SlideShare a Scribd company logo
Top 10 Latest Viruses 
Group 5 
Newton 
Top 10 latest
Exploit.CVE-2011-3402.Gen 
• This is a generic detection for malicious 
TTF (True Type Font) files which exploit 
the CVE-2011-3402 vulnerability found in 
the Microsoft Windows driver 
"win32k.sys". 
• A successful attempt of exploiting this 
vulnerability allows an attacker to execute 
malicious code with elevated privileges on 
a user's computer. Therefore the attacker 
may have full access to the user's private 
data, installed programs and be able to 
install or run any malicious program. 
Spreading: 
VERY LOW 
Damage: 
LOW 
Discovered: 
November 7,2011
Trojan.Ransom.IcePol 
(W32/Reveton; Trojan.Win32.Ransirac) 
• In order to block access to the system, the 
Trojan Adds itself to the WinlogonShell 
registry key in the Current User branch and 
denies access to Windows Explorer for the 
current user. This way, the user is locked on 
the outside, with no chance to run an 
antivirus solution or a removal tool. 
Spreading: 
MEDIUM 
Damage: 
HIGH 
Discovered: 
March 20, 2012
Trojan.Flame.A 
(SkyWiper) 
• This is a multi-component malware 
for targeted attacks. It is able to spy, 
leak data, download/execute other 
components. 
Spreading: 
MEDIUM 
Damage: 
VERY HIGH 
Discovered: 
May 28, 2012
Trojan.OlympicGames 
• The payload comes bundled in spam 
messages related to the London 
Olympic Games. Most of the identified 
samples are fake ticket confirmations in 
the form of malicious PDF documents. 
When opened, the PDF file takes 
advantage of the CVE-2010-2883 
vulnerability in Adobe Reader versions 
9.3 and eariler to deploy a backdoor 
service on the machine. 
Spreading: 
VERY LOW 
Damage: 
VERY LOW 
Discovered: 
August 14, 2012
Trojan.Startpage.AABI 
• The computer user is shown an advertisement 
in the Yahoo Messenger chat window. If clicked, 
the user is prompted to download and execute a 
setup file that contains the payload. When 
executed, the file copies itself to 
%APPDATA%laban.exe and sets itself to run at 
every system boot. When running, it monitors 
to see whether the laban.vn page is set as 
default for every browser installed on the PC 
and, if it has been changed, it restores it back to 
laban.vn. 
Spreading: 
VERY LOW 
Damage: 
VERY LOW 
Discovered: 
August 14, 2012
Trojan.FakeAV 
• Fake AV trojans (known as rogue AV) 
are applications that claim the 
user's computer is infected and 
professional intervention is needed. 
In order to clean the alleged 
infections, the user has to purchase 
the software and, until payment is 
made, all the regular activities are 
disrupted. 
Spreading: 
VERY LOW 
Damage: 
VERY LOW 
Discovered: 
September 22, 
2012
Rootkit.MBR.TDSS 
• The rootkit component is installed by 
the dropper malware. It hooks specific 
functions of the operating system, and 
uses intermediary files to prevents 
Windows from checking digital 
signatures for drivers. It also acts as a 
handler for HDD read/write requests. 
The rootkit component is used with the 
sole purpose of hiding other 
maluicious payloads that are part of 
the respective campaign. 
Spreading: 
MEDIUM 
Damage: 
MEDIUM 
Discovered: 
November 4, 2012
Rootkit.Sirefef.Gen 
(Sophos Troj/ZAccess-L, Troj/ZAccess-I, HPmal/ZAccess-A Avira 
RKIT/ZeroAccess.A) 
• ZeroAccess/Sirefef is a sophisticated 
kernel-mode rootkit that gets 
installed when a ZeroAccess 
dropper gets executed. Initially, the 
dropper checks to see whether it is 
running on a 32- or a 64-bit 
machine by querrying the 
ZWQueryInformationProcess api. 
Spreading: 
MEDIUM 
Damage: 
HIGH 
Discovered: 
November 21, 
2012
PDF:Exploit.CVE-2013-5065.A 
• This is a detection for malicious PDF 
files which exploit the CVE-2013-5065 
local privilege escalation vulnerability 
found in the Microsoft Windows 
NDProxy driver, that could allow 
attackers to run code in Kernel mode. 
The vulnerable systems are the running 
Windows XP or Windows Server 2003. 
Spreading: 
VERY LOW 
Damage: 
LOW 
Discovered: 
November 28, 2013
Exploit.CVE-2013-5065.A 
• This is also a detection for malicious PDF 
files which exploit the CVE-2013-5065 
local privilege escalation vulnerability 
found in the Microsoft Windows 
NDProxy driver, that could also allow 
attackers to run code in Kernel mode. 
The vulnerable systems are the also 
running Windows XP or Windows Server 
2003. (Descriptions are the same with 
PDF:Exploit.CVE-2013-5065.A) 
Spreading: 
VERY LOW 
Damage: 
LOW 
Discovered: 
November 28, 
2013
Thanks for watching!!! 
Presented by: Group 5 
Keith Isaiah Catalan 
Jimmy Ong III 
Arzel Kyle Herrera 
Joan Galang 
Leila Mari Gem Guinitaran 
Pamela Anne Marte 
Ina Louise Magno 
Fortune Ivy Salazar

More Related Content

What's hot

Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus
Ranjeta Muniandy
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
Shrey Vyas
 
Research Paper on Rootkit.
Research Paper on Rootkit.Research Paper on Rootkit.
Research Paper on Rootkit.
Anuj Khandelwal
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
Dharmesh Kumar Sharma
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
Stavia
 
Virus
VirusVirus
Virus
plsriram8
 
Virus slides
Virus slidesVirus slides
Virus slides
rahul kundu
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
Manoj Dongare
 
Rootkit
RootkitRootkit
Rootkit
tech2click
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
Ankit Mistry
 
Conficker
ConfickerConficker
Conficker
Bobmathews
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
Sid1256
 
Seminar On Trojan Horse
Seminar On Trojan HorseSeminar On Trojan Horse
Seminar On Trojan Horse
Nikhil Chabukswar
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Alishba ijaz Muhammad Ijaz
 
Fileless Malware Infections
Fileless Malware InfectionsFileless Malware Infections
Fileless Malware Infections
Ramon
 
Logic bomb virus
Logic bomb virusLogic bomb virus
Logic bomb virus
ssuser1eca7d
 
Reversing malware analysis training part10 exploit development basics
Reversing malware analysis training part10 exploit development basicsReversing malware analysis training part10 exploit development basics
Reversing malware analysis training part10 exploit development basics
Cysinfo Cyber Security Community
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Harendra Singh
 
Intro to Malware Analysis
Intro to Malware AnalysisIntro to Malware Analysis
Intro to Malware Analysis
wremes
 
Computer virus
Computer virusComputer virus
Computer virus
Rahul Baghla
 

What's hot (20)

Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Research Paper on Rootkit.
Research Paper on Rootkit.Research Paper on Rootkit.
Research Paper on Rootkit.
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
Virus
VirusVirus
Virus
 
Virus slides
Virus slidesVirus slides
Virus slides
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Rootkit
RootkitRootkit
Rootkit
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Conficker
ConfickerConficker
Conficker
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
 
Seminar On Trojan Horse
Seminar On Trojan HorseSeminar On Trojan Horse
Seminar On Trojan Horse
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Fileless Malware Infections
Fileless Malware InfectionsFileless Malware Infections
Fileless Malware Infections
 
Logic bomb virus
Logic bomb virusLogic bomb virus
Logic bomb virus
 
Reversing malware analysis training part10 exploit development basics
Reversing malware analysis training part10 exploit development basicsReversing malware analysis training part10 exploit development basics
Reversing malware analysis training part10 exploit development basics
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Intro to Malware Analysis
Intro to Malware AnalysisIntro to Malware Analysis
Intro to Malware Analysis
 
Computer virus
Computer virusComputer virus
Computer virus
 

Viewers also liked

Sinaunang Kabihasnan ng Sumer
Sinaunang Kabihasnan ng SumerSinaunang Kabihasnan ng Sumer
Sinaunang Kabihasnan ng Sumer
Louise Balicat
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
actanimation
 
Kabihasnang sumer
Kabihasnang sumerKabihasnang sumer
Kabihasnang sumer
Ruel Palcuto
 
Modyul 03 ang mga unang kabihasnan
Modyul 03   ang mga unang kabihasnanModyul 03   ang mga unang kabihasnan
Modyul 03 ang mga unang kabihasnan
南 睿
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
shohrabkhan
 
Grade 8: Araling Panlipunan Modyul 2: Mga Sinaunang Kabihasnan sa Asya
Grade 8: Araling Panlipunan Modyul 2: Mga Sinaunang Kabihasnan sa AsyaGrade 8: Araling Panlipunan Modyul 2: Mga Sinaunang Kabihasnan sa Asya
Grade 8: Araling Panlipunan Modyul 2: Mga Sinaunang Kabihasnan sa AsyaNiño Caindoy
 

Viewers also liked (7)

Sinaunang Kabihasnan ng Sumer
Sinaunang Kabihasnan ng SumerSinaunang Kabihasnan ng Sumer
Sinaunang Kabihasnan ng Sumer
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Kabihasnang sumer
Kabihasnang sumerKabihasnang sumer
Kabihasnang sumer
 
Modyul 03 ang mga unang kabihasnan
Modyul 03   ang mga unang kabihasnanModyul 03   ang mga unang kabihasnan
Modyul 03 ang mga unang kabihasnan
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Grade 8: Araling Panlipunan Modyul 2: Mga Sinaunang Kabihasnan sa Asya
Grade 8: Araling Panlipunan Modyul 2: Mga Sinaunang Kabihasnan sa AsyaGrade 8: Araling Panlipunan Modyul 2: Mga Sinaunang Kabihasnan sa Asya
Grade 8: Araling Panlipunan Modyul 2: Mga Sinaunang Kabihasnan sa Asya
 

Similar to Top 10 Latest Viruses

Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
JauwadSyed
 
ESET India Cyber Threat Trends Report Q1
ESET India Cyber Threat Trends Report Q1ESET India Cyber Threat Trends Report Q1
ESET India Cyber Threat Trends Report Q1
ESET_India
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
Mirza Adnan Baig
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
Manish Kumar
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
Abdelhamid Limami
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
Satria Ady Pradana
 
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdfCSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
kd123is123live
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
Mohsin Dahar
 
Unit - 5.ppt
Unit - 5.pptUnit - 5.ppt
Unit - 5.ppt
DHANABALSUBRAMANIAN
 
Presentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad AlmajaliPresentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad Almajali
webhostingguy
 
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand..."Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
eLiberatica
 
O p
O pO p
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploit
devilback
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
 
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
Lab-10 Malware Creation and Denial of Service (DoS)        In t.docxLab-10 Malware Creation and Denial of Service (DoS)        In t.docx
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
pauline234567
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2
F-Secure Corporation
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
Samiullah Khan
 
Malicious software
Malicious softwareMalicious software
Malicious software
msdeepika
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 

Similar to Top 10 Latest Viruses (20)

Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
ESET India Cyber Threat Trends Report Q1
ESET India Cyber Threat Trends Report Q1ESET India Cyber Threat Trends Report Q1
ESET India Cyber Threat Trends Report Q1
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdfCSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Unit - 5.ppt
Unit - 5.pptUnit - 5.ppt
Unit - 5.ppt
 
Presentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad AlmajaliPresentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad Almajali
 
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand..."Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
 
O p
O pO p
O p
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploit
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
Lab-10 Malware Creation and Denial of Service (DoS)        In t.docxLab-10 Malware Creation and Denial of Service (DoS)        In t.docx
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 

Recently uploaded

Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 

Top 10 Latest Viruses

  • 1. Top 10 Latest Viruses Group 5 Newton Top 10 latest
  • 2. Exploit.CVE-2011-3402.Gen • This is a generic detection for malicious TTF (True Type Font) files which exploit the CVE-2011-3402 vulnerability found in the Microsoft Windows driver "win32k.sys". • A successful attempt of exploiting this vulnerability allows an attacker to execute malicious code with elevated privileges on a user's computer. Therefore the attacker may have full access to the user's private data, installed programs and be able to install or run any malicious program. Spreading: VERY LOW Damage: LOW Discovered: November 7,2011
  • 3. Trojan.Ransom.IcePol (W32/Reveton; Trojan.Win32.Ransirac) • In order to block access to the system, the Trojan Adds itself to the WinlogonShell registry key in the Current User branch and denies access to Windows Explorer for the current user. This way, the user is locked on the outside, with no chance to run an antivirus solution or a removal tool. Spreading: MEDIUM Damage: HIGH Discovered: March 20, 2012
  • 4. Trojan.Flame.A (SkyWiper) • This is a multi-component malware for targeted attacks. It is able to spy, leak data, download/execute other components. Spreading: MEDIUM Damage: VERY HIGH Discovered: May 28, 2012
  • 5. Trojan.OlympicGames • The payload comes bundled in spam messages related to the London Olympic Games. Most of the identified samples are fake ticket confirmations in the form of malicious PDF documents. When opened, the PDF file takes advantage of the CVE-2010-2883 vulnerability in Adobe Reader versions 9.3 and eariler to deploy a backdoor service on the machine. Spreading: VERY LOW Damage: VERY LOW Discovered: August 14, 2012
  • 6. Trojan.Startpage.AABI • The computer user is shown an advertisement in the Yahoo Messenger chat window. If clicked, the user is prompted to download and execute a setup file that contains the payload. When executed, the file copies itself to %APPDATA%laban.exe and sets itself to run at every system boot. When running, it monitors to see whether the laban.vn page is set as default for every browser installed on the PC and, if it has been changed, it restores it back to laban.vn. Spreading: VERY LOW Damage: VERY LOW Discovered: August 14, 2012
  • 7. Trojan.FakeAV • Fake AV trojans (known as rogue AV) are applications that claim the user's computer is infected and professional intervention is needed. In order to clean the alleged infections, the user has to purchase the software and, until payment is made, all the regular activities are disrupted. Spreading: VERY LOW Damage: VERY LOW Discovered: September 22, 2012
  • 8. Rootkit.MBR.TDSS • The rootkit component is installed by the dropper malware. It hooks specific functions of the operating system, and uses intermediary files to prevents Windows from checking digital signatures for drivers. It also acts as a handler for HDD read/write requests. The rootkit component is used with the sole purpose of hiding other maluicious payloads that are part of the respective campaign. Spreading: MEDIUM Damage: MEDIUM Discovered: November 4, 2012
  • 9. Rootkit.Sirefef.Gen (Sophos Troj/ZAccess-L, Troj/ZAccess-I, HPmal/ZAccess-A Avira RKIT/ZeroAccess.A) • ZeroAccess/Sirefef is a sophisticated kernel-mode rootkit that gets installed when a ZeroAccess dropper gets executed. Initially, the dropper checks to see whether it is running on a 32- or a 64-bit machine by querrying the ZWQueryInformationProcess api. Spreading: MEDIUM Damage: HIGH Discovered: November 21, 2012
  • 10. PDF:Exploit.CVE-2013-5065.A • This is a detection for malicious PDF files which exploit the CVE-2013-5065 local privilege escalation vulnerability found in the Microsoft Windows NDProxy driver, that could allow attackers to run code in Kernel mode. The vulnerable systems are the running Windows XP or Windows Server 2003. Spreading: VERY LOW Damage: LOW Discovered: November 28, 2013
  • 11. Exploit.CVE-2013-5065.A • This is also a detection for malicious PDF files which exploit the CVE-2013-5065 local privilege escalation vulnerability found in the Microsoft Windows NDProxy driver, that could also allow attackers to run code in Kernel mode. The vulnerable systems are the also running Windows XP or Windows Server 2003. (Descriptions are the same with PDF:Exploit.CVE-2013-5065.A) Spreading: VERY LOW Damage: LOW Discovered: November 28, 2013
  • 12. Thanks for watching!!! Presented by: Group 5 Keith Isaiah Catalan Jimmy Ong III Arzel Kyle Herrera Joan Galang Leila Mari Gem Guinitaran Pamela Anne Marte Ina Louise Magno Fortune Ivy Salazar