Virus File and 'invasion' come back

More than 25% of cases handled by Trend Micro in 2006 were related to file viruses - second only to Trojans (43%). This contrasts with the reviews of security experts in 2005 ' viruses that spread this file, are no longer present and spread much more today. ' In fact, the file viruses are "invading" again, with the risk of spreading and destroying old, even higher than before.

2006 is the year that marks the return of virus files. The malicious code is implanted in the program files and most commonly on Windows operating systems such as .com, .bat, .pif, .sys files . so processing them is very complicated and much more difficult than worrm and trojan.

Pe_Fujacks , a file family virus that appeared in the fourth quarter of 2006, is a typical virus for file viruses. It is able to infect all multi-component methods, sequential, focused, and Web based . Therefore, Pe_Fujacks makes the virus classification unclear. In addition, Pe_Fujacks is considered a very sophisticated attack. Featuring an infector, Pe_Fujacks searches for .exe, .scr, .pif and .com files to get its malicious code. Furthermore, Pe_Fujacks also infects .asp, .aspx, .htm, .html, . .jsp and .php files by inserting its code through the use of an Iframe. Transplanting on these files creates an intermediate source for downloading viruses from the internet to the victim's computer.

Distribution methods :

Virus File and 'invasion' come back Picture 1 Photo: wscomputers.be - Network distribution : A 'goal' that Fujacks has recorded is that it not only proliferates in the infected device itself as a virus file but also targets the entire network as a Worm format. Virus releases its copy into a shared network with a real file called GameSetup.exe. Users are curious in the network, if they are not wary of running this file, they can say, immediately become a victim of Fujacks.

- Broadcast via IM : Pe_Fujacks can also be spread via IM. From the infected machine, it sends a message containing the link to the site containing the virus to the users on the victim's list.

Attack target :

Pe_Fujacks focuses mainly on the ones running the Chinese version of the Windows operating system. However, internet users should be wary of similar attacks or later versions of Pe_Fujacks . Pe_Fujacks will direct users to URLs that contain viruses by virus connecting to the Web site to download the text data containing Websites that distribute the virus. The virus author can change the content of this text file. In particular, one of the files downloading data from these malicious URLs contains spyware belonging to the family TSPY_AGENT . Thus, with TSPY_AGENT , the victim's computer can simultaneously infect three types of malwere: Virus file, Spyware, Trojan.

You can use Anti virus software to kill file viruses.

Decision Win

5 ★ | 1 Vote

May be interested

  • Sober is back today?Sober is back today?
    security experts around the world predict that the sober virus will return today - january 6, 2006. but is the virus really triggering a new wave of virus on the global network as it is already
  • Is Bfsvc.exe a virus? How to remove bfsvc.exe virusIs Bfsvc.exe a virus? How to remove bfsvc.exe virus
    bfsvc.exe is a windows operating system file for boot file servicing utility. this process is very important for the operation of your computer, but it is with legitimate bfsvc.exe.
  • Virus spread through Yahoo! Messenger backVirus spread through Yahoo!  Messenger back
    in recent days, on forums and social networks, there has been a lot of talk about the virus spread through yahoo! messenger once raged 4 years ago.
  • Trend of virus overwriting the file systemTrend of virus overwriting the file system
    bach khoa network security center (bkis) issued a warning to users of a new trend of virus originating from china overriding malicious code on standard windows file.
  • What is the RSV virus?What is the RSV virus?
    the rsv virus is one of the dangerous diseases for young children and infants, spread easily. so, what is rsv virus?
  • Add a virus spread through Yahoo! IMAdd a virus spread through Yahoo!  IM
    afternoon 1-8, a virus named vloveym has spread to a series of computers in vietnam. according to the analysis of the network security center (bkav), this virus appeared on july 28. just like the previous gaixinh (xrobot) and ymheart viruses, vloveym is mainly in
  • How to Prevent Cell Phone HackingHow to Prevent Cell Phone Hacking
    you discover that intimate conversations, images and messages have been spread online. this is not only an invasion of other people's privacy but also affects your personal life. although many politicians and celebrities have fallen victim to mobile phone hacking, you now have ways to protect your device. this article will provide information to help you protect yourself and your loved ones from phone-related scandals or becoming victims of privacy invasion by hackers.
  • 3 ways to identify a Mac infected with a virus3 ways to identify a Mac infected with a virus
    is your mac working a little strange? whether you are seeing ads that you cannot explain or your system is unusually slow, you may think the problem is due to malware. and you may be right in this case.
  • How to enable Back Tap on iOS 14, how to use Back TapHow to enable Back Tap on iOS 14, how to use Back Tap
    back tap is a feature to touch the back of the iphone 2 or 3 times to perform certain actions that have just been added by apple on the ios 14 operating system version.
  • Nightmare named virusNightmare named virus
    already far away, the time when the author of the virus has shattered millions of computers is just a teenage hacker 'little pony', wants to prove the male character. now look back, it's still, anyway