What have been the worst malware in history

0
70

Cybersecurity is one of the most important issues for Internet users. Any page can suffer an attack, even a computer after you have downloaded a program from a page of dubious origin. Today we take the opportunity to take a look at some of the worst malware in history.

When they talked about viruses in the 90s and 80s, they were malicious programs that caused the computer to malfunction. Now everything has changed, and it is not surprising, since there are many new variants of these software in recent years and some have given a lot of talk if we mention, for example, ransomware.

Log4Shell

One of the most important problems that companies always try to have at bay is only the initial failures in the applications. They are the so-called zero-day bugs, which are tried to be solved in a first security patch once released. The problem is that sometimes they are not fixed, as became clear with the discovery of the Log4Shell malware.

This vulnerability was found neither more nor less than in the Minecraft servers, a game that to this day continues to be one of the most played and popular games online by children and adults. The criminals used a flaw in the Java registry in order to execute remote malware. The reason was none other than to steal data or even run errors on computers without being in front of the attacked machine. Although it is considered one of the worst, its solution is as simple as updating the app to avoid it.

BlueKeep

If we talk about errors and cyberattacks we have to talk about Windows. And it is that it is the most popular operating system as far as computers are concerned, so with such a large volume of users it is a very juicy goal. Even more so when public administrations rely on this operating system for their equipment.

In this vulnerability discovered in 2019, the attackers broke into the Windows Remote Desktop Protocol. The problem was determined by the use of a remote troubleshooting application as a tool to remotely inject malicious code. The takeover took a matter of seconds, but what made it more dangerous was its compatibility with 7 series, XP, Vista, and 2003, 2008 base, and R2 server systems.

DoubleKill

Although for many it is one of the most satisfying signs in first-person shooters, the truth is that it is another zero-day vulnerability. This is more current, since it dates from 2018 and affected systems from Windows 7 and later. Yes, it is possible that you have suffered from it without realizing it, although this is only possible thanks to an application that luckily no longer works.

CYBER ATTACK

We are talking about Internet Explorer, the old browser of the operating system. The malicious code could be entered through a web page, but since May 2018 it has ceased to be a problem.

ZeroLogon

Not one, but two patches Microsoft needs to protect its users from ZelogLogon. Officially it had the code CVE-2020-1472 and yes, we have already given you the year it was discovered. In fact, you can get an idea of ​​the headaches it has caused, to the point of being categorized as one of the most serious failures on a 10/10 scale in cybersecurity.

It mainly affected servers with the brand’s operating system and responds to the use of remote login, a segment through which the criminals could enter. In fact, it had a special impact when it came to making changes to user credentials, where it caused serious damage beyond extracting information.

CVE-2022-0609

If you take the previous vulnerability as a reference, this one is more worrying because it is more recent. You only have the registration code, and in this case, Google Chrome was the gateway. Given the popularity of the browser, the incident was listed as one of the worst to date. Although it has already been solved, at the time it had a great impact due to the possibility it had of modifying the data of the device it attacked.

Previous articleLive text in photos and videos: Here’s how to recognize text on your iPhone, iPad, and Mac
Next articleEnd to the problem: now Chrome is safer to enter web pages