|
|
Top Viruses of 2009 : Based on Ranking
This virus is a network worm and exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system, allowing an attacker to remotely attack a computer without valid user credentials. Win32/Conficker infects the computer using unsecured folders, removable medium or by making use of Autorun facility enabled by default in windows. This threat contacts other domain names to download additional malicious code.
To avoid this threat, end users must update their system with the patch already available since October.
Rank 2: INF/Autorun
This is the most common threat that infects a PC by creating an autorun.inf file. The file contains information about programs meant to run automatically when removable devices are connected to the computer. End users must disable the Autorun feature enabled by default in windows. Since, use of removable devices is very popular, you can clearly see the reason why this threat has a rank of 2.
Rank 3: Win32/PSW.OnLineGames
This threat belongs to a family of Trojans that is meant to cause harm to game players by stealing their user credentials and other personal or financial information. This information is then sent to the intruder’s PC. Game players must remain alert as this threat has been found in large volumes.
Rank 4: Win32/Agent
Win32/Agent is a major threat to several end users as it copies itself into the temporary locations and steals information from the infected PC. This malicious code adds entries into the registry, creating several files at different places in the system folder, allowing it to run on every startup. This way complete information is gathered about the infected PC and then transferred to the intruder’s PC. As a protection measure, use a good anti-malware, disable Autorun facility in windows and do not click or open any unknown files.
Rank 5: Win32/FlyStudio
This threat is designed to modify the settings of victim’s internet browser by modifying the search queries and directing the user to advertisements. This threat seems to target the people of China. However, its presence has been reported in other regions like North America. It seems that the malicious code has been deployed by another family of malwares.
Rank 6: INF/Conficker
INF/Conficker exploits the host computer by making use of the Autorun feature enabled by default in windows to spread later versions of this threat. As mentioned earlier, end users must disable the Autorun feature.
Rank 7: Win32/Pacex.Gen
This threat designates a wide range of malwares that makes use of an obfuscation layer to steal passwords and other information from the infected PC. The ".Gen" suffix means generic i.e. the threat contains other variants with similar characteristics. However, other malwares may not share the same base code, but they do make use of the same obfuscation technique to infect the host computer.
Rank 8: WMA/TrojanDownloader.GetCodec
This threat as the suffix .GetCode suggests modifies the audio files present on the system to .wma format and adds a URL header that points to the location of the new codec. In this manner, the host computer is forced to download the new codec and along with the new codec several other malicious codes are also downloaded.
This means that the end user will download the new codec, believing that something new might happen, whereas, the malicious code runs in the background causing harm to the host computer. At present, there is no way to verify the authenticity of the codec being downloaded as a new enhancement or a Trojan horse, users must avoid downloading new codecs unless downloading from a trusted website. Unnecessary downloading of codecs should also be avoided.
Rank 9: Win32/Qhost
This threat copy itself to the System32 folder of the windows directory giving control of the computer to the attacker. The attacker then modifies the DNS settings redirecting the computer to other domains. This is done to compromise the infected machine from downloading any updates and redirect any attempts made to a website that downloads other malicious files on the victim’s computer.
Rank 10: Win32/Autorun
As discussed earlier, threats with the name “Autorun” make use of the Autorun.inf file to infect the victim’s computer. The only solution is to disable the Autorun facility enabled by default in windows.
This threat copy itself to the System32 folder of the windows directory giving control of the computer to the attacker. The attacker then modifies the DNS settings redirecting the computer to other domains. This is done to compromise the infected machine from downloading any updates and redirect any attempts made to a website that downloads other malicious files on the victim’s computer.
Rank 10: Win32/Autorun
As discussed earlier, threats with the name “Autorun” make use of the Autorun.inf file to infect the victim’s computer. The only solution is to disable the Autorun facility enabled by default in windows.
Like It? Please Share It :
|