News

Top 3 scariest malware samples

No two users are one and the same. Just as every person has subtle differences and flaws that make them unique, malware samples also have shifting capabilities that make them stand apart from others in the wild. This past year, a number of frightening malware samples have crept up, and have served to infect a large number of users and spread fear throughout cyberspace. However, by becoming aware of these strains and the characteristics that set them apart, individuals can better protect themselves from these and similar threats.

But what makes a malware sample scary? Is it its infection technique, how many systems it has infiltrated, or the information or content it is after? Fears are another aspect that are unique to each person, so we'll let you judge for yourselves. Here are the top 3 scariest malware samples in recent memory:

1) CIH or Chernobyl
Just as the name implies, this malware sample was one that was discovered a while ago, but is still of interest to many. According to WeLiveSecurity contributor Lysa Myers, the CIH strain was first found in 1998, but seems to re-emerge almost every year. The infection disguises itself in "empty" file space, varying its code to be broken up in different ways to fit the space.

"[I]f your system was still infected on April 26th (the anniversary of the Chernobyl disaster, which was speculated by some to by why the date was chosen) the virus was set to overwrite the first megabyte of the hard drive, which made the computer hang or blue screen," Myers wrote.

2) FakeAlert.D
This strain utilized the popular bait-and-switch strategy common in a range of malware samples today. Users are tricked by a pop-up notification that warns of malware infection and appears to be legitimate. Despite its seriousness, the alert tells the user that for a nominal fee, the system can be cleared of any impending malware detected. However, this is not a real monitoring or restoration service - it is simply cybercriminals' clever way of using individuals' fears against us. Many are so terrified by the prospect of malware infection, that they willingly input their personal and payment information into the alert, which sends the sensitive data straight to hackers.

3) CryptoLocker
Unless you've been living under a rock for the past year and a half or so, chances are you've heard of this next malware, a ransomware sample called CryptoLocker. This strain leverages encryption to lock users out of their files, then demands a ransom - usually in the form of Bitcoin or other digital currency - for the decryption key. The thought of being preventing from accesses precious files like photos, business information and other content is enough to encourage some users to pay the ransom. However, some have reported no resolution after making the payment and continue to be locked out of their files.

While these samples seem scary, they can be properly evaded with best practices like utilizing monitoring programs and encryption.

Protect data in transit with an SSL certificate today.

corporate office

Thawte
The Gateway
Century Lane
Century City, 7441
Cape Town
South Africa

Postal Address:
P O Box 15986
Panorama 7500
Cape Town
South Africa

Call: +353 1 793 9141
Fax: +27 21 819 2950

Buy now! Try now!