1.Stuxnet, is one of the viruses are quite excited because the effects are quite real. By making the disk space so that the victim becomes exhausted raises alert “Low Disk Space”. This is because Stuxnet create large junk files that continues to swell.
3. Webmoner, this virus has similarities with Ram nit shortcut that makes 4 files, but instead trigger the virus file has the file extension sys mso.sys.
Tags:
virus
2. Ram nit, is one of the viruses that have successfully replaced the role of Sality in early 2011 in the computer and infects executable files. From January until now, have many computers have been infected with this virus.
3. Webmoner, this virus has similarities with Ram nit shortcut that makes 4 files, but instead trigger the virus file has the file extension sys mso.sys.
4. While Font Agent also have a shortcut file, only to have it trigger the virus file extension font (Font files) such as setup50045.fon or setup50039.fon.
Face book Fever method of attack also penetrated virus in the year 2011. By leveraging state functions and Face book Chat, many things happen like pishing (article pishing FB Chat), slit XSS (article XSS), scam (article Scam) to spread malware.
5. Kolab, a viral Facebook Chat is quite excited because it has a metamorphic abilities. Any malware that spread through the FB Chat, despite having the same size and name, but it has a different hash algorithm.
In addition, utilizing techniques Kolab FakeURL (fake links) as if the computer user to download image files (JPG), when downloaded is a virus.
6. FakeAV, one of the viruses are quite famous since 2 years ago also did not want to lose this year. Recorded two articles have been published by Vaksincom to attack variants of this malware.
FakeAV is a virus that uses fake security application methods (fake antivirus) to trick computer users with notifications and messages that the computer has been infected with a virus and asking computer users to activate the fake antivirus is a way to pay online.
7. Slugin, one of the variant viruses that spread spam also enliven the competition in 2011. If in previous years there Virut, so this year Slugin the culprit of the spread of spam that are not clear.
By utilizing email account users infected computer, then Slugin send spam to contacts that are owned by the user’s computer.
8. BitCoinMiner / DorkBot, this trojan search Zbot reliable enough money. With the digital currency, and there is also money-producing business programs by mining (mining bitcoin), the virus makers make this as one way that is practical.
By doing BitCoin Mining on thousands of computers infected, it will easily generate enough money. BitCoinMiner itself has 2 variant virus that uses the first icon on the alphabet as the spread of the virus file.
While the second variant uses a method of spreading the virus file Kolab with Facebook Chat. The file is any different, because it uses icons sexy women to attract attention.
9. MacSecurity, variants of this virus is quite a scene in the mid-2011 because it has 5 different variants, but the same is MacDefender, MacGuard, MacProtector, MacShield and MacSecurity.
Have the same character as FakeAV that runs on Windows, MacSecurity trick computer users with notifications and messages that the computer has been infected with a virus and asking computer users to activate the fake antivirus is a way to pay online.
10. Android viruses, like replacing the role of Windows Mobile, Android this year and even fairly rocketed almost every day a lot of applications made specifically for the operating system.
click the Below link download this file |
---|
Virus name | Spreading | Damage | Discovered |
Exploit.CVE-2011-3402.Gen | VERY LOW | LOW | 2011 Nov 07 |
Backdoor.IRCBot.Dorkbot.A | MEDIUM | MEDIUM | 2011 May 15 |
Backdoor.Lavandos.A | MEDIUM | HIGH | 2011 Jan 06 |
Trojan.Android.Geinimi.A | VERY LOW | HIGH | 2011 Jan 03 |
Java.Trojan.Downloader.OpenConnection.AI | HIGH | MEDIUM | 2010 Nov 12 |
Java.Backdoor.ReverseBackdoor.A | LOW | MEDIUM | 2010 Nov 12 |
Win32.Ramnit.G | VERY LOW | VERY LOW | 2010 Oct 28 |
Trojan.Spy.Ursnif.F | MEDIUM | HIGH | 2010 Oct 20 |
Win32.Worm.Stuxnet.A | HIGH | MEDIUM | 2010 Oct 07 |
Win32.Worm.Prolaco.S | MEDIUM | MEDIUM | 2010 Oct 06 |
Exploit.CplLnk.Gen | MEDIUM | LOW | 2010 Jul 19 |
Worm.P2P.Palevo.FP | HIGH | MEDIUM | 2010 Jul 09 |
Win32.Viking.Gen | MEDIUM | MEDIUM | 2010 Jul 07 |
Win32.Worm.Autorun.UB | LOW | LOW | 2010 Jul 01 |
Trojan.Spy.ZBot.EPU | VERY LOW | VERY LOW | 2010 Jun 30 |
Trojan.PWS.OnlineGames.KDLC | LOW | MEDIUM | 2010 Jun 21 |
Backdoor.MSIL.Bot.A | VERY LOW | LOW | 2010 Jun 14 |
Backdoor.Bifrose.AAJX | VERY LOW | MEDIUM | 2010 Jun 14 |
Trojan.Renos.PGZ | MEDIUM | LOW | 2010 Jun 01 |
Trojan.PWS.OnlineGames.KDKC | LOW | LOW | 2010 May 30 |
If you enjoyed this post and wish to be informed whenever a new post is published, then make sure you subscribe to my regular Email Updates. Subscribe Now!
0 comments:
Have any question? Feel Free To Post Below: