The most Deadly Computer Virus in 2020- Part 2

The most Deadly Computer Virus in 2020-(Part 2)

The term computer virus is very common nowadays. In today's young society in our country, there may not be anyone who is not familiar with the word computer virus or never heard. We always use computers or laptops for our various tasks. But do we know how computers are damaged by viruses or which viruses are deadly to computers? How much do we know about this?

However, some of these viruses are discussed in Part-1. However, in addition to some of the notable viruses in Episode 1, there are other viruses / worms that have caused millions of billions of dollars in damage to computers and billions of dollars since their discovery. The viruses are:

1. Cryptolocker

Cryptolocker is a type of ransomware virus that belongs to the Trojan horse class. Cryptolcers usually attack Windows running versions of computers. This Trojan horse virus does not primarily target Mac devices. Once the computer is infected by the virus, all the data on that computer is encrypted. The virus can come through a variety of methods; E-mail is one of them.

In this case, the attachment of the virus will come in the form of a file and ".doc or .pdf" may be added as an extension at the end of the file name. Opening the file will automatically create a new Windows on your computer and the downloader will be activated. As a result, the virus will be downloaded without your knowledge. However, all the files on the computer will be encrypted. Therefore, to protect against this ransomware, it is best not to open files from unknown e-mail addresses.

2. The Anna Kournikova Virus

The Anna Kournikova Virus- This is a worm that spreads very quickly via e-mail. In this case the attachment of the virus comes in the form of a file. The file name may be "AnnaKournikova.vbs". However, this worm is a pay-load free virus (Pay-load free virus) so it does not delete any file on the computer or copy any information. To create the worm, a programmer used a tool-kit called Jan De Wit. Naming the virus was a tactical move for him. Anna Kournikova is a Russian tennis player and the use of her name and picture caused confusion among many people.

3. Sircam

Sircam is also a computer worm. It was first broadcast via mail on the Microsoft Windows system in 2001. People who use Windows 95, 98, Millenium and Microsoft Outlook are more likely to be exposed to the virus. Sircam has several code names such as: W32.Sircam.Worm@mm, Backdoor.SirCam or Troj_Sircam.a.

The worm comes via e-mail. Above the attachment of the virus file, there will be two sentences written in the body part of the e-mail. For example, “Hi! How are you? I send this file in order to have your adcice. Please check it. ” Or “Hi! How are you? I hope you can help with this file that I send. See you later. Thanks. ” Etc. will come with sentences. So it is better not to open any such file. In addition, if SARCAM infects the computer, the files containing SARCAM may have the following names - Sirc32.exe, Sircam.sys, Run32.exe, etc. So to be sure, if you do not find any file after searching by typing the names of the above files in the Windows search bar, you will understand that your computer is safe and if there is, it is better to set up a good antivirus by deleting the files soon.

4. SQL Slammer

SQL Slammer is also a computer worm that targets the ‘Unpatched Microsoft SQL 2000’ server. Its worm then spreads to different servers and generates traffic between ‘UDP Port 1434’. Although the worm is called SQL Slammer, it does not use SQL Language. However, computers in different homes are not damaged by this slammer because the worm is basically in the memory of the system and it is easy to remove.

Slammer is 36-byte and only affects servers that do not run SP3 on SQL servers. Due to the outgoing traffic in UDP 1434, Slammer easily infects the computer. The slammer spread widely in 2002 and 2003, but the risk was greatly reduced in 2004 with the introduction of a patch by Microsoft in 2002, as well as an increase in media coverage of the worm.

5. Conficker

Conficker has certain names such as "Downup, Downup and Kido". The Conficker worm targets the Microsoft Windows operating system and was first identified in 2006. Since then, Conficker has attacked millions of computer files and set up its own botnet infrastructure. This malware targets the computer's Windows system.

In order to manage this, some security experts use cyber criminals as part of this botnet for their profit so that they can spam, phishing or steal someone's confidential information. So there are some things to follow to keep your computer safe from configuration. For example, you need to install the "Microsoft Security Bulletin MSO8-067" update, terminate the Windows LAN service ports. In addition to disabling Auto-Run, the system needs to be updated and a good anti-virus activated.

Post a Comment

0 Comments