Cyber Threat: Latest Computer Virus In 2020

famous computer viruses

There have been many cyber-attacks in the past decade. With the use of the latest techniques, coding, hacking, malicious computer viruses have become common.

The only thing with the evolution of cyber-attacks is that they have become more dangerous and threatening like never. They can take out any bit of information from the system without the user’s knowledge.

And, all we can do is sit and wait for it to happen. This is because we aren’t aware of the current computer viruses surfacing online in the market. And we aren’t even aware of the practices that we should follow to stay safe and secure.

So, today, in this article, we will be talking about the deadliest computer viruses, practices followed and ways to stay safe from the recent computer viruses.

Preventive Measures to Stay Secure From A Computer Virus Attack

The obvious answer to this is we should use an updated and best anti-virus capable of detecting the latest computer virus. In addition to this, using a data recovery wizard tool like EaseUS is also recommended. This tool helps recover files deleted by the computer virus, an example of which was seen during the WannaCary attack. People who were using EaseUS were able to recover files even when their system was attacked. Hence we recommend using it along with using the best anti-malware software.

Download EaseUS Data Recovery Wizard Here

Top Computer Virus Names in 2020

  1. Ryuk Ransomware
  2. Cyborg Ransomware
  3. CryptoMix Clop Ransomware
  4. B0r0nt0k Ransomware
  5. Yatron Ransomware
  6. Astaroth
  7. GoBrut
  8. Jokeroo
  9. Gandcrab Ransomware
  10. Trojan Glupteba
  11. Kuik Adware
  12. Magniber Ransomware
  13. Thanatos Ransomware
  14. Trojan Panda Banker / Zeus Panda

Starting Now!

1. Ryuk Ransomware

Since August 2018 this nastiest ransomware has been targeting large organizations to get high ransom in return of data. This latest malicious computer virus is used to target enterprise environments and is derived from the source code of Hermes. 

It is distributed via either spam mail or through the use of Emotet. Ransom note of Ryuk new computer virus is written to a file name RyukReadMe.txt. and it is unique for each compiled executable. 

This latest computer virus Ryuk ransomware encrypts files using RA-248 and AES-256. Stores keys in the executable using the proprietary Microsoft format and uses a file maker of HERMES to check if a file is encrypted.

2. Cyborg Ransomware

PC Cyborg also known as (AIDS) Aids Info Disk Trojan, is the first-ever ransomware introduced through a floppy disk. This is why it is called  AIDS. This trojan horse virus replaces AUTOEXEC.BAT used to count the number of times a computer is booted. documented.  

Recently a variant of this ransowmare known as Cyborg is found in fake Windows 10 November update. Hackers are using Cyborg ransomware to encrypt victim’s files and ask them to pay the ransom.

It is distributed as an attachment with .jpg extension which is an executable file. Once the victim clicks on it bitcoingenerator.exe file is downloaded from misterbtc2020, a Github account that is not deactivated. This ransomware then encrypts files and shows a ransom note “Cyborg_DECRYPT.txt” informing them about the act and asking for ransom. 

Cyborg ransowmare, malicious computer virus can be created and spread by anyone who gets the builder. Not only this, attackers can craft this ransomware to use with known ransomware extension. 

Currently, there’s no way to deal with Cyborg ransomware.

3. CryptoMix Clop Ransomware

This recent computer virus of CryptoMix Clop ransowmare targets a complete network instead of individual machines. The new variant was discovered around the end of Feb 2019 and was found equipped with more email addresses as compared to the older CryptoMix Clop variant. 

CryptoMix Clop once executed starts terminating different Windows services and processes resulting in disabling anti-virus running on the Windows machine. In addition to this, this ransowmare encrypts the victim’s files and changes the extension to .Clop or .Clop extension. Once all this is done a ransomware note informing the victim about the attack is displayed. 

Currently, there is no means to decrypt the files encrypted by CryptoMix Clop for free.  

4. B0r0nt0k Ransomware

A ransomware computer virus is of different types but as we know all, they are designed for monetary purposes. Ransomware can spread via various methods as malicious software, email attachments, external storage devices, and others.

The latest strain of computer virus known as B0r0nt0k ransomware emerged on February 25th, 2019 encrypts a file on the Linux server and adds an extension. rontok to the encrypted files. Although B0r0nt0k crypto-ransomware is designed for Linux systems and websites it works like the computer viruses designed for Windows. This computer virus apart from affecting data goes one step ahead as it makes changes to

  • Startup settings
  • Registry entries
  • File or programs

To decrypt files attacker demands 20 Bitcoin that are to be paid within three days from the day of the attack. Failing to do so the attacker deletes data permanently. Moreover, this cryptovirus is considered dangerous as it can disable security tools.

  • Take regular data backup
  • Apply latest security patch
  • Use intrusion prevention services to block application exploits

5. Yatron Ransomware

Latest Ransomware-as-a-Service called Yatron is being promoted on Twitter these data. This computer virus works like other ransomware and encrypts targeted files. IT spreads to another computer via EternalBlue and DoublePulsar exploits. Not only this Yatron Ransomware tries to delete encrypted files if the victim fails to make payment within 72 hours.

Apart from exploiting the weaknesses, Yatron computer ransomware will try to spread through P2P programs by copying ransomware executable to default folders.


  • Always keep a backup of important files
  • Avoid enabling macros in attachments received
  • Do not download unsolicited attachments
  • Use admin account only when necessary

6. Astaroth Trojan:

First emerged in 2017 this latest computer virus has already targeted over 8000 systems. It is being used in spam campaigns across Europe and Brazil. This computer trojan spreads through .7zip file attachments and malicious links. Astaroth Trojan targets antivirus tools to steal usernames and passwords.


  • Use 2-FA to add an extra layer of security to your machine
  • Keep your machine and security tools updated
  • Run the latest firewall and dedicated Internet security tool

7. GoBrut:

GoBrut the latest computer virus is not technically sophisticated but can slow down the Internet and cause damage to thousands of computers. This malicious computer virus is Golang based and uses brute force to spread itself on Windows and Linux machines.

This malware can exploit a number of vulnerabilities especially the websites that still use weak passwords are on target. Not only this StealthWorker malware is also capable of updating itself.


  • Use strong and complicated passwords
  • Use progressive delays

Use change response test to prevent automated submissions

Also, Know –10 Best CCleaner Alternatives 

8. Jokeroo:

This recent computer virus also works as Ransomware-as-a-Service and it is being promoted on Twitter via underground hacking sites. This computer virus threat allows affiliates to gain access to a functional ransomware and payment server. Jokeroo started promoting itself as a GrandCrab Ransomware on


  • Practice safe browsing
  • Update operating system and security applications
  • Regular backup of files and other important data

9. Gandcrab Ransomware

It is one of the most current computer viruses. Gandcrab ransomware spread through malvertisements, explicit websites, or spam emails, which leads the user to Rig Exploit Kit Page or GrandSoft EK page. Through these pages, Gandcrab makes an entry into users’ systems and devices.

Once this malicious ransomware is active on the system, it starts to gather user’s personal information such as username, keyboard type, presence of antivirus, IP, OS version, current Windows version, etc. Soon after this, Gandcrab malicious computer virus makes its next move on the basis of information collected. After which it kills all tasks & processes running on the system so that it can start encrypting the data and files present in the system.

It then generates public and private keys on the user’s system, which are then forwarded to C2 server hosted on .bit domain.

As soon as the key is delivered it starts its process of encryption by using the public key generated and adds ‘.GDCB’ extension to all encrypted files. After this, it sends a file containing a ransom message on the user’s system in return for the decryption of their data. The name of the file with a ransom message is ‘GDCB-DECRYPT.txt’.


– Regular backup of important data and files.

– Update operating systems and applications.

– In case of attack, try using ransomware decryption tools.

10. Trojan Glupteba

This is one of the deadliest computer viruses that have several variants with different functionalities.

This trojan reaches the system through a file dropped by other malware or by exploit kits. It activates as a service and enables processes on the system pretending to be a legit or authentic software. Glupteba directly communicates to IP addresses and ports to collect user’s information. It diverts the traffic and users towards various unknown domains such as, travelsreview.wo,,

top computer virus


Enable web and email filters.

– Restrict macros in Microsoft Office products.

– Practice safe browsing.

Must Read : Top 10 Antivirus For Windows

11. Kuik Adware

This is one of the malicious computer viruses in the form of malware & adware dubbed as ‘Kuik’. It acts as a legitimate Adobe Flash Player update by masking itself.

This deadliest computer virus comes with three modules that are legitimate flash player, certificate and .exe file named ‘upp.exe’.

Once the virus enters the system, it communicates with all established network interfaces and adds the DNS

After this, it starts collecting personal information and data from the user’s system and forwards it to the hosting domain ‘’. As soon as the information reaches the domain server, it activates various other malicious tasks on a system that also includes chrome extension from unknown sources, coin miners, etc.


– Regular backup of important data and files.

– Enable authentic antivirus and spyware.

– Restrict from spam emails and also from attachments of file types,


12. Magniber Ransomware

This latest computer virus is most active in Asian countries. Magniber is spread through malvertisements, infected websites that redirect the user to the Magnitude exploit kit page. It is the oldest serving malicious browser toolkit that is still in use to distribute the ransomware.

As soon as Magniber enters into the system, it starts encrypting the data and files with the use of a unique key. Once encrypted, it adds the .dyaaghemy extension to all the files encrypted.


– Regular backup of data and files.

– Update operating systems and applications.

– Block the file extensions such as,


13. Thanatos Ransomware

It’s a new computer virus named ‘Thanatos’, which is distributed through malvertisements, spam emails with malicious attachments and file types, etc. This is very similar to the most famous computer virus that is the ILOVEYOU computer virus.

The most complicated part is to decrypt the data been encrypted by this ransomware. This is because it generates different keys every time for encryption and does not save these keys anywhere making it difficult to recover.

top computer virus

After this, it drops payload in the user’s system in the form of .exe file or .txt file, which is set for autorun and opens every time the system is restarted. This payload starts encrypting files and adds ‘.thanatos’ extension to encrypted files. Soon, the user receives a ransom pay message on its system.


– Disable macros and Activex when using MS Office products.

– Keep a regular backup of data and files.

– Update operating systems and applications.

14. Trojan Panda Banker / Zeus Panda

This latest virus is very much identical to top computer virus Zeus banking trojan malware. This malware uses the web to inject malicious code and steal users’ banking information and credentials.

It basically is distributed through exploit kits, such as Ngler exploit kit, Nuclear exploit kit, and Neutrino exploits kit.

Not only from exploit kits, but this new computer virus is also spread through social networking sites, spam emails, and adult sites as well.

After getting installed on the system, this malicious computer virus starts searching for information such as antivirus, spyware, username, password, etc. This information is passed on to C2 server. And, once this is done, it starts to steal banking credentials, transaction information, and other info as well.


– Regular backup of important data and files.

– Update operating system and applications.

– Block attachments of file types,


Read Also : Low Storage on Mac? Here are The 10 Best Mac Cleaners

So, this was all folks! This is the list of some of the most dangerous and latest computer viruses. Follow all the necessary web practices and preventions to stay safe and secure. And in case you find some loophole, make sure you report it to your service provider as soon as possible.

Remove Viruses with Best Antimalware Tools

If you found this helpful, please let us know. You can also drop your feedback in the comment section below.

You may also like...

4 Responses

  1. saakshi says:


  2. mens trousers says:

    Hi there to all, the contents existing at this web page are really amazing for people experience, well,
    keep up the nice work fellows.

    • Preeti Seth says:

      Thank you for you feedback, it really matters to us. Do subscribe to our blog to receive latest updates.

  3. inechain says:

    Thanks! This is really useful info! Glupteba have got new development wave and now scares crypto world!

Leave a Reply

Your email address will not be published. Required fields are marked *