The most dangerous Twitter viruses
There is a new phenomenon sweeping the internet, and it’s called the Twitter virus. This is a type of malware that is spread through the social networking site Twitter. It works by sendi.Learn more
The most dangerous PC viruses of 2018
It’s been another exciting year in the world of cybersecurity. While there have been no shortage of high-profile data breaches, new and dangerous ransomware strains, and major attacks on critical infrastructure, 2018 will also be remembered as the year that saw the rise of powerful cryptocurrency mining malware and a resurgent interest in crypto-jacking.
As we look back at the past 12 months, these are the 10 most dangerous PC viruses of 2018:
1. WannaCry/NotPetya
WannaCry and NotPetya both first appeared in early 2017, but it was in 2018 that their true impact was felt. WannaCry, in particular, continues to be a problem, with a new variant appearing in late 2018 that targets unpatched Windows XP systems.
NotPetya, meanwhile, has been used in a number of targeted attacks, including one against Maersk that resulted in estimated damages of up to $300 million.
2. keyloggers
Keyloggers are malware that record every keystroke made on an infected system, allowing attackers to steal sensitive information like login credentials, credit card numbers, and more.
In 2018, keyloggers became increasingly sophisticated, with some even able to bypass two-factor authentication.
3. Cryptocurrency mining malware
Cryptocurrency mining malware, or crypto-jacking, exploded in popularity in 2018. This type of malware uses an infected system’s resources to mine for cryptocurrencies like Bitcoin, Monero, and Ethereum, often without the user’s knowledge or consent.
In some cases, crypto-jacking malware can cause serious performance issues on infected systems. In others, it can lead to ballooning electricity bills.
4. malicious Chrome extensions
In 2018, we saw a number of high-profile cases of malicious Chrome extensions that were used to steal sensitive information or inject malicious code into webpages.
One particularly notable example is the British Airways data breach, which affected over 380,000 customers and was caused by a malicious Chrome extension.
5. Ransomware
Ransomware continues to be a major problem, with new strains appearing regularly. In 2018, we saw a number of new ransomware families, including Sodinokibi (also known as REvil), Ryuk, and Hermes.
Ransomware was also used in a number of high-profile attacks, including against the City of Atlanta, the Port of San Diego, and various healthcare organizations.
6. DNS hijacking
DNS hijacking is a type of cyberattack that allows attackers to redirect DNS traffic to a malicious server. This can be used to steal sensitive information, redirect users to malicious websites, or launch other types of attacks.
In 2018, we saw a number of high-profile DNS hijacking attacks, including against the United Nations, the City of Johannesburg, and the Canadian government.
7. Phishing
Phishing continues to be a major problem, with attackers using ever more sophisticated techniques to trick victims into giving up their login credentials, personal information, and more.
In 2018, we saw a number of high-profile phishing attacks, including against Gmail users, Facebook users, and Microsoft Office 365 users.
8. malware disguised as legitimate apps
In 2018, we saw an increase in the number of malware samples that were disguised as legitimate applications. This type of malware is often used to steal sensitive information or infect systems with other types of malware.
9. IoT malware
IoT malware is a type of malware that targets internet-connected devices like routers, smart TVs, and security cameras. In 2018, we saw a number of IoT malware strains, including Mirai, Hajime, and IoTroop (also known as REX).
10. Bootkits and rootkits
Bootkits and rootkits are types of malware that allow attackers to gain low-level access to an infected system. This gives them the ability to stealthily install other types of malware, steal sensitive information, and more.
In 2018, we saw a number of high-profile bootkit and rootkit attacks, including against the United Nations, the Russian government, and various banks.
Visit malwarezero.org to learn more about most dangerous pc viruses. Disclaimer: We used this website as a reference for this blog post.
What are some celsius network alternatives? There are many celsius network alternatives available for those…
What types of muscadine grapes are best for wine making? Muscadine grapes (Vitis rotundifolia) are…