TOP TEN MALWARE VIRUSES
- Get link
- X
- Other Apps
Only yesterday, 1.7 million cyberattacks were registered worldwide. The security provider Check Point has made a list of the most active malware attacks in Spain, specifically during the period of September 2015. The data has been collected through its Threat Cloud map, a tool that collects cyber threats at a level worldwide, and from which you can see how and where the attacks are taking place in real time.
From the security firm they explain that there are two main
trends in terms of malware: it is resistant and long-lived. In other words,
there are variants of malware identified for years that are still active. And
as another security firm confirmed yesterday, the Windows platform continues to
be the main target of cybercriminals. Among malware, the ransomware type (which
encrypt the information on the computer and ask for a ransom for it) are the
ones that are climbing positions more quickly.
TOP
TEN MALWARE VIRUSES:
Ø CONFICKER:
Discovered in 2008, this worm targets Windows platforms. Its variants allow
remote code execution and malware download, taking control of the infected
machine through its control server (C&C - Command and Control Server).
Ø KELIHOS: A botnet that
generally attacks Windows platforms. It is before 2010 and, although it has
been deactivated on several occasions, it always reappears. Use P2P
communications for denial of service (DDoS) attacks, spam, and theft of Bitcoin
wallets.
Ø ZEROACCESS: Discovered
in 2012, they are worms that attack Windows platforms with remote code
execution and malware download, through the C&C or P2P server. It runs on
low levels of the operating system, making it resistant to common mitigation
systems.
Ø TEPFER: It is a Trojan that
opens a "back door" to track and steal private information, or to
remotely control the computer. Discovered in 2012, it mainly targets Windows
and often gets into the system through spam or phishing.
Ø CRYPTOWALL3: This ransomware,
discovered this year, is distributed through drive-by attacks (downloads).
First, it encrypts the files on the infected machine and then informs the user
that they have to pay a ransom to receive a decryption key.
Ø SINOWAL: A resistant Trojan,
whose first references are prior to 2009. In its beginnings, it came in an
email about swine flu, asking the user to create a personal profile by
accessing a certain web page. Now it uses other methods, but it is still
designed to steal confidential information.
Ø ZEMOT: Discovered in 2014, it
is a Trojan “downloader” that is part of a complex network, which includes
different types of malware. Once it penetrates the systems, its objective is to
carry out fraud (click-fraud attacks). Its variants download new malware and
steal sensitive information.
Ø ASPROX: It is a botnet active
since 2007. Focused on phishing and electronic fraud. It allows phishing
attacks, SQL injection attacks to distribute itself, and
"pay-per-install" software downloads to generate revenue.
Ø CUTWAIL: It is a family of
Trojans for Windows, discovered in 2007. Its primary operations are DDoS
attacks and spam, but later variants can remotely execute code and collect
sensitive information. Use a rootkit to avoid detection and removal.
Ø SALITY: One of the most
persistent Trojans, discovered in 2003. Its variants allow remote code
execution and malware download. Its objective is to resist the infected system
and facilitate its remote control through its server.
HOW TO
STAY SAFE FROM THEM?
You are familiar with all the top most and dangerous
malware viruses that will affect your device and will delete or corrupt files.
So how to stay safe from them?
To keep yourself and your data safe from these malware
viruses you should use antivirus
software and if you have any go to next advance and updated antivirus
software that will fight against all these viruses. Choose an antivirus software that
is efficient enough to fight all these viruses and give you complete security
will fighting all viruses.
- Get link
- X
- Other Apps
Comments
Post a Comment