https://invisiblesecurity.blogspot.com/ https://knowledgeanitivirus.blogspot.com/ https://easydatasolutionshere.blogspot.com/ https://anitvirusecurity.blogspot.com/ https://letstechtalkwithus.blogspot.com/ https://computersecuritygossip.blogspot.com/ https://computersecurityinformations.blogspot.com https://computersecurityreviews.blogspot.com/ Techie- Tech: TOP TEN MALWARE VIRUSES

Saturday, April 3, 2021

TOP TEN MALWARE VIRUSES

 

TOP TEN MALWARE VIRUSES



Only yesterday, 1.7 million cyber attacks were registered worldwide. The security provider Check Point has made a list of the most active malware attacks in Spain, specifically during the period of September 2015. The data has been collected through its Threat Cloud map, a tool that collects cyber threats at a level worldwide, and from which you can see how and where the attacks are taking place in real time.

From the security firm they explain that there are two main trends in terms of malware: it is resistant and long-lived. In other words, there are variants of malware identified for years that are still active. And as another security firm confirmed yesterday, the Windows platform continues to be the main target of cybercriminals. Among malware, the ransomware type (which encrypt the information on the computer and ask for a ransom for it) are the ones that are climbing positions more quickly.

TOP TEN MALWARE VIRUSES:

·         CONFICKER: Discovered in 2008, this worm targets Windows platforms. Its variants allow remote code execution and malware download, taking control of the infected machine through its control server (C&C - Command and Control Server).

·         KELIHOS: A botnet that generally attacks Windows platforms. It is before 2010 and, although it has been deactivated on several occasions, it always reappears. Use P2P communications for denial of service (DDoS) attacks, spam, and theft of Bitcoin wallets.

·         ZEROACCESS: Discovered in 2012, they are worms that attack Windows platforms with remote code execution and malware download, through the C&C or P2P server. It runs on low levels of the operating system, making it resistant to common mitigation systems.

·         TEPFER: It is a Trojan that opens a "back door" to track and steal private information, or to remotely control the computer. Discovered in 2012, it mainly targets Windows and often gets into the system through spam or phishing.

·         CRYPTOWALL3: This ransomware, discovered this year, is distributed through drive-by attacks (downloads). First, it encrypts the files on the infected machine and then informs the user that they have to pay a ransom to receive a decryption key.

·         SINOWAL: A resistant Trojan, whose first references are prior to 2009. In its beginnings, it came in an email about swine flu, asking the user to create a personal profile by accessing a certain web page. Now it uses other methods, but it is still designed to steal confidential information.

·         ZEMOT: Discovered in 2014, it is a Trojan “downloader” that is part of a complex network, which includes different types of malware. Once it penetrates the systems, its objective is to carry out fraud (click-fraud attacks). Its variants download new malware and steal sensitive information.

·         ASPROX: It is a botnet active since 2007. Focused on phishing and electronic fraud. It allows phishing attacks, SQL injection attacks to distribute itself, and "pay-per-install" software downloads to generate revenue.

·         CUTWAIL: It is a family of Trojans for Windows, discovered in 2007. Its primary operations are DDoS attacks and spam, but later variants can remotely execute code and collect sensitive information. Use a rootkit to avoid detection and removal.

·         SALITY: One of the most persistent Trojans, discovered in 2003. Its variants allow remote code execution and malware download. Its objective is to resist the infected system and facilitate its remote control through its server.

HOW TO STAY SAFE FROM THEM?

You are familiar with all the top most and dangerous malware viruses that will affect your device and will delete or corrupt files. So how to stay safe from them?

To keep yourself and your data safe from these malware viruses you should use antivirus software and if you have any go to next advance and updated antivirus software that will fight against all these viruses. Choose an antivirus software that is efficient enough to fight all these viruses and give you complete security will fighting all viruses. 

 

No comments:

Difference Between Endpoint Protection & Antivirus Software

  Difference Between Endpoint Protection &  Antivirus Software With regards to cybersecurity, there are parcels and bunches of confusing...