WHAT IS EMAIL BOMBARDMENT?

Image
An email bombing is an attack on your inbox that involves sending massive amounts of messages to it. Sometimes these messages are incomprehensible. But more often, they will be confirmation emails for newsletters and subscriptions. Thus, in the latter case, the attacker uses a script to search for forums and newsletters on the internet. Then they sign up for an account with your email address. Each will send you a confirmation email, asking you to confirm your address. Also, this process is repeated on as many unprotected sites as the script can find. The term Email Bombing or Email Bombing; it can also refer to flooding an email server with too many emails. In an attempt to overwhelm the server and disable it. But that's not the goal here; it would be a challenge to cut down on the modern email accounts used. Meanwhile, Google or Microsoft email servers, anyway. So instead of a denial of service (DOS) attack; against the email servers you are using. Also, the flood of messages...

TOP TEN MALWARE VIRUSES

Only yesterday, 1.7 million cyberattacks were registered worldwide. The security provider Check Point has made a list of the most active malware attacks in Spain, specifically during the period of September 2015. The data has been collected through its Threat Cloud map, a tool that collects cyber threats at a level worldwide, and from which you can see how and where the attacks are taking place in real time.

malware virus

From the security firm they explain that there are two main trends in terms of malware: it is resistant and long-lived. In other words, there are variants of malware identified for years that are still active. And as another security firm confirmed yesterday, the Windows platform continues to be the main target of cybercriminals. Among malware, the ransomware type (which encrypt the information on the computer and ask for a ransom for it) are the ones that are climbing positions more quickly.

TOP TEN MALWARE VIRUSES:

Ø CONFICKER: Discovered in 2008, this worm targets Windows platforms. Its variants allow remote code execution and malware download, taking control of the infected machine through its control server (C&C - Command and Control Server).

Ø KELIHOS: A botnet that generally attacks Windows platforms. It is before 2010 and, although it has been deactivated on several occasions, it always reappears. Use P2P communications for denial of service (DDoS) attacks, spam, and theft of Bitcoin wallets.

Ø ZEROACCESS: Discovered in 2012, they are worms that attack Windows platforms with remote code execution and malware download, through the C&C or P2P server. It runs on low levels of the operating system, making it resistant to common mitigation systems.

Ø TEPFER: It is a Trojan that opens a "back door" to track and steal private information, or to remotely control the computer. Discovered in 2012, it mainly targets Windows and often gets into the system through spam or phishing.

Ø CRYPTOWALL3: This ransomware, discovered this year, is distributed through drive-by attacks (downloads). First, it encrypts the files on the infected machine and then informs the user that they have to pay a ransom to receive a decryption key.

Ø SINOWAL: A resistant Trojan, whose first references are prior to 2009. In its beginnings, it came in an email about swine flu, asking the user to create a personal profile by accessing a certain web page. Now it uses other methods, but it is still designed to steal confidential information.

Ø ZEMOT: Discovered in 2014, it is a Trojan “downloader” that is part of a complex network, which includes different types of malware. Once it penetrates the systems, its objective is to carry out fraud (click-fraud attacks). Its variants download new malware and steal sensitive information.

Ø ASPROX: It is a botnet active since 2007. Focused on phishing and electronic fraud. It allows phishing attacks, SQL injection attacks to distribute itself, and "pay-per-install" software downloads to generate revenue.

Ø CUTWAIL: It is a family of Trojans for Windows, discovered in 2007. Its primary operations are DDoS attacks and spam, but later variants can remotely execute code and collect sensitive information. Use a rootkit to avoid detection and removal.

Ø SALITY: One of the most persistent Trojans, discovered in 2003. Its variants allow remote code execution and malware download. Its objective is to resist the infected system and facilitate its remote control through its server.

HOW TO STAY SAFE FROM THEM?

You are familiar with all the top most and dangerous malware viruses that will affect your device and will delete or corrupt files. So how to stay safe from them?

To keep yourself and your data safe from these malware viruses you should use antivirus software and if you have any go to next advance and updated antivirus software that will fight against all these viruses. Choose an antivirus software that is efficient enough to fight all these viruses and give you complete security will fighting all viruses. 


Comments

Popular posts from this blog

WHAT IS EMAIL BOMBARDMENT?

TESTING THE ANTIVIRUS THAT YOU USE

WHAT IS PAZERA TROJAN AND HOW TO AVOID IT