{"id":6711,"date":"2021-01-27T14:41:37","date_gmt":"2021-01-27T14:41:37","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=6711"},"modified":"2025-07-09T01:36:27","modified_gmt":"2025-07-09T01:36:27","slug":"worst-computer-virus","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/worst-computer-virus\/","title":{"rendered":"What is the worst computer virus? Figuring out"},"content":{"rendered":"<p style=\"text-align: justify\">Worst computer virus &#8211; what is it? Seems that anyone who has ever been infected asks this question. And each user will think that his case was more severe than someone\u2019s else. Is that true? And which virus is really the worst?<\/p>\n<p style=\"text-align: justify\">It is important to mention that computer viruses are not only \u201cviruses\u201d. Nowadays, the term \u201ccomputer viruses\u201d is used to describe all types of malicious programs. But, in fact, viruses are just the type of malware &#8211; same as <a href=\"https:\/\/gridinsoft.com\/backdoor\">backdoors<\/a>, coin miners, spyware or <a href=\"https:\/\/gridinsoft.com\/ransomware\">ransomware<\/a>. You can read more about why that happened <a href=\"https:\/\/gridinsoft.com\/blogs\/malware-vs-virus\/\">in our article.<\/a><\/p>\n<h2>The worst computer virus &#8211; what is it like?<\/h2>\n<p style=\"text-align: justify\">First, let\u2019s figure out what is meant by the term \u201cthe worst computer virus\u201d. Different malware deals different kinds of damage, and it is always unwanted. Viruses can damage your networking configurations, system settings, cipher your files or even break your hardware. But the most dangerous ones considerably deal damage to all elements of your system. Some of such malware aims at making money on you, others &#8211; just to make your life harder. Let\u2019s see the top-5 list of the worst computer virus &#8211; starting from less dangerous.<\/p>\n<h3>5th position. Coin miner trojan<\/h3>\n<p style=\"text-align: justify\">This malware uses your hardware to mine cryptocurrencies, exactly, Monero and DarkCoin. <a href=\"https:\/\/gridinsoft.com\/blogs\/coin-miner-investigation\/\">What is the risk for your computer<\/a>? First of all, it creates a significant load on your hardware &#8211; almost 70-90% on both CPU and GPU. That can easily lead to overheating, which never causes a positive impact on the lifespan of your hardware. Moreover, the <a href=\"https:\/\/www.nicehash.com\/blog\/post\/can-mining-damage-my-gpu-or-a-pc\" rel=\"noopener nofollow\" target=\"_blank\">GPU wear ratio is much higher<\/a> when it is used for cryptomining purposes. The biggest danger is on laptops &#8211; their cooling system is not designed to deal with constantly overloaded hardware.<\/p>\n<figure id=\"attachment_4973\" aria-describedby=\"caption-attachment-4973\" style=\"width: 646px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/10\/coinminer-consumes-cpu.png\" alt=\"Worst computer virus: Coin miner consumes the 95% of CPU capacity\" width=\"646\" height=\"593\" class=\"size-full wp-image-4973\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/10\/coinminer-consumes-cpu.png 646w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/10\/coinminer-consumes-cpu-300x275.png 300w\" sizes=\"auto, (max-width: 646px) 100vw, 646px\" \/><figcaption id=\"caption-attachment-4973\" class=\"wp-caption-text\">Coin miner consumes more 60% of CPU power. Antiviruses cannot work properly in such conditions<\/figcaption><\/figure>\n<p style=\"text-align: justify\">Another side of the problem is that modern coin miner trojans <a href=\"\/spyware\">sometimes have a spyware module<\/a>. It means that your personal data will not be personal anymore &#8211; read the next paragraph.<\/p>\n<h3>4th place. Spyware.<\/h3>\n<p style=\"text-align: justify\">Spyware is designed to steal all possible personal information from the victims\u2019 PCs. Location, language setups, cookie files, search history, activity hours data &#8211; even your PC configuration will be leaked to the crooks. Depending on the type of attack &#8211; massive or individual &#8211; this information will be sold to third parties or used for further cyber attacks. Spyware is extremely silent &#8211; it tries to stay in your system as long as possible to get more personal information about you. Most examples of this malware type are also able to steal your conversations &#8211; so don\u2019t be surprised when you\u2019d see some very private information available for everyone.<\/p>\n<figure id=\"attachment_6715\" aria-describedby=\"caption-attachment-6715\" style=\"width: 320px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/12\/spyware-scheme.jpg\" alt=\"Worst computer virus: Spyware scheme\" width=\"320\" height=\"320\" class=\"size-full wp-image-6715\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/12\/spyware-scheme.jpg 320w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/12\/spyware-scheme-300x300.jpg 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/12\/spyware-scheme-150x150.jpg 150w\" sizes=\"auto, (max-width: 320px) 100vw, 320px\" \/><figcaption id=\"caption-attachment-6715\" class=\"wp-caption-text\">The scheme of spyware virus actions<\/figcaption><\/figure>\n<p style=\"text-align: justify\">Spyware stealthiness makes it a tough nut for antivirus programs. Security tools often struggle to detect spyware correctly with a <a href=\"https:\/\/gridinsoft.com\/blogs\/heuristic-virus\/\">heuristic<\/a> engine. Even if it detects one, you will probably see the detection of the &#8220;generic&#8221; type, which sometimes refers to a false detection and is thus ignored.<\/p>\n<h3>3. Banking trojans<\/h3>\n<p style=\"text-align: justify\">What can be worse than getting your personal information stolen? Sure, getting your banking information stolen. And we are talking not only about card numbers and CVV code &#8211; they are important, but almost useless without the transaction approval. Modern banking trojans aim at your online banking &#8211; exactly, on login and password for it. Having them, crooks are free to manage your money.<\/p>\n<figure id=\"attachment_6716\" aria-describedby=\"caption-attachment-6716\" style=\"width: 660px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/12\/fake-banking-page.jpg\" alt=\"Banking trojan page\" width=\"660\" height=\"535\" class=\"size-full wp-image-6716\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/12\/fake-banking-page.jpg 660w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/12\/fake-banking-page-300x243.jpg 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><figcaption id=\"caption-attachment-6716\" class=\"wp-caption-text\">The page displayed by the most primitive banking trojans<\/figcaption><\/figure>\n<p style=\"text-align: justify\">Sometimes, banking trojans are combined with other malware &#8211; embedded into spyware, rogue software or phishing trojans. Since they aim at seriously protected things &#8211; online banking login forms &#8211; they are made by professionals. And it is a bad idea to ignore their efficiency &#8211; otherwise, you will have to ignore zeros on your banking account. Or, possibly, huge credit lines.<\/p>\n<h3>2nd place &#8211; Wiper virus<\/h3>\n<p style=\"text-align: justify\">This type of malware was always very rare, but <a href=\"https:\/\/www.wired.com\/story\/never-before-seen-wiper-malware-hitting-israeli-targets\/\" rel=\"noopener nofollow\" target=\"_blank\">its danger can not be underestimated<\/a>. Wiper malware is one that destroys your disk partitions. That malware is not about making money on you &#8211; it is just for revenge or mischief. Having your disk partition broken, you lose access to all your files and also to your operating system. UEFI is just not able to find the boot record of your OS &#8211; all data you have on your disks are just a weird mixture of non-structured bytes. Wiper malware is so rare that some of the anti-malware programs do not even have them in their detection databases.<\/p>\n<p style=\"text-align: justify\">Such a malicious program needs access to your system at the driver level. Hence, it is obvious to wait for the hazard from the program that pretends to be the driver updater, \u201csystem optimization tool\u201d, or other <a href=\"https:\/\/howtofix.guide\/is-kmspico-trustworthy\/\" target=\"_blank\" rel=\"noopener nofollow\">deep-configuration stuff<\/a>. Overall, such tools are considered dangerous because of their questionable functionality. And the chance to get your logical disks ruined complements this danger.<\/p>\n<h3>Worst computer virus ever. Ransomware<\/h3>\n<p style=\"text-align: justify\">What is more painful than to get your disk partitions destroyed? Yes, to get your files ciphered. While partitions can be recovered &#8211; thanks to the special tools available for LiveCD launch &#8211; files attacked by ransomware <a href=\"https:\/\/gridinsoft.com\/blogs\/clop-ransomware-exploits-vulnerability-in-solarwinds-serv-u\/\">are impossible to fix<\/a>. Exactly, there are decryption tools for several ransomware families, but none of them give you a guarantee that you will get your files back. The guaranteed way to decrypt your data is to pay the ransom &#8211; $1000 and more.<\/p>\n<figure id=\"attachment_5865\" aria-describedby=\"caption-attachment-5865\" style=\"width: 1489px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/08\/LockFileRansomNote.png\" alt=\"Worst computer virus: Ransomware LockFile ProxyShell and PetitPotam\" width=\"1489\" height=\"972\" class=\"size-full wp-image-5865\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/08\/LockFileRansomNote.png 1489w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/08\/LockFileRansomNote-300x196.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/08\/LockFileRansomNote-1024x668.png 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/08\/LockFileRansomNote-768x501.png 768w\" sizes=\"auto, (max-width: 1489px) 100vw, 1489px\" \/><figcaption id=\"caption-attachment-5865\" class=\"wp-caption-text\">Ransomware note<\/figcaption><\/figure>\n<p style=\"text-align: justify\">Ransomware uses military-grade encryption &#8211; AES-256, RHA-1024, RHA-2048, or even ECC. Decrypting it with brute force can take more time than our universe exists. The only lucky chance of getting your files back without paying the ransom is to get encrypted with the flaw-by-design ransomware. The only well-known ransomware family that has flaws in its encryption key is <a href=\"https:\/\/gridinsoft.com\/ransomware\/hiddentear\">HiddenTear<\/a> &#8211; but its most modern variants have these breaches fixed. Another way to get the decryption key is to wait for the <a href=\"https:\/\/gridinsoft.com\/blogs\/revil-stopped-working-again\/\">ransomware group to shut down<\/a>. But even this does not give you any guarantees.<\/p>\n<p style=\"text-align: justify\">Ransomware also deals heavy damage to your system configurations. To prevent the usage of anti-malware software, it blocks access to the websites of the vendors that are listed on the VirusTotal site. Moreover, it also blocks the launching of antivirus software installation files. It means that your HOSTS files, along with Group Policies, suffered significant changes. If you just manage to remove ransomware, ignoring the system recovery, you will probably see your system malfunctioning.<\/p>\n<h5>Share this article and don\u2019t forget to say your opinion on the worst computer virus in the comments. We will add the most interesting variants to the text &#8211; so describe them well. Good luck!<\/h5>\n","protected":false},"excerpt":{"rendered":"<p>Worst computer virus &#8211; what is it? Seems that anyone who has ever been infected asks this question. And each user will think that his case was more severe than someone\u2019s else. Is that true? And which virus is really the worst? It is important to mention that computer viruses are not only \u201cviruses\u201d. Nowadays, [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":7032,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[17],"tags":[476,23,21,28,55,48,474,475],"class_list":{"0":"post-6711","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-labs","8":"tag-banking-trojan","9":"tag-coin-miner","10":"tag-virus","11":"tag-malware","12":"tag-ransomware","13":"tag-spyware","14":"tag-unwanted-programs","15":"tag-wiper-malware"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/01\/worst-computer-virus.jpg","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/6711","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=6711"}],"version-history":[{"count":11,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/6711\/revisions"}],"predecessor-version":[{"id":8481,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/6711\/revisions\/8481"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/7032"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=6711"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=6711"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=6711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}