Early versions of Jerusalem — one instance of which was found in a military office in Israel — repeatedly infected files until the computer became overwhelmed by their size. It remained active throughout the 1990s, infecting many computers in enterprises and government offices and becoming a popular template for future viruses due to its simple code.
Stoned (1987) ... old viruses never die — that was the warning from anti-virus experts after the Stoned virus resurfaced in 2007, a full 13 years after it was written. The Stoned — or Marijuana — virus became widespread in the early 1990s. It was the most successful virus in terms of number of infections, infiltrating hard drives and the boot sector of floppy disks.
The most common effect of Stoned was to display a message on the screen when the computer started up that read: "Your PC is now stoned. Legalise marijuana." There are more than 90 variants of the virus — and last year it resurfaced to infect a number of laptops running Microsoft Windows after anti-virus programs detected the virus but failed to remove it.
Tequila (1991) ... one of the first widespread viruses to use stealth techniques in order to avoid detection, Tequila was particularly dangerous as it couldn't be removed from the infected computer's memory.
Tequila infected computers by writing an unencrypted copy of itself to sectors of the system hard disk and modifying the master boot record. It used a scrambling method to avoid disassembly, changing itself from one infection to the next.
Michelangelo (1991) ... the Michelangelo virus sparked a media frenzy in 1992, one year after its discovery. After spreading quietly for months, the virus activated on March 6, 1991 — the birth date of its namesake — destroying data on tens of thousands of computers by overwriting parts of the hard disk with random data.
In the weeks before March 6, 1992, the Michelangelo virus became a major news event with constant warnings about its destructive potential. The media coverage descended into hysteria with predictions Michelangelo would wipe out millions of computers. However when March 6 finally arrived only around 10,000 computers were infected, and anti-virus companies were accused of creating hype about the virus to increase sales.
ILOVEYOU (2000) ... as the internet became more popular virus creators turned to programs such as worms — pieces of malicious code that, unlike viruses, are not attached to a "host" file and can reproduce themselves.
The most destructive worm of all time was ILOVEYOU, also known as LoveLetter, which spread by email and disguised itself as a romantic message to the recipient. If opened, it would send itself to everyone in the user's address book, clogging email systems around the world.
ILOVEYOU reached up to 45 million people in one day, causing more than $5 billion of damage with large corporations including the Pentagon and British Parliament forced to shut down their email systems.
Monopoly (2000) ... working in a similar way to ILOVEYOU, the Monopoly worm sent itself by email boasting "proof" that Microsoft boss Bill Gates was guilty of monopoly. At the time, Microsoft was immersed in a legal battle over its attempts to bundle Internet Explorer with its Windows operating system which led to accusations of abusing monopoly power.
The worm was delivered through an attachment called "Monopoly.vbs" that, when opened, displayed an humorous image of Bill Gates on a Monopoly game board. It then attempted to mass-mail itself to all of the user's Outlook contacts.
AnnaKournikova (2001) ... more a nuisance than a threat, this worm masqueraded as a picture of tennis star Anna Kournikova and relied on the public's fondness for the blonde pin-up in order to spread itself.
AnnaKournikova was short-lived and spread via Outlook email with the subject line "Here you have, ;o)", with an attachment called AnnaKournikova.jpg.vbs. Once opened, the worm copied itself to the Windows directory and sent the file to all contacts in the user's Outlook address book.
AnnaKournikova scourged numerous Australian Federal Government Departments and large companies, with some receiving thousands of emails per hour. The worm's creator said he wanted to pay homage to Anna Kournikova as she "deserves some attention". He succeeded spectacularly.
Nimda (2001) ... before Nimda, worms were spread simply by copying or emailing themselves. Nimda used this method but also moved via server-to-server web traffic, infecting shared network hard drives and downloading itself to users who were browsing websites hosted on infected servers.
The result was hundreds of thousands of infections on servers and home computers and a slowdown in internet traffic as Nimda searched for vulnerable servers to attack. Some media reports suggested there may be a link between the virus and Al-Qaeda, as the worm was released in September 2001 — though this was proven to be false .
Sasser (2004) ... a German teenager boasted about becoming the hero of his class after writing the potent Sasser worm that could spread without user intervention. Sasser exploited a operating system flaw, prompting some computers using Windows XP and Windows 2000 systems to continually crash and reboot. However it was easily stopped by a well-configured firewall or by Windows Update downloads.
Sasser caused disruption worldwide, halting Australia's Railcorp trains as operators couldn't communicate with signalmen and forcing the cancellation of 40 Delta Air Lines trans-Atlantic flights. Over 400 post office branches in Taiwan had to revert to using pen and paper after more than a thousand of its machines were hit by the virus.
Storm (2007) ... the worst virus to hit computers in recent times, Storm is classed as a "superworm". It has become well-known for the way it constantly morphs into new forms and finds ways to exploit people's weaknesses. In 2007 it infected thousands of computers by masquerading as an email about a weather disaster, and then mutated and spread with another fake attachment infecting 10 million computers.
Storm continues to infect unsuspecting users today, with subject lines focusing on a range of topics from Facebook to love interests. Recent versions can disguise themselves from virus scans and even shut down security programs. A warning has been issued about emails claiming the Beijing Olympics will be delayed or cancelled due to earthquake damage, which appear to contain a link to a video but in fact are the Storm worm in disguise.
Visit 13above For More Fun
I loved the article, I'll be back often to read what else you have. Graham thebanditblog.com
Its something really interesting, I have lots of interest in mechanism of virus infection. Though, I am from Biology, I feel computer virus are very very interesting. I am also planing to write something on virus and you have provided something I was looking for, though the list is small, but its helpful. I am at www.drsanjiv.blogspot.com
Post a Comment