Malware Viruses
Only yesterday, 1.7 million cyberattacks were registered worldwide. The security provider Check Point has made a list of the most active malware attacks in Spain, specifically during the period of September 2015. The data has been collected through its Threat Cloud map, a tool that collects cyber threats at a level worldwide, and from which you can see how and where the attacks are taking place in real-time.
From the security firm they explain that there are two main trends in terms of malware: it is resistant and long-lived. In other words, there are variants of malware identified for years that are still active. And as another security firm confirmed yesterday, the Windows platform continues to be the main target of cybercriminals. Among malware, the ransomware-type (which encrypt the information on the computer and ask for a ransom for it) are the ones that are climbing positions more quickly.
10 Malware Viruses:
- Conficker: Discovered in 2008, this worm targets Windows platforms. Its variants allow remote code execution and malware download, taking control of the infected machine through its control server (C&C - Command and Control Server).
- Kelihos: A botnet that generally attacks Windows platforms. It is before 2010 and, although it has been deactivated on several occasions, it always reappears. Use P2P communications for denial of service (DDoS) attacks, spam, and theft of Bitcoin wallets.
- Zeroaccess: Discovered in 2012, they are worms that attack Windows platforms with remote code execution and malware download, through the C&C or P2P server. It runs on low levels of the operating system, making it resistant to common mitigation systems.
- Tepfer: It is a Trojan that opens a "back door" to track and steal private information, or to remotely control the computer. Discovered in 2012, it mainly targets Windows and often gets into the system through spam or phishing.
- Cryptowall3: This ransomware, discovered this year, is distributed through drive-by attacks (downloads). First, it encrypts the files on the infected machine and then informs the user that they have to pay a ransom to receive a decryption key.
- Sinowal: A resistant Trojan, whose first references are before 2009. In its beginnings, it came in an email about swine flu, asking the user to create a personal profile by accessing a certain web page. Now it uses other methods, but it is still designed to steal confidential information.
- Zemot: Discovered in 2014, it is a Trojan “downloader” is part of a complex network, which includes different types of malware. Once it penetrates the systems, its objective is to carry out fraud (click-fraud attacks). Its variants download new malware and steal sensitive information.
- Asprox: It is a botnet active since 2007. Focused on phishing and electronic fraud. It allows phishing attacks, SQL injection attacks to distribute themselves, and "pay-per-install" software downloads to generate revenue.
- Cutwail: It is a family of Trojans for Windows, discovered in 2007. Its primary operations are DDoS attacks and spam, but later variants can remotely execute code and collect sensitive information. Use a rootkit to avoid detection and removal.
- Sality: One of the most persistent Trojans, discovered in 2003. Its variants allow remote code execution and malware download. Its objective is to resist the infected system and facilitate its remote control through its server.
How to Stay Safe from Them?
You are
familiar with all the topmost and dangerous malware viruses that will affect
your device and will delete or corrupt files. So how do stay safe from them?
To keep
yourself and your data safe from these malware viruses you should use total security software and if you have any go-to next advance and updated
antivirus software that will fight against all these viruses. Choose an antivirus
software that is efficient enough to fight all these viruses
and give you complete security while fighting all viruses.
Comments
Post a Comment