3: Sasser and Netsky
A 17 year old German named Sven Jaschan produced the two programs and freed them onto the Internet. While the two worms worked in dissimilar ways, similarities in the code led safety experts to consider they both were the work of the same person. The Sasser worm attacked the computers through Microsoft Windows vulnerability. Disregarding to other similar worms it didn’t spread through email rather it travelled through open internet source. Once it demolished a computer system it looked for other potentially vulnerable computer systems. It searches for random IP addresses to find vulnerable computer systems, contacts them and then instructs them to download it. The virus also tainted the victim’s operating system in a way that made it tricky to shut down the computer without cutting off power to the system.
2: Leap-A/Oompa-A
You must have heard that Mac computers are invulnerable towards viruses, is that actually true? Is it? So the answer lies here, for the most part, that’s true. Mac computers are partly protected from virus attacks because of a concept called security through obscurity. But the world is not enough; a Mac hacker has breached the Mac security recently. In the year 2006 the Leap-A virus, also known as Oompa-A, debuted. It uses the iChat instant messaging curriculum to propagate across vulnerable Mac computers. After the virus infects a Mac, it searches through the iChat contacts and sends a message to each person on the list. The message contains a corrupted file that appears to be an innocent JPEG image.
1: Storm Worm
The most deadly virus in our dreadful list of viruses is known as the Storm Worm. It was the year 2006 when or the first time security experts first identified the above said worm. The community began to name the virus the Storm Worm because one of the e-mail messages carrying the virus had as its subject “230 dead as storm batters Europe.” Different antivirus producing companies call the worm with different names; For example, Symantec calls it Peacomm while McAfee refers to it as Nuwar. The type of Storm Worm is a Trojan horse program. Its payload is another program, though not always the same one. Some versions of the Storm Worm turn computers into zombies or bots. This makes the computer easily approachable to the person who is behind the following attack plan.