Amazines Free Article Archive
www.amazines.com - Tuesday, April 16, 2024
Read about the most recent changes and happenings at Amazines.com
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Google
Subscriptions Manage Ezines
CATEGORIES
 Article Archive
 Advertising (133573)
 Advice (161671)
 Affiliate Programs (34799)
 Art and Culture (73855)
 Automotive (145712)
 Blogs (75614)
 Boating (9851)
 Books (17223)
 Buddhism (4130)
 Business (1330636)
 Business News (426446)
 Business Opportunities (366518)
 Camping (10973)
 Career (72795)
 Christianity (15848)
 Collecting (11638)
 Communication (115089)
 Computers (241951)
 Construction (38962)
 Consumer (49953)
 Cooking (17080)
 Copywriting (6733)
 Crafts (18203)
 Cuisine (7549)
 Current Affairs (20319)
 Dating (45908)
 EBooks (19703)
 E-Commerce (48258)
 Education (185520)
 Electronics (83524)
 Email (6438)
 Entertainment (159854)
 Environment (28970)
 Ezine (3040)
 Ezine Publishing (5453)
 Ezine Sites (1551)
 Family & Parenting (111007)
 Fashion & Cosmetics (196605)
 Female Entrepreneurs (11853)
 Feng Shui (134)
 Finance & Investment (310615)
 Fitness (106469)
 Food & Beverages (63045)
 Free Web Resources (7941)
 Gambling (30227)
 Gardening (25202)
 Government (10519)
 Health (630134)
 Hinduism (2206)
 Hobbies (44083)
 Home Business (91657)
 Home Improvement (251210)
 Home Repair (46243)
 Humor (4723)
 Import - Export (5459)
 Insurance (45104)
 Interior Design (29616)
 International Property (3488)
 Internet (191028)
 Internet Marketing (146687)
 Investment (22861)
 Islam (1161)
 Judaism (1352)
 Law (80506)
 Link Popularity (4596)
 Manufacturing (20914)
 Marketing (99316)
 MLM (14140)
 Motivation (18233)
 Music (27000)
 New to the Internet (9496)
 Non-Profit Organizations (4048)
 Online Shopping (129734)
 Organizing (7813)
 Party Ideas (11855)
 Pets (38165)
 Poetry (2229)
 Press Release (12689)
 Public Speaking (5643)
 Publishing (7566)
 Quotes (2407)
 Real Estate (126697)
 Recreation & Leisure (95495)
 Relationships (87674)
 Research (16182)
 Sales (80350)
 Science & Technology (110290)
 Search Engines (23514)
 Self Improvement (153300)
 Seniors (6220)
 Sexuality (36010)
 Small Business (49311)
 Software (83033)
 Spiritual (23516)
 Sports (116155)
 Tax (7663)
 Telecommuting (34070)
 Travel & Tourism (308304)
 UK Property Investment (3123)
 Video Games (13382)
 Web Traffic (11790)
 Website Design (56919)
 Website Promotion (36663)
 World News (1000+)
 Writing (35844)
Author Spotlight
MANMOHAN SINGH

Digital marketing professional with 8 years of experience. A good listner, Stratgist and fun loving ...more
LEMUEL ASIBAL

Lemuel Asibal is a web content writer who also ventures on writing articles and blog posts about any...more
TAL BARNEA

Tal is an electrical engineer with over 25 years of expertise with hardware, software, mechanical an...more
TUSHAR BHATIA

Tushar Bhatia is the Founder President of EmpXtrack Inc with over 19 years of experience in the soft...more
BRENDA PANIN

Passionate blogger and a great animal lover. ...more


A Unique and Dangerous Computer Malware by Khan M





Article Author Biography
A Unique and Dangerous Computer Malware by
Article Posted: 11/25/2013
Article Views: 120
Articles Written: 49
Word Count: 773
Article Votes: 0
AddThis Social Bookmark Button

A Unique and Dangerous Computer Malware


 
Computers,Science & Technology
In this article, I will discuss a very dangerous Malware or virus that is different from other viruses.

As the name indicates, this virus get control of user data files. It’s a kind of malware that first infect the system and send information about a computer to the creator or author. The server located in an unknown location assigns a specific id to the infected machine and generate a pair of public and private key. The virus first look for all kinds of file extensions (like word, excel, PDF and photos). It looks for data files on the infected computer, USB flash drives connected to it and any mounted network storage. Once it determines what files to target, it then encrypts them with a public key and displays a popup on the main screen. The files can still be seen with original names and file size but when the user clicks to open a file, they get a message that “the file is damaged or is not the right file format”. The popup says something like this “your files have been encrypted. If you want to decrypt them, you need to pay $300”. It then starts a clock that goes backward from 72 to 0 hours and as soon as the 72 hours time is passed, the private key, is destroyed and files cannot be decrypted again.

The way hackers ask for money is the same as another type of virus these days, where the malware fills the whole computer screen with a window with a very legitimate looking notice from the government saying something like “you have been involved in illegal activities and pay $100 via ucash at certain gas stations”. In case of this malware, the hackers ask users to pay money using two methods. One is a virtual voucher and the other one is prepaid card that cannot be traced. These two methods are time consuming and it is believed that, the time is not enough to complete the process. This causes a delay so the hackers changed their strategy. They started online customer service offering the user to pay more money ($2300). So far there have been no reports if someone has actually got their files back after paying $300.

Who are and what kind of computers, are the target? Research shows that businesses are mostly affected in the US and Canada. The virus is sent via email attachment mostly from famous courier companies like UPS and FedEx. The virus runs its processes in the background without the user knowledge. So far all PC computers, laptops and servers are being affected. There have been no reports of attacks on Apple Mac computers and MacBooks. Mostly those computer are infected which are not protected with a good antivirus and firewall. It is very important to explain the behavior and removal process of a virus here. When a computer or laptop is infected with a virus, it’s not easy for the user to get rid of it but computer experts can remove it without any problem. A computer technician usually uses different tools and antivirus programs to clean an infection. In the worse case, a computer can be backed up and then wiped out to remove malware and viruses but damage of this new malware cannot be undone using these methods which makes it the most destructive virus of all times.

What is the line of defense against this Malware? What we need to do to avoid this kind of irreversible damage? Data recovery is not possible after its infection because the private key is stored on hacker’s servers. In regards to protection, first of all every windows computer must be protected with a good antivirus like Norton etc. Second, email and email attachments should not be opened. Hackers are using very advanced methods to trick people. A lot of times, computer users are trapped in such a way that they don’t even know what happened. This results in a serious infection. Every user should backup their data to an external hard drive and disconnect it from the computer because if this virus exists, every backup attempt will update the old backup with the infected one. Online backup is not recommended. Online backup is updated regularly which overwrites data with the infected one. USB flash drives should not be connected to the computer all the time.

In this article, I tried to have discussed about a new approach used by hackers to gain control of computers and make illegal money. I have also discussed how this virus attacks computer systems and how it can be avoided.

Related Articles - Virus, Malware, Virus infection,

Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.

 

Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
Name:
Email:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
 
Please enter the code in the image:



 Author Login 
LOGIN
Register for Author Account

 

Advertiser Login

 

ADVERTISE HERE NOW!
   Limited Time $60 Offer!
   90  Days-1.5 Million Views  

 

Great Paranormal Romance


TIM FAY

After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
ALEX BELSEY

I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
GENE MYERS

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
SUSAN FRIESEN

Located in the lower mainland of B.C., Susan Friesen is a visionary brand strategist, entrepreneur, ...more
STEVERT MCKENZIE

Stevert Mckenzie, Travel Enthusiast. ...more
LAURA JEEVES

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
STEPHEN BYE

Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
SHALINI MITTAL

A postgraduate in Fashion Technology. Shalini is a writer at heart! Writing for her is an expression...more
ADRIAN JOELE

I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
JAMES KENNY

James is a Research Enthusiast that focuses on the understanding of how things work and can be impro...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2024, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from wikipedia.org under the GNU FDL license