Virus File and 'invasion' come back

More than 25% of cases handled by Trend Micro in 2006 were related to file viruses - second only to Trojans (43%). This is in contrast to the evaluation of security experts in 2005 'viruses that spread this file, a virus

More than 25% of cases handled by Trend Micro in 2006 were related to file viruses - second only to Trojans (43%). This contrasts with the reviews of security experts in 2005 ' viruses that spread this file, are no longer present and spread much more today. ' In fact, the file viruses are "invading" again, with the risk of spreading and destroying old, even higher than before.

2006 is the year that marks the return of virus files. The malicious code is implanted in the program files and most commonly on Windows operating systems such as .com, .bat, .pif, .sys files . so processing them is very complicated and much more difficult than worrm and trojan.

Pe_Fujacks , a file family virus that appeared in the fourth quarter of 2006, is a typical virus for file viruses. It is able to infect all multi-component methods, sequential, focused, and Web based . Therefore, Pe_Fujacks makes the virus classification unclear. In addition, Pe_Fujacks is considered a very sophisticated attack. Featuring an infector, Pe_Fujacks searches for .exe, .scr, .pif and .com files to get its malicious code. Furthermore, Pe_Fujacks also infects .asp, .aspx, .htm, .html, . .jsp and .php files by inserting its code through the use of an Iframe. Transplanting on these files creates an intermediate source for downloading viruses from the internet to the victim's computer.

Distribution methods :

Virus File and 'invasion' come back Picture 1Virus File and 'invasion' come back Picture 1 Photo: wscomputers.be - Network distribution : A 'goal' that Fujacks has recorded is that it not only proliferates in the infected device itself as a virus file but also targets the entire network as a Worm format. Virus releases its copy into a shared network with a real file called GameSetup.exe. Users are curious in the network, if they are not wary of running this file, they can say, immediately become a victim of Fujacks.

- Broadcast via IM : Pe_Fujacks can also be spread via IM. From the infected machine, it sends a message containing the link to the site containing the virus to the users on the victim's list.

Attack target :

Pe_Fujacks focuses mainly on the ones running the Chinese version of the Windows operating system. However, internet users should be wary of similar attacks or later versions of Pe_Fujacks . Pe_Fujacks will direct users to URLs that contain viruses by virus connecting to the Web site to download the text data containing Websites that distribute the virus. The virus author can change the content of this text file. In particular, one of the files downloading data from these malicious URLs contains spyware belonging to the family TSPY_AGENT . Thus, with TSPY_AGENT , the victim's computer can simultaneously infect three types of malwere: Virus file, Spyware, Trojan.

You can use Anti virus software to kill file viruses.

Decision Win

5 ★ | 1 Vote