Top 10 Most Dangerous Computer Virus World and Indonesia in the last year. Where growth variants threat or threat of computer viruses and the like are increasingly sophisticated and widespread. Not only for one platform only, but to other operating systems besides Windows. This becomes the cause of the increased activity associated with the virtual world.
Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, entered into SCADA systems commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so on. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.
The following are the top 10 malware roaming in cyberspace Indonesia and the world are successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.
1. Win32/Conficker.AA
Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm entered into a computer by exploiting a vulnerability in Server Service. After Conficker.AA successfully, the sending computer will perform remote control of the victim's computer has been infected and to download.
2. Win32/Conficker.AE
Win32/Conficker.AE is a worm which is also one variant of Conficker.AA, with the modus operandi resembles the way the spread spread Conficker.AA
3. Win32/Agent
According to the description of ESET NOD32 as malware malware detection is generic, which is known among the large family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak him then putting yourself in a temporary folder and add the keys in the registry similar to the malware file or similar to the files to copy themselves at random that was then put yourself in the system folders other operations so that malware can "work" at any time the system starts up.
The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.
4. Win32/Conficker.Gen
Win32/Conficker.Gen is one variant of Conficker that have similarities in the modus operandi of infecting the victim's computer. Similarly, also exploited the same vulnerability is a vulnerability in Server Service.
5. Win32/Conficker.X
Threat this one is a worm that attacks a network computer and spreads by exploiting vulnerabilities in Windows operating system from Microsoft. The vulnerability specifically on the RPC subsystem and can be entered remotely by the attacker. Attackers can launch attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs to another by using the domain name has not been authorized.
6. Win32/VB
Worm Win32.VB created with Visual Basic programming language and is able to spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country many are included in this type.
7. INF/Conficker
INF / Conficker is the autorun.inf files that spread Conficker worm. Detection results are also used to parse a set of malware that uses the file autorun.inf as a way to enter and infect personal computers. These files contain information about the program that was developed to be able to run it as a mobile device (eg USB flash disks) and other similar devices accessed by users who use Windows-based PCs.
8. Win32/Alman.NAB
Viruses that infect files. EXE, and spreads through the media that are used together in a computer network. When the virus is active, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A
9. Win32/Stuxnet.A
Win32/Stuxnet.A is a worm that spreads widely through mobile media devices. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerabilities that are exploited in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) is quite popular in the year 2010 as targeted in the automation SCADA systems are widely used in industry.
10. INF/Autorun.gen
Deteksi terhadap INF/Autorun.Gen digunakan untuk menguraikan serangkaian malware yang menggunakan file autorun sebagai cara untuk mengonfirmasi komputer-PC target yang berhasil diserang. File tersebut berisikan informasi program yang dikembangkan untuk mampu melakukan run secara saat perangkat bergerak (misal USB flash disk dan perangkat lain yang sejenis diakses oleh user yang menggunakan PC berbasis Windows.
Source: wayjar.com
No comments:
Post a Comment