Free Software Review
X

Blog & News

Something that some may not initially think as being a good investment; but a laptop that has been deliberately infected with six notorious strains of malware including WannaCry and ILoveYou is being auctioned off – with bids at the time of writing reaching over $1.1m (£800,000). But why?

 

The laptop itself has been disabled from being able to access the internet so ensure that the virus can’t be spread or used in any way and the device will be shipped to the winner. The point of this is almost solely an art exhibition and publicity stunt by artist Guo O Dong and a New York cyber-security company called Deep Instinct.

But what are the infamous viruses and what did they do? We are going to have a look into four of them here.

 

WannaCry

Probably the virus that you are most likely to have heard of, the WannaCry virus was responsible for shutting down hundreds of thousands of computers around the world, demanding that users pay a ransom in order to access their computer again. The reason for the huge level of infamy of this particular virus was that it hit over a third of hospital trusts in the UK as well as 8% of GP Practices. Around 1% of all NHS care was disrupted in the week of the attack and over 19,000 appointments had to be cancelled. This cost the NHS £20 million and then a further £72 million in cleanup.

The cyber attack locked over 200,000 users out of their computer and displayed a large red-lettered warning demanding Bitcoin. This attack was eventually pinned on North Korean hackers which took a year to investigate.

 

ILoveYou

Misleadingly this sweet-sounding virus was based around “love letters” in which a computer worm, originating from the Philippines; began to take control of computers on 5th May 2000. The email included an attachment which had the; innocently seeming at the time, filename of “LOVE-LETTER-FOR-YOU.txt.vbs. If this was opened, a Visual Basic script (which now we can see from the .vbs part of the filename) executed and infected the computer.

This played on the early day naivety of computer and email users by fooling people into opening it because Microsoft actually concealed the extension name of the file which caused many to believe it was a text file. When the file was ran, the script sent itself to everyone in that person’s contact list and edited the computer’s registry files so that the worm began automatically on every startup. It then continued to copy itself across all files in the computer basically ruining the inner workings.

 

MyDoom

The MyDoom or Novarg virus was another worm that created backdoors in the victim’s operating system on their computer. The original version of the virus has several variants but mainly; two triggers. The first of them made the virus begin a distributed denial of service attack (DDOS) which started on 1st February 2004. The second trigger then made the virus stop distributing itself on 12th February 2004 but even after the virus had stopped spreading, the backdoor created remained open and active; allowing access to victim’s computer.

 

The Sobig Worm

Finally, one of the other viruses that has been deliberately put onto the laptop is the Sobig Worm; a computer worm that infected millions of computers connected to the internet through Windows in August 2003.

Sobig.A was first found in January 2003 and Sobig.B was released on 18th May of the same year. Originally known as Palyh and later renamed; Sobig is the second fastest spreading computer worm to have ever entered the computing environment, infecting computers through the internet. Worms, featured a lot in this blog are malicious computer programmes that replicate themselves and can create backdoors in the victim’s computers. This opens them up to having their data stolen; before passing on this information and replicating itself on other people’s systems.

 

Protecting yourself

We aren’t expecting you to be going out and purchasing the tainted laptop with the four of these viruses included (and more!) but it is extremely important to remain vigilant with your computers. One of the issues is that because our computers are sat on our desk; laptops in our bags – the first thing that you think about in terms of safety are not having the device itself stolen or damaged. This then causes a somewhat lackadaisical approach to ensuring the internal file system safety of your computer and the files upon it are safe themselves.

Regular backups, changing passwords securely and regularly as well as having robust antivirus software is very important because not only can your computer become infected and damaged, but important files about your and your business can be compromised or stolen.

News & Blog

5 Steps To Building Process Maps For Bespoke Software Development

5 Steps To Building Process Maps For Bespoke Software Development 16th August 2019
5 Steps To Building Process Maps For Bespoke Software Development Hover Icon Read More

One thing that we can all agree on is that we are striving to produce, to create, to deliver the best product that we can. Whether that is service or goods based; the same can be said of all businesses …

Australia Planning Launch Of Regulator For Algorithms

Australia Planning Launch Of Regulator For Algorithms 26th July 2019
Australia Planning Launch Of Regulator For Algorithms Hover Icon Read More

Regulators in Australia are planning to launch the world’s first dedicated office that will be tasked with ensuring scrutiny over algorithms that are used by technology companies such as Facebook and Google. This has been set up as part of …

Apple Expands Software Development Accelerators In China

Apple Expands Software Development Accelerators In China 19th July 2019
Apple Expands Software Development Accelerators In China Hover Icon Read More

Apple has now opened it’s first app design and development accelerator in China. Located in Shanghai, Apple are hoping that scaling it’s operation in one of the world’s biggest markets will help them see further growth in innovation within app …

Read more news & blog articles

How could we help your business?

A more efficient and profitable use of data. Safer, more secure systems. Operational efficiencies. Special projects. Manage and support your systems to make sure your success is sustainable, is ongoing.

Kaleida Logo
Kaleida Map
Kaleida Keate House, 1 Scholar Green Road, Cobra Court, Trafford Park, Manchester, M32 0TR
Map Pin
Call us on 0161 870 8160 Email us at enquiry@kaleida.co.uk

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close