Storm worm 're-exported' through a joke
Dangerous computer worms Storm Worm used to scan millions of computers and social networks. Its variant is continuing to attack by email bearing the April Fool's Day theme.
Security software company PC Tools detected the virus's new vortex lurking on several websites. "The Storm worm has reappeared. This time email spreads are disguised as a lie date," said health expert Kurt Baumgartner.
If the user accidentally opens the link, "Storm Worm" will immediately flood the PC.Photo: Photogeek
In those messages are links to entice users to access websites with malware waiting. After the virus program file has been accidentally downloaded by the computer user and automatically executed on the infected computer, the Storm April Worm adjusts the firewall system to take up the communication ports for the purpose. "telephone talk" to its center.
In particular, anti-virus tools are almost ineffective because the executable code of the Storm Worm variant has fundamentally changed. According to security experts, the most effective way to prevent this attack is to use anti-malware utilities that integrate behavioral detection technology. The solution to authenticate the signatures of traditional security utilities has been overtaken by this virus.
Users also need to be alert to random links sent to the mailbox. It is best not to click on links that only download the file to your computer if the user does not know its source.
Discover more
storm worm virus computerShare by
Micah SotoYou should read it
- Nugache threatened the throne of Storm
- Storm worm gave Christmas gifts with malicious code
- Storm Worm caused 'waves' in cyberspace
- Valentine 'revived' Storm Worm
- A way to disable the Storm worm has been found
- The Quiet Details That Make a Sports Betting Platform Feel Reliable
- Instructions on creating toy set images with ChatGPT AI
- How are AI agents changing the journalism industry?
- The most terrible viruses of all time (part 1)
- The 10 most devastating viruses in Internet history
- Trojan 2.0 - Implications of Web 2.0 technology