Blog Layout

The Story Of The Franken Virus A Halloween Nightmare!

Rod Noran • Oct 15, 2020

He called his modern day code extrapolation “Franken Virus’! 

The inspiration behind our hacker’s story has been leaked over the last couple of years. The goal of our young hacker was to develop a virus, but not just any virus. He wanted to establish himself as a unique one of a kind hacker. 


He called his modern day code extrapolation “Franken Virus’! 




Establishing unsafe viruses is much less regarding "bragging rights" or satisfying the developer's ego as it is the need for it to become a great revenue generator.

The destruction of data on your computer system or corruption of programs you use is a typical side effect of the “Franken Virus”. 

The reformatting of your computer system "c: drive" computer’s hard drive, especially at the office, and also the loss of useful information made use of to will be an unbelievably excruciating experience.

The extensive release of information back up remedies within firms to abide by regulation and also various other factors means much less and much less useful data is now stored on your computer system's neighborhood hard disk. 

A lot more importantly for the “Franken Virus'' author, this assault does not generate much concrete revenue so there is very little motivation to create more sophisticated programs to counter better anti virus applications as well as business network protection.

Nevertheless, there is profit for the “Franken Virus” writer consequently turning your computer system into a spam distribution equipment. "Spam" is an email sent out without the authorization of the person obtaining the message. 

Cyberpunks gain control of your computer through a Trojan Horse which gives them the very same access to civil liberties as the user. 

Once your computer is regulated by the cyberpunk it becomes known as a "Zombie." A group of zombie makers is called a "botnet.".

By controlling a botnet our “Franken Virus” hacker can produce revenue in a number of ways. The botnet can be utilized to exhort a ransom money from a business by threatening to launch a harmful "Distributed Denial of Service" (DDoS) attack against its website. 


The botnet can likewise be hired out to various other hackers

One of the most usual ways of making money from a botnet is to use it to send spam email. According to the protection software application firm Sophos over 50% of all spam email now stems from botnets. 


Cyberbullies utilize spam email to drive website traffic to pay per click marketing sites or disperse virus programs further. Making use of a zombie computer aids cover their tracks.


The drive for producing profit is clearly obvious in a brand-new kind of infection referred to as "Ransomware" by security specialists which started to appear in 2005. 


Ransomware, as the name recommends, holds data on your computer system "hostage." Documents on your hard drive are encrypted with a password. The individual is after that contacted and also asked to pay a ransom money to release the data.


Right here are some straightforward pointers as well as methods to help avoid your computer developing into a "Franken Zombie.".


- Keep your computer system up to date with the most up to date software application patches for Windows and other Microsoft programs. A lot of infections and other malware make use of vulnerabilities in utilized programs.


- Set up a reliable anti infection program, like Windows Defender. It will keep the virus definitions up to date as well as check your computer routinely.


- Buy a router with a hardware firewall. Preferably you need a firewall program service which filters both incoming and also outgoing web traffic from your computer to the web.


- Never ever open spam email or connected email attachments. These are regularly utilized to disperse virus programs. Make use of a spam filter to help reduce the amount of spam you obtain.


In summary, it is October the month of “Zombies”, “Spooks”, and other evil phenomena. Here’s what you need to do. Give the Technology Center a call and have Matthew and his team prep you for the coming hacker’s of destruction and mayhem. 


They come to your place and prep your devices for the oncoming attack of “Franken Virus” and other concepts of destruction.



Share by: