Interesting Malware
These malware instances highlight various approaches to cyber threats, from network worms to sophisticated supply chain attacks. Each had a unique impact, changing how we view and respond to cyber threats.
1. Conficker
- First detected in 2008, this worm exploited Windows OS vulnerabilities, forming a large botnet.
- It spread via network shares and removable media, affecting millions of computers globally.
2. Morris Worm
- Released in 1988 by Robert Tappan Morris, this was one of the first worms distributed via the internet.
- It aimed to measure internet size but caused widespread disruption due to a bug, affecting approximately 10% of the internet.
3. Zeus Malware
- Known for banking credential theft, Zeus (or Zbot) was first identified in 2007.
- It used keylogging and form-grabbing tactics and could spread through phishing emails and drive-by downloads.
4. Stuxnet
- A highly sophisticated worm discovered in 2010, targeting Iran’s nuclear facilities.
- It exploited multiple zero-day vulnerabilities, causing physical damage to centrifuges and marking one of the first known cyberattacks targeting critical infrastructure.
5. WannaCry
- This 2017 ransomware attack leveraged the EternalBlue exploit to spread through Windows systems.
- It encrypted user data and demanded payment, causing significant disruptions globally, especially in healthcare and other critical services.
6. CookieMiner
- A cryptocurrency-focused malware targeting macOS users, CookieMiner exploited saved credentials, web cookies, and cryptocurrency wallets.
- Detected in 2019, it was aimed at mining cryptocurrency and exfiltrating sensitive data, notably in the crypto community.
7. Sunburst (SolarWinds)
- Identified in 2020, this malware was embedded in updates of SolarWinds’ Orion software.
- It led to a supply chain attack affecting numerous high-profile government and private sector organizations, making it one of the most far-reaching cyber espionage cases.
'Security Terms > Malware Reversing' 카테고리의 다른 글
Static and Dynamic Analysis (0) | 2025.02.19 |
---|---|
Decompiling and Reversing (0) | 2025.02.18 |
Malware Features (0) | 2025.02.17 |