29 Most Dangerous Viruses and Malware Threats to Your Computer Network

Cybercrime is big business and is growing bigger each year. More and more malware and viruses are being introduced. With the increased number of connected devices to the internet ranging from fridges to other helpful tools, there is an increase in the avenues, which hackers can acquire your information fraudulently and use to their advantage.

29 Most Dangerous Viruses and Malware Threats to Your Computer Network

Cybercrime is big business and is growing bigger each year. More and more malware and viruses are being introduced. With the increased number of connected devices to the internet ranging from fridges to other helpful tools, there is an increase in the avenues, which hackers can acquire your information fraudulently and use to their advantage.

Most of the world has gone cashless, with the internet being the primary medium of transaction. It is becoming more and more essential to learn about the latest viruses and malware, and the best ways to protect ourselves before we end up as victims of hackers.

New Computer Viruses and Latest Malware Threats

1.      Clop Ransomware

This is ransomware that will encrypt your files for a ransom, which after payment will be decrypted by the attacker. The ransomware is one of the most dangerous ransomware threats and a variant of the Crypto Mix ransomware.

The virus will first block over 600 windows processes before disabling multiple windows ten applications including windows defender and security essentials, leaving you practically defenseless.

The virus has immensely evolved ad has been used to hack the entire system and networks such as the Maastricht University computer network which was forced to pay a ransom after all their windows devices were hacked.

2.      Zeus Gameover

This is part of the ‘Zeus’ family of malware and viruses. It is a Trojan virus; however, it will mostly disguise itself as something different.

The virus has the capability of accessing your sensitive bank accounts details and stealing your funds. The virus does not need a centralized ”common and control” server to complete transactions, which is the way security personnel target hackers.

These means that Zeus Gameover has the capability of bypassing centralized servers and creating independent servers to send sensitive info, meaning you cannot trace your stolen data.

This is one of the most dangerous viruses out there and you risk losing almost everything without a way of salvaging your losses.

3.      Most Dangerous Virus & Malware Threats in 2020-Cryptojacking

This was a malware designed to use a person’s computing power to help mine cryptocurrencies due to the huge number of computers required to mine cryptocurrencies. Hackers were attempting to install Cryptojacking malware on computers and mobile devices to help ease mining.

The fall of value in cryptocurrencies, however, has seen the decline in Cryptojacking, however, as long as the value continues with its upward trends, they will be crypto hackers trying to hack into the mining process.

4.      CDPwn

This virus is a huge security threat for potentially millions of network devices.

If you happen to come across something labelled CDPwn, stay wary. When exploited by attackers, these four remote codes and a denial service will allow the threat actors to take full control of cisco devices.

The vulnerabilities are named as CVE-2020-3119, is a stack overflow vulnerability. CVE-2020-3118 is format string vulnerability; CVE-2020-3111 is a stack overflow vulnerability for parsing function. CVE-2020-3110 is a heap overflow vulnerability in the cisco 8000 8000 series IP camera, while CVE-2020-3120 is a denial of service vulnerability.

5.      Nasty WinRAR code execution bug

We are all familiar with WinRAR! It is a famous compression software, with over 500 million users worldwide.

Recently, there was a discovery as to code execution vulnerability in WinRAR, whereby attackers could use a compressed file to install malicious applications on the windows machines secretly.

6.      ShadowHammer

This was a virus created mainly for ASUS computer users.

The computers were attacked with a compromised updated software where attackers acquired the capability of modifying Asus live update utility used to deliver firmware and software updates.

Attackers had the capability to deliver malware via a backdoor dubbed shadow hammer.

The malware attacked over 1 million people, and it is still a risky virus, with potentially dangerous repercussions for ASUS users.

7.      Gustuff

This is one of the current Android banking Trojan dubbed Gustuff. The virus will target cryptocurrency apps for known banks such as the Bank of America.

The virus uses social engineering to trick users into accessing the android accessibility service.

8.      Emotet Malware

Hacker is becoming smarter and smarter every day. They are now taking advantage of the scare coming from the coronavirus outbreaks.

It has recently been discovered that hackers are sending spam emails to potential victims in japan providing info about coronavirus.

After you download the info, a series of commands are launched that help download the Emotet virus.

You can prevent the Emotet virus through:

  • Avoid clicking and opening email links directly
  • Search a brand via a known search engine like Google
  • Ensure anti-virus is updated
  • Block all URL and IP based IOC’s at the firewall to remediate this threat
  • Keep applications and operating system updates

9.      Ryuk Ransomware

One of the nastiest ransomware viruses for big corporations, the Ryuk has been a menace and it asks for huge ransoms to free your computers, and provide decryption.

The virus is derived from the source code of Hermes and is distributed either through Emotet or spam mail.

The virus’s ransom note can be found on the ryukreadme.txt unique for each compiled executable.

This latest computer virus will encrypt files using RA-248 and AES-256.

The virus stores keys in the executables using proprietary Microsoft formats and uses file maker for Hermes to check whether a file is encrypted.

10.  Cyborg ransomware

Just to show the threat this virus poses, its alias is AIDS!

This was the first ransomware virus to be introduced through a floppy disk.

The virus is a Trojan horse. How it works is such that it will replace the AUTOEXEC.BAT used to count the number of times a computer is booted.

Recently, a variant of this ransomware was found in the fake windows 10 November update.

The virus is distributed through an attachment with jpg—extension, which is an executable file. On clicking on it, the bitcoingenerator.exe file is downloaded from misterbtc2020, a GitHub account that is not deactivated. This ransomware then encrypts files and shows a ransom note Cyborg_DECRYPT.txt informing them of the virus and the due ransom for decryption.

The ransomware can be distributed by anyone with the builder and has the ransomware extension.

Currently, there is no way to deal with the virus.

11.  CryptoMix Clop Ransomware

This recent virus ransomware targets a complete network.

The virus was first discovered in 2019 and was had more email addresses than the older versions of the CryptoMix clop variant.

Once executed, the virus then starts terminating different windows cervices and processes resulting in disabling antivirus running on the windows machine.

The virus will also encrypt the victim’s files adding their extensions to them.

After its successful encryption, the virus will then inform the victim about the attack and the payout.

12.  B0r0nt0k ransomware

This ransomware came through around 2019, and encrypts a file on the Linux server and adds an extension. rontok to the file.

The virus was designed for Linux systems and websites; however, it functions similar to a windows virus. Apart from affecting data, the virus also makes changes to the systems startup, registry, files, and programs.

For decryption to occur, the attacker demand for up to 20 bitcoins with a time window of three days before the whole files and systems are deleted. The virus increases its dangerous element from the fact that it can also disable security elements within your computer.

Some of the ways you can prevent its threat is through:

  • Regular backups
  • Apply the latest security patches
  • Use intrusion prevention services to bloc application exploits.

13.  Yatron Ransomware

This is another new ransomware-as-a-service and is being promoted on Twitter.

The computer virus works like other many ransomwares by encrypting targeted files. The virus spreads to other computers through EtarnalBlue, DoublePulsar exploits.

Not only this, but Yatron will also try to delete encrypted files if the victim fails to pay the ransom within 72 hours.

The virus will also try to spread through other p2p programs through copying ransomware executable to default folders.

Some of the ways you can prevent Yatron ransomware is:

  • Keep a backup of important files
  • Avoid enabling macros in attachments received
  • Do not download unsolicited attachments
  • Use admin account only when necessary

14.  Astaroth Trojan

The virus was first noticed in 2017 and has targeted over 8000 systems.

The virus has been used to spam campaigns across Europe and brazil. The virus is a Trojan, and it spreads through .7zip file attachments and malicious links. Astaroth Trojan targets several antivirus tools to steal usernames and passwords.

Some of the best ways to prevent the virus is through:

  • Use 2-FA to add an extra layer of security to your machine
  • Keep your machine and security tools updated
  • Run the latest firewall and dedicated internet tools

15.  GoBrut

This virus can slow down the internet and cause damage to the whole number of other computers. The virus is Golang based and can use brute force to spread itself on windows and Linux machines.

The malware can explore a couple of vulnerabilities such as websites using weak passwords.

How you can prevent the spread of the virus is through:

  • Strong, complicated passwords
  • Progressive delays

16.  Jokeroo

This is a recent virus and also works as ransomware. The virus is mainly being promoted through twitter as an underground hacking site. This computer virus threat allows other users and affiliates to gather access to a functional ransomware and payment server. Jokeroo started self-promoting as GrandCrab ransomware on exploit.in.

You can prevent the virus through:

  • Practicing self-browsing
  • Update the operating system and security applications
  • Regular backups of files and other data

17.  GrandCrab ransomware

This is one of the new viruses and spreads through advertisements, explicit websites and spam emails, which will lead the user to the Rig Exploit Kit Page or the Grandsoft EK page.

Through these pages, GrandCrab makes an entry into the user’s systems and devices.

The virus will start to gather your data after it has entered your system. After hacking your usernames, passwords, keyboard types, IP, OS versions and current window versions, the virus will then move on to killing all tasks and processes running in the system to start encrypting all the data present in the system.

It will then generate public and private keys on the users’ systems which will be forwarded to the C2 server hosted on. Bit domain.

After the key delivers, it will start an encryption process by using the public keys generated and add. ‘GDcb’ extensions to all the encrypted files. After this, it will then send a file containing a ransom message on the users’ system in return for the decryption of all the data.

18.  Trojan Glupteba

This virus is one of the deadliest, as it comes in several variants, each functioning differently.

The virus reaches the computer through a file dropped by another malware or through exploit kits.

It will activate as a service enabling processes on the system pretending to be legit and authentic software.

Glupteba directly communicates to IP addresses and ports to collect user info. It will then divert traffic and users towards different domains such as ostdownload.xyz, travelsreview.wo, rldbigdesign. Website etc.

To help prevent the virus, you can:

  • Enable web and email filters
  • Restrict macro in Microsoft office products
  • Practice safe downloading.

19.  Kiuk Adware

This virus comes in the form of malware and adware referred to as ‘Kiuk’

The virus acts as a legit adobe flash player update by masking itself.

The virus is quite deadly and comes as a legitimate flash player, certificate and .exe file named ‘upp.exe’.

The virus will add the DNS 18.219.162.248 as it communicates with all established network interfaces. After it starts collecting personal info, and data from the user’s system and forwards this to the hosting domain, ‘kuikdelivery.com’

As soon as the info reaches the domain, it activates various other malicious tasks on a system that also includes chrome extensions from unknown sources, coin miners etc.

20.  Magniber ransomware

This virus is mostly active in Asian countries.

The virus is also distributed through malvertisements, where infected websites redirect the user to the Magnitude exploit kit page.

If the virus enters your computer, it will start encrypting data files with a unique key, and once encrypted, it will add—dyaaghemy extension to all the encrypted files.

There are ways you can help prevent Magniber from entering your computer through:

  • Back up important files
  • Update the operating system and apps
  • Block file extensions such as exelpif/tmp/url/vbe/scr/reg/cer/pst/cmd/com/bet/dll/dat/hlp/htaljs/wsf

21.  Thanatos ransomware

This is one of the newer viruses.

The virus is distributed through malvertisements, spam emails and malicious attachments. It can be compared to the ILOVEYOU virus.

If the virus gets on your computer, you will have a long day trying to decrypt the data it tries to encrypt, as it generates different keys for encryption and never saves the keys, making it a loop where you decrypt as it encrypts.

The virus will also drop a payload in the user’s system in the form of .exe. File or. Txt file set for autorun and opens every time the system is restarted.

After the virus adds ‘Thanatos’ extension to encrypted files, you will get a ransom pay message.

22.  Trojan panda banker

This virus is similar to Zeus banking Trojan malware. The malware uses the web to inject malicious code to steal banking info and credentials. The virus is transmitted through exploit kits such as Ngler exploit kit, Nuclear exploit it, and Neutrino exploits kit.

The virus can also be spread through social network sites, spam emails and adult sites.

How the virus works is such that, after the virus gets downloaded, it will search the computer for information regarding antivirus, spyware, usernames, passwords etc. The information is then passed to a C2 server and after, it will start stealing banking details, transaction and other info as well.

To help prevent and deal with these threats, then you should:

  • Regularly back up important data and files
  • Update operating systems and application
  • Block attachments of file types

23.  Melissa

This is a mass-mailing macro virus created by David L. Smith.

The virus targeted Microsoft word and outlook based systems through infecting word documents posted on alt.sex Usenet group. If you downloaded and opened a document from these sites, you would get your computer infected.

The virus would then mail itself to up to 50 people present in the victim’s address book.

24.  CryptoLocker

There is a new way for computers to get infected through a new way of infection called ransomware. Most people are still unaware of this threat, and the level of harm it can bring.

This is one of deadliest computer virus malware attacks, which has the potential to take your files hostage. Ransomware works just as any other kidnap movie does, through ‘kidnapping’ your files, with a ransom demand to get them back.

The CryptoLocker ransomware is a type of Trojan ransomware released in 2013 and spreads through mail attachments. Once downloaded, malicious code is then hidden I the attachment and encrypts all user files making them inaccessible.

For you to get your files back, you will have to pay a certain amount of money ranging from a couple of hundred pounds to a couple of grand in the form of cryptocurrency.

There are currently several ransomwares out there, writing for the next files to kidnap. It is therefore advisable to keep your file backed up to stay protected.

25.  ILoveYou

Don’t be carried away by the name, ILoveYou is a truly dangerous virus.

The computer was discovered more than ten years ago, and since then there have been huge advances in security measures.

The malware was uploaded into your device by clicking on an attachment called ‘LOVE-LETTER-FOR-YOU.TXT.vbs’.’

How the malware works are that, once, inside your computer, it will override system files persona files and spread to every inch of your computer. The malware would not hide from the users, and until a number of computers were infected, would it be noticed.

The virus was so bad that it won the Guinness world record for the most virulent virus of all time.

26.  My doom

This is a damaging virus discovered in 2004. This virus can compete with such viruses as ILOVEYOU, and it was one of the top worms spread through email.

The creator of the virus is still unknown, and it is widely believed that the threat actor was paid for it. The belief was that the man responsible for the virus was a McAfee employer by the name Craig Schumugar. The name My Doom was made out of the targeted victim for the virus.

The virus hit huge giants like SCO, Microsoft and google through distributed denial of service attack.

27.  Storm worm

This is another vicious computer virus that was discovered in 2006.

How the virus works is that, it will send out an email with the subject line ‘230 dead as storm batters Europe’ as bait for a news fan.

As soon as the user clicks on the link, the virus would infect the computer, and the problems would start.

The virus was a Trojan virus and it would infect a number of machines turning them into bots, which is a zombie-like state where the creator has control over the infected viruses. Through these computers, a huge number of spam mails are sent, and he process replicated to other computers.

28.  Sasser & Netsky

This is two worms created by a 17-year-old Sven Jaschan. The worms were grouped due to their huge similarity, which made the possibility that the same person created them.

Both the worms affect the computer differently. The former spread through scanning random IP addresses and instruct them to download the virus. The latter is a more dangerous and viral virus as it was an email-based worm that would come disguised as an email, or would come attached to an email.

29.  Stuxnet

One of the scary viruses is the Stuxnet virus and is spread by a USB thumb drive targeting software control. It is quite the malicious software as it affects the less known zero-day vulnerabilities and infects computers and spread.

The virus is dangerous as it does not just infect PC rather, it has some real-world physical effects. It also targets centrifuges used to produce the enriched uranium that powers nuclear weapons and reactors.

The virus was created in 2005, but it was only discovered in 2010. However, the virus will do little harm to computers not involved in uranium enrichment.

Conclusion

There are more malware and viruses out there, plus there are still hackers trying to create more viruses. Ensure you keep tabs on new and updated versions of viruses. Plus, keep your computer safe with anti-viruses, and other means of protection such as back-ups.

Keep safe!