You are Here: Articlelogy.com » Computers » Networks » How To Stop The Sneaky Propagation Of The Insidious Viruses Mebroot And Torpig

How To Stop The Sneaky Propagation Of The Insidious Viruses Mebroot And Torpig


Go to: Previous Article Next Article


Botnets are becoming more prevalent as malware technologies becomes more complex. One of the more destructive examples that hit the scene back in 2008 is known as Mebroot. This virus, which is still around, is a rootkit that changes a computers Master Boot Record permitting it to run prior to the operating system of the computer gets loaded, allowing it to hide itself from anti-virus protection software.

When prioritizing elements of enterprise network security, preventing malware like a rootkit that hides itself and allows for complete control of the computer is of highest priority. Mebroot by itself is rather benign in that it does not have any specific functions but becomes a platform for other harmful software. The most virulent of these is Torpig, a huge botnet.

Torpig has a number of different information stealing pieces of software that analyze the infected computer for credentials, accounts and passwords as well as supposedly granting attackers full control of the computer. In 2009 a team of researchers were able to take control of the Torpig botnet for a period of ten days. During that period, they pulled out over 70GB of stolen data from botnet client machines.

Mebroot gets onto computers by a user accessing a website using a web browser that is older and has not been updated to eliminate the weaknesses that Mebroot uses to install itself on the user's computer. A good way to detect it is with a network based detector, since the virus hides itself on the system on which it is installed which might make it unable to be found.

Only some anti-virus applications can detect and remove Mebroot. If a computer is rebooting or acting infected, yet no virus appears in a scan, fixing the Master Boot Record on the system will remove it if it installed. Searching the web for "Fix MBR" will turn up some different ways to repair the Master Boot Record. After that is done, run a complete virus scan on the machine again to find anything else that was hidden.

The best way to go is to stop machine infestation by keeping browsers patched, and running both host and network based malware detection programs that are continually updated with real time information to stop any infection before it starts.
Article Source: Articlelogy.com
- Credit Cards A big selection of Cards in all flavors: Bad Credit Cards, Secured Cards, Prepaid Cards, Credit Cards for Canada, Low Interest Cards, etc -


Word Count: 387




Reduce Your Debts Without Bankruptcy. See How Much You Can Save. Free Debt Analysis



Read Previous Article ~ Read Next Article
 


Selected Articles

1: Public Car Insurance in Canada
2: Monthly Car Insurance
3: Why Compare Vehicle Insurance Quotes
4: Way to Get your Unique iPhone Apps Developed
5: Why Do I Need to Attend a Fitness Resort?
6: Contact Lenses Online: Convenient, Less Time Absorbing, Order On The Spot
7: Want Assist With Internet Marketing? Try These Suggestions
8: The Foam Filled Chairs Are Perfect Items of Furnishings
9: People clinging to their content sending dcma requests
10: The Enormous Bean Bag is low priced along with a top quality item of furniture
11: Tips on how to Handle Cholesterol Levels to be Healthful
12: A good solid Global One Ultimate Power Profits Paradigm Shift Platinum Superbly Inspection
13: Car Maintenance: Much better Than Auto Repair St. Louis Case
14: Choosing B&b Hartbeespoort Dam
15: Melaleuca- An Impartial Review- So is this a Melaleuca Scam or can you honestly generate income with this business?
16: Los Ciclos Grado Medio en Catalunya interesan a los estudiantes
17: Tips To Start Successfully Marketing On the web Today
18: Prescription Assistance Programs, Goal and Rewards
19: Way to Find an Efficient SEO Service Provider
20: Joomla Development for your Website
21: Website Design Graphics for Niche Businesses
22: Recycling Help in Keeping our Environment Thoroughly clean
23: Nashville Recycling Info for the Folks of Nashville
24: Personal computer Restoration - Suggestions for Locating a Dependable provider at Waukesha
25: Would like To order Tunes On-line?
26: Viviane Skincare- A Completely Independent Assessment By an Expert
27: Dallas Texas HCG Diet plan Protocol
28: HCG Diet Protocol, it genuinely Succeeds
29: The Functions for Charter Jets
30: Try Out the Well known Athlete's Alfredo with Homemade Alfredo Sauce recipe
31: The Broccoli Cheddar Spinach Soup Recipe Is easy To Actualize
32: Technology Consulting Overview
33: Join the opportunity Get Pre-launch Immediately And Tie down Your Place
34: Beneficial Suggestions For Achieving Article Marketing Results
35: Why should you opt for promotional pens?
36: Types of stress relievers to keep you hale and healthy
37: Mistakes to avoid while choosing novelty pens


Read Previous Article ~ Read Next Article

You are Here: Articlelogy.com » Computers » Networks » How To Stop The Sneaky Propagation Of The Insidious Viruses Mebroot And Torpig