Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest stationmaster buy cloud host technology Hall
"Disk Drive"--the most awesome Trojan plane in history
Current outcome: to be silenced. Is it the Thunder or the end? Disk drive virus The author seems to be smarter than the panda writer, in the face of Internet users, the face of the major anti-virus manufacturers of the joint suppression, he was in the most of the moment chose to "run", but perhaps he is only a brief shelter, secretly brewing a larger attack!
Development process:
Disk drive virus first appeared in February 2007, Jinshan Poison PA anti-virus expert Tiejun said that the virus only in the Windows system directory to generate Lsass.exe and Smss.exe files, and modify the system time is 1980 years. At that time, the virus is not the purpose of the download, itself there are more bugs, intrusion prone to cause the system blue screen panic.
In the 2008, variants are growing, gradually absorbing the features of AV Terminator and robotic dog, and increasing the ability to fight security software. In the early March 2008, a large area broke out, with a total of 107 variants, with millions of computers infected. At present, under the encircle of the major anti-virus software manufacturers, the new variant of the "disk drive" has not been updated for several days, and the malicious Web site has been closed.
Poisoning symptoms:
1. Forced modification of the process, resulting in the failure of security software
2. In the user without any sense of automatic network, download mass theft Trojan, steal privacy
3. Tampering with files cannot be restored, it is extremely difficult to completely erase
4. Through software vulnerabilities and ARP attacks spread, to the LAN paralysis
"Gray Dove"--the most hidden trader in history
The current outcome: reopening. In the 2007, in the joint siege of the anti-virus manufacturer represented by Jinshan, the Gray Pigeon Studio officially closed down, which was a victory for the anti-virus manufacturer in the process of fighting the virus. However, the secret gray pigeon trade has not stopped, at the end of 2007, Gray Pigeon Studio opened again, although not so publicized before, but still is a cancer on the internet, netizens are not careful, it is likely to suffer its harm again.
Development process: Gray Pigeon first appeared in 2001, using Delphi writing, using the most discussed "bounce port" connection way to avoid most personal network firewall interception. Jinshan Poison PA anti-virus expert Tiejun said, 2001 to 2003 is the imitation period of gray pigeon, imitate "glacier", its open source way gradually increased the amount of transmission; gray pigeons Enter the rapid development period from 2004 to 2005, the number of victimized users greatly increased, The 2004 infection statistics showed 103483, and by 2005 the number climbed to 890321; In 2006 to 2007 Gray Pigeon into the national hacker era, for three consecutive years, the top 10 virus rankings. March 21, 2007 Gray Pigeon Studio was forced to completely stop the development and registration of Grey pigeon remote management software.
Poisoning symptoms:
1. Theft account: Easy to take the user important account
2. Peeping Privacy: Remote monitoring and photographing user privacy
3. Blackmail money: After stealing user secrets to blackmail
4. Development of "broiler": remote control of poisoned machines
5. Stealing trade secrets: stealing important documents from users
6. Intermittent sexual harassment: hackers remotely interfere with the user's computer
7. Wanton mischief, destroying the computer
"Panda Burning Incense"--the most "lovely" system killer in history
The ending: The author is in prison, all the dust settled!
Development process: October 16, 2006 "Panda incense" virus spread on the internet, at the end of 2006 to early 2007, Jinshan Poison PA Anti-Virus Center to monitor the "Panda incense" variant number has reached more than 90. Virus mainly through the site with infected users, but also in the LAN spread, resulting in a short period of March millions of computer poisoning. February 2007, "Panda incense" virus designer Li June, all the dust landed.
Poisoning symptoms:
1. Infected system files, all of the. exe executables in the infected user's system are changed to pandas holding three incense
2. Spread through the LAN, and then infect all computer systems in the LAN, resulting in the enterprise LAN paralysis
3. Abort a large number of anti-virus software processes
4. Delete file with extension Gho to make the user's system backup file missing
5. Add the virus code to the end of all the Web pages in the poisoned computer, and the user can also be infected by the virus when browsing these websites