Online threats are always on the rise, and this year is no different. The Coronavirus outbreak has not slowed down the computer malware spread and, in fact, aided it. Every computer virus and other malware can significantly harm your system in many ways.
However, a few ones are more dangerous than the rest of the others and can cause massive damage to the individual or the organization. Here is the list of the latest virus threats of the year.
Sr No. | Name | Type | Damage | Risk Level |
1. | Clop | Ransomware | Encrypts file and ask for ransom up to $20 million | High |
2. | Cyborg | Ransomware | Encrypt victim’s files and ask them to pay the ransom | High |
3. | Glupteba | Trojan | It communicates to IP addresses and ports to collect user’s information | High |
4. | B0r0nt0k | Ransomware | Encrypt data and make changes to Startup Settings, Registry entries, File or programs | High |
5. | Zeus Gameover | Trojan | Access sensitive bank account details and steal all funds | Moderate |
6. | Gustuff | Trojan | Uses social engineering to trick users into getting access to Android Accessibility service | Moderate |
7. | Ryuk | Ransomware | Targeting large organizations to get high ransom in return for data | Moderate |
8. | Astaroth | Trojan | Targets antivirus tools to steal usernames and passwords | Moderate |
9. | Shadow Hammer | Supply Chain Attack | Provide malicious updates by compromising an authentic source | Low |
10. | Emotet | Email Virus | Taking advantage of the fear over coronavirus outbreak | Low |
Latest Virus Threats
Clop Ransomware
Clop is the latest and one of the most deadly ransomware threats. Ransomware is a type of malware that encrypts the files and folder and asks for the ransom in return for the decrypting tool or key after infiltrating into the system. Clop is one of the variants of the CryptoMix ransomware. Clop was first discovered in 2018, and since then, it has evolved so much that it even targets the network other than the individual system.
Recently, Clop targeted one of the biggest software companies in the world, Software AG. It has demanded a whopping $20 million for the decryption.
Cyborg Ransomware
Cyborg is a ransomware variant that is spread to the users through a fake, infected Windows 10 update. Users are sent an email requesting them to install the latest Windows update urgently. When clicking on the email’s fraudulent link, the Cyborg gets entry into the system and starts encrypting files in the background. A ransom note is released in the form of a “Cyborg_DECRYPT.txt” text file after the encryption. As of now, there is no way to crack the Cyborg ransomware.
Trojan Glupteba
Glupteba is one of the deadliest trojans that have multiple forms that perform different malicious functions. It is spread through other malware programs or emails. Like other trojan programs, Glupteba also pretends to be a legit software program and get activated as a service. It then directly accesses the IP address and ports to collect the user’s information. Glupteba can divert the traffic to unknown, suspicious domains.
B0r0nt0k Ransomware
B0r0nt0k, like any other ransomware program, infiltrates your system and encrypt your data, after that demands the ransom in return. That is not it. It has the added ability too. Unlike other ransomware malware programs, B0r0nt0k can make changes to Startup Settings, Registry entries, and File or programs. The attacker demands 20 bitcoin for decrypting the data.
Zeus Gameover
Zeus Gameover is a type of trojan malware that disguises itself as an essential and legitimate application. It then gets access to your sensitive bank details and steals your money. Zeus Gameover is dangerous because, unlike other malware, it does not require a centralized Command and Control server to complete the transaction. It can easily bypass the centralized servers and create an independent server for transferring sensitive information.
Gustuff
Gustuff is another trojan type of malware that basically targets Android devices. It is the Android banking trojan that targets popular banking apps such as Bank of America, Chase Bank, and others. Even the cryptocurrency apps are on its radar. For retrieving the sensitive information, this trojan malware uses the social engineering attack to force users to give access to the Android Accessibility service.
Ryuk Ransomware
Ryuk is another deadly ransomware program that encrypts files using the RA-248 and AES-256 encrypting techniques. It is distributed using spam emails or through the Emotet virus. Ryuk developers are regularly targetting large organizations to get a high ransom amount.
Astaroth Trojan
Astaroth is a trojan malware that targets antivirus programs to steal the victim’s username and passwords. It is widely spread across Europe and Brazil through spam email campaigns. Already more than 10K systems are infected with it. Astaroth trojan is usually spread through .7zip file attachments and fraudulent links.
Shadow Hammer
Shadow Hammer is a new type of supply chain malware attack. In this, the Asus laptop users were attacked by providing compromised software updates. Cybercriminals carried this out by taking control of the Asus Live Update Utility, i.e., Asus’ own server was used to spread the malware to the users. More than a million devices were compromised using the Shadow Hammer supply chain attack. If you are an Asus user and want to know whether your device was affected by the Shadow Hammer, click here.
Emotet Email Virus
Cybercriminals are continuously finding new ways to spread malicious codes. One such popular method is social engineering attack via email. Recently, after the coronavirus explosion, many cyberattacker groups took advantage of the fear developed into the people and carried out their malicious tasks. The most dangerous one is Emotet.
Hackers are sending spam emails to the people that claim to provide vital information regarding coronavirus. After the email attachment is downloaded and opened, a series of codes are launched that triggers the download of Emotet malware.
How to Avoid such Online Threats?
Prevention is always a better option than a cure. It is essential to avoid such threats so that you do not have to deal with them. Here are some tips for that:
- Never fall into the trap of attractive pop-ups and banner ads.
- Always ignore award-giving web pages and emails. Never click on the links they carry.
- While installing software, uncheck the installation of the bonus program.
- Avoid getting freeware programs from unsecured and untrustworthy sources.
- Always keep installed a robust antimalware solution such as MalwareFox on your device so that any threat can be detected beforehand.
- Use multifactor authentication to add an extra layer of security to your machine
- Always keep a backup of important files to counter any ransomware attack
- Keep your OS and system applications updated