Wednesday, May 8, 2024
Home Malware Storm Worm : Family member of Trojan

Storm Worm : Family member of Trojan

The Storm worm is not the latest but deadliest virus. It was late 2006 when the computer security expert identified this worm. The people called this virus the Storm worm because one of the emails sent to the user which contains the virus file has the subject “230 dead as storm batters Europe”. The Antivirus companies call the worm by other names like McAfee calls it Nuwar.

The Storm worm is from the trojan horse family. The worm creates payload to the other program through but not always the same one. Some of the storm worms turn the computer into zombies or bots.

When the computer is vulnerable then it takes the remote control by the person behind the attack.

Some of the hackers utilize them to create a botnet and use it to send spam mail across the internet and vulnerable the entire machines connected with that network.

The Storm is specially used for the current situation subject in their mail and then sent to the victim’s mail. For example “ this time COVID-19 is creating so many issues then the mail you receive are also related to the coronavirus”,” earthquake and more the recent issue in the subject line. After that you got a link in the email body basically that is connected to a link and that downloads the storm worm in your machine and your whole machine is under control of a cyber hacker.

Several news headlines and bloggers mention that this virus is the worst virus attack in years.

Although the security expert also said that the virus spreads frequently and this is most difficult to detect or remove from a computer system.

How to remove this virus from your PC?

The main thing you have to do please don’t turn off your antivirus or windows defender that mainly checks the changes happening and track if any trojan installed in your PC’

You can have to take some advantage to figure out with this issue :

  • Install a Good antivirus which helps you to protect the computer and if possible check the right antivirus online and then make decisions.
  • The Antivirus updated is also important because the virus changes the code and then it tries to harm your PC or machine.
  • Always try to ON the protection of antivirus and Windows defenders.

 

Bipin Choudharyhttps://vednam.com
Bipin has been a passionate blogger for several years. He is a Cyber Security Enthusiast, Security Blogger, Technical Writer. He is always eager to know everything about the latest technology development and advancement. Author @ Vednam

2 COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular

7 Best Free Ethical Hacking Courses Online

  Ethical hacking is the practice of identifying vulnerabilities in computer systems and networks, using the same techniques and tools as malicious hackers. Ethical hackers,...

How does AuKill malware work?

AuKill Malware Actively Used to Disable EDR in Ongoing Attacks The cybersecurity landscape is constantly evolving, and attackers are always finding new ways to breach...

What is Black box hacking ? How Does it works ?

  Black box hacking refers to the process of testing a system, network or application for vulnerabilities without having any prior knowledge of its internal...

What is Penetration testing ? How does it works ?

  Penetration testing, or PenTesting for short, is a critical part of any comprehensive cybersecurity program. It involves testing the security of computer systems, networks,...

Recent Comments