Every Type of Computer Virus Explained in 8 Minutes
ฝัง
- เผยแพร่เมื่อ 17 พ.ค. 2024
- Every famous type of PC virus gets explained in 8 minutes!
Join my Discord to discuss this video:
/ discord
Subscribe and activate the bell!
💼 Business Mail: operamp4@gmail.com
- TIMESTAMPS -
0:00 Malware
0:17 Virus
0:51 Worm
1:28 Trojan
1:59 Malvertising
2:27 RAT
2:44 Backdoor
3:00 Rootkit
3:36 Spyware
3:53 Keylogger
4:07 Ransomware
4:28 Fileless Malware
4:49 Adware
5:09 RAM Scraper
5:19 DDoS Attack
5:44 Browser Hijacking
6:11 Cryptojacking
6:29 Rogue Security Software
6:42 Phishing
7:09 Hybrid Malware
7:22 Brute Force Attack
7:47 Wiper
7:57 Social Engineering
- SOURCES -
en.wikipedia.org/wiki/Malware
en.wikipedia.org/wiki/Compute...
en.wikipedia.org/wiki/Compute...
en.wikipedia.org/wiki/Trojan_...)
www.techtarget.com/searchsecu...
en.wikipedia.org/wiki/Rootkit
www.malwarebytes.com/backdoor
en.wikipedia.org/wiki/Keystro...
www.malwarebytes.com/keylogger
en.wikipedia.org/wiki/Spyware
www.malwarebytes.com/spyware
en.wikipedia.org/wiki/Ransomware
en.wikipedia.org/wiki/Fileles...
en.wikipedia.org/wiki/Adware
en.wikipedia.org/wiki/Memory-...
www.checkpoint.com/cyber-hub/...
en.wikipedia.org/wiki/Malvert...
en.wikipedia.org/wiki/Denial-...
en.wikipedia.org/wiki/Browser...
en.wikipedia.org/wiki/Cryptoj...
en.wikipedia.org/wiki/Rogue_s...
en.wikipedia.org/wiki/Phishing
en.wikipedia.org/wiki/Brute-f....
en.wikipedia.org/wiki/Wiper_(....
en.wikipedia.org/wiki/Social_...)
- DISCLAIMER -
Do not use this video as your only source of information. This video is for entertainment/edutainment purposes, and some information could be too oversimplified or incorrect. This channel's goal is to spark your curiosity and let you do your own research on these topics. I'm not a cybersecurity expert.
Sending this to my grandmother
Haha good one 😂
She will get another virus opening this video
Lol
She will get another one trying to open a laptop
So she could more efficiently get viruses? Genius
When you open a pirated game and the cmd window appers for a split second: 🤨
😂😂😂😂😂
Heart skips a beat when that happens.
What site u use
@@JohnathanJohaisen TotallyNotaVirus.Dox
@@JohnathanJohaisenobviously shitty one
Have you heard of the hacker that escaped the cops, they say he ransomware far away
The 36 winged roach will find you
lol you got me
lol
😂
Cybersec comedy gold 🥇
how to give 400k internet users anxiety in 8 minutes
You'll be fine
Hello your computer has virus
If youre not stupid or 70+ years old youre not gonna get a virus
I find computer viruses so intriguing. I’ve been testing malware in controlled environments since my late teens!
Same! I find malware interesting. My dad owns a small computer repair business and he sees all sorts of malware
Omg it’s you! I love watching your videos! Viruses are very intriguing and I hope to never accidently get one
IM A FAN PLEASE REPLY
OMG CRYPTO NWO!!!
Hi @CryptoNWO , I really love ya videos where you absolutely torture your laptop/computer
The worst thing is when you delete a computer virus but then your pants start slipping
huh🤨
@@liam_si iykyk
Lmao elite reference
i was searching around the internet
Damn didn’t think anyone remembered that meme lmao
I'd like to add 'spearphishing' to the list, where phishing attacks are generally sent to a demographic or pool of targets, spearphising is tailored to an individual, and typically magnitudes harder to catch than a typical phishing attack.
Love the video :)
And whale phishing, which is spear phishing but specifically targeting high ranking members of an organization
It goes into the group of phishing attacks so its not really needed to be put in
@creammando I mean, a good portion of the stuff in the video falls under malware
@@Kitty-xi1sb yea but malware is too general and have many different types but different types of phishing are very similar so spearphishing doesnt need to be put on the list because its just phishing for a specific person
They are a few malware terms here that are not pursuant to the Comptia rules.
Video idea: Every Martial arts styles explained.
Love all of your videos!
Great idea!
Cool idea! I did Taekwondo at one point!
@@Pupper626same here with Karate
@@Agriz1210 But there are lots of karate styles, so many you could make an entire video about them.
@@directorofnolearning I now have the sudden urge to learn all of the styles of karate in order to get the platinum trophy for karate
Love how diverse these topics are
Is zip bomb a trojan?
@@kormannn1hmmm
@@kormannn1....
@@kormannn1....
148.2.12h7h
For some reason I expected there would be a sponsored segment promoting some antivirus software or a VPN.
me too kkkkk
@@user-kt8fk2li7j ⚠🚨 BRASILEIRO DETECTADO
Same
@@user-kt8fk2li7j 🚨 BRASILEIRO DETECTADO 🚨
@@user-kt8fk2li7j ⚠️ BRASILEIRO DETECTADO ⚠️
4:42 i really like how the hacker has a horrendous posture
Bro fr said "Ima be a camel"
Well since the hacker is an actually HACKER he probably spend years on their computer like discord Mods..... except he showers and eats less.
His monitor and keyboard are floating
just like in real life, its accurate
I'll collect them all like thanos
Video idea: every military rank (general, lieutenant) explained in 8 minutes
Edit: sorry I know basically nothing about military
Why 8 minutes
Boring
Wouldn't work as even within NATO the ranks and associated responsibility can vary wildly.
this is a cool idea
seniority can vary a lot between countries, and even between branches. For example, a lieutenant in the navy ranks higher than one in the army.
Ain't no way the hacker using a keylogger on a gamer, the gamer will crash the hacker's computer faster than he can react 💀
Keylogger vs average DMC player
Keylogger vs average fnf player
This is actually pretty scary. I didn't know there were so many
There is way more sub-terms and more specialized attacks both hardware and software
The last one is the one that sounds the mildest but it's quite the opposite. Quoting another guy, imagine you work at a high end software developing agency. At lunch, someone casually approaches you and says "hey I'm hungry but I don't know the place yet, can you recommend me some good place to eat?" While it sounds like an innocent question, you're pretty much telling him what places you and your colleagues go for lunch, and where he can find potential targets for whatever devious things he wants to do.
@@OlympusGames-zv2rs Or imagine that the guy just leaves a USB key on a table. Someone will be like "what is this USB", they put it in a computer but there's malware on the USB.
@@gabor6259 thats actually a real attack which is concerning
There's many more sub types and more are likely being created as we speak. Technology advances at a rapid pace so there's likely new ones being developed. Cyber security is a constant cat and mouse game.
This is honestly more useful than the "hacking" software you see in most Cyberpunk games.
Sure
Ew woke cyberpunk game
@@TheRealName7I mean it’s set in the future
6:34 POV mcaffee
Omg this is so true, it actually happened to me once
No, McAfee is Not that bad
It is installed it my security by default in my phone
fr
Test: starts in 30 minutes and i haven’t studied.
Me asf: all computer viruses explained
Bruh moment
Same wtf
I dont know why but hearing about computer viruses gives me some fear
Correction on rootkit: Rootkits themselves are not inherently designed to give a malicious actor remote access to a computer, but can do so. Rootkits are designed to be stealthy and concealed, and usually are used to protect other pieces of more specialized malware (like keyloggers) from traditional security measures. The term "root" in rootkit is named after the "root" permission level of unix-based operating systems (administrator/system on windows). Rootkits usually operate at ring 0 (kernel) and can be very difficult to detect, but some are only run in the userspace. Some special types of rootkits can overwrite the master boot record (mbr) or hijack other parts of the boot process. This type of rootkit is called a "bootkit" and be very difficult to detect and remove, even surviving drive wipes. While technically a rootkit can be bundled with a RAT or have RAT functionality, rootkits are often designed to maintain high permission levels on a computer, as well interfere with standard security measures. As such, rootkits are nasty pieces of malware which can bring great harm to a system or network if designed correctly.
No hate! Just wanted to clear this up! :)
he said that in the video
@@sandwan4845 no, he said rootkits provide remote access, not all rootkits do. They gain full control over a computer.
I'm legitimately concerned about my internet searches now...
god me too 💀
Dont worry at the end of the day we live on a floating rock
Amazing video! I think its worth mentioning that rootkits often wont target antiviruses at all, as many modern day antiviruses have anti hijacking detection built in. More often than not rootkits disguise themselves as other regularly installed programs or modifying the task manager / process viewer to skip the memory space where the rootkit resides, hiding it from both user and antiviruses.
10/10 video tho
some antivirus has a different view of the processes than windows will show like they have their own special viewer that can't be modified!!
@@justsomeone282The only unmodifiable view is one done via a kernel module looking at the data structures directly. Sysinternals RootkitRevealer demonstrates the technique.
Imagine if this video had a computer virus
The tidbit that ads themselves are an inherent security vulnerability is kinda funny
5:43
These softwares are horrifying. One time I tried to get an autoclicker but clicked the fake download link(I didn’t have an adblocker at the time) and this fake software installed an entirely new taskbar, deleting the old one! Huge search engine bar, with ads popping up ON THE AREA WHERE THE TASKBAR WAS!!! This incident will never not scare me.
had the same shit, easiest virus to deinstall, suddenly yahoo popped up and yeah thats the moment the virus got backshots from anti malware
@@souyakawata9449you got that yahoo browser hijack as well? I had some fun trying to figure that out but luckily I was able to find a anti malware software to scan my computer and it went away after. Not that many problems since
Ohh so that's why my old PC's cursor was moving on its own
Im getting increasingly paranoid of getting hacked
dont worry just dont do stupid things and you'll be fine
I feel like keylogging could be stopped by typing into multiple fields at once, one part at a time, randomizing how many characters in each part, and adding other irrelevant data that you delete anyways.
This is actually a nice run through of everything. Well done mate!
I like how well you interact with your community ❤ and make their ideas come true
Sadly, I was a victim of the web browser virus. I started to use another web browser, and like a few months later, my computer got physical damage, and I erased it, and by the time I repaired it, the virus was gone.
ive been watching your videos since the beginning, and your artstyle has gotten very good! great video!
You might also wanna know that DDoS stands for Distributed Denial of Service.
In this example, it show rather a DoS, since the Distributed warrant flooding from lots of other devices (in particular to make tracing harder)
DoS is a single server flooding requests to a target and DDoS is multiple servers flooding requests to a target (most of the time being part of a botnet) and no its not to make tracing harder its to make the denial of service more effective especially against strong servers.
I need this stuff to make a cybersecurity ontology for a lvl 7 postgrad module (Ontologies and knowledge bases). what a win.
i literally just got down with a playthrough of a game ABOUT viruses. what a coincidence!
edit: the game was plague inc.
edit 2: so i found a game on steam called "Entodrive". it's about computer viruses. gonna play that soon.
what was the game?
@@glomerofthe7rings289plague inc.
@@glomerofthe7rings289 Kinitopet?
I want to know the game too
Whats the game's name?
3:29 One observation though, the Kernel is not in the OS, the OS is in the kernel
No, the Kernel is IN the Operating System
No, the kernel is is the BIOS (motherboard)
@@logiebogieboo_currI understand you got confused with the bios and the kernel but they aren’t the same thing the kernel is located in the OS meaning that it’s stored in the storage drive not the motherboard
@@creammando It is not. You can try it yourself honestly. Make a dual boot system, install a rootkit and you will notice that the rootkit has access to both operating systems.
@@user-jk5bg6mh5q dual booting is a different story, i dont know much about how it works but im assuming both oses are connected in some way but thats not a good example, you can search it up, and at least do research like i did to verify your claims because im 100% sure the kernel is in the OS just like how kernel drivers are in the OS so if you wipe out the os and install a new one the kernel drivers go with it since its inside of the OS
My heart stop beating when my computer (almost) got diagnosed with 5 entire freaking viruses just because I wanted to get an extension to hide my mouse pointer for my game and I knew dang well I had to renew the McAfee crap but I guess I didn't need to (So I didn't)
Cant wait for ramsonware people to hack my pc like "heh heh time to earn bank" then realize all I have is useless images of memes that i wont miss being encrypted
Thanks for getting right to the point I was expecting a 2 minute intro or something like that but it just started on the point of the video, thanks
New fear unlocked
Great channel.. gets to the point immediately..subscribed :)
you should do types of music next
As a younger kid i thought it was just RAT and wiper
This explains it soo good & has a nice length of time :) Love it!
the fact that the app zoom has a rat in it, literally with the user’s permission someone can control your mouse, etc (its a feature idk if its still there or not)
No lol thats not a rat, a RAT (explained in the video btw) is a Remote Access Trojan that gives the attacker access to your computer (shell, screen view or both) and they can do whatever they want your pc as programmed into their RAT, for example some RATs dont have it programmed where they can control your mouse, also zoom cant control your mouse and stuff without your permission, that would be illegal and would be detected by antiviruses
Wouldn't it make sense to call this "Every Type of Computer Malware" instead? Or maybe "Cyber Attack".
I agree with changing it to malware instead of virus but I don’t think there are enough cyber terms to say “cyber attacks” which was also my first thought after hearing DDoS
Virus is just a blanket term
Cyberattacks is about right here, 'malware' applies where the attack is some form of software e.g. worm/virus/trojan, pretty much everything before RAM scraping. Most of the things afterwards are either network-based or just methods to describe an attack but not really an attack itself. Social engineering is sort of an umbrella term for other things mentioned in the video that play on the human and may/may not lead to malware infection i.e. phishing, adware, malvertising. Regardless of any pedantic wording necessities, vid's accurate :)
I think "computer virus" is a more understandable term for the average user
I love your videos. I'm actually learning stuff from you, thanks. You should do a video based off of diseases and how they harm/kill
Maybe 5 of these aren’t technically viruses, but I’m happy you added these tools and processes to inform the general public. You explained them all pretty well and precise, too!
well explained like always.
Me: why my neck hurts?
Also me: 4:48
interesting video! I like how you use paint to explain things
According to the way you described spyware, google is spyware because all the things you described fits google perfectly
1:44 bro was personal with that one 💀💀
Looks like a girl that uses Instagram 24/7
nah- ima make a pop-up ad out of this-
@@ComputerBoyTheEntertainer why
@@weidie2moro just for my upcoming pop-up generator >:)
as a cybersecurity major i loved this!!!
subscribing for more videos, (hopefully more security related videos)
i believe i had an adware on my pc at one point. randomly, and without my permission, it would open a thing for McAfee or whatever, with the worlds smallest close button, only able to be clicked on a certain page. my cousin also had this at one point, and i dont know if my pc is further compromised. thank you a ton for the video, to keep us all safe.
i knew ads were anoying but... this is nr 1 reason to get rid of ads
not all ADs are malicious lmao
@@creammando ok
SQL injection: One of the most common ways to get hacked. By not properly sanitizing data sent by a user (such as a search form), an attacker can run arbitrary code on your database.
Not that common anymore tbh. Most user inputs are sanitized these days. Still possible though, but past its prime imo
This video is giving my computer a virus, 💀
the amount of anxiety this gives me is uncomfortable
Really big thanks for making this video, now I learned more about how to be aware of the internet.
Video idea: every type of scam
Edit: lollll the evaluator made this video some minutes ago
what if your a hacker and that’s why you know all this?
Word of advice about rat viruses (from experience)
If it's the direct kind and not the stealthy type, and you catch the hacker in the act, disable your network and boot the computer in safe mode until you find where the virus is. Some systems will show recently downloaded and modified files so it should be rather easy to locate the rat as I had to do that
What about GOAT files?
i once had a virus that deleted every direct access on my computer and didn't let me use the search feature for searching programs, it happened everytime my computer was turned off, so i did a factory reset (i think they're called that) on my computer and it was gone, but now after like 1-2 years after the incident now my command thing randomly opens up for a split second and then closes
Love your video bro ♥️
I have a video idea where you explain all leaked or pirated movies quality and their comparison 🔥
Plz ✨
6:29 Literally tech support scammers in a nutshell
you forgot to include one
windows
Just learned about the Linux xz backdoor, and this appears in my subscription feed.
I heard a girl on a TH-cam video talk about how she got malware on her computer and contacted the person who "made" it I suppose. And he asked for a bunch of money so she could fix it, like how can you destroy someones computer then ask for money? 😔
more scamming
sadly thats how ransomware gangs work
Definition of ransomware.
I might have a browser hijacker and possibly adware
Thanks for the information, I’ll use this later.
glad to be on this list
Video Idea: Every physician specialization of medicine explained
An April Fools Day video that is not an April Fools joke?
Great video. It would be cool to have the concepts orginized in tree/graph form showing the relations between them like having malware being the root and spyware being one of its children and the keylogger being a child of spyware. It might end up looking weird but idk sounds cool to me.
An extra i gathered up: "memeware" malweares that are explicetly malweares and are made for fun and destroy the pc, normaly they destroy the pc when run and give some kind-of warning (an example is memz)
So.. *if* i am undersyanding correctly :
you are an idiot would count as one?
but hes trying to explain actual terms
That's not an extra. You said it yourself, it's a malware.
How about every type of microorganism, I am so tired of explaining the difference between viruses, bacteria, amoeba etc. to boomers.
Don't worry, in time somebody a lot younger than yourself will be explaining things to you as you dribble onto your bib throughout the day.
@@YouChwb boomer detected cry more
Not funny
Why waste your time on something that nobody gives a flying fook about?
As someone studying cyber security, this really helps. Thanks!
Back in the day we doesn't have wifi, and Rouge Security System happened on my dad's phone, so they forced me to go to the laundry to install the specific app lol, instead I played games and told them I removed the virus.
video idea: type of oiled up men pls
Some missing subcategories I noticed:
Dos attacks are a more primitive DDos attack that has requests sent by only one client
Dictionary attacks are similar to Brute Force Attacks but instead use a list of common codes and pass phrases to guess a password (for example using variants of the word password as it is common to make your password password)
DoS attacks are not primitive versions of DDoS attacks. DDoS attacks are a subcategory Denial of Service attacks. DDoS just refers to the attack being distributed among infected/zombie devices. DoS attacks can be sophisticated and exploit vulnerabilities such as improper validation in regular expressions. For instance, if an attacker sends a request that causes a server to process it exponentially, this can cause the service to crash or stop. Hence, it denies service. I'm also not sure why they felt the need to include bruteforce attacks as it is an attack method and not a form of malware.
@@timah9420 I am aware, I said primitive to simplify the concept. I am still at GCSE level computer science and thus don't feel qualified to truly explain all the specifics of everything, only general concepts.
Some of them I didn’t know existed. NOW I KNOW THAT ONE TIME A MARIO MULTIVERSE THING ONCE WIPED AN OLD OCMPUTER THAT I NOW USE FOR SCHOOL
1:09 THERE WAS VERY SCARY WORM THAT JUST:
-FOUND A COMPUTER
-GETS INSIDE
-BREAKS IT WITHOUT BEING AS A LIST AND WITHOUT OPENING IT
-REPLICATES ITSELF
-SENDS TO OTHERS
-REPEATS
Windows itself is a spyware lol
3:43 How did you know I was watching TH-cam?? You must be running spyware on my computer!!!1!!1!11!!1!!!!
this is the most chill pc virus bonzi buddy
Im now scared to touch anything on the device.
7:45 uh? Is he AI?
Okay now that I'm focusing on it he 100% doesn't sound real
What? What part are you talking about? I clicked the timestamp and I don't hear anything "fake"
@PhantomChaos76 on my phone I couldn't hear it, I guess it depends on speaker quality, but there def was a blip. And now that I noticed it it's hard to not notice the fact that he speaks in the most robotic cadence
Thanks for the information now I know what to do to make that bank
Efficient, I like it. Straight to the point
this was quite interesting coming from a compsci major who just learned systems programming
Example of Spyware: TikTok
And Instagram
basically any app can be called spyware because usually they will sell your information to advertisers or governments like tiktok does
nuh uh
So close yet you are not smart
I know full well TikTok is spyware.
TikTok does not include spyware.
TikTok IS the spyware.
I love how many of these apply to McAfee
It's really interesting how connected these things are.
Very high quality video!
Thanks for the windows guide! Now I know all the ins and outs of my system!
I like this channel very informative 👍
RAT is like a mind controlling parasite that makes ur computer do unwanted things and things against you to help the hacker but secretly
I love how simple to understand. These are just by watching this video.
Very cool now I know every computer virus and others!