fbpx
Wikipedia

Timeline of computer viruses and worms

This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.

Hex dump of the Blaster worm, showing a message left for Microsoft co-founder Bill Gates by the worm's programmer

1960s edit

  • John von Neumann's article on the "Theory of self-reproducing automata" is published in 1966.[1] The article is based on lectures given by von Neumann at the University of Illinois about the "Theory and Organization of Complicated Automata" in 1949.

1970s edit

1970 edit

1971 edit

  • The Creeper system, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies to test John von Neumann's theory.[3] Creeper infected DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message "I'm the creeper, catch me if you can!" was displayed. The Reaper program was later created to delete Creeper.[4]
  • At the University of Illinois at Urbana-Champaign, a graduate student named Alan Davis (working for Prof. Donald Gillies) created a process on a PDP-11 that (a) checked to see if an identical copy of itself was currently running as an active process, and if not, created a copy of itself and started it running; (b) checked to see if any disk space (which all users shared) was available, and if so, created a file the size of that space; and (c) looped back to step (a). As a result, the process stole all available disk space. When users tried to save files, the operating system advised them that the disk was full and that they needed to delete some existing files. Of course, if they did delete a file, this process would immediately snatch up the available space. When users called in a system administrator (A. Ian Stocks) to fix the problem, he examined the active processes, discovered the offending process, and deleted it. Of course, before he left the room, the still existing process would create another copy of itself, and the problem would not go away. The only way to make the computer work again was to reboot.[citation needed]

1972 edit

  • The science fiction novel, When HARLIE Was One, by David Gerrold, contains one of the first fictional representations of a computer virus, as well as one of the first uses of the word "virus" to denote a program that infects a computer.

1973 edit

  • In fiction, the 1973 Michael Crichton movie Westworld made an early mention of the concept of a computer virus, being a central plot theme that causes androids to run amok.[5] Alan Oppenheimer's character summarizes the problem by stating that "...there's a clear pattern here which suggests an analogy to an infectious disease process, spreading from one...area to the next." To which the replies are stated: "Perhaps there are superficial similarities to disease" and, "I must confess I find it difficult to believe in a disease of machinery."[6] (Crichton's earlier work, the 1969 novel The Andromeda Strain and 1971 film were about an extraterrestrial biological virus-like disease that threatened the human race.)

1974 edit

  • The Rabbit (or Wabbit) virus, more a fork bomb than a virus, is written. The Rabbit virus makes multiple copies of itself on a single computer (and was named "rabbit" for the speed at which it did so) until it clogs the system, reducing system performance, before finally reaching a threshold and crashing the computer.[7]

1975 edit

  • April: ANIMAL is written by John Walker for the UNIVAC 1108.[8] ANIMAL asked several questions of the user in an attempt to guess the type of animal the user was thinking of, while the related program PERVADE would create a copy of itself and ANIMAL in every directory to which the current user had access. It spread across the multi-user UNIVACs when users with overlapping permissions discovered the game, and to other computers when tapes were shared. The program was carefully written to avoid damaging existing file or directory structures, and to avoid copying itself if permissions did not exist or if harm would result. Its spread was halted by an OS upgrade that changed the format of the file status tables PERVADE used. Though non-malicious, "Pervading Animal" represents the first Trojan "in the wild".[9]
  • The novel The Shockwave Rider by John Brunner is published, coining the word "worm" to describe a program that propagates itself through a computer network.[10]

1977 edit

  • The Adolescence of P-1 novel,[11] describes a worm program that propagates through modem-based networks, eventually developing its own strategy-developing AI, which deals with cross-hardware and cross-os issues, eventually infecting hardware manufactures and defense organizations.

1980s edit

1982 edit

1983 edit

  • November: The term "virus" is re-coined by Frederick B. Cohen in describing self-replicating computer programs. In 1984 Cohen uses the phrase "computer virus" (suggested by his teacher Leonard Adleman) to describe the operation of such programs in terms of "infection". He defines a "virus" as "a program that can 'infect' other programs by modifying them to include a possibly evolved copy of itself." Cohen demonstrates a virus-like program on a VAX11/750 system at Lehigh University. The program could install itself in, or infect, other system objects.[13][failed verification]

1984 edit

  • August: Ken Thompson publishes his seminal paper, "Reflections on Trusting Trust", in which he describes how he modified a C compiler so that when used to compile a specific version of the Unix operating system, it inserts a backdoor into the login command, and when used to compile a new copy of itself, it inserts the backdoor insertion code, even if neither the backdoor nor the backdoor insertion code is present in the source code of this new copy.[14]

1986 edit

  • January: The Brain boot sector virus is released. Brain is considered the first IBM PC compatible virus, and the program responsible for the first IBM PC compatible virus epidemic. The virus is also known as Lahore, Pakistani, Pakistani Brain, and Pakistani flu as it was created in Lahore, Pakistan, by 19-year-old Pakistani programmer Basit Farooq Alvi and his brother, Amjad Farooq Alvi.[15]
  • December: Ralf Burger presented the Virdem model of programs at a meeting of the underground Chaos Computer Club in Germany. The Virdem model represented the first programs that could replicate themselves via addition of their code to executable DOS files in COM format.[16]

1987 edit

  • Appearance of the Vienna virus, which was subsequently neutralized – the first time this had happened on the IBM platform.[17]
  • Appearance of Lehigh virus (discovered at its namesake university),[17] boot sector viruses such as Yale from the US, Stoned from New Zealand, Ping Pong from Italy, and appearance of the first self-encrypting file virus, Cascade. Lehigh was stopped on campus before it spread to the "wild" (to computers beyond the university), and as a result, has never been found elsewhere. A subsequent infection of Cascade in the offices of IBM Belgium led to IBM responding with its own antivirus product development. Prior to this, antivirus solutions developed at IBM were intended for staff use only.
  • October: The Jerusalem virus, part of the (at that time unknown) Suriv family, is detected in the city of Jerusalem. The virus destroys all executable files on infected machines upon every occurrence of Friday the 13th (except Friday 13 November 1987 making its first trigger date May 13, 1988). Jerusalem caused a worldwide epidemic in 1988.[17]
  • November: The SCA virus, a boot sector virus for Amiga computers, appears. It immediately creates a pandemic virus-writer storm. A short time later, SCA releases another, considerably more destructive virus, the Byte Bandit.
  • December: Christmas Tree EXEC was the first widely disruptive replicating network program, which paralyzed several international computer networks in December 1987. It was written in Rexx on the VM/CMS operating system and originated in West Germany. It re-emerged in 1990.

1988 edit

  • March 1: The Ping-Pong virus (also called Boot, Bouncing Ball, Bouncing Dot, Italian, Italian-A or VeraCruz), an MS-DOS boot sector virus, is discovered at the University of Turin in Italy.
  • June: The CyberAIDS and Festering Hate Apple ProDOS viruses spreads from underground pirate BBS systems and starts infecting mainstream networks. Festering Hate was the last iteration of the CyberAIDS series extending back to 1985 and 1986. Unlike the few Apple viruses that had come before which were essentially annoying, but did no damage, the Festering Hate series of viruses was extremely destructive, spreading to all system files it could find on the host computer (hard drive, floppy, and system memory) and then destroying everything when it could no longer find any uninfected files.
  • November 2: The Morris worm, created by Robert Tappan Morris, infects DEC VAX and Sun machines running BSD UNIX that are connected to the Internet, and becomes the first worm to spread extensively "in the wild", and one of the first well-known programs exploiting buffer overrun vulnerabilities.
  • December: The Father Christmas worm attacks DEC VAX machines running VMS that are connected to the DECnet Internet (an international scientific research network using DECnet protocols), affecting NASA and other research centers. Its purpose was to deliver a Christmas greeting to all affected users.

1989 edit

  • October: Ghostball, the first multipartite virus, is discovered by Friðrik Skúlason. It infects both executable .COM files and boot sectors on MS-DOS systems.
  • December: Several thousand floppy disks containing the AIDS Trojan, the first known ransomware, are mailed to subscribers of PC Business World magazine and a WHO AIDS conference mailing list. This DOS Trojan lies dormant for 90 boot cycles, then encrypts all filenames on the system, displaying a notice asking for $189 to be sent to a post office box in Panama in order to receive a decryption program.

1990s edit

1990 edit

  • Mark Washburn, working on an analysis of the Vienna and Cascade viruses with Ralf Burger, develops the first family of polymorphic viruses, the Chameleon family. Chameleon series debuted with the release of 1260.[18][19][20]
  • June: The Form computer virus is isolated in Switzerland. It would remain in the wild for almost 20 years and reappear afterward; during the 1990s it tended to be the most common virus in the wild with 20 to more than 50 percent of reported infections.

1991 edit

  • Mattel releases a toyline called "Computer Warriors," bringing computer viruses into mainstream media. The villain, Megahert, is a sentient computer virus.

1992 edit

  • March: The Michelangelo virus was expected to create a digital apocalypse on March 6, with millions of computers having their information wiped, according to mass media hysteria surrounding the virus. Later assessments of the damage showed the aftermath to be minimal. John McAfee had been quoted by the media as saying that five million computers would be affected. He later said that pressed by the interviewer to come up with a number, he had estimated a range from five thousand to five million, but the media naturally went with just the higher number.
  • October: Milton-Bradley releases Omega Virus, a board game containing one of the first examples of a sentient computer virus in mainstream media.

1993 edit

  • "Leandro" or "Leandro & Kelly"[21] and "Freddy Krueger"[22] spread quickly due to popularity of BBS and shareware distribution.

1994 edit

  • April: OneHalf is a DOS-based polymorphic computer virus.
  • September: ReBoot first airs, containing another memorable fictional, sentient computer virus, Megabyte.

1995 edit

  • The first Macro virus, called "Concept", is created. It attacked Microsoft Word documents.[23]

1996 edit

  • "Ply" – DOS 16-bit based complicated polymorphic virus appeared with a built-in permutation engine.
  • Boza, the first virus designed specifically for Windows 95 files arrives.
  • Laroux, the first Excel macro virus appears.
  • Staog, the first Linux virus attacks Linux machines

1997 edit

  • Esperanto, the first cross-platform virus, appears.

1998 edit

  • June 2: The first version of the CIH virus appears. It is the first known virus able to erase flash ROM BIOS content.

1999 edit

2000s edit

2000 edit

  • May 5: The ILOVEYOU worm (also known as the Love Letter, VBS, or Love Bug worm), a computer worm written in VBScript and using social engineering techniques, infected millions of Windows computers worldwide within a few hours of its release.
  • June 28: The Pikachu virus is believed to be the first computer virus geared at children. It contains the character "Pikachu" from the Pokémon series. The operating systems affected by this worm are Windows 95, Windows 98, and Windows ME.

2001 edit

  • February 11: The Anna Kournikova virus hits e-mail servers hard by sending e-mail to contacts in the Microsoft Outlook addressbook.[25] Its creator, Jan de Wit, was sentenced to 150 hours of community service.[26]
  • March 13: Magistr, also called Disembowler, is discovered. It is a complex email worm for Windows systems with multiple payloads that trigger months apart from each other. It targets members of the Law profession by searching the files on a user's computer for various keywords relating to court proceedings, activating if such are found.[27]
  • May 8: The Sadmind worm spreads by exploiting holes in both Sun Solaris and Microsoft IIS.
  • July: The Sircam worm is released, spreading through Microsoft systems via e-mail and unprotected network shares.
  • July 13: The Code Red worm attacking the Index Server ISAPI Extension in Microsoft Internet Information Services is released.
  • August 4: A complete re-write of the Code Red worm, Code Red II begins aggressively spreading onto Microsoft systems, primarily in China.
  • September 18: The Nimda worm is discovered and spreads through a variety of means including vulnerabilities in Microsoft Windows and backdoors left by Code Red II and Sadmind worm.
  • October 26: The Klez worm is first identified. It exploits a vulnerability in Microsoft Internet Explorer and Microsoft Outlook and Outlook Express.

2002 edit

  • February 11: The Simile virus is a metamorphic computer virus written in assembly.
  • Beast is a Windows-based backdoor Trojan horse, more commonly known as a RAT (Remote Administration Tool). It is capable of infecting almost all versions of Windows. Written in Delphi and released first by its author Tataye in 2002, its most current version was released on October 3, 2004.
  • March 7: Mylife is a computer worm that spread itself by sending malicious emails to all the contacts in Microsoft Outlook.[28]
  • September 16: Another fictional, sentient computer virus appears in animation – Swayzak from Toonami's Total Immersion Event Trapped in Hyperspace and its corresponding game on the Cartoon Network website.

2003 edit

  • January 24: The SQL Slammer worm, aka Sapphire worm, Helkern and other names, attacks vulnerabilities in Microsoft SQL Server and MSDE becomes the fastest spreading worm of all time (measured by doubling time at the peak rate of growth),[29] causing massive Internet access disruptions worldwide just fifteen minutes after infecting its first victim.[30]
  • April 2: Graybird is a trojan horse also known as Backdoor.Graybird.[31]
  • June 13: ProRat is a Turkish-made Microsoft Windows based backdoor trojan horse, more commonly known as a RAT (Remote Administration Tool).[32]
  • August 12: The Blaster worm, aka the Lovesan worm, rapidly spreads by exploiting a vulnerability in system services present on Windows computers.
  • August 18: The Welchia (Nachi) worm is discovered. The worm tries to remove the Blaster worm and patch Windows.
  • August 19: The Sobig worm (technically the Sobig.F worm) spreads rapidly through Microsoft systems via mail and network shares.
  • September 18: Swen is a computer worm written in C++.[33]
  • October 24: The Sober worm is first seen on Microsoft systems and maintains its presence until 2005 with many new variants. The simultaneous attacks on network weak points by the Blaster and Sobig worms cause massive damage.
  • November 10: Agobot is a computer worm that can spread itself by exploiting vulnerabilities on Microsoft Windows. Some of the vulnerabilities are MS03-026 and MS05-039.[34]
  • November 20: Bolgimo is a computer worm that spread itself by exploiting a buffer overflow vulnerability at Microsoft Windows DCOM RPC Interface.[35]

2004 edit

  • January 18: Bagle is a mass-mailing worm affecting all versions of Microsoft Windows. There were two variants of Bagle worm, Bagle.A and Bagle.B. Bagle.B was discovered on February 17, 2004.
  • January 26: The MyDoom worm emerges, and currently holds the record for the fastest-spreading mass mailer worm. The worm was most notable for performing a distributed denial-of-service (DDoS) attack on www.sco.com, which belonged to The SCO Group.
  • February 16: The Netsky worm is discovered. The worm spreads by email and by copying itself to folders on the local hard drive as well as on mapped network drives if available. Many variants of the Netsky worm appeared.
  • March 19: The Witty worm is a record-breaking worm in many regards. It exploited holes in several Internet Security Systems (ISS) products. It was the fastest computer issue to be categorized as a worm, and it was the first internet worm to carry a destructive payload[citation needed]. It spread rapidly using a pre-populated list of ground-zero hosts.
  • May 1: The Sasser worm emerges by exploiting a vulnerability in the Microsoft Windows LSASS service and causes problems in networks, while removing MyDoom and Bagle variants, even interrupting business.
  • June 15: Caribe or Cabir is a computer worm that is designed to infect mobile phones that run Symbian OS. It is the first computer worm that can infect mobile phones. It spread itself through Bluetooth. More information can be found on F-Secure[36] and Symantec.[37]
  • August 16: Nuclear RAT (short for Nuclear Remote Administration Tool) is a backdoor trojan that infects Windows NT family systems (Windows 2000, Windows XP, Windows 2003).[38]
  • August 20: Vundo, or the Vundo Trojan (also known as Virtumonde or Virtumondo and sometimes referred to as MS Juan) is a trojan known to cause popups and advertising for rogue antispyware programs, and sporadically other misbehavior including performance degradation and denial of service with some websites including Google and Facebook.[39]
  • October 12: Bifrost, also known as Bifrose, is a backdoor trojan which can infect Windows 95 through Vista. Bifrost uses the typical server, server builder, and client backdoor program configuration to allow a remote attack.[40]
  • December: Santy, the first known "webworm" is launched. It exploited a vulnerability in phpBB and used Google to find new targets. It infected around 40000 sites before Google filtered the search query used by the worm, preventing it from spreading.

2005 edit

  • August 2005: Zotob is a computer worm which exploits security vulnerabilities in Microsoft operating systems like Windows 2000, including the MS05-039 plug-and-play vulnerability. This worm has been known to spread on Microsoft-ds or TCP port 445.
  • October 2005: The copy protection rootkit deliberately and surreptitiously included on music CDs sold by Sony BMG is exposed. The rootkit creates vulnerabilities on affected computers, making them susceptible to infection by worms and viruses.
  • Late 2005: The Zlob Trojan, is a Trojan horse program that masquerades as a required video codec in the form of the Microsoft Windows ActiveX component. It was first detected in late 2005.[41]

2006 edit

  • January 20: The Nyxem worm was discovered. It spread by mass-mailing. Its payload, which activates on the third of every month, starting on February 3, attempts to disable security-related and file-sharing software, and destroy files of certain types, such as Microsoft Office files.
  • February 16: Discovery of the first-ever malware for Mac OS X, a low-threat trojan-horse known as OSX/Leap-A or OSX/Oompa-A, is announced.
  • Late March: Brontok variant N was found in late March.[42] Brontok was a mass-email worm and the origin for the worm was from Indonesia.
  • June: Starbucks is a virus that infects StarOffice and OpenOffice.
  • Late September: Stration or Warezov worm first discovered.
  • Development of Stuxnet is presumed to have been started between 2005 and 2006.

2007 edit

  • January 17: Storm Worm identified as a fast-spreading email spamming threat to Microsoft systems. It begins gathering infected computers into the Storm botnet. By around June 30, it had infected 1.7 million computers, and it had compromised between 1 and 10 million computers by September.[43] Thought to have originated from Russia, it disguises itself as a news email containing a film about bogus news stories asking the user to download the attachment which it claims is a film.
  • July: Zeus is a trojan that targets Microsoft Windows to steal banking information by keystroke logging.

2008 edit

  • February 17: Mocmex is a trojan, which was found in a digital photo frame in February 2008. It was the first serious computer virus on a digital photo frame. The virus was traced back to a group in China.[44]
  • March 3: Torpig, also known as Sinowal and Mebroot, is a Trojan horse that affects Windows, turning off anti-virus applications. It allows others to access the computer, modifies data, steals confidential information (such as user passwords and other sensitive data) and installs more malware on the victim's computer.[45]
  • May 6: Rustock.C, a hitherto-rumored spambot-type malware with advanced rootkit capabilities, was announced to have been detected on Microsoft systems and analyzed, having been in the wild and undetected since October 2007 at the very least.[46]
  • July 6: Bohmini.A is a configurable remote access tool or trojan that exploits security flaws in Adobe Flash 9.0.115 with Internet Explorer 7.0 and Firefox 2.0 under Windows XP SP2.[47]
  • July 31: The Koobface computer worm targets users of Facebook and Myspace. New variants constantly appear.[48]
  • November 21: Computer worm Conficker infects anywhere from 9 to 15 million Microsoft server systems running everything from Windows 2000 to the Windows 7 Beta. The French Navy,[49] UK Ministry of Defence (including Royal Navy warships and submarines),[50] Sheffield Hospital network,[51] German Bundeswehr[52] and Norwegian Police were all affected. Microsoft sets a bounty of US$250,000 for information leading to the capture of the worm's author(s).[53] Five main variants of the Conficker worm are known and have been dubbed Conficker A, B, C, D and E. They were discovered 21 November 2008, 29 December 2008, 20 February 2009, 4 March 2009 and 7 April 2009, respectively. On December 16, 2008, Microsoft releases KB958644[54] patching the server service vulnerability responsible for the spread of Conficker.

2009 edit

  • July 4: The July 2009 cyber attacks occur and the emergence of the W32.Dozer attack the United States and South Korea.
  • July 15: Symantec discovered Daprosy Worm, a trojan worm is intended to steal online-game passwords in internet cafes. It could intercept all keystrokes and send them to its author, making it potentially a very dangerous worm to infect B2B (business-to-business) systems.
  • August 24: Source code for MegaPanzer is released by its author under GPLv3.[55] and appears to have been apparently detected in the wild.[56]
  • November 27: The virus Kenzero is a virus that spreads online from peer-to-peer networks (P2P) taking browsing history.[57]

2010s edit

2010 edit

  • January: The Waledac botnet sent spam emails. In February 2010, an international group of security researchers and Microsoft took Waledac down.[58]
  • January: The Psyb0t worm is discovered. It is thought to be unique in that it can infect routers and high-speed modems.[59]
  • February 18: Microsoft announced that a BSoD problem on some Windows machines which was triggered by a batch of Patch Tuesday updates was caused by the Alureon Trojan.[60]
  • June 17: Stuxnet, a Windows Trojan, was detected.[61] It is the first worm to attack SCADA systems.[62] There are suggestions that it was designed to target Iranian nuclear facilities.[63] It uses a valid certificate from Realtek.[64]
  • September 9: The virus, called "here you have" or "VBMania", is a simple Trojan horse that arrives in the inbox with the odd-but-suggestive subject line "here you have". The body reads "This is The Document I told you about, you can find it Here" or "This is The Free Download Sex Movies, you can find it Here".

2011 edit

  • SpyEye and Zeus merged code is seen.[65] New variants attack mobile phone banking information.[66]
  • Anti-Spyware 2011, a Trojan horse that attacks Windows 9x, 2000, XP, Vista, and Windows 7, posing as an anti-spyware program. It disables security-related processes of anti-virus programs, while also blocking access to the Internet, which prevents updates.[67]
  • Summer 2011: The Morto worm attempts to propagate itself to additional computers via the Microsoft Windows Remote Desktop Protocol (RDP). Morto spreads by forcing infected systems to scan for Windows servers allowing RDP login. Once Morto finds an RDP-accessible system, it attempts to log into a domain or local system account named 'Administrator' using several common passwords.[68] A detailed overview of how the worm works – along with the password dictionary Morto uses – was done by Imperva.[69]
  • July 13: the ZeroAccess rootkit (also known as Sirefef or max++) was discovered.
  • September 1: Duqu is a worm thought to be related to the Stuxnet worm. The Laboratory of Cryptography and System Security (CrySyS Lab)[70] of the Budapest University of Technology and Economics in Hungary discovered the threat, analysed the malware, and wrote a 60-page report naming the threat Duqu.[71][72] Duqu gets its name from the prefix "~DQ" it gives to the names of files it creates.[73]

2012 edit

  • May: Flame – also known as Flamer, sKyWIper, and Skywiper – a modular computer malware that attacks computers running Microsoft Windows. Used for targeted cyber espionage in Middle Eastern countries. Its discovery was announced on 28 May 2012 by MAHER Center of Iranian National Computer Emergency Response Team (CERT), Kaspersky Lab and CrySyS Lab of the Budapest University of Technology and Economics. CrySyS stated in their report that "sKyWIper is certainly the most sophisticated malware we encountered during our practice; arguably, it is the most complex malware ever found".[74]
  • August 16: Shamoon is a computer virus designed to target computers running Microsoft Windows in the energy sector. Symantec, Kaspersky Lab, and Seculert announced its discovery on August 16, 2012.
  • September 20: NGRBot is a worm that uses the IRC network for file transfer, sending and receiving commands between zombie network machines and the attacker's IRC server, and monitoring and controlling network connectivity and intercept. It employs a user-mode rootkit technique to hide and steal its victim's information. This family of bot is also designed to infect HTML pages with inline frames (iframes), causing redirections, blocking victims from getting updates from security/antimalware products, and killing those services. The bot is designed to connect via a predefined IRC channel and communicate with a remote botnet.[75][76]

2013 edit

  • September: The CryptoLocker Trojan horse is discovered. CryptoLocker encrypts the files on a user's hard drive, then prompts them to pay a ransom to the developer to receive the decryption key. In the following months, several copycat ransomware Trojans were also discovered.
  • December: The Gameover ZeuS Trojan is discovered. This type of virus steals one's login details on popular Web sites that involve monetary transactions. It works by detecting a login page, then proceeds to inject malicious code into the page, keystroke logging the computer user's details.
  • December: Linux.Darlloz targets the Internet of things and infects routers, security cameras, set-top boxes by exploiting a PHP vulnerability.[77][78]

2014 edit

  • November: The Regin Trojan horse is discovered. Regin is a dropper, primarily spread via spoofed Web pages. Once installed, it quietly downloads additional malware, making it difficult for signature-based anti-virus programs to detect. It is believed to have been created by the United States and United Kingdom as a tool for espionage and mass surveillance.[citation needed]

2015 edit

  • The BASHLITE malware is leaked leading to a massive spike in DDoS attacks.[79]
  • Linux.Wifatch is revealed to the general public. It is found to attempt to secure devices from other more malicious malware.[80][81][82]

2016 edit

  • January: A trojan named "MEMZ" is created. The creator, Leurak, explained that the trojan was intended merely as a joke.[83] The trojan alerts the user to the fact that it is a trojan and warns them that if they proceed, the computer may no longer be usable. It contains complex payloads that corrupt the system, displaying artifacts on the screen as it runs. Once run, the application cannot be closed without causing further damage to the computer, which will stop functioning properly regardless. When the computer is restarted, in place of the bootsplash is a message that reads "Your computer has been trashed by the MEMZ Trojan. Now enjoy the Nyan cat...", which follows with an animation of the Nyan Cat.[84]
  • February: Ransomware Locky with its over 60 derivatives spread throughout Europe and infected several million computers. At the height of the spread over five thousand computers per hour were infected in Germany alone.[85] Although ransomware was not a new thing at the time, insufficient cyber security as well as a lack of standards in IT was responsible for the high number of infections.[86] Unfortunately, even up to date antivirus and internet security software was unable to protect systems from early versions of Locky.[87]
  • February: Tiny Banker Trojan (Tinba) makes headlines.[88] Since its discovery, it has been found to have infected more than two dozen major banking institutions in the United States, including TD Bank, Chase, HSBC, Wells Fargo, PNC and Bank of America.[89][90] Tiny Banker Trojan uses HTTP injection to force the user's computer to believe that it is on the bank's website. This spoof page will look and function just as the real one. The user then enters their information to log on, at which point Tinba can launch the bank webpage's "incorrect login information" return, and redirect the user to the real website. This is to trick the user into thinking they had entered the wrong information and proceed as normal, although now Tinba has captured the credentials and sent them to its host.[91][92]
  • August: Journalists and researchers report the discovery of spyware, called Pegasus, developed and distributed by a private company which can and has been used to infect iOS and Android smartphones often – based on 0-day exploits – without the need for any user-interaction or significant clues to the user and then be used to exfiltrate data, track user locations, capture film through its camera, and activate the microphone at any time. The investigation suggests it was used on many targets worldwide and revealed its use for e.g. governments' espionage on journalists, opposition politicians, activists, business people and others.[93]
  • September: Mirai creates headlines by launching some of the most powerful and disruptive DDoS attacks seen to date by infecting the Internet of Things. Mirai ends up being used in the DDoS attack on 20 September 2016 on the Krebs on Security site which reached 620 Gbit/s.[94] Ars Technica also reported a 1 Tbit/s attack on French web host OVH.[95] On 21 October 2016 multiple major DDoS attacks in DNS services of DNS service provider Dyn occurred using Mirai malware installed on a large number of IoT devices, resulting in the inaccessibility of several high-profile websites such as GitHub, Twitter, Reddit, Netflix, Airbnb and many others.[96] The attribution of the attack to the Mirai botnet was originally reported by BackConnect Inc., a security firm.[97]

2017 edit

  • May: The WannaCry ransomware attack spreads globally. Exploits revealed in the NSA hacking toolkit leak of late 2016 were used to enable the propagation of the malware.[98] Shortly after the news of the infections broke online, a UK cybersecurity researcher in collaboration with others found and activated a "kill switch" hidden within the ransomware, effectively halting the initial wave of its global propagation.[99] The next day, researchers announced that they had found new variants of the malware without the kill switch.[100]
  • June: The Petya attack spreads globally affecting Windows systems. Researchers at Symantec reveal that this ransomware uses the EternalBlue exploit, similar to the one used in the WannaCry ransomware attack.[101][102][103]
  • September: The Xafecopy Trojan attacks 47 countries, affecting only Android operating systems. Kaspersky Lab identified it as a malware from the Ubsod family, stealing money through click based WAP billing systems.[104][105]
  • September: A new variety of Remote Access Trojan (RAT), Kedi RAT, is distributed in a Spear Phishing Campaign. The attack targeted Citrix users. The Trojan was able to evade usual system scanners. Kedi Trojan had all the characteristics of a common Remote Access Trojan and it could communicate to its Command and Control center via Gmail using common HTML, HTTP protocols.[106][107]

2018 edit

  • February: Thanatos, a ransomware, becomes the first ransomware program to accept ransom payment in Bitcoin Cash.[108]

2019 edit

2020s edit

2024 edit

Researchers Nassi, Cohen, and Bitton developed a computer worm called Morris II, targeting generative AI email assistants to steal data and send spam, thereby breaching security protections of systems like ChatGPT and Gemini. Conducted in a test environment, this research highlights the security risks of multimodal large language models (LLMs) that now generate text, images, and videos. Generative AI systems, which operate on prompts, can be exploited through weaponized prompts. For instance, hidden text on a webpage could instruct an LLM to perform malicious activities, such as phishing for bank details. While generative AI worms like Morris II haven’t been observed in the public, their potential threat is a concern for the tech industry.[110]

See also edit

References edit

  1. ^ von Neumann, John (1966). Arthur W. Burks (ed.). Theory of self-reproducing automata (PDF). University of Illinois Press. Retrieved June 12, 2010.
  2. ^ "The Scarred Man Returns | GREGORY BENFORD". Retrieved 2021-09-12.
  3. ^ Chen, Thomas; Robert, Jean-Marc (2004). . Archived from the original on 2009-05-17. Retrieved 2009-02-16.
  4. ^ Russell, Deborah; Gangemi, G T (1991). Computer Security Basics. O'Reilly. p. 86. ISBN 0-937175-71-4.
  5. ^ "IMDB synopsis of Westworld". www.imdb.com. Retrieved November 28, 2015.
  6. ^ Michael Crichton (November 21, 1973). Westworld (movie). 201 S. Kinney Road, Tucson, Arizona, USA: Metro-Goldwyn-Mayer. Event occurs at 32 minutes. And there's a clear pattern here which suggests an analogy to an infectious disease process, spreading from one resort area to the next." ... "Perhaps there are superficial similarities to disease." "I must confess I find it difficult to believe in a disease of machinery.{{cite AV media}}: CS1 maint: location (link)
  7. ^ "The very first viruses: Creeper, Wabbit and Brain", Daniel Snyder, InfoCarnivore, May 30, 2010,
  8. ^ "ANIMAL Source Code". Fourmilab.ch. 1996-08-13. Retrieved 2012-03-29.
  9. ^ "The Animal Episode". Fourmilab.ch. Retrieved 2012-03-29.
  10. ^ Craig E. Engler (1997). . Classic Sci-Fi Reviews. Archived from the original on 2008-07-03. Retrieved 2008-07-28.
  11. ^ Ryan, Thomas J. (1977). The Adolescence of P-1 (1st ed.). New York: Macmillan. ISBN 0-02-606500-2.
  12. ^ "First virus hatched as a practical joke". The Sydney Morning Herald (AP). 3 September 2007. Retrieved 9 September 2013.
  13. ^ Fred Cohen (1983-11-03). "Computer Viruses – Theory and Experiments". eecs.umich.edu. Retrieved 2012-03-29.
  14. ^ Thompson, Ken (August 1984). "Reflections on Trusting Trust". Communications of the ACM. 27 (8): 761–763. doi:10.1145/358198.358210. S2CID 34854438.
  15. ^ Leyden, John (January 19, 2006). "PC virus celebrates 20th birthday". The Register. Retrieved March 21, 2011.
  16. ^ Szor, Peter (2005). The Art of Computer Virus Research and Defense. Symantec Press / Addison-Wesley Professional. ISBN 978-0-321-30454-4.
  17. ^ a b c Wentworth, Rob (July 1996). (reprinted from The Digital Viking). Twin Cities PC User Group. Archived from the original on 24 December 2013. Retrieved 9 September 2013.
  18. ^ "Virus.DOS.Chameleon.1260 – Securelist". Viruslist.com. Archived from the original on 2012-09-19. Retrieved 2010-07-10.
  19. ^ . Vil.nai.com. Archived from the original on 2009-07-22. Retrieved 2010-07-10.
  20. ^ . Viruslist.com. Archived from the original on 2009-07-13. Retrieved 2010-07-10.
  21. ^ "Leandro", Threat Encyclopedia, Trend Micro, 9 March 2000. Retrieved 9 September 2013.
  22. ^ "Freddy Virus", Virus Information Summary List, December 1992. Retrieved 9 September 2013.
  23. ^ "Glossary – Securelist". Viruslist.com. Retrieved 2010-07-10.
  24. ^ "Wscript.KakWorm". Symantec. Retrieved 2012-03-29.
  25. ^ "Kournikova computer virus hits hard". BBC News. February 13, 2001. Retrieved April 9, 2010.
  26. ^ Evers, Joris (May 3, 2002). "Kournikova virus maker appeals sentence". Retrieved 20 November 2010.
  27. ^ "Magistr - the Virus Encyclopedia". The Virus Encyclopedia. Retrieved 21 October 2021.
  28. ^ "MyLife Worm". Antivirus.about.com. 2002-03-07. Retrieved 2012-03-29.
  29. ^ "The Spread of the Sapphire/Slammer Worm". Retrieved 2012-12-14.
  30. ^ "Slammed!". Wired. July 2003. Retrieved 2012-12-14.
  31. ^ Sevcenco, Serghei (February 10, 2006). "Symantec Security Response: Backdoor.Graybird". Symantec. Archived from the original on December 11, 2003. Retrieved 2009-03-01.
  32. ^ "Backdoor.Prorat". Symantec. February 13, 2007. Retrieved 2009-03-01.
  33. ^ "Threat Description: Worm:W32/Swen". F-secure.com. Retrieved 2012-03-29.
  34. ^ . Securelist. Archived from the original on 2012-03-15. Retrieved 2012-03-29.
  35. ^ "W32.Bolgi.Worm". Symantec. Retrieved 2012-03-29.
  36. ^ "Threat Description:Bluetooth-Worm:SymbOS/Cabir". F-secure.com. Retrieved 2012-03-29.
  37. ^ "SymbOS.Cabir". Symantec. Retrieved 2012-03-29.
  38. ^ . Computer Associates. August 16, 2004. Archived from the original on 2009-09-11. Retrieved 2009-03-01.
  39. ^ . McAfee. Archived from the original on 2009-02-17. Retrieved 2009-03-01.
  40. ^ "Backdoor.Bifrose". Symantec, Inc. October 12, 2004. Retrieved 2009-02-28.
  41. ^ "The ZLOB Show: Trojan Poses as Fake Video Codec, Loads More Threats". Trend Micro. Retrieved 2009-02-28.
  42. ^ "Threat Description: Email-Worm:W32/Brontok.N". F-secure.com. Retrieved 2012-03-29.
  43. ^ Peter Gutmann (31 August 2007). "World's most powerful supercomputer goes online". Full Disclosure. Retrieved 2007-11-04.
  44. ^ Gage, Deborah (February 17, 2005). "Chinese PC virus may have hidden agenda". Seattle PI. Retrieved 2009-03-01.
  45. ^ Kimmo (March 3, 2008). "MBR Rootkit, A New Breed of". F-Secure. Retrieved 2009-03-01.
  46. ^ "Win32.Ntldrbot (aka Rustock)". Dr. Web Ltd. Retrieved 2009-03-01.
  47. ^ . virustotal.com. July 8, 2008. Archived from the original on 2009-04-01. Retrieved 2009-03-01.
  48. ^ "Koobface malware makes a comeback". cnet.com. April 9, 2010. Retrieved 2009-04-13.
  49. ^ Willsher, Kim (2009-02-07). "French fighter planes grounded by computer virus". The Daily Telegraph. London. Retrieved 2009-04-01.
  50. ^ Williams, Chris (2009-01-20). "MoD networks still malware-plagued after two weeks". The Register. Retrieved 2009-01-20.
  51. ^ Williams, Chris (2009-01-20). "Conficker seizes city's hospital network". The Register. Retrieved 2009-01-20.
  52. ^ (in German). PC Professionell. 2009-02-16. Archived from the original on 2009-03-21. Retrieved 2009-04-01.
  53. ^ Neild, Barry (2009-02-13). "$250K Microsoft bounty to catch worm creator". CNN. Retrieved 2009-03-29.
  54. ^ "MS08-067: Vulnerability in Server service could allow remote code execution". Microsoft Corporation.
  55. ^ Dancho Danchev. "Source code for Skype eavesdropping trojan in the wild". ZDNet.
  56. ^ "Code for Skype Spyware Released to Thwart Surveillance". WIRED. 31 August 2009.
  57. ^ Harvison, Josh (September 27, 2010). . kait8.com. Archived from the original on 2016-06-11. Retrieved 20 November 2010.
  58. ^ "Waledac Takedown Successful". honeyblog.org. February 25, 2010. Retrieved 16 November 2012.
  59. ^ Paul, Ian (25 March 2009). "Nasty New Worm Targets Home Routers, Cable Modems". PC World. Retrieved 2009-03-26.
  60. ^ "Alureon trojan caused Windows 7 BSoD". microsoft.com. February 18, 2010. Retrieved 2010-02-18.
  61. ^ "VirusBlokAda News". Anti-virus.by. Retrieved 2012-03-29.
  62. ^ Gregg Keizer (16 September 2010). "Is Stuxnet the 'best' malware ever?". InfoWorld. Archived from the original on 5 December 2012. Retrieved 16 September 2010.
  63. ^ Stuxnet virus: worm 'could be aimed at high-profile Iranian targets’, Telegraph, 23 Sep 2010
  64. ^ "Possible New Rootkit Has Drivers Signed by Realtek". Kaspersky Labs. 15 July 2010.
  65. ^ "Bastard child of SpyEye/ZeuS merger appears online". The Register. 2011. Retrieved April 11, 2011. Bastard child of SpyEye/ZeuS merger appears online
  66. ^ "SpyEye mobile banking Trojan uses same tactics as ZeuS". The Register. 2011. Retrieved April 11, 2011. SpyEye mobile banking Trojan uses same tactics as ZeuS
  67. ^ "XP AntiSpyware 2011 – Virus Solution and Removal". Precisesecurity.com. Retrieved 2012-03-29.
  68. ^ . blogs.appriver.com. 2011. Archived from the original on 2011-10-14. Retrieved 2011-08-31.
  69. ^ "Morto Post Mortem: Dissecting a Worm". blog.imperva.com. 2011.
  70. ^ "Laboratory of Cryptography and System Security (CrySyS)". Retrieved 4 November 2011.
  71. ^ "Duqu: A Stuxnet-like malware found in the wild, technical report" (PDF). Laboratory of Cryptography of Systems Security (CrySyS). 14 October 2011.
  72. ^ . Laboratory of Cryptography of Systems Security (CrySyS). 21 October 2011. Archived from the original on 2 October 2012. Retrieved 25 October 2011.
  73. ^ "W32.Duqu – The precursor to the next Stuxnet (Version 1.4)" (PDF). Symantec. 23 November 2011. Retrieved 30 December 2011.
  74. ^ (PDF). Budapest University of Technology and Economics. 28 May 2012. Archived from the original (PDF) on 28 May 2012. Retrieved 29 May 2012.
  75. ^ "NGRBot", Enigma Software Group, 15 October 2012. Retrieved 9 September 2013.
  76. ^ "Dissecting the NGR bot framework: IRC botnets die hard", Aditya K. Sood and Richard J. Enbody, Michigan State University, USA, and Rohit Bansal, SecNiche Security, USA, with Helen Martin1 (ed.), January 2012. Retrieved 9 September 2013. (subscription required)
  77. ^ Goodin, Dan (2013-11-27). "New Linux worm targets routers, cameras, "Internet of things" devices". Ars Technica. Retrieved October 24, 2016.
  78. ^ Sterling, Bruce (2014-01-29). "Linux.Darlloz, the Internet-of-Things worm". Wired. Retrieved 24 October 2016.
  79. ^ "Attack of Things!". Level 3 Threat Research Labs. 25 August 2016. Retrieved 6 November 2016.
  80. ^ Ballano, Mario (1 Oct 2015). "Is there an Internet-of-Things vigilante out there?". Symantec. Retrieved 14 November 2016.
  81. ^ "linux.wifatch". The White Team. October 5, 2015. Retrieved 15 November 2016.
  82. ^ Cimpanu, Catalin (Oct 7, 2015). "Creators of the Benevolent Linux.Wifatch Malware Reveal Themselves". Softpedia. Retrieved 14 November 2016.
  83. ^ Oberhaus, Daniel (July 9, 2016). "Watch This Malware Turn a Computer into a Digital Hellscape". Motherboard. Retrieved July 4, 2018.
  84. ^ Dean, Madeleine (August 26, 2016). "MEMZ virus: what is it and how it affects Windows PC?". Windows Report. Retrieved July 4, 2018.
  85. ^ "Ransomware: Erpresserische Schadprogramme" 2016-02-21 at the Wayback Machine, bsi-fuer-buerger.de, 9 February 2016. Retrieved 10 March 2016.
  86. ^ "Locky ransomware on aggressive hunt for victims", Symantec.com, 18 February 2016. Retrieved 10 March 2016.
  87. ^ "Antivirus scan for (Locky)", virustotal.com, 16 February 2016. Retrieved 10 March 2016.
  88. ^ danielevir (19 September 2014). "'Tiny Banker' Malware Attempted At Customers Of US Banks". Massive Alliance. Retrieved 10 September 2017.
  89. ^ "Modified Tiny Banker Trojan Found Targeting Major U.S. Banks". Entrust, Inc.
  90. ^ Jeremy Kirk (15 September 2014). "'Tiny banker' malware targets US financial institutions". PCWorld.
  91. ^ "'Tiny Banker' Malware Targets Dozens of Major US Financial Institutions". The State of Security. 2014-09-16.
  92. ^ "Tiny 'Tinba' Banking Trojan Is Big Trouble". msnbc.com. 2012-05-31.
  93. ^ "What is Pegasus spyware and how does it hack phones?". The Guardian. 18 July 2021. Retrieved 13 August 2021.
  94. ^ The Economist, 8 October 2016, The internet of stings
  95. ^ Bonderud, Douglas (October 4, 2016). "Leaked Mirai Malware Boosts IoT Insecurity Threat Level". securityintelligence.com. Retrieved 20 October 2016.
  96. ^ "Today the web was broken by countless hacked devices". theregister.co.uk. 21 October 2016. Retrieved 24 October 2016.
  97. ^ "Blame the Internet of Things for Destroying the Internet Today". Motherboard. VICE. 2016-10-21. Retrieved 27 October 2016.
  98. ^ Wong, Julia Carrie; Solon, Olivia (2017-05-12). "Massive ransomware cyber-attack hits 74 countries around the world". The Guardian. ISSN 0261-3077. Retrieved 2017-05-12.
  99. ^ Solon, Olivia (2017-05-13). "'Accidental hero' finds kill switch to stop spread of ransomware cyber-attack". The Guardian. ISSN 0261-3077. Retrieved 2017-05-13.
  100. ^ Khandelwal, Swati. "It's Not Over, WannaCry 2.0 Ransomware Just Arrived With No 'Kill-Switch'". The Hacker News. Retrieved 2017-05-14.
  101. ^ "Petya ransomware outbreak: Here's what you need to know". Retrieved 10 September 2017.
  102. ^ "Ransom.Petya - Symantec". www.symantec.com. Retrieved 10 September 2017.
  103. ^ "'Petya' Ransomware Outbreak Goes Global — Krebs on Security". krebsonsecurity.com. 28 June 2017. Retrieved 10 September 2017.
  104. ^ "New malware steals users' money through mobile phones: Report". The Economic Times. 10 September 2017. Retrieved 10 September 2017.
  105. ^ "Xafecopy Trojan, a new malware detected in India; it disguises itself as an app to steals money via mobile phones". Tech2. 2017-09-10. Retrieved 10 September 2017.
  106. ^ "Kedi RAT can steal your information and send it through gmail".
  107. ^ "Beware the Kedi RAT pretending to be a Citrix file that Gmails home". 2017-09-12.
  108. ^ Abrams, Lawrence (February 26, 2018). "Thanatos Ransomware Is First to Use Bitcoin Cash. Messes Up Encryption". Bleeping Computer. Retrieved June 25, 2019.
  109. ^ AMR, GReAT (8 November 2019). "Titanium: the Platinum group strikes again". Kaspersky Lab. Retrieved 9 November 2019.
  110. ^ WIRED (2024-03-02). "Researchers create AI worms that can spread from one system to another". Ars Technica. Retrieved 2024-03-07.
  111. ^ Corbet, Jonathan (2024-03-29). "A backdoor in xz". LWN. Retrieved 2024-04-03.

External links edit

  • by Mari Keefe, Computerworld, April 2009
  • 5th Utility Ltd list of the 10 worst computer viruses of all time

timeline, computer, viruses, worms, confused, with, list, computer, worms, this, article, multiple, issues, please, help, improve, discuss, these, issues, talk, page, learn, when, remove, these, template, messages, this, article, require, cleanup, meet, wikipe. Not to be confused with List of computer worms This article has multiple issues Please help improve it or discuss these issues on the talk page Learn how and when to remove these template messages This article may require cleanup to meet Wikipedia s quality standards The specific problem is includes many viruses of unclear noteworthiness Please help improve this article if you can November 2015 Learn how and when to remove this template message This article needs to be updated The reason given is No entries after 2019 Please help update this article to reflect recent events or newly available information November 2023 Learn how and when to remove this template message This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses computer worms Trojan horses similar malware related research and events Hex dump of the Blaster worm showing a message left for Microsoft co founder Bill Gates by the worm s programmer Contents 1 1960s 2 1970s 2 1 1970 2 2 1971 2 3 1972 2 4 1973 2 5 1974 2 6 1975 2 7 1977 3 1980s 3 1 1982 3 2 1983 3 3 1984 3 4 1986 3 5 1987 3 6 1988 3 7 1989 4 1990s 4 1 1990 4 2 1991 4 3 1992 4 4 1993 4 5 1994 4 6 1995 4 7 1996 4 8 1997 4 9 1998 4 10 1999 5 2000s 5 1 2000 5 2 2001 5 3 2002 5 4 2003 5 5 2004 5 6 2005 5 7 2006 5 8 2007 5 9 2008 5 10 2009 6 2010s 6 1 2010 6 2 2011 6 3 2012 6 4 2013 6 5 2014 6 6 2015 6 7 2016 6 8 2017 6 9 2018 6 10 2019 7 2020s 7 1 2024 8 See also 9 References 10 External links1960s editJohn von Neumann s article on the Theory of self reproducing automata is published in 1966 1 The article is based on lectures given by von Neumann at the University of Illinois about the Theory and Organization of Complicated Automata in 1949 1970s edit1970 edit The first story written about a computer virus is The Scarred Man by Gregory Benford 2 1971 edit The Creeper system an experimental self replicating program is written by Bob Thomas at BBN Technologies to test John von Neumann s theory 3 Creeper infected DEC PDP 10 computers running the TENEX operating system Creeper gained access via the ARPANET and copied itself to the remote system where the message I m the creeper catch me if you can was displayed The Reaper program was later created to delete Creeper 4 At the University of Illinois at Urbana Champaign a graduate student named Alan Davis working for Prof Donald Gillies created a process on a PDP 11 that a checked to see if an identical copy of itself was currently running as an active process and if not created a copy of itself and started it running b checked to see if any disk space which all users shared was available and if so created a file the size of that space and c looped back to step a As a result the process stole all available disk space When users tried to save files the operating system advised them that the disk was full and that they needed to delete some existing files Of course if they did delete a file this process would immediately snatch up the available space When users called in a system administrator A Ian Stocks to fix the problem he examined the active processes discovered the offending process and deleted it Of course before he left the room the still existing process would create another copy of itself and the problem would not go away The only way to make the computer work again was to reboot citation needed 1972 edit The science fiction novel When HARLIE Was One by David Gerrold contains one of the first fictional representations of a computer virus as well as one of the first uses of the word virus to denote a program that infects a computer 1973 edit In fiction the 1973 Michael Crichton movie Westworld made an early mention of the concept of a computer virus being a central plot theme that causes androids to run amok 5 Alan Oppenheimer s character summarizes the problem by stating that there s a clear pattern here which suggests an analogy to an infectious disease process spreading from one area to the next To which the replies are stated Perhaps there are superficial similarities to disease and I must confess I find it difficult to believe in a disease of machinery 6 Crichton s earlier work the 1969 novel The Andromeda Strain and 1971 film were about an extraterrestrial biological virus like disease that threatened the human race 1974 edit The Rabbit or Wabbit virus more a fork bomb than a virus is written The Rabbit virus makes multiple copies of itself on a single computer and was named rabbit for the speed at which it did so until it clogs the system reducing system performance before finally reaching a threshold and crashing the computer 7 1975 edit April ANIMAL is written by John Walker for the UNIVAC 1108 8 ANIMAL asked several questions of the user in an attempt to guess the type of animal the user was thinking of while the related program PERVADE would create a copy of itself and ANIMAL in every directory to which the current user had access It spread across the multi user UNIVACs when users with overlapping permissions discovered the game and to other computers when tapes were shared The program was carefully written to avoid damaging existing file or directory structures and to avoid copying itself if permissions did not exist or if harm would result Its spread was halted by an OS upgrade that changed the format of the file status tables PERVADE used Though non malicious Pervading Animal represents the first Trojan in the wild 9 The novel The Shockwave Rider by John Brunner is published coining the word worm to describe a program that propagates itself through a computer network 10 1977 edit The Adolescence of P 1 novel 11 describes a worm program that propagates through modem based networks eventually developing its own strategy developing AI which deals with cross hardware and cross os issues eventually infecting hardware manufactures and defense organizations 1980s edit1982 edit A program called Elk Cloner written for Apple II systems was created by high school student Richard Skrenta originally as a prank The Apple II was particularly vulnerable due to the storage of its operating system clarification needed on a floppy disk Elk Cloner s design combined with public ignorance failed verification about what malware was and how to protect against it led to Elk Cloner being responsible for the first large scale failed verification computer virus outbreak in history 12 1983 edit November The term virus is re coined by Frederick B Cohen in describing self replicating computer programs In 1984 Cohen uses the phrase computer virus suggested by his teacher Leonard Adleman to describe the operation of such programs in terms of infection He defines a virus as a program that can infect other programs by modifying them to include a possibly evolved copy of itself Cohen demonstrates a virus like program on a VAX11 750 system at Lehigh University The program could install itself in or infect other system objects 13 failed verification 1984 edit August Ken Thompson publishes his seminal paper Reflections on Trusting Trust in which he describes how he modified a C compiler so that when used to compile a specific version of the Unix operating system it inserts a backdoor into the login command and when used to compile a new copy of itself it inserts the backdoor insertion code even if neither the backdoor nor the backdoor insertion code is present in the source code of this new copy 14 1986 edit January The Brain boot sector virus is released Brain is considered the first IBM PC compatible virus and the program responsible for the first IBM PC compatible virus epidemic The virus is also known as Lahore Pakistani Pakistani Brain and Pakistani flu as it was created in Lahore Pakistan by 19 year old Pakistani programmer Basit Farooq Alvi and his brother Amjad Farooq Alvi 15 December Ralf Burger presented the Virdem model of programs at a meeting of the underground Chaos Computer Club in Germany The Virdem model represented the first programs that could replicate themselves via addition of their code to executable DOS files in COM format 16 1987 edit Appearance of the Vienna virus which was subsequently neutralized the first time this had happened on the IBM platform 17 Appearance of Lehigh virus discovered at its namesake university 17 boot sector viruses such as Yale from the US Stoned from New Zealand Ping Pong from Italy and appearance of the first self encrypting file virus Cascade Lehigh was stopped on campus before it spread to the wild to computers beyond the university and as a result has never been found elsewhere A subsequent infection of Cascade in the offices of IBM Belgium led to IBM responding with its own antivirus product development Prior to this antivirus solutions developed at IBM were intended for staff use only October The Jerusalem virus part of the at that time unknown Suriv family is detected in the city of Jerusalem The virus destroys all executable files on infected machines upon every occurrence of Friday the 13th except Friday 13 November 1987 making its first trigger date May 13 1988 Jerusalem caused a worldwide epidemic in 1988 17 November The SCA virus a boot sector virus for Amiga computers appears It immediately creates a pandemic virus writer storm A short time later SCA releases another considerably more destructive virus the Byte Bandit December Christmas Tree EXEC was the first widely disruptive replicating network program which paralyzed several international computer networks in December 1987 It was written in Rexx on the VM CMS operating system and originated in West Germany It re emerged in 1990 1988 edit March 1 The Ping Pong virus also called Boot Bouncing Ball Bouncing Dot Italian Italian A or VeraCruz an MS DOS boot sector virus is discovered at the University of Turin in Italy June The CyberAIDS and Festering Hate Apple ProDOS viruses spreads from underground pirate BBS systems and starts infecting mainstream networks Festering Hate was the last iteration of the CyberAIDS series extending back to 1985 and 1986 Unlike the few Apple viruses that had come before which were essentially annoying but did no damage the Festering Hate series of viruses was extremely destructive spreading to all system files it could find on the host computer hard drive floppy and system memory and then destroying everything when it could no longer find any uninfected files November 2 The Morris worm created by Robert Tappan Morris infects DEC VAX and Sun machines running BSD UNIX that are connected to the Internet and becomes the first worm to spread extensively in the wild and one of the first well known programs exploiting buffer overrun vulnerabilities December The Father Christmas worm attacks DEC VAX machines running VMS that are connected to the DECnet Internet an international scientific research network using DECnet protocols affecting NASA and other research centers Its purpose was to deliver a Christmas greeting to all affected users 1989 edit October Ghostball the first multipartite virus is discovered by Fridrik Skulason It infects both executable COM files and boot sectors on MS DOS systems December Several thousand floppy disks containing the AIDS Trojan the first known ransomware are mailed to subscribers of PC Business World magazine and a WHO AIDS conference mailing list This DOS Trojan lies dormant for 90 boot cycles then encrypts all filenames on the system displaying a notice asking for 189 to be sent to a post office box in Panama in order to receive a decryption program 1990s edit1990 edit Mark Washburn working on an analysis of the Vienna and Cascade viruses with Ralf Burger develops the first family of polymorphic viruses the Chameleon family Chameleon series debuted with the release of 1260 18 19 20 June The Form computer virus is isolated in Switzerland It would remain in the wild for almost 20 years and reappear afterward during the 1990s it tended to be the most common virus in the wild with 20 to more than 50 percent of reported infections 1991 edit Mattel releases a toyline called Computer Warriors bringing computer viruses into mainstream media The villain Megahert is a sentient computer virus 1992 edit March The Michelangelo virus was expected to create a digital apocalypse on March 6 with millions of computers having their information wiped according to mass media hysteria surrounding the virus Later assessments of the damage showed the aftermath to be minimal John McAfee had been quoted by the media as saying that five million computers would be affected He later said that pressed by the interviewer to come up with a number he had estimated a range from five thousand to five million but the media naturally went with just the higher number October Milton Bradley releases Omega Virus a board game containing one of the first examples of a sentient computer virus in mainstream media 1993 edit Leandro or Leandro amp Kelly 21 and Freddy Krueger 22 spread quickly due to popularity of BBS and shareware distribution 1994 edit April OneHalf is a DOS based polymorphic computer virus September ReBoot first airs containing another memorable fictional sentient computer virus Megabyte 1995 edit The first Macro virus called Concept is created It attacked Microsoft Word documents 23 1996 edit Ply DOS 16 bit based complicated polymorphic virus appeared with a built in permutation engine Boza the first virus designed specifically for Windows 95 files arrives Laroux the first Excel macro virus appears Staog the first Linux virus attacks Linux machines1997 edit Esperanto the first cross platform virus appears 1998 edit June 2 The first version of the CIH virus appears It is the first known virus able to erase flash ROM BIOS content 1999 edit January 20 The Happy99 worm first appeared It invisibly attaches itself to emails displays fireworks to hide the changes being made and wishes the user a happy New Year It modifies system files related to Outlook Express and Internet Explorer IE on Windows 95 and Windows 98 March 26 The Melissa worm was released targeting Microsoft Word and Outlook based systems and creating considerable network traffic June 6 The ExploreZip worm which destroys Microsoft Office documents was first detected September the CTX virus is isolated December 30 The Kak worm is a JavaScript computer worm that spread itself by exploiting a bug in Outlook Express 24 2000s edit2000 edit May 5 The ILOVEYOU worm also known as the Love Letter VBS or Love Bug worm a computer worm written in VBScript and using social engineering techniques infected millions of Windows computers worldwide within a few hours of its release June 28 The Pikachu virus is believed to be the first computer virus geared at children It contains the character Pikachu from the Pokemon series The operating systems affected by this worm are Windows 95 Windows 98 and Windows ME 2001 edit February 11 The Anna Kournikova virus hits e mail servers hard by sending e mail to contacts in the Microsoft Outlook addressbook 25 Its creator Jan de Wit was sentenced to 150 hours of community service 26 March 13 Magistr also called Disembowler is discovered It is a complex email worm for Windows systems with multiple payloads that trigger months apart from each other It targets members of the Law profession by searching the files on a user s computer for various keywords relating to court proceedings activating if such are found 27 May 8 The Sadmind worm spreads by exploiting holes in both Sun Solaris and Microsoft IIS July The Sircam worm is released spreading through Microsoft systems via e mail and unprotected network shares July 13 The Code Red worm attacking the Index Server ISAPI Extension in Microsoft Internet Information Services is released August 4 A complete re write of the Code Red worm Code Red II begins aggressively spreading onto Microsoft systems primarily in China September 18 The Nimda worm is discovered and spreads through a variety of means including vulnerabilities in Microsoft Windows and backdoors left by Code Red II and Sadmind worm October 26 The Klez worm is first identified It exploits a vulnerability in Microsoft Internet Explorer and Microsoft Outlook and Outlook Express 2002 edit February 11 The Simile virus is a metamorphic computer virus written in assembly Beast is a Windows based backdoor Trojan horse more commonly known as a RAT Remote Administration Tool It is capable of infecting almost all versions of Windows Written in Delphi and released first by its author Tataye in 2002 its most current version was released on October 3 2004 March 7 Mylife is a computer worm that spread itself by sending malicious emails to all the contacts in Microsoft Outlook 28 September 16 Another fictional sentient computer virus appears in animation Swayzak from Toonami s Total Immersion Event Trapped in Hyperspace and its corresponding game on the Cartoon Network website 2003 edit January 24 The SQL Slammer worm aka Sapphire worm Helkern and other names attacks vulnerabilities in Microsoft SQL Server and MSDE becomes the fastest spreading worm of all time measured by doubling time at the peak rate of growth 29 causing massive Internet access disruptions worldwide just fifteen minutes after infecting its first victim 30 April 2 Graybird is a trojan horse also known as Backdoor Graybird 31 June 13 ProRat is a Turkish made Microsoft Windows based backdoor trojan horse more commonly known as a RAT Remote Administration Tool 32 August 12 The Blaster worm aka the Lovesan worm rapidly spreads by exploiting a vulnerability in system services present on Windows computers August 18 The Welchia Nachi worm is discovered The worm tries to remove the Blaster worm and patch Windows August 19 The Sobig worm technically the Sobig F worm spreads rapidly through Microsoft systems via mail and network shares September 18 Swen is a computer worm written in C 33 October 24 The Sober worm is first seen on Microsoft systems and maintains its presence until 2005 with many new variants The simultaneous attacks on network weak points by the Blaster and Sobig worms cause massive damage November 10 Agobot is a computer worm that can spread itself by exploiting vulnerabilities on Microsoft Windows Some of the vulnerabilities are MS03 026 and MS05 039 34 November 20 Bolgimo is a computer worm that spread itself by exploiting a buffer overflow vulnerability at Microsoft Windows DCOM RPC Interface 35 2004 edit January 18 Bagle is a mass mailing worm affecting all versions of Microsoft Windows There were two variants of Bagle worm Bagle A and Bagle B Bagle B was discovered on February 17 2004 January 26 The MyDoom worm emerges and currently holds the record for the fastest spreading mass mailer worm The worm was most notable for performing a distributed denial of service DDoS attack on www sco com which belonged to The SCO Group February 16 The Netsky worm is discovered The worm spreads by email and by copying itself to folders on the local hard drive as well as on mapped network drives if available Many variants of the Netsky worm appeared March 19 The Witty worm is a record breaking worm in many regards It exploited holes in several Internet Security Systems ISS products It was the fastest computer issue to be categorized as a worm and it was the first internet worm to carry a destructive payload citation needed It spread rapidly using a pre populated list of ground zero hosts May 1 The Sasser worm emerges by exploiting a vulnerability in the Microsoft Windows LSASS service and causes problems in networks while removing MyDoom and Bagle variants even interrupting business June 15 Caribe or Cabir is a computer worm that is designed to infect mobile phones that run Symbian OS It is the first computer worm that can infect mobile phones It spread itself through Bluetooth More information can be found on F Secure 36 and Symantec 37 August 16 Nuclear RAT short for Nuclear Remote Administration Tool is a backdoor trojan that infects Windows NT family systems Windows 2000 Windows XP Windows 2003 38 August 20 Vundo or the Vundo Trojan also known as Virtumonde or Virtumondo and sometimes referred to as MS Juan is a trojan known to cause popups and advertising for rogue antispyware programs and sporadically other misbehavior including performance degradation and denial of service with some websites including Google and Facebook 39 October 12 Bifrost also known as Bifrose is a backdoor trojan which can infect Windows 95 through Vista Bifrost uses the typical server server builder and client backdoor program configuration to allow a remote attack 40 December Santy the first known webworm is launched It exploited a vulnerability in phpBB and used Google to find new targets It infected around 40000 sites before Google filtered the search query used by the worm preventing it from spreading 2005 edit August 2005 Zotob is a computer worm which exploits security vulnerabilities in Microsoft operating systems like Windows 2000 including the MS05 039 plug and play vulnerability This worm has been known to spread on Microsoft ds or TCP port 445 October 2005 The copy protection rootkit deliberately and surreptitiously included on music CDs sold by Sony BMG is exposed The rootkit creates vulnerabilities on affected computers making them susceptible to infection by worms and viruses Late 2005 The Zlob Trojan is a Trojan horse program that masquerades as a required video codec in the form of the Microsoft Windows ActiveX component It was first detected in late 2005 41 2006 edit January 20 The Nyxem worm was discovered It spread by mass mailing Its payload which activates on the third of every month starting on February 3 attempts to disable security related and file sharing software and destroy files of certain types such as Microsoft Office files February 16 Discovery of the first ever malware for Mac OS X a low threat trojan horse known as OSX Leap A or OSX Oompa A is announced Late March Brontok variant N was found in late March 42 Brontok was a mass email worm and the origin for the worm was from Indonesia June Starbucks is a virus that infects StarOffice and OpenOffice Late September Stration or Warezov worm first discovered Development of Stuxnet is presumed to have been started between 2005 and 2006 2007 edit January 17 Storm Worm identified as a fast spreading email spamming threat to Microsoft systems It begins gathering infected computers into the Storm botnet By around June 30 it had infected 1 7 million computers and it had compromised between 1 and 10 million computers by September 43 Thought to have originated from Russia it disguises itself as a news email containing a film about bogus news stories asking the user to download the attachment which it claims is a film July Zeus is a trojan that targets Microsoft Windows to steal banking information by keystroke logging 2008 edit February 17 Mocmex is a trojan which was found in a digital photo frame in February 2008 It was the first serious computer virus on a digital photo frame The virus was traced back to a group in China 44 March 3 Torpig also known as Sinowal and Mebroot is a Trojan horse that affects Windows turning off anti virus applications It allows others to access the computer modifies data steals confidential information such as user passwords and other sensitive data and installs more malware on the victim s computer 45 May 6 Rustock C a hitherto rumored spambot type malware with advanced rootkit capabilities was announced to have been detected on Microsoft systems and analyzed having been in the wild and undetected since October 2007 at the very least 46 July 6 Bohmini A is a configurable remote access tool or trojan that exploits security flaws in Adobe Flash 9 0 115 with Internet Explorer 7 0 and Firefox 2 0 under Windows XP SP2 47 July 31 The Koobface computer worm targets users of Facebook and Myspace New variants constantly appear 48 November 21 Computer worm Conficker infects anywhere from 9 to 15 million Microsoft server systems running everything from Windows 2000 to the Windows 7 Beta The French Navy 49 UK Ministry of Defence including Royal Navy warships and submarines 50 Sheffield Hospital network 51 German Bundeswehr 52 and Norwegian Police were all affected Microsoft sets a bounty of US 250 000 for information leading to the capture of the worm s author s 53 Five main variants of the Conficker worm are known and have been dubbed Conficker A B C D and E They were discovered 21 November 2008 29 December 2008 20 February 2009 4 March 2009 and 7 April 2009 respectively On December 16 2008 Microsoft releases KB958644 54 patching the server service vulnerability responsible for the spread of Conficker 2009 edit July 4 The July 2009 cyber attacks occur and the emergence of the W32 Dozer attack the United States and South Korea July 15 Symantec discovered Daprosy Worm a trojan worm is intended to steal online game passwords in internet cafes It could intercept all keystrokes and send them to its author making it potentially a very dangerous worm to infect B2B business to business systems August 24 Source code for MegaPanzer is released by its author under GPLv3 55 and appears to have been apparently detected in the wild 56 November 27 The virus Kenzero is a virus that spreads online from peer to peer networks P2P taking browsing history 57 2010s edit2010 edit January The Waledac botnet sent spam emails In February 2010 an international group of security researchers and Microsoft took Waledac down 58 January The Psyb0t worm is discovered It is thought to be unique in that it can infect routers and high speed modems 59 February 18 Microsoft announced that a BSoD problem on some Windows machines which was triggered by a batch of Patch Tuesday updates was caused by the Alureon Trojan 60 June 17 Stuxnet a Windows Trojan was detected 61 It is the first worm to attack SCADA systems 62 There are suggestions that it was designed to target Iranian nuclear facilities 63 It uses a valid certificate from Realtek 64 September 9 The virus called here you have or VBMania is a simple Trojan horse that arrives in the inbox with the odd but suggestive subject line here you have The body reads This is The Document I told you about you can find it Here or This is The Free Download Sex Movies you can find it Here 2011 edit SpyEye and Zeus merged code is seen 65 New variants attack mobile phone banking information 66 Anti Spyware 2011 a Trojan horse that attacks Windows 9x 2000 XP Vista and Windows 7 posing as an anti spyware program It disables security related processes of anti virus programs while also blocking access to the Internet which prevents updates 67 Summer 2011 The Morto worm attempts to propagate itself to additional computers via the Microsoft Windows Remote Desktop Protocol RDP Morto spreads by forcing infected systems to scan for Windows servers allowing RDP login Once Morto finds an RDP accessible system it attempts to log into a domain or local system account named Administrator using several common passwords 68 A detailed overview of how the worm works along with the password dictionary Morto uses was done by Imperva 69 July 13 the ZeroAccess rootkit also known as Sirefef or max was discovered September 1 Duqu is a worm thought to be related to the Stuxnet worm The Laboratory of Cryptography and System Security CrySyS Lab 70 of the Budapest University of Technology and Economics in Hungary discovered the threat analysed the malware and wrote a 60 page report naming the threat Duqu 71 72 Duqu gets its name from the prefix DQ it gives to the names of files it creates 73 2012 edit May Flame also known as Flamer sKyWIper and Skywiper a modular computer malware that attacks computers running Microsoft Windows Used for targeted cyber espionage in Middle Eastern countries Its discovery was announced on 28 May 2012 by MAHER Center of Iranian National Computer Emergency Response Team CERT Kaspersky Lab and CrySyS Lab of the Budapest University of Technology and Economics CrySyS stated in their report that sKyWIper is certainly the most sophisticated malware we encountered during our practice arguably it is the most complex malware ever found 74 August 16 Shamoon is a computer virus designed to target computers running Microsoft Windows in the energy sector Symantec Kaspersky Lab and Seculert announced its discovery on August 16 2012 September 20 NGRBot is a worm that uses the IRC network for file transfer sending and receiving commands between zombie network machines and the attacker s IRC server and monitoring and controlling network connectivity and intercept It employs a user mode rootkit technique to hide and steal its victim s information This family of bot is also designed to infect HTML pages with inline frames iframes causing redirections blocking victims from getting updates from security antimalware products and killing those services The bot is designed to connect via a predefined IRC channel and communicate with a remote botnet 75 76 2013 edit September The CryptoLocker Trojan horse is discovered CryptoLocker encrypts the files on a user s hard drive then prompts them to pay a ransom to the developer to receive the decryption key In the following months several copycat ransomware Trojans were also discovered December The Gameover ZeuS Trojan is discovered This type of virus steals one s login details on popular Web sites that involve monetary transactions It works by detecting a login page then proceeds to inject malicious code into the page keystroke logging the computer user s details December Linux Darlloz targets the Internet of things and infects routers security cameras set top boxes by exploiting a PHP vulnerability 77 78 2014 edit November The Regin Trojan horse is discovered Regin is a dropper primarily spread via spoofed Web pages Once installed it quietly downloads additional malware making it difficult for signature based anti virus programs to detect It is believed to have been created by the United States and United Kingdom as a tool for espionage and mass surveillance citation needed 2015 edit The BASHLITE malware is leaked leading to a massive spike in DDoS attacks 79 Linux Wifatch is revealed to the general public It is found to attempt to secure devices from other more malicious malware 80 81 82 2016 edit January A trojan named MEMZ is created The creator Leurak explained that the trojan was intended merely as a joke 83 The trojan alerts the user to the fact that it is a trojan and warns them that if they proceed the computer may no longer be usable It contains complex payloads that corrupt the system displaying artifacts on the screen as it runs Once run the application cannot be closed without causing further damage to the computer which will stop functioning properly regardless When the computer is restarted in place of the bootsplash is a message that reads Your computer has been trashed by the MEMZ Trojan Now enjoy the Nyan cat which follows with an animation of the Nyan Cat 84 February Ransomware Locky with its over 60 derivatives spread throughout Europe and infected several million computers At the height of the spread over five thousand computers per hour were infected in Germany alone 85 Although ransomware was not a new thing at the time insufficient cyber security as well as a lack of standards in IT was responsible for the high number of infections 86 Unfortunately even up to date antivirus and internet security software was unable to protect systems from early versions of Locky 87 February Tiny Banker Trojan Tinba makes headlines 88 Since its discovery it has been found to have infected more than two dozen major banking institutions in the United States including TD Bank Chase HSBC Wells Fargo PNC and Bank of America 89 90 Tiny Banker Trojan uses HTTP injection to force the user s computer to believe that it is on the bank s website This spoof page will look and function just as the real one The user then enters their information to log on at which point Tinba can launch the bank webpage s incorrect login information return and redirect the user to the real website This is to trick the user into thinking they had entered the wrong information and proceed as normal although now Tinba has captured the credentials and sent them to its host 91 92 August Journalists and researchers report the discovery of spyware called Pegasus developed and distributed by a private company which can and has been used to infect iOS and Android smartphones often based on 0 day exploits without the need for any user interaction or significant clues to the user and then be used to exfiltrate data track user locations capture film through its camera and activate the microphone at any time The investigation suggests it was used on many targets worldwide and revealed its use for e g governments espionage on journalists opposition politicians activists business people and others 93 September Mirai creates headlines by launching some of the most powerful and disruptive DDoS attacks seen to date by infecting the Internet of Things Mirai ends up being used in the DDoS attack on 20 September 2016 on the Krebs on Security site which reached 620 Gbit s 94 Ars Technica also reported a 1 Tbit s attack on French web host OVH 95 On 21 October 2016 multiple major DDoS attacks in DNS services of DNS service provider Dyn occurred using Mirai malware installed on a large number of IoT devices resulting in the inaccessibility of several high profile websites such as GitHub Twitter Reddit Netflix Airbnb and many others 96 The attribution of the attack to the Mirai botnet was originally reported by BackConnect Inc a security firm 97 2017 edit May The WannaCry ransomware attack spreads globally Exploits revealed in the NSA hacking toolkit leak of late 2016 were used to enable the propagation of the malware 98 Shortly after the news of the infections broke online a UK cybersecurity researcher in collaboration with others found and activated a kill switch hidden within the ransomware effectively halting the initial wave of its global propagation 99 The next day researchers announced that they had found new variants of the malware without the kill switch 100 June The Petya attack spreads globally affecting Windows systems Researchers at Symantec reveal that this ransomware uses the EternalBlue exploit similar to the one used in the WannaCry ransomware attack 101 102 103 September The Xafecopy Trojan attacks 47 countries affecting only Android operating systems Kaspersky Lab identified it as a malware from the Ubsod family stealing money through click based WAP billing systems 104 105 September A new variety of Remote Access Trojan RAT Kedi RAT is distributed in a Spear Phishing Campaign The attack targeted Citrix users The Trojan was able to evade usual system scanners Kedi Trojan had all the characteristics of a common Remote Access Trojan and it could communicate to its Command and Control center via Gmail using common HTML HTTP protocols 106 107 2018 edit February Thanatos a ransomware becomes the first ransomware program to accept ransom payment in Bitcoin Cash 108 2019 edit November Titanium is an advanced backdoor malware developed by the PLATINUM APT 109 2020s edit2024 edit Researchers Nassi Cohen and Bitton developed a computer worm called Morris II targeting generative AI email assistants to steal data and send spam thereby breaching security protections of systems like ChatGPT and Gemini Conducted in a test environment this research highlights the security risks of multimodal large language models LLMs that now generate text images and videos Generative AI systems which operate on prompts can be exploited through weaponized prompts For instance hidden text on a webpage could instruct an LLM to perform malicious activities such as phishing for bank details While generative AI worms like Morris II haven t been observed in the public their potential threat is a concern for the tech industry 110 March 29 XZ Utils backdoor is discovered 111 April 1 The Linux s WALLSCAPE Bug is discovered See also editHelpful worm History of computer viruses List of security hacking incidents Timeline of computing 2020 presentReferences edit von Neumann John 1966 Arthur W Burks ed Theory of self reproducing automata PDF University of Illinois Press Retrieved June 12 2010 The Scarred Man Returns GREGORY BENFORD Retrieved 2021 09 12 Chen Thomas Robert Jean Marc 2004 The Evolution of Viruses and Worms Archived from the original on 2009 05 17 Retrieved 2009 02 16 Russell Deborah Gangemi G T 1991 Computer Security Basics O Reilly p 86 ISBN 0 937175 71 4 IMDB synopsis of Westworld www imdb com Retrieved November 28 2015 Michael Crichton November 21 1973 Westworld movie 201 S Kinney Road Tucson Arizona USA Metro Goldwyn Mayer Event occurs at 32 minutes And there s a clear pattern here which suggests an analogy to an infectious disease process spreading from one resort area to the next Perhaps there are superficial similarities to disease I must confess I find it difficult to believe in a disease of machinery a href Template Cite AV media html title Template Cite AV media cite AV media a CS1 maint location link The very first viruses Creeper Wabbit and Brain Daniel Snyder InfoCarnivore May 30 2010 ANIMAL Source Code Fourmilab ch 1996 08 13 Retrieved 2012 03 29 The Animal Episode Fourmilab ch Retrieved 2012 03 29 Craig E Engler 1997 The Shockwave Rider Classic Sci Fi Reviews Archived from the original on 2008 07 03 Retrieved 2008 07 28 Ryan Thomas J 1977 The Adolescence of P 1 1st ed New York Macmillan ISBN 0 02 606500 2 First virus hatched as a practical joke The Sydney Morning Herald AP 3 September 2007 Retrieved 9 September 2013 Fred Cohen 1983 11 03 Computer Viruses Theory and Experiments eecs umich edu Retrieved 2012 03 29 Thompson Ken August 1984 Reflections on Trusting Trust Communications of the ACM 27 8 761 763 doi 10 1145 358198 358210 S2CID 34854438 Leyden John January 19 2006 PC virus celebrates 20th birthday The Register Retrieved March 21 2011 Szor Peter 2005 The Art of Computer Virus Research and Defense Symantec Press Addison Wesley Professional ISBN 978 0 321 30454 4 a b c Wentworth Rob July 1996 Computer Virus reprinted from The Digital Viking Twin Cities PC User Group Archived from the original on 24 December 2013 Retrieved 9 September 2013 Virus DOS Chameleon 1260 Securelist Viruslist com Archived from the original on 2012 09 19 Retrieved 2010 07 10 V2PX Vil nai com Archived from the original on 2009 07 22 Retrieved 2010 07 10 What we detect Securelist Viruslist com Archived from the original on 2009 07 13 Retrieved 2010 07 10 Leandro Threat Encyclopedia Trend Micro 9 March 2000 Retrieved 9 September 2013 Freddy Virus Virus Information Summary List December 1992 Retrieved 9 September 2013 Glossary Securelist Viruslist com Retrieved 2010 07 10 Wscript KakWorm Symantec Retrieved 2012 03 29 Kournikova computer virus hits hard BBC News February 13 2001 Retrieved April 9 2010 Evers Joris May 3 2002 Kournikova virus maker appeals sentence Retrieved 20 November 2010 Magistr the Virus Encyclopedia The Virus Encyclopedia Retrieved 21 October 2021 MyLife Worm Antivirus about com 2002 03 07 Retrieved 2012 03 29 The Spread of the Sapphire Slammer Worm Retrieved 2012 12 14 Slammed Wired July 2003 Retrieved 2012 12 14 Sevcenco Serghei February 10 2006 Symantec Security Response Backdoor Graybird Symantec Archived from the original on December 11 2003 Retrieved 2009 03 01 Backdoor Prorat Symantec February 13 2007 Retrieved 2009 03 01 Threat Description Worm W32 Swen F secure com Retrieved 2012 03 29 Backdoor Win32 Agobot gen Securelist Archived from the original on 2012 03 15 Retrieved 2012 03 29 W32 Bolgi Worm Symantec Retrieved 2012 03 29 Threat Description Bluetooth Worm SymbOS Cabir F secure com Retrieved 2012 03 29 SymbOS Cabir Symantec Retrieved 2012 03 29 Spyware Detail Nuclear RAT 1 0b1 Computer Associates August 16 2004 Archived from the original on 2009 09 11 Retrieved 2009 03 01 Vundo McAfee Archived from the original on 2009 02 17 Retrieved 2009 03 01 Backdoor Bifrose Symantec Inc October 12 2004 Retrieved 2009 02 28 The ZLOB Show Trojan Poses as Fake Video Codec Loads More Threats Trend Micro Retrieved 2009 02 28 Threat Description Email Worm W32 Brontok N F secure com Retrieved 2012 03 29 Peter Gutmann 31 August 2007 World s most powerful supercomputer goes online Full Disclosure Retrieved 2007 11 04 Gage Deborah February 17 2005 Chinese PC virus may have hidden agenda Seattle PI Retrieved 2009 03 01 Kimmo March 3 2008 MBR Rootkit A New Breed of F Secure Retrieved 2009 03 01 Win32 Ntldrbot aka Rustock Dr Web Ltd Retrieved 2009 03 01 Virus Total virustotal com July 8 2008 Archived from the original on 2009 04 01 Retrieved 2009 03 01 Koobface malware makes a comeback cnet com April 9 2010 Retrieved 2009 04 13 Willsher Kim 2009 02 07 French fighter planes grounded by computer virus The Daily Telegraph London Retrieved 2009 04 01 Williams Chris 2009 01 20 MoD networks still malware plagued after two weeks The Register Retrieved 2009 01 20 Williams Chris 2009 01 20 Conficker seizes city s hospital network The Register Retrieved 2009 01 20 Conficker Wurm infiziert hunderte Bundeswehr Rechner in German PC Professionell 2009 02 16 Archived from the original on 2009 03 21 Retrieved 2009 04 01 Neild Barry 2009 02 13 250K Microsoft bounty to catch worm creator CNN Retrieved 2009 03 29 MS08 067 Vulnerability in Server service could allow remote code execution Microsoft Corporation Dancho Danchev Source code for Skype eavesdropping trojan in the wild ZDNet Code for Skype Spyware Released to Thwart Surveillance WIRED 31 August 2009 Harvison Josh September 27 2010 Blackmail virus infects computers holds information ransom kait8 com Archived from the original on 2016 06 11 Retrieved 20 November 2010 Waledac Takedown Successful honeyblog org February 25 2010 Retrieved 16 November 2012 Paul Ian 25 March 2009 Nasty New Worm Targets Home Routers Cable Modems PC World Retrieved 2009 03 26 Alureon trojan caused Windows 7 BSoD microsoft com February 18 2010 Retrieved 2010 02 18 VirusBlokAda News Anti virus by Retrieved 2012 03 29 Gregg Keizer 16 September 2010 Is Stuxnet the best malware ever InfoWorld Archived from the original on 5 December 2012 Retrieved 16 September 2010 Stuxnet virus worm could be aimed at high profile Iranian targets Telegraph 23 Sep 2010 Possible New Rootkit Has Drivers Signed by Realtek Kaspersky Labs 15 July 2010 Bastard child of SpyEye ZeuS merger appears online The Register 2011 Retrieved April 11 2011 Bastard child of SpyEye ZeuS merger appears online SpyEye mobile banking Trojan uses same tactics as ZeuS The Register 2011 Retrieved April 11 2011 SpyEye mobile banking Trojan uses same tactics as ZeuS XP AntiSpyware 2011 Virus Solution and Removal Precisesecurity com Retrieved 2012 03 29 Morto Worm Spreads to Weak Systems blogs appriver com 2011 Archived from the original on 2011 10 14 Retrieved 2011 08 31 Morto Post Mortem Dissecting a Worm blog imperva com 2011 Laboratory of Cryptography and System Security CrySyS Retrieved 4 November 2011 Duqu A Stuxnet like malware found in the wild technical report PDF Laboratory of Cryptography of Systems Security CrySyS 14 October 2011 Statement on Duqu s initial analysis Laboratory of Cryptography of Systems Security CrySyS 21 October 2011 Archived from the original on 2 October 2012 Retrieved 25 October 2011 W32 Duqu The precursor to the next Stuxnet Version 1 4 PDF Symantec 23 November 2011 Retrieved 30 December 2011 sKyWIper A Complex Malware for Targeted Attacks PDF Budapest University of Technology and Economics 28 May 2012 Archived from the original PDF on 28 May 2012 Retrieved 29 May 2012 NGRBot Enigma Software Group 15 October 2012 Retrieved 9 September 2013 Dissecting the NGR bot framework IRC botnets die hard Aditya K Sood and Richard J Enbody Michigan State University USA and Rohit Bansal SecNiche Security USA with Helen Martin1 ed January 2012 Retrieved 9 September 2013 subscription required Goodin Dan 2013 11 27 New Linux worm targets routers cameras Internet of things devices Ars Technica Retrieved October 24 2016 Sterling Bruce 2014 01 29 Linux Darlloz the Internet of Things worm Wired Retrieved 24 October 2016 Attack of Things Level 3 Threat Research Labs 25 August 2016 Retrieved 6 November 2016 Ballano Mario 1 Oct 2015 Is there an Internet of Things vigilante out there Symantec Retrieved 14 November 2016 linux wifatch The White Team October 5 2015 Retrieved 15 November 2016 Cimpanu Catalin Oct 7 2015 Creators of the Benevolent Linux Wifatch Malware Reveal Themselves Softpedia Retrieved 14 November 2016 Oberhaus Daniel July 9 2016 Watch This Malware Turn a Computer into a Digital Hellscape Motherboard Retrieved July 4 2018 Dean Madeleine August 26 2016 MEMZ virus what is it and how it affects Windows PC Windows Report Retrieved July 4 2018 Ransomware Erpresserische Schadprogramme Archived 2016 02 21 at the Wayback Machine bsi fuer buerger de 9 February 2016 Retrieved 10 March 2016 Locky ransomware on aggressive hunt for victims Symantec com 18 February 2016 Retrieved 10 March 2016 Antivirus scan for Locky virustotal com 16 February 2016 Retrieved 10 March 2016 danielevir 19 September 2014 Tiny Banker Malware Attempted At Customers Of US Banks Massive Alliance Retrieved 10 September 2017 Modified Tiny Banker Trojan Found Targeting Major U S Banks Entrust Inc Jeremy Kirk 15 September 2014 Tiny banker malware targets US financial institutions PCWorld Tiny Banker Malware Targets Dozens of Major US Financial Institutions The State of Security 2014 09 16 Tiny Tinba Banking Trojan Is Big Trouble msnbc com 2012 05 31 What is Pegasus spyware and how does it hack phones The Guardian 18 July 2021 Retrieved 13 August 2021 The Economist 8 October 2016 The internet of stings Bonderud Douglas October 4 2016 Leaked Mirai Malware Boosts IoT Insecurity Threat Level securityintelligence com Retrieved 20 October 2016 Today the web was broken by countless hacked devices theregister co uk 21 October 2016 Retrieved 24 October 2016 Blame the Internet of Things for Destroying the Internet Today Motherboard VICE 2016 10 21 Retrieved 27 October 2016 Wong Julia Carrie Solon Olivia 2017 05 12 Massive ransomware cyber attack hits 74 countries around the world The Guardian ISSN 0261 3077 Retrieved 2017 05 12 Solon Olivia 2017 05 13 Accidental hero finds kill switch to stop spread of ransomware cyber attack The Guardian ISSN 0261 3077 Retrieved 2017 05 13 Khandelwal Swati It s Not Over WannaCry 2 0 Ransomware Just Arrived With No Kill Switch The Hacker News Retrieved 2017 05 14 Petya ransomware outbreak Here s what you need to know Retrieved 10 September 2017 Ransom Petya Symantec www symantec com Retrieved 10 September 2017 Petya Ransomware Outbreak Goes Global Krebs on Security krebsonsecurity com 28 June 2017 Retrieved 10 September 2017 New malware steals users money through mobile phones Report The Economic Times 10 September 2017 Retrieved 10 September 2017 Xafecopy Trojan a new malware detected in India it disguises itself as an app to steals money via mobile phones Tech2 2017 09 10 Retrieved 10 September 2017 Kedi RAT can steal your information and send it through gmail Beware the Kedi RAT pretending to be a Citrix file that Gmails home 2017 09 12 Abrams Lawrence February 26 2018 Thanatos Ransomware Is First to Use Bitcoin Cash Messes Up Encryption Bleeping Computer Retrieved June 25 2019 AMR GReAT 8 November 2019 Titanium the Platinum group strikes again Kaspersky Lab Retrieved 9 November 2019 WIRED 2024 03 02 Researchers create AI worms that can spread from one system to another Ars Technica Retrieved 2024 03 07 Corbet Jonathan 2024 03 29 A backdoor in xz LWN Retrieved 2024 04 03 External links editA short history of hacks worms and cyberterror by Mari Keefe Computerworld April 2009 5th Utility Ltd list of the 10 worst computer viruses of all time Retrieved from https en wikipedia org w index php title Timeline of computer viruses and worms amp oldid 1217853610 1975, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.