Only
yesterday, 1.7 million cyber attacks were registered worldwide. The security
provider Check Point has made a list of the most active malware attacks in
Spain, specifically during the period of September 2015. The data has been
collected through its Threat Cloud map, a tool that collects cyber threats at a
level worldwide, and from which you can see how and where the attacks are
taking place in real time.
From
the security firm they explain that there are two main trends in terms of
malware: it is resistant and long-lived. In other words, there are variants of
malware identified for years that are still active. And as another security
firm confirmed yesterday, the Windows platform continues to be the main target
of cybercriminals. Among malware, the ransomware type (which encrypt the
information on the computer and ask for a ransom for it) are the ones that are
climbing positions more quickly.
TOP TEN MALWARE VIRUSES:
·
CONFICKER: Discovered in 2008, this worm targets
Windows platforms. Its variants allow remote code execution and malware
download, taking control of the infected machine through its control server
(C&C - Command and Control Server).
·
KELIHOS: A botnet that generally attacks
Windows platforms. It is before 2010 and, although it has been deactivated on
several occasions, it always reappears. Use P2P communications for denial of
service (DDoS) attacks, spam, and theft of Bitcoin wallets.
·
ZEROACCESS: Discovered in 2012, they are worms that
attack Windows platforms with remote code execution and malware download,
through the C&C or P2P server. It runs on low levels of the operating
system, making it resistant to common mitigation systems.
·
TEPFER: It is a Trojan that opens a "back
door" to track and steal private information, or to remotely control the
computer. Discovered in 2012, it mainly targets Windows and often gets into the
system through spam or phishing.
·
CRYPTOWALL3: This ransomware, discovered this year,
is distributed through drive-by attacks (downloads). First, it encrypts the
files on the infected machine and then informs the user that they have to pay a
ransom to receive a decryption key.
·
SINOWAL: A resistant Trojan, whose first
references are prior to 2009. In its beginnings, it came in an email about
swine flu, asking the user to create a personal profile by accessing a certain
web page. Now it uses other methods, but it is still designed to steal
confidential information.
·
ZEMOT: Discovered in 2014, it is a Trojan
“downloader” that is part of a complex network, which includes different types
of malware. Once it penetrates the systems, its objective is to carry out fraud
(click-fraud attacks). Its variants download new malware and steal sensitive
information.
·
ASPROX: It is a botnet active since 2007.
Focused on phishing and electronic fraud. It allows phishing attacks, SQL
injection attacks to distribute itself, and "pay-per-install"
software downloads to generate revenue.
·
CUTWAIL: It is a family of Trojans for Windows,
discovered in 2007. Its primary operations are DDoS attacks and spam, but later
variants can remotely execute code and collect sensitive information. Use a
rootkit to avoid detection and removal.
·
SALITY: One of the most persistent Trojans,
discovered in 2003. Its variants allow remote code execution and malware
download. Its objective is to resist the infected system and facilitate its
remote control through its server.
HOW TO STAY SAFE FROM THEM?
You
are familiar with all the top most and dangerous malware viruses that will
affect your device and will delete or corrupt files. So how to stay safe from
them?
To
keep yourself and your data safe from these malware viruses you should
use antivirus
software and if you have any go to next advance and updated antivirus
software that will fight against all these viruses. Choose an antivirus software that
is efficient enough to fight all these viruses and give you complete security
will fighting all viruses.
No comments:
Post a Comment