Top Five New Viruses (Computer)

Businesses, governments, and individuals are forever attempting to stay one step ahead of web savvy hackers. Being aware of the most harmful computer viruses can help business owners and home users to potentially minimize risk and shore up their internet defenses. These new viruses represent some of the latest threats in the cyber world.

The Basic Terminology

There are essentially three types of computer viruses:

  • Malware – Malware includes more than computer viruses. Worms, Trojans, adware, and even ransomware may all be considered malware. Malware is any computer code created to do damage to computer systems, gain unauthorized access to computers, or steal information.
  • Ransomware – Ransomware disables access to computer files by encrypting data. Demands for payment or other requests must be met before the software will be unlocked to allow access to servers or business files.
  • Trojans – Trojans require the recipient to take some form of action, such as running a program or accessing a malicious website through an email link. A common use of a Trojan attack is first to notify a computer user a virus has infected them. The user is prompted to click a link or run the attached program to solve the problem; thus, the user falls victim to the Trojan attack.

Five New Viruses

Cyborg Ransomware

Cyborg Ransomware sneaks into computers and encrypts files. Cyborg’s most recent evolution invades systems disguised as Windows updates. To protect your systems from Cyborg, avoid opening any questionable or unknown file with a “jpg” extension. Once Cyborg takes over, users receives a notification that files are encrypted and won’t be restored unless a ransom is paid. The ransom amount and instructions are provided. Unfortunately, decryption is often not provided – even if the ransom is paid. Once infected, the virus can be removed, but that does not restore access to the files. Typically, the only recovery is removing the virus, then restoring files from recent backups.


GoBrut uses brute force methodology to decipher passwords and gain access to Windows and Linux systems. GoBrut can slow down internet access to infected machines. The real threat of this virus is the potential of discovering and leaking confidential information such as passwords, usernames, and more.


Jokeroo is a serious form of ransomware offered on underground hacking sites for use by other cyberthieves. It can be distributed through social media sites, such as Twitter. Hackers joining in on this ransomware as a service scheme receive a portion of the ransom generated from their victims.

CryptoMix Clop Ransomware

CryptoMix Clop focuses on attacking complete networks. CryptoMix Clop spreads throughout Windows systems, shutting down critical services and processes. This results in a system that is defenseless against the virus. Ransomware then takes over, encrypting files and presenting the ransom note. This virus currently has no free decryption solution available.

Trojan Glupteba

The Trojan Glupteba virus uses exploitive codes or other malware. Many infected users are not even aware of the attack. Using the system’s IP information, it communicates with other websites to gather sensitive information.

Avoiding Computer Viruses

There are several steps all computer users should take to improve cybersecurity::

  • Install an antivirus program and install updates regularly.
  • Update your operating system regularly to take advantage of new defenses.
  • Do not click links or open attachments included with suspicious or unknown emails.
  • Keep regular backups of critical files.
  • Utilize strong passwords and change them frequently.
  • Never utilize public WiFi for sensitive activity, unless utilizing VPN services.

Awareness is key to prevention. Staying on top of the latest computer viruses is just the first step. The next step is following strong cybersecurity measures. They can help to protect your system and data against the latest virus.

Posted in: