1 thought on “What are the new development of the current computer virus”

  1. With the development of computer technology, computer viruses are also continuously developing. Computer viruses and anti -virus technology are continuously developing in the process of restraining each other like the enemy and us. On one side, we are in passive defense and resistance.

    The computer virus will show new development trends: while bringing us a lot of convenience and help, the Internet and LAN have become the main way to spread computer virus transmission; in the struggle with anti -virus technology, The deformation and destructive power of computer viruses have been continuously improved; the emergence of hybrid viruses has gradually lost meaning to the classification and definition of computer viruses in the past, which also makes the anti -virus work more difficult; The consequences of "poisoning" are more serious; some software that people use the most will become the main object of attacks of computer viruses.

    . The computer network (Internet, LAN) becomes the main way to propagate computer virus. Using the computer network is gradually becoming the condition of computer virus seizures

    The earliest computer virus only passes only through the earliest passing through File copy dissemination, the most common communication medium at the time was floppy disks and pirated discs. With the development of computer networks, computer viruses can currently spread through computer networks (emails, web pages, instant messaging software, etc.). The development of computer networks helps the spread of computer viruses to greatly increase, and the scope of infection is getting wider and wider. It can be said that networking brings the efficiency of computer virus infection. This is the most prominent performance of "shock waves" and "shock waves". Taking "shock waves" as an example, the impact wave is an Internet worm that uses RPC DCOM buffer overflow vulnerabilities. It can collapse the attack system and quickly spread through the Internet through the Internet. It will continue to scan the system with vulnerabilities and send data to port 135 ports with vulnerabilities, and then download the code msblast.exe that can be replicated from the infected computers, and check whether the current computer has the network available network available networks available. connect. If there is no connection, the worm is checked for the Internet connection for 10 seconds, until the internet connection is established. Once the Internet connection is established, the worm will open the 4444 port on the infected system, listen to the port 69, scan the Internet, try to connect to port 135 connected to other target systems and attack them. Compared with the previous computer virus impression of us, the initiative of computer virus (active scanning computers that can be infected) and independence (no longer rely on host files) are stronger.

    . The speed of computer virus deformation (variant) is extremely fast and develops towards a hybrid and diversified

    "Viole waves" explosion large -scale outbreak shortly, and its deformation virus will be It appeared and continuously updated. It does not take a month from the appearance of variant A to the appearance of variant F. While people are busy killing the "fluctuating waves", a new computer virus came into being -"shock wave killer", which will turn off the process of computer virus such as "vibration wave" "Waves" Similar: blocking the network, exhausting computer resources, shutdown of random countdown shutdown, and timely attacking certain servers. A report released by the anti -virus service provider Sophos stated that the number of new worm viruses on the Internet in May this year reached a new high in 30 months. New high since December. These 959 new viruses include new variants of some old viruses before. As a result of the development of computer viruses to hybrid and diversified development, some viruses will be more delicate, and other viruses will be more complicated. Mixed virus characteristics, such as red code virus (Code Red), integrate the characteristics of file type and worm virus This development trend will make it more difficult for anti -virus work. On January 27, 2004, a new type of worm virus spread in the enterprise email system, resulting in a surge in the number of emails, thereby blocking the network. Different anti -virus manufacturers name them NOVARG, MyDoom, SCO bombs, Noweig, small postman variants, etc. This virus uses a rare tactic combining virus and spam. The speed seems to be faster than the recent spread of several other viruses.

    . The hiddenness of the operation method and communication method

    On September 14, the Microsoft Security Center issued the September Vulnerability Security Announcement. The GDI vulnerabilities mentioned in MS04-028 are designated as "serious". Rising Security experts believe that the vulnerability involves GDI components. When users browse specific JPG pictures, the buffer will overflow and then perform the virus attack code. This vulnerability may occur on all Windows operating systems, for all software based on IE browser kernels, Office series software, Microsoft .NET development tools, and other graphics -related software of Microsoft. The widest high risk vulnerability. This type of virus ("picture virus") may have an onset through the following forms: 1. group emails, JPG picture files with viruses; 2. Use malicious web pages, browse JPG files in the webpage, and even pictures that comes with on the webpage You can be infected by the virus; 3. Pass through pictures or send pictures files through instant messaging software (such as QQ, MSN, etc.).

    In computer infected by computer virus, you may only see some common normal processes such as SVCHOST, Taskmon, etc. In fact, it is the computer virus process. At the beginning of June this year, a movie related to Harry Potter began to be screened in the United States and the United Kingdom, respectively. Then, a security company in the UK issued a warning saying that the "cyber sky" worm virus was re -burning with the help of a science fiction role Harry Potter. Security companies pointed out that users infected by Netsky.P infection in infection have increased significantly because it can camouflage itself as a video file, game or book to lure users to download users related to Harry Potter. "Worm.lehs", "V baby" virus and "Worm.swen" virus all disguised themselves into Microsoft's patch procedures. These camouflage are invincible. Don't you not download anything from the computer network? Including related information, videos, and songs you are interested in? As for the use of beautiful words in the theme, it attracts you to open the email for the invasion of computer viruses, which is already a very common computer virus disguise. In addition, some computer viruses infected with QQ, MSN and other instant messaging software will give you a very attractive URL. As long as you browse the webpage of this URL, the computer virus comes.

    . Use operating system vulnerabilities

    It operating system is a bridge connecting computer users and computer systems, and the core of computer systems. At present, the most widely used Windows series operating system. In 2003, the "worm king", "shock wave" and the "shock wave" in 2004, and the "picture virus" mentioned earlier using the vulnerability of the Windows system, which caused the entire Internet in just a few days. Great harm. The development operating system is a complex project. It is inevitable that vulnerabilities and errors occur. Any operating system is to gradually mature and improve in the process of repairing vulnerabilities and correcting errors. But these vulnerabilities and errors give computer viruses and hackers a good performance stage.

    As the DOS operating system usage decreases, the computer virus infected with the DOS operating system will also withdraw from the historical stage; as the usage of the Windows operating system increases, the computer virus for the Windows operating system will become a computer virus will become a computer virus will become the computer virus will become the computer virus will become the computer virus of the Windows operating system. Mainstream.

    5. Computer virus technology and hacking technology will increasingly integrated

    because their ultimate goal is the same: destruction. Strictly speaking, Trojan and rear doors are not computer viruses because they cannot copy and diffuse themselves. However, with the development of computer virus technology and hacking technology, virus writers will eventually integrate these two technologies. Rising Global Anti -Virus Monitoring Network is the first to intercept a Trojan -controlled Trojan -controlled Trojan, and names it "Trojan.qqbot.a) virus. According to reports, this is the world's first Trojan virus that can control the system through QQ control systems, which will also cause the harm of compulsory system restart, forced to download virus files, and capture the current system screen. The latest variant T virus that broke out in mid -November 2003 has a variety of virus characteristics such as worms, hackers, and back doors. The lethality and harm are very large. The MyDoom worm virus is spread through email attachments. When the user opens and runs the worm program in the attachment, the worm will immediately send a large number of deceptive emails with the email address in the user mailbox as the goal At the same time, leave the back door that can be uploaded and executed on the user host. These computer viruses may be the prototype of integration of computer virus technology with hackers.

    . 6. Material interests will become the biggest power to promote the development of computer viruses

    From the perspective of the development of computer virus, interest and hobbies of technology are the source of computer virus development. power. But more and more signs show that material interests will become the greatest motivation to promote the development of computer viruses. In early June 2004, my country and other countries successfully intercepted computer viruses for bank online user accounts and passwords for banks. Kingsoft Poison has successfully intercepted the latest variant B of online banking thieves. This variant will steal more banks and passwords of banks, which may cause huge economic losses; The new Internet virus "Korgo", Korgo virus is quite similar to the "volatile wave" virus that was raging in the previous month, but its main attack targets are bank accounts and credit card information. In fact, not only online banking, online stock accounts, credit card accounts, house transactions, and even game accounts may be attacked by the virus, and even the online virtual currency is within the target range of the virus. The more famous ones are "happy ears", "stock stealing", etc., and there are many unknown, so it is a more terrible virus. The computer virus for online games is more obvious in this point. The online game account and thousands of dollars or even 10,000 yuan virtual equipment have made it in the hands of others.

    Nowadays, many banks provide online verification or password keys. Users must not only save costs and lose huge capital risks. It is necessary to buy a password key or digital certificate.

Leave a Comment

Shopping Cart