8 Examples of Infamous Malware

Learn about the most notorious examples of malware in history that may surprise you with their modus operandi.

 Malware or malicious software is software intended to disrupt, modify or destroy all or part of the elements essential to the proper functioning of the computer.

As soon as this malware software has the ability to multiply, it can be categorized as a computer virus.

If malware is able to collect information from its victims and transfer it to its programmer or a third party, it can be considered as spyware or spyware.

For example, spyware can copy the passwords of its victim and send it to whoever created it.

It is widely used in computer hacking.

To combat malware, you need to use anti-malware software, which will not be discussed in this post.

Here, what interests us are malware and in this post, we show you the examples of malware that really existed and are infamous with their operations.

Examples of infamous malware

We know that malware is harmful to our machines.

Unfortunately, we continue to underestimate how very dangerous they can be.

To understand, nothing beats examples of the most famous malware and their operating modes.

1 / Sircam

Sircam is both a logic bomb inspection and see which spreads through Microsoft Outlook emails.

The computer virus attacks by choosing a document from your “my documents” folder. He then sends a letter with the subject of the name of the document he attacked and the copy of the virus as an attachment.

2 / Stuxnet

It is a war virus, discovered in 2010 by a computer security company VirusBlokAda. This worm has the ability to spy on and reprogram industrial systems.

Balance sheet, out of 45000 systems infected by this worm, 30000 were discovered in Iran and the other 15000 distributed in France, Germany, India and Indonesia.

3/ “I love you”

 A virus that broke many hearts…

This computer worm spreads via email and email attaching an attachment named “LOVE-LETTER-FOR-YOU.TXT.vbs”, when the user clicks on this script it is executed by modifying the registry to make its execution time infinite.

 It then multiplies in several windows system folders to modify the auto-launch registry base in order to run each time windows starts.

Once the operation "Love" completed successfully, this malware changes the homepage of the internet browser to download the trojan WIN-BUGSFIX.

Horse that we will see in the next section!!




4 / WIN-BUGSFIX

This Trojan is downloaded by “I love you” virus.

The latter copies your password then sends it by email to its designer.

It will then create a web file responsible for executing the scripts containing the viruses”I love you”Previously duplicated in the system files to then send it to the victim's contacts.

 The purpose of this computer virus is to collect passwords and then send the virus "I love you" contact with the victim. And the process resumes with each of them.

Result: 350000 computers infected with the “i love you” virus in 10 minutes. The verses Bill Clinton, Ben Laden, Anna Kournikova are the clones of “I love you”.

5 / JIGSAW

It is a worm and ransomware type malware.

It infects its victim's machine via the internet and gives them a one-hour countdown to pay the ransom. Spend this time, the virus deletes the victim's files exponentially every hour.

If in one hour it deletes one file, in two hours it will delete 2-3 others in the machine until there is nothing left.

6 / PETYA

This ransonware only attacks businesses. it encrypts companies' data and then asks them for a large sum of money in return.

7 / REGIN

A spy-type malware discovered in 2014 by two giants, creators of computer antivirus, Kaspersky Lab and Symantec (creator of Norton antivirus).

It is used as a cyber espionage platform against both private and public organizations.

It allows you to listen to telephone conversations, read emails, collect information up to the password in real time.

According to information revealed by Edward Snowden, this malware would be created by the NSA in collaboration with the British spy service, the GCHQ.

8 / WANACRY

Malware that brought a lot of people to tears in 2017 on windows. It is type worms and ransomware.

It encrypts its victim's data making it impossible to recover it and demands a ransom in bitcoin. This makes the transaction impossible to trace.

All computer viruses are malware, but malware is not necessarily a virus. The difference is that one is able to duplicate itself very quickly while the other (malware) may not have this ability.

To get rid of it, you have to use anti-malware instead of antivirus. For more information, I invite you to read the following post:

Examples of infamous malware

ON THE SAME TOPIC