Alert! Here are the 10 newest computer viruses this year

Listen to the word Virus it has become a scary thing for internet users. Moreover, we must always be vigilant! with the latest computer virus of the year. There have been many cyber attacks in the last decade. By using the latest techniques and encryption, hacking and cyber threats have become easier and more common. They can retrieve information from the system if they need it so easily.

However, most people never know they are being hacked. This is because we are not aware of the computer viruses that are currently appearing online in the internet world. And we don’t even follow the practices we need to follow in order to stay safe and protected from virus threats.

So in this article, we’ll talk about some of the most dangerous and newest computer viruses this year, and how to prevent them. Here is a list of the latest computer viruses for this year.

  1. B0r0nt0k Ransomware
  2. Yatron Ransomware
  3. Gandcrab Ransomware
  4. Magniber Ransomware
  5. Thanatos Ransomware
  6. Trojan Astaroth
  7. The Glupteba Trojan
  8. GoBrut
  9. Joker
  10. Kuik Adware

1. B0r0nt0k Ransomware

Computer ransomware viruses are of various types, but, as we all know, they are designed for monetary purposes. Ransomware can spread through various methods, such as malicious software, email attachments, external storage devices, and more.

Recently, a new computer virus known as B0r0nt0k ransomware appeared on February 25, 2019, encrypting files on Linux servers and adding extensions. fall to encrypted files. Although B0r0nt0k cryptoransomware is designed for Linux systems and websites, it works like a computer virus designed for Windows. This computer virus in addition to affecting the data, and this virus can make changes as well.

  • Startup settings
  • Registration entry
  • Files or programs

To decrypt the files, the attacker asks for 20 bitcoins to be paid within three days of the attack. Failure to do so will permanently delete the attacker. In addition, this cryptovirus is considered dangerous because it can disable security tools.

Prevention:

  • Make regular backups of your data
  • Apply the latest security patch
  • Use intrusion prevention services to block application exploits

2. Yatron Ransomware

A new ransomware-as-a-service called Yatron is being promoted on Twitter. This computer virus works like any other ransomware program and encrypts the files it targets. IT spreads to other computers through EternalBlue and DoublePulsar exploits. Not only that, this Yatron Ransomware virus also tries to delete the encrypted files if the victim fails to make a payment within 72 hours. In addition to exploiting the ransomware computer vulnerability, Yatron will try to spread it through P2P programs by copying the ransomware executable to the default folder.

Prevention:

  • Always keep a backup of your important files
  • Avoid activating macros on received attachments
  • Do not download unsolicited attachments
  • Use the administrator account only when necessary

3. Gandcrab Ransomware

This is one of the most famous computer viruses. Gandcrab is the spread of ransomware through malware advertisements, explicit websites or spam emails, which redirects users to the Rig Exploit Kit page or the GrandSoft EK page. Through these pages, Gandcrab makes entries into users’ systems and devices.

Once the ransomware is active in the system, it begins to collect personal information of the user, such as username, keyboard type, presence of antivirus, IP, operating system version, current version of Windows, etc. The malicious computer virus Gandcrab takes the next steps based on the information it collects. After that, it stops all tasks and processes running on the system so that it can start encrypting the data and files in the system.

It then generates a public and private key on the user’s system, which is then transmitted to a C2 server hosted on a .bit domain. As soon as the key is sent, it starts the encryption process using the generated public key and adds the “.GDCB” extension to all the encrypted files. It then sends a file containing a redemption message to the user’s system in exchange for decrypting the user’s data. The file name with the redemption message is “GDCB-DECRYPT.txt”.

Prevention:

  • Regular backup of important data and files.
  • Update your operating system and applications.
  • In the event of an attack, try using a ransomware decryption tool.

4. Magniber Ransomware

The latter computer virus is especially active in Asian countries. Magniber is spread by malvertisements, an infected website that redirects users to the Magnitude exploit kit page. This virus is the oldest set of malicious browser tools still used to distribute ransomware. Once Magniber enters the system, it starts encrypting data and files using a unique key. Once encrypted, it adds the .dyaaghemy extension to all encrypted files.

Prevention:

  • Regular backup of data and files.
  • Update your operating system and applications.
  • Lock file extensions like exe | pif | tmp | url | vb | vbe | scr | reg | pst | cmd | com | liliac | dll | dat | hlp | hta | js | wsf.

5. Thanatos Ransomware

This is a new computer virus called “Thanatos”, which is distributed through advertisements, spam emails with attachments and malicious file types, etc. It is very similar to the most famous computer virus, the ILOVEYOU computer virus. The hardest part is decrypting the data that this ransomware has encrypted. Because, it generates a different key each time for encryption and does not store that key anywhere, which makes recovery difficult.

After that, it will start loading payloads on the user’s system as .exe or .txt files, which are set to run automatically and open each time the system is restarted. This handy task starts encrypting the file and adds the “.thatatos” extension to the encrypted file. Immediately, the user receives a redemption payment message on his system.

Prevention:

  • Disable macros and Activex when using MS Office products.
  • Store data and files regularly.
  • Update your operating system and applications.

6. Trojan Astaroth

First appeared in 2017, the latest computer virus targeted more than 8,000 systems. It has been used in spam campaigns in Europe and Brazil. This computer Trojan spreads through .7zip file attachments and malicious links. Astaroth Trojan targets antivirus tools to steal usernames and passwords.

Prevention:

  • Use 2-FA to add an extra layer of security to your car
  • Always keep your machines and safety tools up to date
  • Run the latest firewalls and specialized Internet security tools

7. Trojan stupidity

This is one of the worst computer viruses that has many variants with different functions. This Trojan enters the system through files thrown by other malware or through operating kits. It is activated as a service and allows processes in the system to claim to be legitimate or genuine software. Glupteba communicates directly with IP addresses and ports to collect user information. Redirects traffic and users to various unknown domains, such as ostdownload.xyz, travelsreview.wo, rldbigdesign.website, sportpics.xyzkinosport.top.

Prevention:

  • Enable web and email filters.
  • Limit macros on Microsoft Office products.
  • Practice safe exploration.

8. GoBrut

The latest GoBrut computer viruses are not technically advanced, but they can slow down the Internet and cause damage to thousands of computers. This computer virus is based on Golang and uses brute force to spread on Windows and Linux machines. This malware can exploit a number of vulnerabilities, especially websites that still use weak passwords as a target. Not only is this malware StealthWorker capable of updating itself.

Prevention:

  • Use strong and complex passwords
  • Use progressive delay
  • Use change response tests to prevent automatic submissions

9. Joker

This computer virus also works as a Ransomware-as-a-Service and is promoted on Twitter through underground hacking sites. This cyber threat allows affiliates to gain access to functional ransomware and payment servers. Jokeroo has started promoting itself as GrandCrab Ransomware on Exploit.in.

Prevention:

  • Practice safe exploration
  • Update your operating system and security applications
  • Regular backup of files and other important data

10. Click Adware

It is one of the most important computer viruses in the form of malware and adware, which is nicknamed “Rapid”. This virus acts as an update Adobe Flash Player legitimate by self-closure. This malicious computer virus comes with three modules which are legitimate, certified flash player and .exe file called “upp.exe”. Once the virus enters the system, it will communicate with all existing network interfaces and add DNS 18,219,162,248.

After that, it will only start collecting personal information and data from the user’s system and redirecting them to the hosting domain “kuikdelivery.com”. As soon as the information reaches the domain server, it activates various other malicious tasks on the system, which also include chrome extensions from unknown sources, coin miners, etc.

Prevention:

  • Regular backup of important data and files.
  • Enable genuine antivirus and spyware.
  • Restrict from spam emails as well as file attachments, exe | pif | tmp | url | vb | vbe | scr | reg | pst | cmd | com | liliac | dll | dat | hlp | hta | js | wsf.

Conclusion

So the latest computer viruses this year so many and very deadly. We must always prepare our computers to be free of these viruses, one of which is by using an antivirus application that can protect computers from dangerous and deadly blues attacks.

Read also: Top 5 Antivirus Apps Today (Free)


So much information this time. Looking forward to more interesting information and don’t forget to share this information with your friends. Thank you…

Leave a Comment

/* */