The Olympics is getting closer and closer. How can those who have not bought a ticket Feel the sweat of the Olympics in the first place? The Internet is undoubtedly the first choice for users to obtain Olympic information and watch Olympic videos. However, in this way, various network viruses are offered the opportunity to commit crimes.
In recent years, hot events have become the "culprit" in virus propagation ". The virus uses the characteristics of high popularity of hotspot events and high clicks rate of netizens, disguising it as hot movies, hot online videos, hot photos, and so on to trick users into clicking and downloading to infect the virus.
The Olympic Games are bound to be the focus of attention. Kingsoft anti-virus experts have given special reminders to netizens that during the Olympics, genuine anti-virus software must be installed, upgraded in a timely manner, and real-time monitoring and firewall functions should be enabled, to avoid the "Olympics" virus.
Kingsoft drug overlord global anti-virus monitoring center reminds users to be highly vigilant against the following 10 major viruses during the Olympics:
1. "Crazy download 106496" (Win32.Troj. DownLoader. wd.0000496)
This is a trojan download device. It can defend against security software and disrupt the operation of some security software. It then downloads a large number of malicious programs such as online games and online banking trojans, seriously threatening the security of users' virtual property. Unlike the General download server virus, the "Madman" also has a secret weapon. The timer is set to "self-defense" and runs repeatedly at intervals to prevent users from deleting it.
2. "Pigeon nest downloader 363520" (Win32.Hack. Huigezi.363520)
This is a worm-type download device. In addition to the remote password theft and control system with "gray pigeons", it can also destroy anti-virus software in users' computers and download a large number of malicious programs such as online games and online banking Trojan horses, this seriously threatens the security of user business secrets, personal privacy, and virtual property. As the latest variant of "gray pigeon", it has the most popular features of virus downloads. It can download a large number of other Trojans and viruses, which are more infectious and destructive.
3. "Network matchmaker variant 364544" (Win32.Hack. RedGirl. m.364544)
This is the latest Remote Control Trojan "Network matchmaker" variant, and is more and more capable of defending against security software. In order to avoid virus scanning and removal, the virus inserts a large number of junk commands, while disguising the icon as a common installation file icon. Modify the Registry to enable automatic startup when dealing with soft removal. Use the IE browser to create a remote thread, connect to the remote server specified by the hacker, and receive monitoring commands to control the computer that has been poisoned.
4. "online banking hacker account theft 61440" (Win32.Hack. Agent.61440)
After replacement, the user will be notified that the chances of system exceptions will be reduced, so that the virus can be prevented from being killed. Connect to the address specified by the virus author and send the recorded data, resulting in the loss of your online banking account.
5. "destructive advertising brush 61440" (Win32.HackTool. DownLoader. d.61440)
This is an advertisement Trojan program. It comes with a web site library that will guide the user's IE browser to automatically log on to these web sites to help them brush traffic. Users can only browse websites with built-in virus advertisements, which is very angry. Some of the webpage pop-up by viruses are malicious websites full of malicious files, which may be infected once viewed. In addition, viruses may damage a large amount of data in the system during operation, resulting in computer operation exceptions, which are harmful.
6. "Dead pig download server 147456" (Win32.Troj. EncodeXor. a.147456)
This is a download program. It is highly aggressive. It adopts a dual-process running method to achieve self-protection. Crazy images hijack almost all of the current mainstream security software, resulting in a complete loss of computer defense capabilities. The purpose of a virus, like its name, is to kill the user's security software. Download the virus list, most of which are online games and online banking account theft Trojans, which pose unpredictable threats to users' Virtual Properties, bank deposits, and trade secrets.
7. "Trojan assembly module 219648" (Win32.Troj. WdHitT. a.219648)
This virus is part of the win32.Troj. wehit.424312 Trojan. The eHit family has a clear division of labor for Trojans. In addition to the traditional downloader functions, there are also advertisement software functions that will access specified website traffic information in the background. In addition, the virus connects to the specified remote address, uploads the user's computer information, and downloads other Trojans to the user's computer for operation, which brings more trouble.
8. "restores the card breaker 73728" (Win32.TrojDownloader. Agent.73728)
This is a Trojan Downloading program. This downloader has done a lot of work in defending against the system security module. It can bypass the monitoring of the security module, illegally connect to a remote server, and even penetrate the recovery card. The virus will modify the system file, open the local port protocol port to connect to the network, then download the virus, and penetrate the recovery card installed on the computer to run the virus, causing great damage to computers in Internet cafes and other places.
9. "wild dog download 40960" (Win32.Hack. PcClient.40960)
This is a trojan download tool similar to a robot dog. The new variant of the robot dog disease has not appeared in our sight for a long time. However, many Trojans like this are still starting to appear. The virus attempts to disrupt the normal operation of multiple security software by modifying the system time, removing the active defense, and terminating the process, and then downloads an astonishing number of online games and online banking account theft Trojans, seriously endangering users' virtual property.
10. "Jianghu doctor 45056" (Win32.TrojDownloader. zlob.000056)
This is a fraudulent Trojan program. After the virus runs, the search plug-in will be added to the IE browser without authorization, and the IE page will point to the advertisement website specified by the virus author, forcing users to browse. The plug-in is also installed on the user's computer, and the user is directed to a fake online anti-virus website, forcing the user to buy. If the user refuses, the inquiry window will pop up continuously. It is a typical rogue activity.
Kingsoft drug overlord anti-virus experts suggest users to take the following two measures to protect network security and enjoy the prosperous sports:
1. Install professional anti-virus software to download the latest version Kingsoft drug overlord 2008 for free) for comprehensive monitoring to prevent the increasing number of viruses during the Olympics.
2. During the summer vacation, the number of users playing online games and using QQ and other instant chat tools has increased. Therefore, all types of Trojan horses will increase accordingly, and users are recommended to develop good network usage habits.