Skip to main content

Novarg: The Worst Computer Virus in the World!

In 2004, the Mydoom virus, also known as Novarg, induced around $38 billion in damage. This computer virus was spread by mass emailing. The Mydoom virus works by scraping email addresses from infected machines. Then it will send a copy of itself to other machines connected to the same network that the infected was using. This kind of virus also brought infected devices into a botnet. If you are interested in computer hacking, you might already know that botnets were used for a hacking technique called DDoS or distributed denial of services.
According to the report, the main goal of the virus is to shut down the target server. This computer virus was designed to either infect the client in the network or compromise the server directly. After the incident, the Mydoom virus or "Novarg" was considered the worst computer virus in the world.

During its fame, the Novarg virus was responsible for 25% of all the emails sent throughout the world. But today, it is shocking that it was still existing, and reports said that it generated around 1% of all 3.4 billion phishing emails sent every day.

Until now, the creator of the worst computer virus is still unknown, even though a $250,000 reward was offered.
These are some symptoms to tell if computer viruses have infected your device:

  1. There are constant pop-up windows that ask you to visit untrusted websites.
  2. The home page looks different, and you can't change it back to the original form.
  3. Your email accounts were sending emails you didn't send.
  4. Your computer's speed and performance are unusually slow.
  5. There's a program or software that you didn't recognize or installed.
  6. Your passwords are changed, and you can't log in to your accounts.

If you encounter any of these symptoms, run a scan test on your device with the help of antivirus programs such as Windows Defender, Avast Antivirus, etc.

Now, the question here is how can we protect ourselves against computer viruses?

First, always update the software on your PC. There are lots of cyber security services that ensure that all of your software is up-to-date.
Second, always turn on your Windows firewall and Windows Defender (for Windows users). This will help you filter all the files and resources that were going in and out of your computer. It would be best to consider scanning your PC for threats and malware.

Lastly, do not click or open suspicious files or links. Hackers hid most of the viruses in what we called trojan. This trojan acts as a carrier and disguises itself as files, software, etc. When you see a suspicious file on your PC or someone wants you to open the file, and you feel that it was a little shady. Go to virustotal.com and scan the file for possible threats.

Comments

Popular posts from this blog

UPDATED V3 ONION LINKS 2022 [DARK WEB]

  People are still wondering what was inside the Dark Web. It became trendy because of curiosity, and the curiosity of people are still growing day by day. Now, to clear the minds of many people, I will show you how to access the Dark Web and give you NEW and UPDATED v3 onion links that you can use to explore deeper. HOW TO ACCESS THE DEEP WEB? 1. Download and install TOR Browser. Download Link:  https://www.torproject.org/download/ 2. After installing the TOR browser, you can now launch the browser. It will now establish a connection. Once it was done, you can see the DuckDuckGo search bar. (Note: DuckDuckGo is the default search engine in TOR browser) 3. Now, you can copy any of the links below and paste it in the address bar of TOR browser. NEW V3 Onion Links for 2022: [Disclaimer: The information in this blog is for educational purposes only. The author of this article will not be responsible for any illegal activities that you will do or bad things that will happen to you...

HOW TO BYPASS ALL SHORT LINKS?

  Bitly, TinyURL, Cuttly, and many more. These are some of the URL shorteners that you can find on the internet. The main purpose of these websites or tools is to shorten the links that we share on the internet or make someone earn money by just sharing a link.           But one of the main problems here is, there are so many URL shorteners that made the work much longer and there are so many ads, which is very annoying in my case. So, with this tutorial, I will show you how you can bypass all these short links and get the work done much easier without wasting your time staring at so many ads on your monitor.           Before we start the process, let's talk about the tool that we needed, the TamperMonkey. This is a browser extension that was so popular to the point that it has an estimated of over 10 million users right now. Tampermonkey enables us to add and use userscripts. Userscripts are JavaScript programs that can b...

Chinese Hackers used Modified Version of Log4j Exploit to Attack Academic Institution

          A Chinese advanced persistent threat (APT) hackers has been observed using a modified version of the Log4j exploit to target a large unnamed academic institution. The said exploit was performing various operations such as recon and credential harvesting on the targeted systems.           The APT group was dubbed as "Aquatic Panda" and some believed that they are on-the-go since mid-2020. As Benjamin Wiley said on the CrowdStrike report, it is a China-based [APT] with a dual mission of intelligence collection and industrial espionage. Their attacks mostly targeted companies in telecommunications, technology, and government sectors.           According to the CrowdStrike, researchers from Falcon OverWatch recently disrupted an attempt to steal industrial intelligence and military secrets from an unnamed academic institution using Log4Shell exploit tools. The researchers uncovered the suspic...