What are the popular computer viruses?
The world's top ten computer viruses 1 and CIH viruses: the global loss is about 500 million dollars.
CIH virus (1998) was written by Chen Yinghao, a college student in Taiwan Province province, and was introduced into Chinese mainland from Taiwan Province province, China. The carrier of CIH is a tool named "ICQ Chinese Ch_at module", which is reproduced by various websites on the Internet by popular pirated CD games such as Tomb Raider or Windows95/98, making it spread rapidly.
CIH virus is a file virus, and its alias is Win95. CIH, space filler, Win32. CIH and CIH. It mainly infects executable files (PE format) under Windows95/98, but the current version does not infect DOS and WIN3. X(NE format, executable file Windows 3. 1 executable file format under Windows Andos/2) is invalid in WinNT.
Top ten computer viruses in the world II. Melissa virus: the global loss is about $300-600 million.
Melissa (1999) spread herself by sending emails to 50 contacts in the user's address book list through Microsoft's Outlook email software. The email is like the following sentence: "This is the document you requested, please don't show it to others", and an attachment of the Word document is attached. Clicking on this file will make the virus infect the host and copy itself repeatedly.
It is estimated that this Word macro script virus infects 15%~20% of commercial PCs around the world. The virus spread so fast that Intel, Microsoft and many other companies using Outlook software were caught off guard to prevent damage, and they were forced to shut down the entire email system.
Top ten computer viruses in the world 3. Love bug virus: the global loss exceeds $654.38+00 billion.
Love Bug (2000) was distributed through Outlook email system with the theme of "ILoveYou" and the attachment of "Love-Letter-for-you.txt.vbs". After opening the virus attachment, the virus will automatically send a virus email to all mailboxes in the address book, block the mail server, and infect twelve extensions such as. VBS。 HTA。 JPG and. MP3。
The new "Vbs" The virus "Newlove" spreads through outlook, just like the Vbs.loveletter virus. When you open the attachment of virus mail, you will observe that the computer's hard disk light flashes wildly, the system speed slows down obviously, and a large number of files with vbs extension appear in the computer. All shortcuts are changed to be associated with wscript.exe in the system directory, which further consumes system resources and leads to system crash.
Top ten computer viruses in the world. Code Red Virus: The global loss is about $2.6 billion.
Red Team (200 1) is a computer worm, which can spread through network servers and the Internet. On May 38, 2006+July 0 13, the red team spread from the network server. It aims to attack the network server running Microsoft Internet information service software. Ironically, before this, in mid-June, Microsoft released a patch to fix this vulnerability.
After being infected by it, the network site controlled by the attacked host will display such information: "Hello! Welcome! " . Then the virus will actively look for other vulnerable hosts to infect. This behavior lasted about 20 days, and then it launched a denial of service (DoS) attack on some IP addresses. In less than a week, nearly 400,000 servers were infected, and 1 10,000 computers were infected.
Shock wave virus: tens of billions of dollars lost
Shock wave (2003) was intercepted by Rising Global Anti-virus Monitoring Network for the first time on August 12, 2003. When the virus is running, it will constantly use IP scanning technology to find computers with Win2K or XP system installed on the network, and then use DCOMRPC buffer vulnerabilities to attack the system. Once successful, the virus will spread to the other computer for infection, making the system run abnormally, constantly restarting, and even causing the system to crash.
In addition, the virus will also conduct a denial-of-service attack on an upgraded website of Microsoft, resulting in the website being blocked and users unable to upgrade their systems through the website. /kloc-After August of 0/6, the virus will also make the attacked system lose the ability to update the vulnerability patch.
Top ten computer viruses in the world. Big Mac virus: loss of $5-10 billion.
Big Mac (2003) spread through the local area network, looking for all computers on the local area network, and trying to write itself into the startup directory of each computer on the network to start itself. Once the virus runs, it will automatically download the virus from the designated website every two hours when the computer is connected to the internet. At the same time, it will look up all email addresses on the computer hard disk, and send virus emails with titles such as "Re:Movies" and "Re:Sample" to these addresses for mail dissemination. The virus will also download the virus from the designated website every two hours and send the user's privacy to the designated mailbox.
Because the content of the email comes from the data in the infected computer, it may reveal the confidential documents of users, especially enterprises and institutions that use local area network to work. It is best to use online antivirus software to prevent important data from being stolen.
Top ten computer viruses in the world. MyDoom virus: loss10 billion dollars.
MyDoom(2004) is a virus more powerful than Big Mac virus. It broke out on June 26, 2004, and the network loading time slowed down by more than 50% during the peak period. It will automatically generate virus files, modify the registry, and spread it by email. It will also try to download and execute backdoor programs from multiple URLs. If the download is successful, it will be saved in a Windows folder named winvpn32.exe. This backdoor program allows malicious users to remotely access infected computers.
The virus uses its own SMTP engine to send toxic e-mails to spread. The virus collects e-mail addresses from related key values in the registry and files with various extensions. The virus will also request e-mail addresses according to some established rules and send toxic e-mails to these addresses. The virus also ignores email addresses with specific characters.
Top ten computer viruses in the world. Shock wave virus: loss of 5-1billion dollars.
Shockwave (2004) broke out on April 30, 2004, causing tens of millions of dollars in losses to the world in a short time. It also reminds everyone that in April 2004, the virus was a third-party modified version of I-worm/sasser.a. Like the previous version of the virus, it was also spread through the latest LSASS vulnerability of Microsoft. We remind users to download Microsoft patches in time to prevent virus invasion. If the virus file is executed in a pure DOS environment, English sentences condemning American soldiers will be displayed.
Systems infected by shock wave include Windows2000, WindowsServer2003 and WindowsXP. After the virus runs, it will skillfully copy itself as %WinDir%napatch.exe, randomly search the machines on the network, and send illegal data containing backdoor programs to port 445 of the remote computer. If the remote computer has MS04-0 1 1 vulnerability, it will automatically run the backdoor program and open the backdoor port.
Top ten computer viruses in the world. Panda incense burning virus: loss of hundreds of millions.
Panda Burning Incense (2006) started a large-scale outbreak at the end of 2006. Take worms for example. Take WhBoy.h as an example, it is written with Delphi tool, which can stop a large number of antivirus software and firewall software processes. The virus will delete files with the extension of gho, making it impossible for users to use ghost software to restore the operating system.
"Panda Burning Incense" is infected with *. exe,*。 com,*。 pif,*。 src,*。 Html and *. The asp files of the system cause IE to automatically connect to the designated virus website to download the virus as soon as the user opens these web files. Autorun.inf and setup.exe files are generated for each partition of the hard disk. The virus can also spread through USB flash drive and mobile hard disk, and run by using the automatic playback function of Windows system. "Panda Burning Incense" can also modify the registry startup item, and the infected file icon will become a "Panda Burning Incense" pattern. Viruses can also spread through * * * shared folders and weak system passwords.
The world's top ten computer viruses 10, online game thief virus: loss of 10 million dollars.
The online game thief (2007) is a virus that steals online game accounts and passwords, and its variant wm is a typical variety. Jws, the English version of Troy /PSW. Jws, one of the latest variants of the Trojan family, is written in VisualC++ with shelled. After jws, a variant of "online robber", runs, it will copy itself to the Windows directory and register it as a "Windows_Down" system service, thus realizing self-startup.
The virus will steal the accounts and passwords of many online game players, including World of Warcraft, Perfect World and Journey. , and download other viruses to run locally. Once the player's computer is poisoned, it may lead to the loss of the game account and equipment. In 2007, it was a sensation, and online gamers were on pins and needles.
These are the popular computer viruses brought to you by Bian Xiao. All the contents of the top ten computer viruses in the world.