Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
Hello. My name is Dustin, and welcome to Mauer.
Malware and especially ran somewhere are becoming more and more prevalent every single day. It seems like the news is always reporting on a new ransom or outbreak or some of the virus that's going around.
Some of the most famous types of Mauer you may have heard of includes Stuxnet,
which is one of the first ventures into cyber warfare.
Well, Laki Ransomware, which is one of the larger ransomware outbreaks starting at the beginning of 2016
The I Love You Virus was one of the first larger malware outbreaks, and it was named for the email that delivered it. Having a subject line of I Love You,
my doom is considered to be one of the most damaging viruses ever released
and last the Wannacry Ransomware outbreak of 2017
which targeted window systems and spread via eternal blue, which was an exploit actually developed by the NSA.
It's important to be able to recognize various types of malware in case you ever need to clean a situation up. If you were able to recognize them. Our it makes that task much easier because you actually understand how it got on the machine what it's doing more attempting to do and how to stop it.
So the first type of mount where we're gonna go over is actually this Stuxnet worm stocks that is one of the most known Mauer variants on this list.
It was developed in 2009 by government engineers in the United States in an attempt to damage Iran's nuclear program. It was initially spread via USB thumb drives that were then introduced into the air gapped environment at the plants.
Um, air gapped means that the plant, computer systems and control systems had zero Internet or outside access, making it impossible to infect him via your traditional means.
There's really a lot of information that we could discuss about stuck nets. It's actually a very, very interesting story s. So I'd recommend checking out Kim's enters book Countdown to Zero Day, which it's fantastic story going behind the creation, deployment and aftermath of the STUXNET virus.
Laki Ransomware was initially spread by fake emails and infected attachments, including many different formats like DOT doctor, your standard word document dot Excel s where your excel spreadsheets or ah dot zip files. So which is just say Ah zip archive file.
Once the file it was opened, it would display incorrect
plea and look kind all weird with a message that said, Um, please enable macros if the data and coding is incorrect,
once the user enable those macros a binary file launched which then downloaded the Laki Ransomware
Laki targeted a wide range of file formats, including some more specific files like file types used by engineers or AH, developers or testers.
The top 10 countries hit by Laki were France, Italy
Spain, the U S Great Britain.
Japan, the Czech Republic. In Canada,
Laki ran somewhere used Arcee 2048 bit encryption within A s 1 28 bit cipher
which at this time makes it impossible to decrypt. So if you didn't have backups of data, you have to pay the ransom in order to get your information back.
Typical payment values in order to restore your software and your data ranged in price from half a Bitcoin to a full Bitcoin.
The I love you virus was let loose on the Internet in the year 2000 and at the time it was the most damaging Mauer event of all time.
The I Love You virus was spread via email, and it got its name because the email had the subject of I Love You.
The email contained a malicious Mauer script called Most of Time Love Dash Letter Dash for dash you dot t x t dot VBS Which, if you weren't aware, um, or you just didn't read it correctly,
it could easily be mistaken for just so a love letter
Tech stock, you know.
But it was actually a virus. A malicious VBS script
once launched the I Love You virus overrode system and personal files while spreading itself over and over and over and over again.
The I Love You Virus is actually in the Guinness Book of World Records for being known as the most violent virus of all time.
My doom is considered to be one of the most damaging viruses ever released.
It is one of the fastest spreading email base. Worms, when it was made back in 2004 hit large companies like Microsoft, Google and the S. E O Group with a DDOS or ah distributed denial of service attack.
The author of the MyDoom worm is still unknown to this day.
In 2004 when the mighty virus ran rampant, it was estimated that 16 to 25% of all e mails have been affected by my doom.
There's a fun fact about my doom that may make you a little bit smarter here. The worm actually contained a text message. Andy, I'm just doing my job. Nothing personal. Sorry, which led many people to believe that the Worms creator was paid.
They wanna cry. Ran Somewhere
was a worldwide cyber attack that took place in May of 2017 and targeted computers running Microsoft Windows.
It spread through an essay or a national security agency developed exploit known as Eternal Blue, which targeted older Windows operating systems.
This exploit was stolen in released by the Shadow Brokers Group a few months prior to the attack.
When it was announced and released by the Shadow brokers. Myself actually released patches for all of their current OS is, um that have that exploit available?
I want to cry when it came out, was that only able to infect older versions that did not receive a patch or a system that was just too old in a patches that were developed for
wanna cry was actually stopped in four days. When it was initially discovered, a security researcher found a kill switch in its code,
which then is shut down the hole.
The whole network, um, Mike's off also released patches for the first time in a really long time that we're four older operating systems they normally don't patch. It was listed as a Nim Urgency security patch and in order to help stop the spread
of the wannacry ransomware