Posts

Image
                                         Zeus  Virus Zeus ,  ZeuS , or  Zbot  is a  Trojan horse   malware  package that runs on versions of  Microsoft Windows . While it can be used to carry out many malicious and criminal tasks, it is often used to steal banking information by  man-in-the-browser   keystroke logging  and  form grabbing .  Zeus is very difficult to detect even with up-to-date antivirus and other security software as it hides itself using  stealth techniques . [5]  It is considered that this is the primary reason why the Zeus malware has become the largest botnet on the Internet:  Damballa  estimated that the malware infected 3.6 million  PCs  in the U.S. in 2009. [6]  Security experts are advising that businesses continue to offer training to users to teach t...
Image
                                                Sasser Virus Sasser  is a  computer worm  that affects computers running vulnerable versions of the  Microsoft   operating systems   Windows XP  and  Windows 2000 . Sasser spreads by exploiting the system through a vulnerable  port . Thus it is particularly virulent in that it can spread without user intervention, but it is also easily stopped by a properly configured  firewall  or by downloading system updates from  Windows Update . The specific hole Sasser exploits is documented by Microsoft in its  MS04-011  bulletin, for which a patch had been released seventeen days earlier. The effects of Sasser include the  news agency   Agency France- Presse  (AFP) having all its satellite communications blocked for hours and the  U.S...
Image
                                                                        Conficker Conficker , also known as  Downup ,  Downadup  and  Kido , is a  computer worm  targeting the  Microsoft Windows   operating system  that was first detected in November 2008. [1]  It uses flaws in Windows OS software and  dictionary attacks  on administrator passwords to propagate while forming a  botnet , and has been unusually difficult to counter because of its combined use of many advanced malware techniques. [2] [3]  The Conficker worm infected millions of computers including government, business and home computers in over 190 countries, making it the largest known computer worm infection since the 2003  Welchia . Impact in Europe Intramar, ...
Image
                                            Stuxnet Virus    Stuxnet  is a  malicious   computer worm .  Stuxnet specifically targets  programmable logic controllers  (PLCs), which allow the automation of electro mechanical processes such as those used to control machinery on factory assembly lines, amusement rides, or  centrifuges  for separating nuclear material. Exploiting four  zero-day flaws .  Stuxnet functions by targeting machines using the  Microsoft Windows  operating system and networks, then seeking out  Siemens  Step7 software. Stuxnet reportedly compromised Iranian PLCs, collecting information on industrial systems and causing the fast-spinning centrifuges to tear themselves apart.  Stuxnet’s design and architecture are not domain-specific and it could be tailored as a platform...
Image
                                              My DOOM My doom is primarily transmitted via  e-mail , appearing as a transmission error, with subject lines including "Error", "Mail Delivery System", "Test" or "Mail Transaction Failed" in different languages, including English and French. The mail contains an  attachment  that, if  executed , re sends the worm to e-mail addresses found in local files such as a user's address book. It also copies itself to the “shared folder” of  peer-to-peer   file-sharing  application  KaZaA  in an attempt to spread that way. My doom avoids targeting e-mail addresses at certain universities, such as  Rutgers ,  MIT ,  Stanford  and  U C Berkeley , as well as certain companies such as  Microsoft  and  Symantec . Some early reports claimed the wor...
Image
                           Cryptolocker virus The  Crypto Locker ransom ware attack  was a  cyber attack  using the  Crypto Locker   ransom ware  that occurred from 5 September 2013 to late-May 2014. The attack utilized a  trojan  that targeted computers running  Microsoft Windows ,  and was believed to have first been posted to the Internet on 5 September 2013.  It propagated via infected email attachments, and via an existing  botnet ; when activated, the malware  encrypts  certain types of files stored on local and mounted network drives using RSA  public-key cryptography , with the private key stored only on the malware's control servers. The malware then displays a message which offers to decrypt the data if a payment (through either  bitcoin  or a pre-paid cash voucher) is made by a stated deadline, and ...