Computer Trend - Growth variants threat of computer or viruses increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This becomes the cause of the increase in activity associated with the virtual world.
Level growing threats in various forms to reach a high level and almost predictable even endanger human life will trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small error may trigger a nuclear danger.
Here are the top 10 malware roaming in cyberspace Indonesia that successfully detected by ESET Threat Sense Lab. Perhaps one of them to infect our computers.
1. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%
Win32/Conficker.AA is a worm that spreads through shared folders and mobile media devices. This worm comes into computers by exploiting vulnerabilities in the Server Service. After Conficker.AA successful, the sending computer will perform remote control of victim computers that have been infected and downloading.
2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%
Win32/Conficker.AE is a worm that is also one of Conficker.AA variant, with the modus operandi of spreading like a way of distributing Conficker.AA
3. Detection Percentage Win32/Agent Year 2010: 3.48%
According to the description of the results of ESET NOD32 as malware malware detection is generic, which is known among the large family of malware with the user's ability to steal data from infected PCs. To do that malware is usually going duplicate himself then places himself in the temporary folder and add the registry keys that are similar to the malware file or similar to the results files to copy itself at random it was then put yourself in the system folders other operations so that malware can "work" in every time the system start up.
Malware is able to mutate into a series of other threat, its spread through a series of intermediaries that it's almost impossible to remove it only by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable autorun, and that is not less important is, think carefully before you click anything.
4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%
Win32/Conficker.Gen is one variant of Conficker having a similar modus operandi in infecting the victim's computer. Similarly, also exploited the same vulnerability that the vulnerability in Server Service.
5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%
Threat this one is a worm that attacks a network computer and spreads by exploiting vulnerabilities in Windows operating system from Microsoft. The vulnerability specifically the RPC subsystem and can be entered remotely by an attacker. Attackers can launch attacks without using a valid identity. Threat is able to make contact with the web servers to download malicious programs that others using the domain name are not official.
6. Detection Percentage Win32/VB Year 2010: 2.74%
Worm Win32.VB created with Visual Basic programming language and the ability to spread quickly, but caused no major problems. Threat is usually worked to spread spam. Because of the risks that that's not great, the user can handle most cases himself Win32/VB by using antivirus or security devices to stop movement at the corporate gateways. Malware domestically produced many included in this species.
7. INF / Conficker Percentage of Detection in 2010: 2.14%
INF / Conficker is the autorun.inf file that spread the worm Conficker. Results of detection are also used to parse a set of malware that use the file autorun.inf as a way to enter and infect personal computers. These files contain information on the program developed to be able to run in a time of mobile devices (eg USB flash disks) and other similar devices accessed by users who use Windows-based PC.
8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%
Viruses that infect files. EXE, and spread through the media that are used together in a computer network. When active, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both process and the files associated with the virus. Win32/Alman.NAB also has another name that is: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A
9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%
Win32/Stuxnet.A is a worm that spread widely through mobile media devices. Exploiting vulnerabilities in computer operating systems from targeted attacks also spread the modus operandi of this worm. Vulnerability is exploited in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) is quite popular in the year 2010 as targeted in SCADA automation system that is widely used in industry.
10. INF / Autorun.gen Detection Percentage Year 2010: 1.91%
Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the target-PC computers which successfully attacked. These files contain information on the program developed to be able to run in a time of mobile devices (eg USB flash disks and other similar devices accessed by users who use Windows-based PC).
Latest Computer Trend Here:
{ 0 comments... Views All / Send Comment! }
Post a Comment