You are on page 1of 1

Trojan 1. Zeus Trojan Scareware 1.

Spysherrif
Spyware 1. CoolWebSearch

It first started in July of 2007. It started on December 2, 2005. This malware started in May of 2003.
This trojan uses phishing attacks which once opened, This malware tells the user about a false virus on their This malware affects your computer by exploiting your
Trojan: downloads malware on your computer. This malware Scareware: device and tells them to buy a false program to resolve it.
Spyware: browser while creating shortcuts and adding sketchy
records your keystrokes as well as uses form-grabbing to Once infected, it will hinder internet connection, and bookmarks. It also slows down your PC, browser and
capture information such as usernames and passwords blocks access to other utilities. It prevents system restore internet speed/performance.
A trojan horse is malware that entered into a website. It can steal sensitive information or This malware manipulates users into as well as blocks anti-spyware softwares in addition to
It’s a malicious program that To remove this spyware from your device, though it is
misleads users from its real build a botnet. thinking there is a threat on their self-reinstalling itself. collects and misuses private difficult, you can use an antimalware removal tool such as
The best method of removal is to use a trojan removal
purpose or intent. computer, and then purchasing fake This virus cannot be removed manually. The main way to information about a user. Zemana AntiMalware.
anti-malware software such as MalwareFox. remove it is through specific spyware remover tools such This software is $29.95/yr.
This software costs $24.95/yr. malicious software to remove it.
as SmitFraudFix.
This remover tool is free.

2. Storm Worm 3. AIDS Trojan 2. LizaMoon 3. Drive Cleaner 2. Transponder VX2 3. 180SearchAssistant

This spyware was released in 2002.


It started in January of 2007. This trojan commenced in December, 1989. It started in September of 2010. It was first seen on July 24, 2009. Start date unknown. 180 SA uses log transmission for the pages that you visit as
The Storm Worm opens a backdoor in the computer and This malware attacks the C: drive of a computer and This scareware tricks you into launching a fake security This software displays fake security programs for the user This program follows the user as they surf the web and well as the keywords that you type. This malware
allows it to be controlled remotely. This trojan is also able counts the number of times a file or the computer is protocol. When it is launched, this virus changes the to use. It then infects your computer, deletes temporary records their activity. It monitors the click stream, activity automatically opens pop-up ads when you enter a
to copy and update itself multiple times as well as install a booted. Once the number reaches 90, the malware Registry of the computer as well as disables certain files, internet tracks as well as cookies. It makes of the PC and communicates with servers. keyword into the 180 search assistant search engine.
rootkit to hide itself from the user. encrypts all of the files within the C: drive. security protocols. On a Windows PC, it interferes with modifications to the registry and runs every time the The best way to remove this malware is to use a spyware To remove this spyware, you can go to control panel, find
In order to get rid of this virus, you can use a virus removal In order to recover their files, the users would have had to Windows Security Center and Microsoft Security device is started up. removal tool. One option would be the SuperAntiSpyware Remove/Add Programs and find a file that says “180
tool such as Sophos Scan & Clean. send money to a PO Box to the PC Cyborg Corporation. Essentials. To remove this program completely, a trust-worthy anti- software. search assistant” along with all of its other aliases. You
The Sophos software is free of cost. The amount that needed to be paid was $189. You can remove this malware by using an antivirus spyware software is required. One effective tool is This tool costs $39.95/yr. can also use an adware removal program like
detection and removal tool such as AVG Antivirus SpyHunter. Malwarebytes.
This software costs $59.99/yr. The SpyHunter software costs $39.99/yr. Malwarebytes costs $51.99/yr.

Rootkit 1. ZeroAccess
Adware 1. Gator

Rootkit: This rootkit appeared in May of 2011. This adware was first released in 1999.

MALWARE
This malware disguises its presence, turns the device’s
system into a bot, and uses the corrupted device as a
Adware: Gator silently, automatically downloads ads onto your PC.
It installs pop-up advertisements and collects user
It is a computer software that enables delivery platform for other malware. It uses social information.
engineering as well as exploit packs. It can be removed manually by going to the Control Panel
access to a restricted area of a It is a malware which
You can get rid of this malware by using anti-malware and removing the application. All Gator supported
computer. It can mask its own software and rebooting your computer. One example of automatically displays and applications also need to be uninstalled. It can also be
existence as well as the existence of what you can use is the RKill 2.9. downloads unwanted ads on a removed by antivirus removal tools.
other software. This software is free. user’s device while they are online. This malware is free to remove.

MALICIOUS SOFTWARE THAT


2. Flame 3. Stoned Bootkit
FUNCTIONS WITHOUT USER 2. Fireball 3. Dollar Revenue

CONSENT.
It started in March of 2010
Flame can infect and spread to other systems through a This original version of this malware called Stoned, was This malware was initially released in 2015. This adware was created and released in 200
network as well as a USB stick. When the device becomes created and released in 1987. It runs code on computers, mainly to download files and This adware silently installs multiple malwares to the
infected, this malware can send/receive wireless hack the device to generate ads. This malware also has
It is a rootkit virus with boot capabilities. This malware system without user consent. It installs a browser toolbar,
commands, and collect data on the user through anti-detection capabilities. Furthermore, it creates a fake
screenshots, monitors, microphones, cameras, and
gains access to the entire computer system by using file then displays ads on the compromised device and tracks
system drivers, plugins, boot applications, etc. homepage and search engines on the user’s browser internet searches.
keystrokes. It can then send this information to command
and control servers. You can get rid of this rootkit by using an anti malware which allows the adware to collect information on the This malware can be removed manually by uninstalling it
This malware is difficult to remove and is often removed by scanner and tool such as the SpyHunter removal tool. user. It could also bring additional malware onto your and disabling its network connection. You can also use an
the hacker who planted it through a “SUICIDE” command This tool costs $60. device. anti-spyware removal tool such as Malwarebytes.
once they have the information they want. However, one To remove it, the main method is to use antivirus software. Dollar Revenue is free to remove but can cost money if
software program that can potentially detect and remove it An effective option is Malewarebytes.
is the Bitdefender Antivirus.
you use an anti-spyware that isn’t free.
It costs $51.99/yr.
The Bitdefender software costs $39.99/yr.

Virus 1. The Concept Virus


Worms 1. WannaCry

It first appeared in July, 1995.


This virus consists of Word macros. It is a macro virus that
It was released on May 12, 2017.
Virus: uses Microsoft Word and attacks its global document
Worm: This is a crypto ransomware that enters a weaker system,
template to infect a system anytime you load a document.
then repeatedly copies and executes the program. It
It copies the virus so that anytime the document goes
encrypts critical files on a computer and spreads through
A self-replicating piece of code through the word processor, it becomes infected. A self-replicating malware that networks.
You have to immediately stop loading any new documents
which copies itself to another and restart your computer in safe mode. You can
spreads itself to other computers, The best way to get rid of this virus is to use antivirus
software such as the Norton Bootable Recovery Tool.
program, computer sector, or download a scanning and repair tool such as F-Secure often through a computer network.
This software is free.
document. Anti-virus.
This software costs $69.99/yr.

2. Clop 3. Melissa 2. Code Red 3. The Morris Worm

It started in February of 2019. The Melissa virus was released on March 26, 1999. It started on July 15, 2001.
Its initial appearance was on November 2, 1988.
The Clop virus is a file encrypting virus which attaches This virus is distributed through an email attachment using This worm makes its way into a computer's system and
This worm used a backdoor in the electronic mail system
itself to saved files using the .Clop extension. It prevents a macro to take over the email system. Once opened, this replicates itself into different networks without user
as well as a bug. It self- replicated through networks while
users from being able to access their data until a ransom virus replicates itself and sends it to the top 50 people in authorization. It overflows the server and depletes the
remaining hidden. It immensely slowed down the
fee is paid. the user's email. internet.
computer, delaying emails for days.
You need to isolate the device and use a malware To remove this virus, you need to install antivirus software To clean your computer of the Code Red virus, you need
The main way to get rid of this worm was through software
removal tool or antivirus software. The McAfee antivirus such as Panda Antivirus. to reboot it and use the Microsoft Windows security patch.
patching.
software is one option The cost of this software is $58.99/yr. The security patch can range from about $50-200 based
The total average repair cost ranged from $100 000 - $10
The price of this antivirus is $74.99/yr. on your device.
million.

You might also like