Learn about the most notorious examples of malware in history that may surprise you with their modus operandi.
Malware or malicious software is software intended to disrupt, modify or destroy all or part of the elements essential to the proper functioning of the computer.
As soon as this malware software has the ability to multiply, it can be categorized as a computer virus.
If malware is able to collect information from its victims and transfer it to its programmer or a third party, it can be considered as spyware or spyware.
For example, spyware can copy the passwords of its victim and send it to whoever created it.
It is widely used in computer hacking.
To combat malware, you need to use anti-malware software, which will not be discussed in this post.
Here, what interests us are malware and in this post, we show you the examples of malware that really existed and are infamous with their operations.
Examples of infamous malware
We know that malware is harmful to our machines.
Unfortunately, we continue to underestimate how very dangerous they can be.
To understand, nothing beats examples of the most famous malware and their operating modes.
1 / Sircam
Sircam is both a logic bomb inspection and see which spreads through Microsoft Outlook emails.
The computer virus attacks by choosing a document from your “my documents” folder. He then sends a letter with the subject of the name of the document he attacked and the copy of the virus as an attachment.
2 / Stuxnet
It is a war virus, discovered in 2010 by a computer security company VirusBlokAda. This worm has the ability to spy on and reprogram industrial systems.
Balance sheet, out of 45000 systems infected by this worm, 30000 were discovered in Iran and the other 15000 distributed in France, Germany, India and Indonesia.
3/ “I love you”
A virus that broke many hearts…
This computer worm spreads via email and email attaching an attachment named “LOVE-LETTER-FOR-YOU.TXT.vbs”, when the user clicks on this script it is executed by modifying the registry to make its execution time infinite.
It then multiplies in several windows system folders to modify the auto-launch registry base in order to run each time windows starts.
Once the operation "Love" completed successfully, this malware changes the homepage of the internet browser to download the trojan WIN-BUGSFIX.
Horse that we will see in the next section!!
4 / WIN-BUGSFIX
This Trojan is downloaded by “I love you” virus.
The latter copies your password then sends it by email to its designer.
It will then create a web file responsible for executing the scripts containing the viruses”I love you”Previously duplicated in the system files to then send it to the victim's contacts.
The purpose of this computer virus is to collect passwords and then send the virus "I love you" contact with the victim. And the process resumes with each of them.
Result: 350000 computers infected with the “i love you” virus in 10 minutes. The verses Bill Clinton, Ben Laden, Anna Kournikova are the clones of “I love you”.
5 / JIGSAW
It is a worm and ransomware type malware.
It infects its victim's machine via the internet and gives them a one-hour countdown to pay the ransom. Spend this time, the virus deletes the victim's files exponentially every hour.
If in one hour it deletes one file, in two hours it will delete 2-3 others in the machine until there is nothing left.
6 / PETYA
This ransonware only attacks businesses. it encrypts companies' data and then asks them for a large sum of money in return.
7 / REGIN
A spy-type malware discovered in 2014 by two giants, creators of computer antivirus, Kaspersky Lab and Symantec (creator of Norton antivirus).
It is used as a cyber espionage platform against both private and public organizations.
It allows you to listen to telephone conversations, read emails, collect information up to the password in real time.
According to information revealed by Edward Snowden, this malware would be created by the NSA in collaboration with the British spy service, the GCHQ.
8 / WANACRY
Malware that brought a lot of people to tears in 2017 on windows. It is type worms and ransomware.
It encrypts its victim's data making it impossible to recover it and demands a ransom in bitcoin. This makes the transaction impossible to trace.
All computer viruses are malware, but malware is not necessarily a virus. The difference is that one is able to duplicate itself very quickly while the other (malware) may not have this ability.
To get rid of it, you have to use anti-malware instead of antivirus. For more information, I invite you to read the following post:
ON THE SAME TOPIC
- Tux Typing: the educational game that turns learning the keyboard into an adventure!
- Cash register – The essential solution to better manage your business
- Rent or buy your computer? possibility of renting with option to buy
- Become a good programmer: The keys to excel in the different fields of programming!
- The 10 things that annoy PC users the most
- Tizen OS – 12 Things You (Maybe) Didn't Know About This System
- HP All-in-One Desktop PC: The All-in-One Computer Starts Up but the Screen Displays Nothing
- Git linking local repository to remote repository – How to link your local repository to the remote repository to protect your project.
- 8 Examples of Infamous Malware
- Y2MATE – youtube video downloader and converter
- mbind: Operation not permitted – mysql – troubleshooting
- Ubuntu Won't Launch After Installation – 3 Solutions – Troubleshooting
- The 4 rules of simple design according to Kent Beck
- 10 free apps to learn typing without looking
- How to install Mysql in ubuntu 20.04 lts - tutorial
- Bluesky – The decentralized social network backed by former Twitter CEO