Online threats are always on the rise, and this year is no different. The Coronavirus outbreak has not slowed down the computer malware spread and, in fact, aided it. Every computer virus and other malware can significantly harm your system in many ways.
However, a few ones are more dangerous than the rest of the others and can cause massive damage to the individual or the organization. Here is the list of the latest virus threats of the year.
Clop is the latest and one of the most deadly ransomware threats. Ransomware is a type of malware that encrypts the files and folder and asks for the ransom in return for the decrypting tool or key after infiltrating into the system. Clop is one of the variants of the CryptoMix ransomware. Clop was first discovered in 2018, and since then, it has evolved so much that it even targets the network other than the individual system.
Recently, Clop targeted one of the biggest software companies in the world, Software AG. It has demanded a whopping $20 million for the decryption.
Cyborg is a ransomware variant that is spread to the users through a fake, infected Windows 10 update. Users are sent an email requesting them to install the latest Windows update urgently. When clicking on the email’s fraudulent link, the Cyborg gets entry into the system and starts encrypting files in the background. A ransom note is released in the form of a “Cyborg_DECRYPT.txt” text file after the encryption. As of now, there is no way to crack the Cyborg ransomware.
Glupteba is one of the deadliest trojans that have multiple forms that perform different malicious functions. It is spread through other malware programs or emails. Like other trojan programs, Glupteba also pretends to be a legit software program and get activated as a service. It then directly accesses the IP address and ports to collect the user’s information. Glupteba can divert the traffic to unknown, suspicious domains.
B0r0nt0k, like any other ransomware program, infiltrates your system and encrypt your data, after that demands the ransom in return. That is not it. It has the added ability too. Unlike other ransomware malware programs, B0r0nt0k can make changes to Startup Settings, Registry entries, and File or programs. The attacker demands 20 bitcoin for decrypting the data.
Zeus Gameover is a type of trojan malware that disguises itself as an essential and legitimate application. It then gets access to your sensitive bank details and steals your money. Zeus Gameover is dangerous because, unlike other malware, it does not require a centralized Command and Control server to complete the transaction. It can easily bypass the centralized servers and create an independent server for transferring sensitive information.
Gustuff is another trojan type of malware that basically targets Android devices. It is the Android banking trojan that targets popular banking apps such as Bank of America, Chase Bank, and others. Even the cryptocurrency apps are on its radar. For retrieving the sensitive information, this trojan malware uses the social engineering attack to force users to give access to the Android Accessibility service.
Ryuk is another deadly ransomware program that encrypts files using the RA-248 and AES-256 encrypting techniques. It is distributed using spam emails or through the Emotet virus. Ryuk developers are regularly targetting large organizations to get a high ransom amount.
Astaroth is a trojan malware that targets antivirus programs to steal the victim’s username and passwords. It is widely spread across Europe and Brazil through spam email campaigns. Already more than 10K systems are infected with it. Astaroth trojan is usually spread through .7zip file attachments and fraudulent links.
Shadow Hammer is a new type of supply chain malware attack. In this, the Asus laptop users were attacked by providing compromised software updates. Cybercriminals carried this out by taking control of the Asus Live Update Utility, i.e., Asus’ own server was used to spread the malware to the users. More than a million devices were compromised using the Shadow Hammer supply chain attack. If you are an Asus user and want to know whether your device was affected by the Shadow Hammer, click here.
Cybercriminals are continuously finding new ways to spread malicious codes. One such popular method is social engineering attack via email. Recently, after the coronavirus explosion, many cyberattacker groups took advantage of the fear developed into the people and carried out their malicious tasks. The most dangerous one is Emotet.
Hackers are sending spam emails to the people that claim to provide vital information regarding coronavirus. After the email attachment is downloaded and opened, a series of codes are launched that triggers the download of Emotet malware.