Zeus Virus Zeus , ZeuS , or Zbot is a Trojan horse malware package that runs on versions of Microsoft Windows . While it can be used to carry out many malicious and criminal tasks, it is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing . Zeus is very difficult to detect even with up-to-date antivirus and other security software as it hides itself using stealth techniques . [5] It is considered that this is the primary reason why the Zeus malware has become the largest botnet on the Internet: Damballa estimated that the malware infected 3.6 million PCs in the U.S. in 2009. [6] Security experts are advising that businesses continue to offer training to users to teach t...
Posts
- Get link
- X
- Other Apps
Sasser Virus Sasser is a computer worm that affects computers running vulnerable versions of the Microsoft operating systems Windows XP and Windows 2000 . Sasser spreads by exploiting the system through a vulnerable port . Thus it is particularly virulent in that it can spread without user intervention, but it is also easily stopped by a properly configured firewall or by downloading system updates from Windows Update . The specific hole Sasser exploits is documented by Microsoft in its MS04-011 bulletin, for which a patch had been released seventeen days earlier. The effects of Sasser include the news agency Agency France- Presse (AFP) having all its satellite communications blocked for hours and the U.S...
- Get link
- X
- Other Apps
Conficker Conficker , also known as Downup , Downadup and Kido , is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008. [1] It uses flaws in Windows OS software and dictionary attacks on administrator passwords to propagate while forming a botnet , and has been unusually difficult to counter because of its combined use of many advanced malware techniques. [2] [3] The Conficker worm infected millions of computers including government, business and home computers in over 190 countries, making it the largest known computer worm infection since the 2003 Welchia . Impact in Europe Intramar, ...
- Get link
- X
- Other Apps
Stuxnet Virus Stuxnet is a malicious computer worm . Stuxnet specifically targets programmable logic controllers (PLCs), which allow the automation of electro mechanical processes such as those used to control machinery on factory assembly lines, amusement rides, or centrifuges for separating nuclear material. Exploiting four zero-day flaws . Stuxnet functions by targeting machines using the Microsoft Windows operating system and networks, then seeking out Siemens Step7 software. Stuxnet reportedly compromised Iranian PLCs, collecting information on industrial systems and causing the fast-spinning centrifuges to tear themselves apart. Stuxnet’s design and architecture are not domain-specific and it could be tailored as a platform...
- Get link
- X
- Other Apps
My DOOM My doom is primarily transmitted via e-mail , appearing as a transmission error, with subject lines including "Error", "Mail Delivery System", "Test" or "Mail Transaction Failed" in different languages, including English and French. The mail contains an attachment that, if executed , re sends the worm to e-mail addresses found in local files such as a user's address book. It also copies itself to the “shared folder” of peer-to-peer file-sharing application KaZaA in an attempt to spread that way. My doom avoids targeting e-mail addresses at certain universities, such as Rutgers , MIT , Stanford and U C Berkeley , as well as certain companies such as Microsoft and Symantec . Some early reports claimed the wor...
- Get link
- X
- Other Apps
Cryptolocker virus The Crypto Locker ransom ware attack was a cyber attack using the Crypto Locker ransom ware that occurred from 5 September 2013 to late-May 2014. The attack utilized a trojan that targeted computers running Microsoft Windows , and was believed to have first been posted to the Internet on 5 September 2013. It propagated via infected email attachments, and via an existing botnet ; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography , with the private key stored only on the malware's control servers. The malware then displays a message which offers to decrypt the data if a payment (through either bitcoin or a pre-paid cash voucher) is made by a stated deadline, and ...