Computer viruses are becoming more dangerous every year. They slow down your computer and can generate all kinds of other unexpected problems. Although the number of attacks detected fell in 2017, there were still over 120,000 attacks and security breaches according to INCIBE. Globally, the figure was much higher. USA Today reports that 765 million were affected by cyberattacks in April 2018 alone.
This year, the Exploit Kit has been used by hackers more than ever. This is a set of algorithms that any cybercriminal can use to design their own viruses, modify old existing viruses and create any type of virus. In the wrong hands, it can be devastating.
Another concern is that many people’s computers are being infected without their knowledge. They are being turned into botnets, which are used to commit widescale cyberattacks that wouldn’t otherwise be possible. A paper from Rhodes University argued in favor of new spatial networks to detect and fight botnets.
Here are the most dangerous and harmful viruses currently operating.
THE MOST DANGEROUS VIRUSES
CONFICKER
It’s a virus that comes in through a Windows security flaw. This worm sneaks into the computer and hijacks sensitive information stored in memory to give access to a set of viruses that are capable of stealing personal information and bank data. Your computer becomes the slave of a server that works worldwide.
The Conficker virus takes advantage of the most powerful and common means of file transmission, such as email or messaging applications such as Whatsapp. Its main function is to export passwords through its botnet. Facebook and Skype also spread this virus quickly and efficiently throughout the entire network of Internet users and by devices with little security and badly updated.
Another interesting feature of Conficker is that it multiplies on computers, creating infinite copies of itself and sending copies to your botnet. This virus disables all security options and eliminates recovery methods on the hard drive, such as restore points and system backups.
NIVDORT
This is a life-long Trojan. This malware is usually installed by opening an infected email, which may or may not contain an attachment. Just by previewing the mail you can perfectly be giving Nivdort access to your system and endangering all your data, passwords and keys.
The Nivdort virus, which works on Windows, does part of the same as Conficker. It intends to hijack the computer and add it to its botnet. It endangers all your data. It captures keystrokes, histories, open applications, steals users and passwords, as well as the information it finds regarding bank cards and payment gateways such as Pay Pal, a madness.
ZEROACCESS
It is a virus that is distributed by various means redirecting traffic to websites that host troyan.zeroaccess. It affects Windows operating systems. Windows XP, Vista, Windows 7 and Windows 8 are the sensitive versions. These operating systems become part of your botnet and are controlled to perform multiple tasks.
One of the main uses of the Zeroaccess virus by cybercriminals is closely related to Bitcoin. Infected computers are used to generate cryptomoneda. Another common use is in the fraud of online ads, generating clicks in advertising campaigns of companies that have an economic impact on losses.
The Zero virus is also capable of downloading new threats in the form of fake antivirus, leaving your computer controlled by tools that load at the beginning and collect detailed information by scanning and analyzing the entire file system. This malware creates a volume of encrypted files where it stores all its files, components and libraries to control the computer and all its functions.
ZEUS
The Zeus virus, which has already undergone modifications that make it more powerful and has more advanced versions, has given and will continue to give much war and is one of the malwares in charge of transporting the well-known Cryptolocker. Cryptolocker is a virus capable of encrypting the information in your computer and rendering it useless.
This virus is usually downloaded by phishing and impersonates a corporation. Zeus is usually received via email and in a few seconds you install a file encryptor. The means of recovery are cancelled and the computer is attached to a botnet and controlled remotely.
The main objective of the Zeus virus in all its variants is the theft and kidnapping of all user data, bank account passwords and accesses and their subsequent spread.