The Hanoi Polytechnic Security Center (Bkis) has recorded 33,137 new virus strains in Vietnam last year, of which 36 are internal viruses. These variants have infected 59.4 million computers, of which the most SecretW.Worm (420,000 machines).
Yahoo Messenger users are suffering from the Kavo virus
Millions of domestic users cannot communicate with their friends, Yahoo Messenger partners because their computers "stick" to the Kavo virus (Chinese origin). In June 2008 alone, 1.2 million PCs were infected with Kavo, ie an average of 40,000 computers / day - a record of speed of spread. The virus also has the fastest growth rate ever with 20 variants / day.
Initially, the goal of spreading hacker Kavo was to attack online games to steal the player's account. However, due to programming errors, the virus that interferes with Yahoo Messenger memory has generated an error to access the memory exception, so users cannot log into this chat application.
Override standard Windows files - new virus trends
Not only does it appear in large numbers, many new viruses also "scour" the windows in Windows to hide and attack security software that can't recover the original code. This will also be the main trend in 2009.
Due to overriding malicious code on standard Windows file, security tool when virus removal has erased the original file and corrupted the operating system. Bkis recorded 92 new strains of virus using this method in October 2008. A recent survey showed that 91% of infected computers had to reinstall the operating system.
Virus fake gateway 'disruptive' businesses
Network collapsed, the website was inserted banner, popup Chinese characters is a popular phenomenon in 2008 in many agencies and businesses, including companies leasing servers (hosting) and Internet service providers (ISP ).
From an infected system, the virus sends broadcast address (ARP) packets to all other computers on the same network to impersonate the gateway of the system, causing outbound connections. The Internet of these computers is tricked away through the previous fake gateway and then to the real gateway. Thus, only an infected computer can cripple the entire network, but not all computers that encounter banner insertion are also infected.