Self-destructing virus kills off PCs

Self-destructing virus kills off PCs

The article is written by https://veepn.com digital security specialists.
The evolution of malware in recent times has been developed and raised by malware authors for different purposes targeting a range of different victims. On the other hand the cyber security specialists develop programs and applications to defend or obstruct the infectious malware. In conjunction to this, there has always been a cyber conflict between malware authors and security firms to restrict the entry of malware. The cyber conflict has unveiled the evolution of an interesting type of malware called the Rombertik malware.

What is a Rombertik Malware?
Rombertik is a composite malware that gets connected to the web browser to gain access over the user’s sensitive information and other credentials to release stolen data to the hacker controlled server. Rombertik, randomly gathers information from all websites. The malware has been found to spread through phishing messages. The malware once identified by any means starts to self destruct, destroying itself on detection also pulling down the hard drive along with it. It constantly re-boots the system, making the hard drive to start over and over again.

Security experts find it mind boggling to learn the functioning about this rival malware. This malware creates a worse experience because once the Rombertik is detected, it probes itself to destroy the master boot record of the storage device. On rebooting, the disk and all the information on it will be of no use until they are cleared and re-installed. By doing so you will lose all the data.

How to prevent the Rombertik infection:
There are certain basic old school techniques you can follow to prevent from getting infected by the nasty malware Rombertik.
1. Make sure that you have an antivirus program or an internet security software like Comodo Internet Security Software installed on your system, that helps you to scan all the incoming mails.
2. The malware spreads through phishing mails, so it is advisable to avoid opening such mails that looks weird and suspicious. Also do not click on suspicious links or attachments that are sent from unknown contacts or sometimes even from contacts that you know.
3. Stay up to date with the latest version of the antivirus or any other software that you have already installed.

  • Added Mar 12, 2020

New Arrivals

Comments

Log in or join now to add a comment.
No comments yet, you can be the first!