sexta-feira, 5 de setembro de 2014

10 Most Destructive Computer Viruses

Getting a mechanism virus has happened to many users in some conform or another. To most, it is simply a amiable inconvenience, requiring a cleanup and afterwards installing that antivirus module that you’ve been definition to implement though never got around to. But in other cases, it can be a finish disaster, with your mechanism branch into a really costly section that that no volume of antivirus can protect.


In this list, we will prominence some of a misfortune and scandalous mechanism viruses that have caused a lot of repairs in genuine life. And given people customarily proportion ubiquitous malware like worms and trojan horses as viruses, we’re including them as well. These malware have caused extensive harm, amounting to billions of dollars and disrupting vicious genuine life infrastructure. Here are a 10 many famous and antagonistic mechanism viruses.



1. ILOVEYOU


The ILOVEYOU pathogen is considered one of a many destructive mechanism pathogen ever created and it’s not tough to see why. The pathogen managed to mutilate massacre on mechanism systems all over a world, causing indemnification totaling in during an guess of $10 billion. 10% of a world’s Internet-connected computers were believed to have been infected. It was so bad that governments and vast companies took their mailing complement offline to forestall infection.


via BBC


The pathogen was combined by dual Filipino programers, Reonel Ramones and Onel de Guzman. What it did was use amicable engineering to get people to click on a attachment; in this case, a adore confession. The tie was indeed a book that poses as a TXT file, due to Windows during a time stealing a tangible prolongation of a file. Once clicked, it will send itself to everybody in a user’s mailing list and ensue to overwrite files with itself, creation a mechanism unbootable. The dual were never charged, as there were no laws about malware. This led to a dramatization of a E-Commerce Law to residence a problem.


2. Code Red


Code Red initial flush on 2001 and was detected by dual eEye Digital Security employees. It was named Code Red given a a span were drinking Code Red Mountain Dew during a time of discovery. The worm targeted computers with Microsoft IIS web server installed, exploiting a aegis crawl problem in a system. It leaves really small snippet on a tough hoop as it is means to run wholly on memory, with a distance of 3,569 bytes. Once infected, it will ensue to make a hundred copies of itself though due to a bug in a programming, it will transcribe even some-more and ends adult eating a lot of a systems resources.


via F-Secure


It will afterwards launch a rejection of use dispute on several IP address, famous among them a website of a White House. It also allows backdoor entrance to a server, permitting for remote entrance to a machine. The many noted sign is a summary it leaves behind on influenced web pages, “Hacked By Chinese!”, that has spin a meme itself. A patch was after expelled and it was guess that it caused $2 billion in mislaid productivity. A sum of 1-2 million servers were affected, that is extraordinary when we cruise there were 6 million IIS servers during a time.


3. Melissa


Named after an outlandish dancer from Florida, it was combined by David L. Smith in 1999. It started as an putrescent Word document that was posted adult on a alt.sex usenet group, claiming to be a list of passwords for racy sites. This got people extraordinary and when it was downloaded and opened, it would trigger a macro inside and unleash a payload. The pathogen will mail itself to a tip 50 people in a user’s email residence book and this caused an boost of email traffic, disrupting a email services of governments and corporations. It also sometimes depraved documents by inserting a Simpsons anxiety into them.


via MSN Canada


Smith was eventually held when they traced a Word request to him. The record was uploaded regulating a stolen AOL comment and with their help, law coercion was means to detain him reduction than a week given a dispute began. He cooperated with a FBI in capturing other pathogen creators, famous among them a creator of a Anna Kournikova virus. For his cooperation, he served customarily 20 months and paid a excellent of $5000 of his 10 year sentence. The pathogen reportedly caused $80 million in damages.


4. Sasser


A Windows worm initial detected in 2004, it was combined by mechanism scholarship tyro Sven Jaschan, who also combined a Netsky worm. While a cargo itself might be seen as simply irritating (it slows down and crashes a computer, while creation it tough to reset though slicing a power), the effects were impossibly disruptive, with millions of computers being infected, and important, vicious infrastructure affected. The worm took advantage of a aegis crawl disadvantage in Local Security Authority Subsystem Service (LSASS), that controls a confidence process of internal accounts causing crashes to a computer. It will also use a complement resources to generate itself to other machines by a Internet and taint others automatically.


via HP


The effects of a pathogen were widespread as while a feat was already patched, many computers haven’t updated. This led to some-more than a million infections, holding out vicious infrastructures, such as airlines, news agencies, open transportation, hospitals, open transport, etc. Overall, a repairs was estimated to have cost $18 billion. Jaschen was attempted as a minor and perceived a 21 month dangling sentence.


5. Zeus


Zeus is a Trojan equine done to taint Windows computers so that it will perform several rapist tasks. The many common of these tasks are customarily man-in-the-browser keylogging and form grabbing. The infancy of computers were putrescent possibly by drive-by downloads or phishing scams. First identified in 2009, it managed to concede thousands of FTP accounts and computers from large multinational companies and banks such as Amazon, Oracle, Bank of America, Cisco, etc. Controllers of a Zeus botnet used it to take a login certification of amicable network, email and banking accounts.


via Abuse.ch


In a US alone, it was estimated that more than 1 million computers were infected, with 25% in a US. The whole operation was sophisticated, involving people from around a universe to act as income mules to filch and send income to a ringleaders in Eastern Europe. About $70 million were stolen and in possession of a ring. 100 people were arrested in tie of a operation. In late 2010, a creator of Zeus announced his retirement though many experts trust this to be false.


6. Conficker


Also famous as Downup or Downadup, Conficker is a worm of different authorship for Windows that done a initial coming in 2008. The name comes form a English word, configure and a German pejorative.It infects computers regulating flaws in a OS to emanate a botnet. The malware was means to taint some-more than 9 millions computers all around a world, inspiring governments, businesses and individuals. It was one of a largest famous worm infections to ever surface causing an guess repairs of $9 billion.


via Wikipedia


The worm works by exploiting a network use vulnerability that was benefaction and unpatched in Windows. Once infected, a worm will afterwards reset comment lockout policies, retard entrance to Windows refurbish and antivirus sites, spin off certain services and close out user accounts among many. Then, it proceeds to implement program that will spin a mechanism into a botnet slave and scareware to fraud income off a user. Microsoft after supposing a repair and patch with many antivirus vendors providing updates to their definitions.


7. Stuxnet


Believed to have been combined by a Israeli Defence Force together with a American Government, Stuxnet is an instance of a pathogen combined for a purpose of cyberwarfare, as it was dictated to interrupt a chief efforts of a Iranians. It was estimated that Stuxnet has managed to hurt one fifth of Iran’s chief centrifuges and that scarcely 60% of infections were strong in Iran.


via IEEE


The mechanism worm was designed to dispute industrial Programmable Logic Controllers (PLC), that allows for automation of processes in machinery. It privately directed during those combined by Siemens and was widespread by putrescent USB drives. If a putrescent mechanism didn’t enclose Siemens software, it would lay asleep and taint others in a singular conform as to not give itself away. If a program is there, it will afterwards ensue to change a speed of a machinery, causing it to rip apart. Siemens eventually found a approach to mislay a malware from their software.


8. Mydoom


Surfacing in 2004, Mydoom was a worm for Windows that became one of a fastest swelling email worm given ILOVEYOU. The author is different and it is believed that a creator was paid to emanate it given it contains a content message, “andy; I’m customarily doing my job, zero personal, sorry,”. It was named by McAfee worker Craig Schmugar, one of a people who had creatively detected it. ‘mydom’ was a line of content in a program’s formula (my domain) and intuiting this was going to be big, combined ‘doom’ into it.


via Virus.Wikidot.com


The worm spreads itself by appearing as an email delivery blunder and contains an tie of itself. Once executed, it will send itself to email addresses that are in a user’s residence book and copies itself to any P2P program’s folder to generate itself by that network. The cargo itself is twofold: initial it opens adult a backdoor to concede remote entrance and second it launches a rejection of use dispute on a argumentative SCO Group. It was believed that the worm was combined to interrupt SCO due to dispute over tenure of some Linux code. It caused an guess of $38.5 billion in indemnification and a worm is still active in some form today.


9. CryptoLocker


CryptoLocker is a form of Trojan equine ransomware targeted during computers regulating Windows. It uses several methods to widespread itself, such as email, and once a mechanism is infected, it will ensue to encrypt certain files on a tough expostulate and any mounted storage connected to it with RSA open pivotal cryptography. While it is easy adequate to mislay a malware from a computer, a files will still sojourn encrypted. The customarily approach to clear a files is to compensate a release by a deadline. If a deadline is not met, a release will boost significantly or a decryption keys deleted. The release customarily volume to $400 in prepaid income or bitcoin.


via Bleepingcomputer.com


The release operation was eventually stopped when law coercion agencies and confidence companies managed to take control partial of a botnet handling CryptoLocker and Zeus. Evgeniy Bogachev, a ring leader, was charged and a encryption keys were expelled to a influenced computers. From information collected from a raid, a series of infections is estimated to be 500,000, with a series of those who paid a release to be during 1.3%, amounting to $3 million.


10. Flashback


Though not as deleterious as a rest of a malware on this list, this is one of a few Mac malware to have benefit notoriety as it showed that Macs are not immune. The Trojan was initial discovered in 2011 by antivirus association Intego as a feign Flash install. In a newer incarnation, a user simply needs to have Java enabled (which is expected a infancy of us). It propagates itself by regulating compromised websites containing JavaScript formula that will download a payload. Once installed, a Mac becomes partial of a botnet of other putrescent Macs.


via CNET


The good news is that if it is infected, it is simply localized to that specific user’s account. The bad news is that some-more than 600,000 Macs were infected, including 274 Macs in a Cupertino area, a domicile of Apple. Oracle published a repair for a exploit with Apple releasing an refurbish to mislay Flashback from people’s Mac. It is still out in a wild, with an guess of 22,000 Macs still putrescent as of 2014.




10 Most Destructive Computer Viruses

Nenhum comentário:

Postar um comentário