"Every day new computer viruses are created to annoy us and damage our computer systems. Below are 10 of the most common viruses".
Every day new computer viruses are created to annoy us and damage our computer systems. Below are 10 viruses that are currently touted as the most common infecting computers, this can be seen from their ability to potentially cause damage.
New viruses appear every day. This is by no means an all-encompassing list of viruses. The best thing you can do is stay alert, update your favorite anti-virus software, and stay alert to current computer virus threats.
10 Most Common Types of Viruses That Often Infect Computers
Trojan horse trying to download remote files, This virus will inject files and etc into the EXPLORER.EXE process which causes system instability on the computer.
Mass mail worm that lowers security settings. It can delete security-related registry subkeys and can block access to security-related websites.
Trojan horses that allow compromised computers to be used as secret proxies and that can degrade network performance.
A mass mail worm that spreads by sending email to addresses generated from files on local drives.
Mass mail worm & IRC backdoor Trojan for Windows platform. Messages sent by this virus will have a subject chosen at random from a list including the title.
Examples include: Account restriction notifications, Email Account Suspension, Security measures, Member Support, Important Notifications, and others.
Mass mail worm and Trojan with an IRC backdoor similar in nature to W32-Mytob-GH. W32/Mytob-EX will run continuously in the background,
Provides a backdoor server that allows remote intruders to gain access and control over computers via IRC channels. This virus spreads by sending viruses to email attachments that are retrieved from your email address.
Viruses: W32/Mytob-AS, Mytob-BE, Mytob-C, and Mytob-ER
These variations of the worm family share the same characteristics in terms of what they can do. They are mass mail worms with backdor functionality that can be controlled via an Internet Relay Chat (IRC) network.
Apart from that, they can also spread via email as well as through various other operating system vulnerabilities such as LSASS (MS04-011).
Mass mail worm and a "peer-to-peer" worm that will copy itself into a folder on the Windows system with the file name Norton Update.exe. It can then create any number of files in the folder with a filename consisting of 8 random characters and a DLL extension.
W32/Zafi-D copies itself to a folder with a name containing shares, uploads, or music as ICQ 2005a new!.exe or winamp 5.7 new!.exe. W32/Zafi-D will also display a fake error message box with the words "CRC: 04F6Bh" and the text "Error inPacked file!".
A bulk mail worm with IRC backdor functionality that can also infect computers vulnerable to the LSASS exploit (MS04-011).
Peer-to-peer or (P2P) worms and emails that will copy themselves into Windows system folders as randomly named EXE files. This worm will test the existence of an internet connection by trying to connect to www.google.com or www.microsoft.com.