Top 10 Most Destructive Malware For Computers and Internet

Top 10 most prevalent global malware 1. TROJ_GENERIC Malware Type: Trojan This is the Trend Micro generic detection for low-threat Trojan...

Top 10 most prevalent global malware


1. TROJ_GENERIC

Malware Type: Trojan
This is the Trend Micro generic detection for low-threat Trojans. It also installs itself as a browser helper object (BHO) by creating certain registry keys.

2. WORM_NUWAR.CQ

Malware Type: Worm
This worm arrives as an attachment to mass-mailed email messages. It spreads by attaching a copy of itself to an email message, which it sends using its own Simple Mail Transfer Protocol (SMTP) engine. Having its own SMTP engine allows it to send messages without using any mailing application, such as MS Outlook.

3. WORM_NYXEM.E

Malware Type: Worm
This worm propagates by attaching copies of itself to email messages that it sends to target addresses, using its own SMTP engine. Through this SMTP engine, it is able to easily send the email message without using other mailing applications, such as Microsoft Outlook.

4. WORM_NETSKY.DAM

Malware Type: Worm
This is Trend Micro's detection for the damaged samples of WORM_NETSKY variants. It runs on Windows 95, 98, ME, NT, 2000 and XP.

5. HTML_NETSKY.P

Malware Type: HTML
This HTML malware arrives as an email with an executable file attachment that is detected by Trend Micro as WORM_NETSKY.P. It exploits a known vulnerability in Internet Explorer versions 5.01 and 5.5 known as the Automatic Execution of Embedded MIME Type. This vulnerability causes Internet Explorer to automatically run executable file attachments in email messages.

6. TROJ_SMALL.EDW

Malware Type: Trojan
This Trojan arrives as a file dropped by other malware like WORM_NUWAR.CQ or as a file downloaded unknowingly by a user when visiting malicious URLs. It may also arrive as a downloaded copy by earlier variants.

It is also spammed via email using subject lines related to specific events. The image below is a sample of the said email message.


7. WORM_RONTKBR.GEN

Malware Type: Worm
This is Trend Micro's detection for unknown and future variants of WORM_RONTOKBRO and WORM_BRONTOK malware programs. It serves as a proactive means of safeguarding against possible attacks of the aforementioned malware.

8. WORM_ANIG.A

Malware Type: Worm
This memory-resident worm propagates by dropping copies of itself in shared network drives. It steals login information and saves the obtained data in a file, which can be retrieved by a remote user. Its keylogger component substitutes the standard Microsoft Graphical Identification and Authentication DLL (MSGINA.DLL) to carry out its information-stealing routine.

9. PE_PARITE.A

Malware Type: Worm
This file infector infects .EXE and .SCR files on an infected system and on remote network shares with read and write access. It makes use of port 30167 in order to access network shares. It stays in memory by injecting itself into EXPLORER.EXE; thus, hiding its running process.

10. WORM_MOFEI.B

Malware Type: Worm
This destructive, memory-resident worm attempts to log on to remote machines using a list of user names. It then drops and executes a copy of itself on the remote machines. It has backdoor capabilities, and may execute commands coming from a remote malicious user. The said routine provides the remote user virtual control over the affected machine, thus compromising system security.
Source: Trend Micro



Technology Updates On Mail




COMMENTS

Name

3G,9,4G,9,ADSENSE,3,aircel,4,airtel,16,Android,8,Announcements,1,Apple,12,Asus,2,BHIM,1,Blackberry,11,Blogger Hacks,10,Blogger Templates,56,broadband plan,7,Browser,8,BSNL,13,Computer Games,6,Coupon Code,1,Customer Support,32,D2H,1,Data Plan,25,Dell,1,Digital Banking,2,Do Not Call,7,Downloads,31,DTH,8,Electronic Items,8,facebook,12,featured,1,free antivirus,7,Gadget News,7,google news,21,google Tips,10,GPS,5,Hacks And Tricks,7,HCL Laptop,1,Hitachi,1,howto,8,HP,2,HTC,5,Idea,5,Internet,7,Intex,1,iPhone,25,iPhone Price List,1,Kerala,2,Laptop,24,LAVA,7,Lenovo,3,LG,6,micromax,1,Microsoft,1,Miscellaneous,174,MNP Change,1,mobile Applications,8,Mobile Number Portability,3,Mobile Phone Price,29,Mobile Phone Review,124,mobile tariff plan,63,Mobile Unlocking Code,1,Mobile Wallet,2,motorola,12,MS Office,1,MTNL,1,Nokia,30,Offbeat News,1,Orkut,1,Paypal,1,PayTm,1,phone,4,Price List,2,reliance communication,4,Reliance Communications,2,Reliance Jio,25,Resources,1,samsung,9,Samsung Mobile Price List,1,SEO,2,skype,2,social media,1,software,4,Sony Ericsson,2,Sony Phone Price List,1,spice,2,Tablet,1,tata DOCOCMO,4,Tata Indicom,3,TATA Sky,1,Tech Define,2,Tech News,474,toshiba,1,twitter,1,Uninor,1,Upcoming Products,3,UPI,1,USSD Codes,9,Verizon,1,videocon,2,Vodafone,6,vodaofne,4,Web Hosting,6,Whats App,3,Windows,22,Wordpress,2,Wordpress Pluging,1,Xbox,1,Xiaomi,3,YouTube Hacks,5,
ltr
item
YourDataPlan - Telecom Updates & News - Jio, 4G,3G,LTE, Mobiles Data Plan: Top 10 Most Destructive Malware For Computers and Internet
Top 10 Most Destructive Malware For Computers and Internet
YourDataPlan - Telecom Updates & News - Jio, 4G,3G,LTE, Mobiles Data Plan
http://www.getfreedataplan.com/2009/05/top-10-most-destructive-malware-for.html
http://www.getfreedataplan.com/
http://www.getfreedataplan.com/
http://www.getfreedataplan.com/2009/05/top-10-most-destructive-malware-for.html
true
4333792579372704303
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy