Computer viruses that come a callin’
the list of computer worm and trojan viruses
Every day new computer viruses are created to annoy us and to wreck a
havoc on our computer systems. Many
of them are simply designed to annoy and cause disruptions on your computer or computer systems.
But some of them can cause a serious and permanent damage and loss of
data, often resulting in having to make costly repairs to your computer system, while you try
The 10 Most Prevalent Worm and Trojan
Below are ten viruses currently cited as being the most prevalent in
terms of being seen the most or in their ability to potentially cause damage. New viruses are created daily. This
is by no means an all inclusive list. The best thing you can do is to remain vigilant, keep your anti-virus
software updated, and stay aware of the current computer virus threats.
1. Virus: Trojan.Lodear
A Trojan horse that attempts to download remote files. It will inject
a .dll file into the EXPLORER.EXE process causing system instability.
2. Virus: W32.Beagle.CO@mm
A mass-mailing worm that lowers security settings. It can delete
security-related registry sub keys and may block access to security-related websites.
3. Virus: Backdoor.Zagaban
A Trojan horse that allows the compromised computer to be used as a
covert proxy and which may degrade network performance.
4. Virus: W32/Netsky-P
A mass-mailing worm which spreads by emailing itself to addresses
produced from files on the local drives.
5. Virus: W32/Mytob-GH
A mass-mailing worm and IRC backdoor Trojan for the Windows platform.
Messages sent by this worm will have the subject chosen randomly from a list including titles such as: Notice of
account limitation, Email Account Suspension, Security measures, Members Support, Important
6. Virus: W32/Mytob-EX
A mass-mailing worm and IRC backdoor Trojan similar in nature to
W32-Mytob-GH. W32/Mytob-EX runs continuously in the background, providing a backdoor server which allows a remote
intruder to gain access and control over the computer via IRC channels. This virus spreads by sending itself to
email attachments harvested from your email addresses.
7. Virus: W32/Mytob-AS, Mytob-BE, Mytob-C, and Mytob-ER
This family of worm variations possesses similar characteristics in
terms of what they can do. They are mass-mailing worms with backdoor functionality that can be controlled through
the Internet Relay Chat (IRC) network. Additionally, they can spread through email and through various operating
system vulnerabilities such as the LSASS (MS04-011).
8. Virus: Zafi-D
A mass mailing worm and a peer-to-peer worm which copies itself to the Windows system folder with
the filename Norton Update.exe. It can then create a number of files in the Windows system folder with filenames
consisting of 8 random characters and a DLL extension. W32/Zafi-D copies itself to folders with names containing
share, upload, or music as ICQ 2005a new!.exe or winamp 5.7 new!.exe. W32/Zafi-D will also display a fake error
message box with the caption "CRC: 04F6Bh" and the text "Error in packed file!".
9. Virus: W32/Netsky-D
A mass-mailing worm with IRC backdoor functionality which can also
infect computers vulnerable to the LSASS (MS04-011) exploit.
10. Virus: W32/Zafi-B
A peer-to-peer (P2P) and email worm that will copy itself to the
Windows system folder as a randomly named EXE file. This worm will test for the presence of an internet connection
by attempting to connect to www.google.com or www.microsoft.com. A bilingual, worm with an attached Hungarian
political text message box which translates to "We demand that the government accommodates the homeless, tightens
up the penal code and VOTES FOR THE DEATH PENALTY to cut down the increasing crime. Jun. 2004, Pécs (SNAF
your exposure to computer viruses
So, beware of viruses by avoding visits to suspicious websites and
not openning email attachments, unless they're from trusted friends. Even then, always keep your antivirus
protection on when online or openning email attachments. And above all, keep your antivirus software or internet
security subscription always current and get automatic updates.
Tips - When choosing antivirus
software for your new or old computer, there are some basics that you should know before you
decide on what antivirus program to download and install on your computer
Computer Virus Prevention - Simple and
practical steps will help you protect your computer against viruses by preventing your system from
being infected by a virus.
Computer Virus Protection - What is a computer virus
and how to best protect your computer system from viruses and other online
Computer Viruses and Worms - While many computer viruses are just
designed to annoy us, some can cause serious computer damage. This particularly applies to worms, which
are usually amongst most destructive viruses. See the list of more destructive worms and trojans, and
what they can do to your computer.
Fighting Computer Viruses - Antivirus programs generally keep pace
with current virus threats. But instead of only relying on those programs doing their job, take some
simple steps to protect your computer and avoid getting infected by a virus.
Antivirus Program - One of the best free antivirus programs is Avast Antivirus. If
you're not already familiar with this program, read our review of this easy to use antivirus program
and how to use it.
Norton Antivirus Program - Who hasn't yeat heard of Symantec's
Norton Antivirus!? One of the most reliable, paid antivirus programs is easy to use and provides a good
all-round protection for your computer.
Horse - Even if you're an occasional computer user, no doubt you know about trojan
horses and the threat they can pose to your computer. Often masquerading as a harmless application,
trojan horse can be a destructive program.
Zone Alarm - One of the
internet security programs that should be on your computer as part of online protection.
Available both in free and paid version, Zone Alarm monitors your online traffic and acts as a
firewall, to protect your computer against malware threats.