Unlike older worms that often spread just because they could, modern worms often spread to drop a payload (like ransomware). WannaCrypt also deserves a mention here.By hiding what they're doing, they try to avoid detection by security software. It then sends that information to a remote server.īoth Bondat and Gamarue have clever ways of obscuring themselves to evade detection. When Bondat infects a system, it gathers information about the machine such as device name, Globally Unique Identifier (GUID), and OS build. We've seen it distribute other malware such as info stealers, spammers, clickers, downloaders, and rogues.īondat typically arrives through fictitious Nullsoft Scriptable Install System (NSIS), Java installers, and removable drives. When Gamarue infects a device, it becomes a distribution channel for other malware. Gamarue typically arrives through spam campaigns, exploits, downloaders, social networking sites, and removable drives. This threat typically gets into a device from a drive-by download attack, meaning it's installed when users just visit a compromised web page. Jenxcus has capabilities of not only infecting removable drives but can also act as a backdoor that connects back to its server. Although these worms share some commonalities, it's interesting to note that they also have distinct characteristics. Jenxcus (also known as Dunihi), Gamarue (also known as Androm), and Bondat have consistently remained at the top of the list of malware that infects users running Microsoft software. Depending on the variant, they can steal sensitive information, change security settings, send information to malicious hackers, stop users from accessing files, and other malicious activities. Different worms use different methods to infect devices. Worms represent a large category of malware. It can spread through email attachments, text messages, file-sharing programs, social networking sites, network shares, removable drives, and software vulnerabilities. A worm is a type of malware that can copy itself and often spreads through a network by exploiting security vulnerabilities.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |