How do viruses and worms spread on email?
TipsMake.com - There are many things you can find in your inbox. The negative entries of the email attachments include:
• Trojan horses
• Worms
• Viruses
In many cases, email viruses are not true viruses because they cannot function without human impact. However, they still affect your email system.
A Trojan horse, hearing its name does not seem to be harmful, but it can actually destroy software in plain wrappers. Plain wrapper is an email attachment from someone you don't know. This file is very misleading. When you run this attachment, it can do a lot of things, from deleting all files to changing your desktop. After that, it will send it to the people on your list to be able to spread it.
Here are two examples to help you understand how email viruses work, based on Symantec's information.
Worm.ExploreZip is a computer worm containing malicious code. This computer worm uses Microsoft Outlook, Outlook Express, and Exchange to manually send them to unread emails in your inbox. It also searches for drivers and other computers on the network to copy them to the Windows directory of other computers and edit WIN.INI.
This worm will destroy all file formats such as .h, .c, .cpp, asm, .doc, .ppt, or .xls on your hard drive, as well as other hard drives on the same network if these The machine accidentally let them run. This will continue until this computer worm is removed.
You can get this computer deep through an attachment called zipped_files.exe , disguising them as a normal zip file. However, when running, it will copy itself to Windows operating system with the file name as Explore.exe or setup.exe . This computer worm modifies WIN.INI or the registry, from which the Explore.exe file will be run every time you start Windows.
Symantec also provides additional information about the technology and explains what you need to know if you suspect there is Worm.ExploreZip in your operating system.
In some special cases, email attachments may work on your own without your impact. Based on information from Symantec.
VBS.BubbleBoy is a computer worm that works on Windows 98 and Windows 2000 operating systems. It can also work on Windows 95 operating systems if Windows Scripting Host is installed. This computer worm only works with the English and Spanish versions of the operating system.
Microsoft Outlook (or Express) with Internet Explorer 5 needs to be installed so that they can copy themselves.
This computer worm took advantage of the security vulnerability in Microsoft Outlook / IE5 to fill the UPDATE.HTA file every time the email was displayed without having to split the file and run the attachment.
UPDATE.HTA is located at the Program-StartUp in the Start menu. From there, the infection will not work until you start the computer. UPDATE.HTA is a script file that uses MS Outlook to send messages containing deep email to everyone on the MS Outlook list. By fixing security holes in Microsoft Outlook / IE5, this computer worm will no longer work.
Microsoft also added information about this computer pest.
Keep your antivirus software up to date with the latest viruses from antivirus software vendors that cannot prevent new viruses when not being updated. If you use Norton AntiVirus, turn on Auto-Protect. Norton AntiVirus antivirus software will automatically alert you when your virus update is older than 30 days. Norton's LiveUpdate will also automatically update.
If you think the virus has spread to your computer via email sent from friends on your list, notify this person and tell them not to open mail or attachments. That will be the only effective way to prevent their spread.
You should read it
- Stuxnet worm targets Iran's nuclear reactor
- April Fool's Day remembers the worm Conflicker
- Symantec alerted W32.dozer worm
- Symantec introduced a data protection solution
- Warning virus similar to Stuxnet 'computer worm'
- New worms spread via email provide fake links
- Storm worm 're-exported' through a joke
- Appeared worm computer attack AMD processor chip
May be interested
- Outbreaks of virus spread via fake emailassuming an airline email, hackers are spreading dangerous trojans to users' mailboxes.
- Can viruses spread through WiFi?viruses can use wifi to spread from one computer to another and in some cases, jump back and forth between nearby networks to find new targets.
- Difference between Virus, Spyware and Malwarea flu virus develops and replicates by infecting cells on the body and turning them into virus replicating plants. in a place similar to a computer virus ...
- How to avoid Malwaremalware is a term that describes a relatively broad category of malicious software including viruses, worms, trojan horses, rootkits, spyware and adware.
- Watch out for VNNIC impersonation email to spread viruses!about two days ago, a series of emails pretending to be vietnam internet network information center (vnnic) sent out virus warning messages, but the emails themselves contained malicious code in the attachment to attack public users.
- The spread of malware and how to prevent ityou often don't understand why viruses can infect your computer even though you have installed antivirus. so which routes have they spread and how to prevent them?
- Around the world, about 50% of computers are infected with virusesin january 2011, the world has about 50% of computers infected with viruses, this is the latest report of panda labs in vietnam, accordingly, these machines are mainly infected with trojans accounting for 59% .. .
- Windows computer worm forces users to view Homestar Runnerw32 / lacon-a is a computer virus that has been around since the mid-2000s. at that time, it was very classic with spam like email, registry or cameo homestar runner.
- 2 viruses that destroy datathe following 2 computer worms belong to cyclical, dispersal operations on a fixed day every month. they are extremely dangerous because when the data is destroyed by these two viruses, it cannot be recovered.
- Limiting the spread of Virus, Trojan manually on Windowsin addition to using anti-virus software to kill trojan viruses, you can still limit the spread of viruses, trojans without installing any additional software on the system.