One of the primary goals of Bleeping Computer is to assist victims of infection with removal and to prevent the spread of malicious programs
, not encourage them. Therefore, we will not provide links to malware or malicious sites where infections have been contracted and spread. Others reading this topic may use the information for nefarious purposes
or an unwitting novice user may accidentally click a link and end up infecting their computer.
For those and other obvious reasons, we are not going to provide specific information in a public forum and by policy, we don't provide assistance via PM. However, you can perform a Google search on "how to infect your computer on purpose
" which will provide information such as this article
You can also read this topic
which explains the most common ways malware is contracted and identifies the types of sites where you can easily get infected by not following the advice
provided to protect yourself.
If your intention is to infect a VM
for the purposes of testing, be aware that not all malware will work in that environment. Malware writers have been able to create malicious files which can detect if it is running in a VM. When that detection is made, the malware is able to change its behavior by not running any malicious code which can infect the operating system. This is a deliberate technique to make analysis/detection more difficult for security researchers who use VMs to study infections in order to understand the methodology used and find disinfection solutions.
The Internet is so big, so powerful and pointless that for some people it is a complete substitute for life.
Andrew Brown (1938-1994)
A learning experience is one of those things that say, "You know that thing you just did? Don't do that." Douglas Adams (1952-2001)
"Imagination is more important than knowledge. Knowledge is limited. Imagination circles the world." Albert Einstein (1879-1955) Follow BleepingComputer on: Facebook | Twitter | Google+