Top Six Worst Computer Viruses.

A computer virus infection might be a little nuisance or a catastrophe that will cost you hundreds of thousands of shillings to repair. The most well-known and infamous computer viruses that have done a lot of harm are listed here. The damage produced by this virus has cost billions of dollars and has disrupted vital real-world infrastructure. Here are the top six worst computer viruses.

How Metaverse Will Destroy Passwords


One of the worst computer viruses ever made, Klez was created using Microsoft Visual C++. The most widely used antivirus program cannot identify Klez because of its advanced stealth technology. Klez is a well-known “mass-mailer,” randomly sending itself to addresses from the user’s Outlook contact book. The infected computer’s email address becomes the “from” address as soon as the virus captures it. Klez shows up in emails with various topic headings. Unfortunately, the virus succeeded since there was no recognizable title or message pattern.

CryptoLocker Ransomware

The malware known as CryptoLocker was made accessible in September 2013. A malware called CryptoLocker made user data unavailable by encrypting them. A dangerous form of ransomware, the virus encrypts files on the computer. A victim must pay a predetermined amount using bitcoin to access the file or data. In June 2014, the CryptoLocker-related cyber organization’s leader was fired.

The CryptoLocker infection may be avoided in several ways, including by keeping malware and antivirus software up to date, ignoring suspicious attachments and files, and avoiding clicking on odd or unfamiliar URLs. Additionally, creating a backup of your files is usually a good idea.

What you Need to Know About Cloud Computing


The computer virus is known as “ILOVEYOU” is regarded as one of the most dangerous ever made. To entice individuals to open an attachment, the malware exploited social engineering. It will begin to replace files with itself after being clicked and send itself to everyone on the user’s email list. When activated, it will overwrite files and send a message to every person on the user’s mailing list, rendering the machine incapable of starting up. Around $10 billion in damages were caused, and it was able to wreak havoc on computer systems all around the world.

Code Red

A company known as eEye Digital Security was the first to identify the Code Red worm when it initially appeared in 2001. Originally given the name Code Red Mountain Dew when it was discovered. It is only 3,569 bytes in size and may operate fully in memory, leaving very little of a footprint on the hard drive. By taking advantage of a system buffer overflow issue, the worm specifically targeted PCs with the Microsoft IIS web server installed.


Nimda was a mass-mailing virus that initially surfaced in September 2001 and used a variety of methods to spread. The virus was named after the word “admin” spelled backward. Infected email attachments and websites using outdated versions of Microsoft’s IIS web server software are two ways that Nimda spreads. Among the victims of Nimda were large organizations like Microsoft and Dell.

One of the most important takeaways from Nimda is how important it is for businesses to promptly fix any known vulnerabilities in their networks. The Nimda malware has multiple variations, according to Kaspersky. The majority of them are thought to be modified versions of the original virus in which the text strings have been changed.

Zeus Gameover

The “Zeus” family of malware and viruses includes Zeus Gameover. This malicious software is a Trojan—malware that poses as a trustworthy entity and steals your money by accessing your private bank account information.

The worst thing about this specific Zeus malware type is that it lacks a vulnerability common to many intrusions that law enforcement may target: the need for a centralized “Command and Control” server to execute transactions. Zeus Gameover can instead construct separate servers to deliver sensitive data without using centralized ones. In essence, it is impossible to find the stolen data.

Leave a Reply

Your email address will not be published. Required fields are marked *