EssaysForStudent.com - Free Essays, Term Papers & Book Notes
Search

Top 10 Malware of 2004

By:   •  Essay  •  582 Words  •  February 2, 2010  •  718 Views

Page 1 of 3

Join now to read essay Top 10 Malware of 2004

The top 10 malware threats of 2004 as taken from McAfee and defined by Symantec are as followed: Adware-180, Adware-Gator, Exploit-ByteVerify, Exploit-MhtRedir, JS/Noclose, W32/Bagle, W32/Mydoom, W32/Netsky, W32/Sasser, W32/Sdbot (family including sdbot, gaobot, polybot, spybot). The majority of these threats enter into our system under a different alias’ or by hitching a ride on programs we download online.

Adware-180 is a spybot that monitors the activity its infectee’s do while online. This program will open up affliated sites when it sees a certain keyword while searching online. When adware-180 is downloaded it creates a name for itself in the Microsoft registry, this registry then can fix itself it only partial parts of the adware are removed.

Adware-Gator is one that I am ooooh to familiar with. This adware drives me crazy! I will be searching online and all of a sudden down by my time and date a little box will pop up giving me alternative vacation prices or prescription prices. Gator (or gain as it says in my registry) gets downloaded onto the computer either manually or by sneaking itself in with another download. With this adware on the hard drive it allows websites to upload their content to your computer without your knowledge enabling them to display advertisements at the strangest times.

Exploit-MhtRedir is a file that is considered “a malicious website to download and execute programs on your computer”. It’s file type is a Trojan horse, which disguises itself in order to promote unwanted HTML on your computer. This Trojan only affects Microsoft internet explorer.

W32/Mydoom comes in an assortment of different subcategories ranging from category 1 to 2. The majority of the Mydoom worms are a category 2. The mass mailing worm that uses its own smtp to send emails to people listed on the infected computers. It allows unauthorized remote access. Once it finds the addresses of people it sends itself in attachments that say things like read the following attachment, please confirm, please read immediately etc.

W32/Sasser

Download as (for upgraded members)  txt (3.4 Kb)   pdf (65.9 Kb)   docx (11.2 Kb)  
Continue for 2 more pages »