Now, intelligence agencies from various countries develop multiple computers as viruses and malware intelligence agents. The cold war between Nations so switching to a virtual world.
In recent years, surfaced a couple of new malware created with technology is very complex and is able to attack various targets for different attacks. However meaningless malware long gone for granted. This is the amount of malware that stands out the last five years as intelligence agents first-class a la "James Bond".
1. Stuxnet
Stuxnet worm is complex with its cyber war gave birth to the discourse, and is often referred to as a new breed of malware. His attack took place at the end of 2010, where more than half the cases of infection occur in Iran, followed by Indonesia and India. Its impact was felt on sudden full hard disk without cause.
The main threat lies in its ability Stuxnet took over control of the industrial system such as changing motion motor or pump, allowing the sabotage. Iran, for example, had become victims of Stuxnet. Malware is infecting computers in nuclear reactor at Bushehr, but hers did not interfere with crucial systems.
2. Duqu
The next generation of Stuxnet is Trojan Duqu, which was first identified in October 2011 and allegedly built by the same developer as platform design similar. In contrast to Stuxnet, Duqu used to practice espionage because it can steal passwords, take a screenshot on the desktop, and stole various types of documents belonging to the victim.
3. Flame
Flame is a Trojan with capabilities such as replication and worm can spread through USB or local network. Flame identified in may 2012, but is expected to start circulating since 20 March 2010.
These malicious programs are working to '' sniff '' the traffic on the network, take a screenshot, record the conversation, steals passwords, to tap the keyboard. His ability to steal this data makes it as a dangerous weapon of espionage. Victims of Flame range from individuals, organizations, Governments, and educational institutions.
4. MacTrojan
Malware successfully subvert the Apple claims that Mac is a product immune virus. Last April, more than half a million infected Mac Trojan Flashback device. This Malware exploit weaknesses in the Java platform, allowing the Flashback terunduh automatically without warning.
On an infected computer will be installed, a malicious module one of its functions is showing false results on search engines and can be ordered to download other malicious programs.
5. DNSChanger
What is '' DNSChanger face long '' because it appeared since 2007. The last two weeks, this trojan makes a scene because of rumored would cause '' Apocalypse '' Internet on 9 July.
How it works is to attack the Domain Name System (DNS), domain rename feature a row of numbers. As a result, the device could not access the stricken site although connected with the Internet normally.
Not just a PC, this trojan also attacked router. In June, DNSChanger Working Group detected that more than 300 thousand IP addresses around the world have been infected. According to Alfons Tanujaya, antivirus Vaksin.com, practitioners of DNSChanger in Indonesia belongs to the impact is very small. On 11 June, detected only the infected IP 1,481, or about 0,0033% of Indonesia's total Internet users 55 million.
No comments:
Post a Comment