Dormant cyber virus found in a system at a German nuclear plant

0
807

As a consequence, none of the dangerous malware was activated, so the only way it could have spread was through USB drives. However, the German officials identified 18 USB drives that were also infected without being used on systems outside of the Internet’s domain. W32.Ramnit, a virus  Symantec first identified  in January of 2010, travels through removable drives, and attempts to capture social media and banking passwords in browsers. Another worm, Conficker, was first discovered in 2010, and attempts to use the machine as part of a botnet, usually for denial of service attacks. It’s a keylogger as well, typically targeting users on social media. The machine wasn’t used for banking or social media, so the keylogging and botnet functions would’ve been effectively useless.

LEAVE A REPLY

Please enter your comment!
Please enter your name here