The most dangerous PC viruses of 2019
The most dangerous PC viruses of 2019
The year 2019 has seen its fair share of devastating viruses and malware attacks. From the WannaCry ransomware attack that hit businesses and organizations around the world, to the NotPetya attack that crippled Ukraine’s critical infrastructure, these viruses have caused immense damage and disruption.
While there have been many scary viruses and malware attacks this year, there are a few that stand out as the most dangerous. Here are the most dangerous PC viruses of 2019.
1. WannaCry
The WannaCry ransomware attack was one of the biggest and most widespread malware attacks of 2017. It affected over 200,000 computers in 150 countries and caused billions of dollars in damage. The virus encrypted files on infected computers and demanded a ransom of $300 in Bitcoin to decrypt them.
While WannaCry was mostly shut down and contained within a few days, it still caused a lot of damage. Many businesses and organizations were forced to shut down their computers and systems until they could remove the virus. The WannaCry attack was a wake-up call for many businesses and organizations about the importance of cybersecurity.
2. NotPetya
The NotPetya virus was first discovered in June 2017. It initially spread through Ukraine before quickly spreading to other countries. NotPetya is a ransomware virus that encrypts files on infected computers and demands a ransom for decrypting them.
However, unlike other ransomware viruses, NotPetya does not seem to have a way to decrypt the files even if the ransom is paid. This makes it much more destructive and dangerous. NotPetya also has a destructive “wiper” function that can delete critical system files, making it even more damaging.
NotPetya caused billions of dollars in damage and was one of the most destructive viruses of 2017. It crippled Ukraine’s critical infrastructure, including its power grid, banks, and government agencies. The virus also spread to other countries, causing damage to businesses and organizations around the world.
3. Emotet
Emotet is a malware virus that first appeared in 2014. It is primarily spread through spam emails that contain malicious attachments or links. Once a computer is infected with Emotet, it will download and install other malware, including ransomware and banking Trojans.
Emotet is particularly dangerous because it can infect a computer without the user’s knowledge. It can also disable security software and spread to other computers on the same network. Emotet has been used in a number of high-profile attacks, including the NotPetya and WannaCry attacks.
4. Hajime
Hajime is a malware virus that was first discovered in 2016. It is a “botnet” virus that can be used to launch distributed denial-of-service (DDoS) attacks. Hajime can also be used to steal passwords and personal information.
Hajime is particularly dangerous because it can infect a computer without the user’s knowledge. It can also spread to other computers on the same network. Hajime is believed to be used by a number of different cybercriminal groups and has been used in a number of high-profile attacks.
5. Mirai
Mirai is a malware virus that was first discovered in 2016. It is a “botnet” virus that can be used to launch distributed denial-of-service (DDoS) attacks. Mirai can also be used to steal passwords and personal information.
Mirai is particularly dangerous because it can infect a wide range of devices, including home routers and Internet of Things (IoT) devices. This allows Mirai to create a large “botnet” that can be used to launch powerful DDoS attacks. Mirai was used in a number of high-profile attacks, including the October 2016 DDoS attack on Dyn, a major DNS provider.
6. Kryptik
Kryptik is a malware virus that was first discovered in 2014. It is primarily spread through spam emails that contain malicious attachments or links. Once a computer is infected with Kryptik, it will download and install other malware, including ransomware and banking Trojans.
Kryptik is particularly dangerous because it can infect a computer without the user’s knowledge. It can also disable security software and spread to other computers on the same network. Kryptik has been used in a number of high-profile attacks, including the NotPetya and WannaCry attacks.
7. Locky
Locky is a ransomware virus that was first discovered in 2016. It is primarily spread through spam emails that contain malicious attachments or links. Once a computer is infected with Locky, it will encrypt files on the infected computer and demand a ransom for decrypting them.
Locky is particularly dangerous because it can encrypt a wide range of files, including documents, photos, and music files. It can also spread to other computers on the same network. Locky has been used in a number of high-profile attacks, including the NotPetya and WannaCry attacks.
8. Dridex
Dridex is a malware virus that was first discovered in 2014. It is primarily spread through spam emails that contain malicious attachments or links. Once a computer is infected with Dridex, it will download and install other malware, including ransomware and banking Trojans.
Dridex is particularly dangerous because it can infect a computer without the user’s knowledge. It can also disable security software and spread to other computers on the same network. Dridex has been used in a number of high-profile attacks, including the NotPetya and WannaCry attacks.
9. Cerber
Cerber is a ransomware virus that was first discovered in 2016. It is primarily spread through spam emails that contain malicious attachments or links. Once a computer is infected with Cerber, it will encrypt files on the infected computer and demand a ransom for decrypting them.
Cerber is particularly dangerous because it can encrypt a wide range of files, including documents, photos, and music files. It can also spread to other computers on the same network. Cerber has been used in a number of high-profile attacks, including the NotPetya and WannaCry attacks.
10. Petya/NotPetya
Petya/NotPetya is a ransomware virus that was first discovered in 2016. It is primarily spread through spam emails that contain malicious attachments or links. Once a computer is infected with Petya/NotPetya, it will encrypt files on the infected computer and demand a ransom for decrypting them.
Petya/NotPetya is particularly dangerous because it can encrypt a wide range of files, including documents, photos, and music files. It can also spread to other computers on the same network. Petya/NotPetya has been used in a number of high-profile attacks, including the NotPetya and WannaCry attacks.Published here
The 20 most widespread PC viruses
Over the past two decades, PC viruses have become increasingly sophisticated and widespread, causing billions of dollars in damage worldwide. Here are the 20 most widespread viruses of the past 20 years, according to data from security firm Symantec.
1. WannaCry
WannaCry is a ransomware virus that first appeared in May of 2017. It quickly spread around the world, infecting more than 230,000 computers in 150 countries. WannaCry encrypts a victim’s files and demands a ransom be paid in Bitcoin in order to decrypt the files. The virus caused an estimated $4 billion in damage and was particularly damaging to hospitals and other critical infrastructure.
2. Conficker
Conficker is a worm that first appeared in 2008 and quickly spread to more than 10 million computers. The worm disabled security features and installed malware that allowed attackers to take control of the infected computers. Conficker was particularly difficult to remove and remained a threat for years.
3. Zeus
Zeus is a Trojan horse that first appeared in 2007. It was used to steal banking information by infecting computers and then recording the victim’s keystrokes. Zeus was used in a number of high-profile attacks, including the theft of $3 million from a French bank.
4. Stuxnet
Stuxnet is a worm that was specifically designed to target industrial control systems. It was first discovered in 2010 and is believed to have been created by the US and Israeli governments for the purpose of disrupting Iran’s nuclear program. Stuxnet is considered to be the first weaponized computer virus.
5. Cryptolocker
Cryptolocker is a ransomware virus that first appeared in 2013. It encrypts a victim’s files and demands a ransom be paid in Bitcoin in order to decrypt the files. Cryptolocker has been used in a number of high-profile attacks, including the compromise of the New York Times’ website.
6. Sality
Sality is a virus that first appeared in 2003. It is a polymorphic virus, which means it is able to change its code in order to avoid detection. Sality is often used to distribution other malware, such as Trojans and ransomware.
7. Sober
Sober is a worm that first appeared in 2003. It is typically spread via email and is used to distribute other malware, such as ransomware. Sober was used in a number of high-profile attacks, including the distribution of the MyDoom worm.
8. MyDoom
MyDoom is a worm that first appeared in 2004. It is typically spread via email and is used to launch distributed denial of service (DDoS) attacks. MyDoom was used in a number of high-profile attacks, including the disruption of the SCO Group’s website.
9. Storm
Storm is a worm that first appeared in 2007. It is typically spread via email and is used to launch distributed denial of service (DDoS) attacks. Storm was used in a number of high-profile attacks, including the disruption of the BBC’s website.
10. SQL Slammer
SQL Slammer is a worm that first appeared in 2003. It targets unpatched Microsoft SQL Server installations and is used to launch denial of service attacks. SQL Slammer caused a worldwide denial of service attack that impacted major companies, such as Bank of America and Microsoft.
11. Melissa
Melissa is a virus that first appeared in 1999. It is spread via email and is used to launch denial of service attacks. Melissa was used in a number of high-profile attacks, including the shutdown of the ecommerce site Buy.com.
12. Blaster
Blaster is a worm that first appeared in 2003. It is used to launch denial of service attacks and to install a backdoor on the infected computer. Blaster was used in a number of high-profile attacks, including the shutdown of Microsoft’s Windows Update website.
13. Netsky
Netsky is a worm that first appeared in 2004. It is used to distribute other malware, such as ransomware. Netsky was used in a number of high-profile attacks, including the mass-mailing of the Sober worm.
14. Code Red
Code Red is a worm that first appeared in 2001. It is used to launch denial of service attacks. Code Red was used in a number of high-profile attacks, including the shutdown of the White House website.
15. Iloveyou
Iloveyou is a virus that first appeared in 2000. It is spread via email and is used to launch denial of service attacks. Iloveyou was used in a number of high-profile attacks, including the mass-mailing of the Melissa virus.
16. Sasser
Sasser is a worm that first appeared in 2004. It is used to launch denial of service attacks and to install a backdoor on the infected computer. Sasser was used in a number of high-profile attacks, including the shutdown of Deutsche Telekom’s T-Online service.
17. Creeper
Creeper is a virus that first appeared in 1971. It is considered to be the first computer virus. Creeper was used to display the message “I’m the creeper, catch me if you can!”
18. Morris
Morris is a worm that first appeared in 1988. It is considered to be the first internet worm. Morris was used to launch denial of service attacks.
19. foundation
Foundation is a virus that first appeared in 1998. It is spread via email and is used to launch denial of service attacks. Foundation was used in a number of high-profile attacks, including the shutdown of the Yahoo! website.
20. Anna Kournikova
Anna Kournikova is a virus that first appeared in 2001. It is spread via email and is used to launch denial of service attacks. Anna Kournikova was used in a number of high-profile attacks, including the mass-mailing of the Melissa virus.
All material on this site was made with malwarezero.org as the authority reference. See page.