Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
eWEEK.com
Search
eWEEK.com
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • Networking
    • PC Hardware

    Conficker, Coreflood and Other Malware Madness on Your PC

    By
    BRIAN PRINCE
    -
    May 12, 2009
    Share
    Facebook
    Twitter
    Linkedin

      PrevNext

      1Conficker, Coreflood and Other Malware Madness on Your PC

      1

      2The MBR/Sinowal/Mebroot/Torpig rootkit&#151Stealthiest Rootkit in the Wild?

      2

      A recent update from the hackers enabled it to hook itself even deeper within the Windows operating system to avoid detection. Researchers at the University of California, Santa Barbara, seized control of the Torpig botnet for 10 days earlier in 2009 and uncovered 70GB worth of financial data.

      3Zeus&#151Malware from Mount Olympus

      3

      Also known as Zbot, the Trojan has been linked to the cyber-theft of financial information. The hackers controlling the botnet recently hit the “kill operating system” switch on more than 100,000 infected computers.

      4Rustock.C&#151Busy Botnet

      4

      Rustock.C creates a back door on a compromised system and uses rootkit functionality to hide any files and registry subkeys it creates. The first “operational” samples of Rustock.C appeared in September 2007. Security researchers estimate the botnet can send out as many as 600,000 spam messages a day. Photo courtesy of Microsoft

      5Vundo&#151Social Engineering

      5

      Vundo is a Trojan also known as Virtumonde. The malware has been linked to campaigns for rogue anti-virus. There are many different types of Vundo trojans. According to SecureWorks, the malware family includes rootkit functionality, and often spreads through Instant Messaging and fake YouTube videos. Once infected, victims may be hit with numerous payloads.

      6No Title

      6

      Conficker—The Windows Worm You May Have Heard of Though it may have been overhyped, the Conficker worm definitely created a massive army of compromised computers. At various times, the number of infections has been put in the millions. More recent estimates have put the number of PCs compromised by variants A, B and C at about 2.7 million, according to the Conficker Working Group. Photo courtesy of Conficker Working Group

      7Hexzone&#151Kidnapping Computers

      7

      Hexzone is installed as a “Browser Helper Object,” and injects itself into the browser as a plug-in. When the victim browses the Web, the plug-in leads them to a page hosting porn and demands payment to remove the content. According to FireEye, Hexzone has also been observed downloading Trojan.Ransomlock.

      8Coreflood&#151A Deadly Banking Trojan

      8

      Coreflood remains an effective banking Trojan. Coreflood goes back to as early as 2002, and was linked last summer to the infection of thousands of computers and the theft of some 500 gigabytes of uncompressed data during a 16-month period. Photo courtesy of SecureWorks

      9Trojan Bankpatch.C&#151Denmark Banks Targeted

      9

      Bankpatch.C popped up earlier this year. Bankpatch is customized to target certain regions and certain banks, such as in January and February, when there was an outbreak of infections in Denmark. The first version of the Trojan was released in 2007, with the .C variant first appearing in August of 2008, according to Symantec.

      PrevNext

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      CHRIS PREIMESBERGER - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      CHRIS PREIMESBERGER - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      EWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      ZEUS KERRAVALA - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      WAYNE RASH - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Info

      © 2020 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×