• Home
  • About
  • Contact
  • Privacy
  • Terms
  • DCMA
  • Write For Us / Submit
Tech News, Magazine & Review WordPress Theme 2017
  • Tech
    How Drones and 360-Degree Cameras Are Changing Bridal Photoshoots

    How Drones and 360-Degree Cameras Are Changing Bridal Photoshoots

    120+ Best Creative Names for Team at Work

    120+ Best Creative Names for Team at Work

    Can You Repair Printed Circuit Board ?

    Mastering PCB Board Repair Comprehensive Guide

    Breaking Barriers Federal Inmate Texting Service

    Breaking Barriers Federal Inmate Texting Service

    transfer whatsapp from android to iphone

    How to Transfer WhatsApp from Android to iPhone!

    Understanding the Role of Humidity Chambers in Climate Testing

    Understanding the Role of Humidity Chambers in Climate Testing

    Everything You Get to Know About Movember Beard Memes

    Everything You Get to Know About Movember Beard Memes

    Best Book Recommendation Apps

    11 Best Book Recommendation Apps

    How to quickly divide or Split PDF files

    How to Quickly Divide or Split PDF Files

  • Gear
    • All
    • Camera
    • Laptop
    • Smartphone
    The New Galaxy Watch Ultra and Galaxy Ring Are Announced by Samsung

    The New Galaxy Watch Ultra and Galaxy Ring Are Announced by Samsung

    Exploring the Innovative Features of Pear Phones

    Exploring the Innovative Features of Pear Phones

    Latest Smart Home Gadgets for a Connected Life

    Latest Smart Home Gadgets for a Connected Life

    Eco-Friendly Products for Students

    Eco-Friendly Products for Students

    Essential Photography Equipment and Gadgets

    Mastering Your Shots: Essential Photography Equipment and Gadgets

    Level Up Your Game: Must-Have Gaming Gear!

    Level Up Your Game: Must-Have Gaming Gear!

    Trending Tags

    • Best iPhone 7 deals
    • Apple Watch 2
    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • iOS 10
    • iPhone 7
    • Sillicon Valley
  • Gaming
    Master the World of Online Gaming with the Best Gaming VPN

    Master the World of Online Gaming with 3 Best Gaming VPN

    7 Powerful Strategies to Overcome Video Game Addiction and Reclaim Your Life

    7 Powerful Strategies to Overcome Video Game Addiction and Reclaim Your Life

    Powerful Ways Xbox Cloud Gaming is Revolutionizing the Gaming World

    5 Powerful Ways Xbox Cloud Gaming is Revolutionizing the Gaming World

    9 Best Alternative Games Like Kahoot

    9 Best Alternative Games Like Kahoot

    The Top 8 Free Bubble Shooter Games for Endless Entertainment

    The Top 8 Free Bubble Shooter Games for Endless Entertainment

    Cloud Gaming Revolution: How Streaming is Changing the Future of Gaming

    Cloud Gaming Revolution: How Streaming is Changing the Future of Gaming

  • Crypto
    How Drones and 360-Degree Cameras Are Changing Bridal Photoshoots

    How Drones and 360-Degree Cameras Are Changing Bridal Photoshoots

    120+ Best Creative Names for Team at Work

    120+ Best Creative Names for Team at Work

    Can You Repair Printed Circuit Board ?

    Mastering PCB Board Repair Comprehensive Guide

    Breaking Barriers Federal Inmate Texting Service

    Breaking Barriers Federal Inmate Texting Service

    transfer whatsapp from android to iphone

    How to Transfer WhatsApp from Android to iPhone!

    Understanding the Role of Humidity Chambers in Climate Testing

    Understanding the Role of Humidity Chambers in Climate Testing

    Everything You Get to Know About Movember Beard Memes

    Everything You Get to Know About Movember Beard Memes

    Best Book Recommendation Apps

    11 Best Book Recommendation Apps

    How to quickly divide or Split PDF files

    How to Quickly Divide or Split PDF Files

  • Business
    How Drones and 360-Degree Cameras Are Changing Bridal Photoshoots

    How Drones and 360-Degree Cameras Are Changing Bridal Photoshoots

    120+ Best Creative Names for Team at Work

    120+ Best Creative Names for Team at Work

    Can You Repair Printed Circuit Board ?

    Mastering PCB Board Repair Comprehensive Guide

    Breaking Barriers Federal Inmate Texting Service

    Breaking Barriers Federal Inmate Texting Service

    transfer whatsapp from android to iphone

    How to Transfer WhatsApp from Android to iPhone!

    Understanding the Role of Humidity Chambers in Climate Testing

    Understanding the Role of Humidity Chambers in Climate Testing

    Everything You Get to Know About Movember Beard Memes

    Everything You Get to Know About Movember Beard Memes

    Best Book Recommendation Apps

    11 Best Book Recommendation Apps

    How to quickly divide or Split PDF files

    How to Quickly Divide or Split PDF Files

No Result
View All Result
Geeky Insider
  • Tech
    How Drones and 360-Degree Cameras Are Changing Bridal Photoshoots

    How Drones and 360-Degree Cameras Are Changing Bridal Photoshoots

    120+ Best Creative Names for Team at Work

    120+ Best Creative Names for Team at Work

    Can You Repair Printed Circuit Board ?

    Mastering PCB Board Repair Comprehensive Guide

    Breaking Barriers Federal Inmate Texting Service

    Breaking Barriers Federal Inmate Texting Service

    transfer whatsapp from android to iphone

    How to Transfer WhatsApp from Android to iPhone!

    Understanding the Role of Humidity Chambers in Climate Testing

    Understanding the Role of Humidity Chambers in Climate Testing

    Everything You Get to Know About Movember Beard Memes

    Everything You Get to Know About Movember Beard Memes

    Best Book Recommendation Apps

    11 Best Book Recommendation Apps

    How to quickly divide or Split PDF files

    How to Quickly Divide or Split PDF Files

  • Gear
    • All
    • Camera
    • Laptop
    • Smartphone
    The New Galaxy Watch Ultra and Galaxy Ring Are Announced by Samsung

    The New Galaxy Watch Ultra and Galaxy Ring Are Announced by Samsung

    Exploring the Innovative Features of Pear Phones

    Exploring the Innovative Features of Pear Phones

    Latest Smart Home Gadgets for a Connected Life

    Latest Smart Home Gadgets for a Connected Life

    Eco-Friendly Products for Students

    Eco-Friendly Products for Students

    Essential Photography Equipment and Gadgets

    Mastering Your Shots: Essential Photography Equipment and Gadgets

    Level Up Your Game: Must-Have Gaming Gear!

    Level Up Your Game: Must-Have Gaming Gear!

    Trending Tags

    • Best iPhone 7 deals
    • Apple Watch 2
    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • iOS 10
    • iPhone 7
    • Sillicon Valley
  • Gaming
    Master the World of Online Gaming with the Best Gaming VPN

    Master the World of Online Gaming with 3 Best Gaming VPN

    7 Powerful Strategies to Overcome Video Game Addiction and Reclaim Your Life

    7 Powerful Strategies to Overcome Video Game Addiction and Reclaim Your Life

    Powerful Ways Xbox Cloud Gaming is Revolutionizing the Gaming World

    5 Powerful Ways Xbox Cloud Gaming is Revolutionizing the Gaming World

    9 Best Alternative Games Like Kahoot

    9 Best Alternative Games Like Kahoot

    The Top 8 Free Bubble Shooter Games for Endless Entertainment

    The Top 8 Free Bubble Shooter Games for Endless Entertainment

    Cloud Gaming Revolution: How Streaming is Changing the Future of Gaming

    Cloud Gaming Revolution: How Streaming is Changing the Future of Gaming

  • Crypto
    How Drones and 360-Degree Cameras Are Changing Bridal Photoshoots

    How Drones and 360-Degree Cameras Are Changing Bridal Photoshoots

    120+ Best Creative Names for Team at Work

    120+ Best Creative Names for Team at Work

    Can You Repair Printed Circuit Board ?

    Mastering PCB Board Repair Comprehensive Guide

    Breaking Barriers Federal Inmate Texting Service

    Breaking Barriers Federal Inmate Texting Service

    transfer whatsapp from android to iphone

    How to Transfer WhatsApp from Android to iPhone!

    Understanding the Role of Humidity Chambers in Climate Testing

    Understanding the Role of Humidity Chambers in Climate Testing

    Everything You Get to Know About Movember Beard Memes

    Everything You Get to Know About Movember Beard Memes

    Best Book Recommendation Apps

    11 Best Book Recommendation Apps

    How to quickly divide or Split PDF files

    How to Quickly Divide or Split PDF Files

  • Business
    How Drones and 360-Degree Cameras Are Changing Bridal Photoshoots

    How Drones and 360-Degree Cameras Are Changing Bridal Photoshoots

    120+ Best Creative Names for Team at Work

    120+ Best Creative Names for Team at Work

    Can You Repair Printed Circuit Board ?

    Mastering PCB Board Repair Comprehensive Guide

    Breaking Barriers Federal Inmate Texting Service

    Breaking Barriers Federal Inmate Texting Service

    transfer whatsapp from android to iphone

    How to Transfer WhatsApp from Android to iPhone!

    Understanding the Role of Humidity Chambers in Climate Testing

    Understanding the Role of Humidity Chambers in Climate Testing

    Everything You Get to Know About Movember Beard Memes

    Everything You Get to Know About Movember Beard Memes

    Best Book Recommendation Apps

    11 Best Book Recommendation Apps

    How to quickly divide or Split PDF files

    How to Quickly Divide or Split PDF Files

Submit
Geeky Insider
No Result
View All Result

The 10 Worst Computer Viruses in History

by Staff Writer
October 28, 2022
in Gadget and Gear
Reading Time: 8 mins read
Computer code in the shape of a skull on a screen
Share on FacebookShare on Twitter

solarseven/Shutterstock.com

Computer virus: Those two words instantly make us sweat—and for good reason. Since the 1980s, viruses have wreaked havoc on everything from our inboxes to industrial facilities. While cybersecurity has improved, the damage done by viruses throughout history is a reminder of what these bugs can do.

Picture it: It’s 1986, and you see a message on your Windows PC saying your computer is infected with a virus. To remedy the situation, you’re instructed to call brothers Basit and Amjad Farooq Alvi. At that moment, as you pick up your phone and start to dial, you immediately regret pirating the brothers’ software (as you should).

The virus was known as Brain, the first PC virus. It was technically built for the protection of software. However, the good intentions didn’t last. Soon, viruses were malicious in nature, resulting in billions of dollars of damage, identity theft, wrecked hardware…the list goes on.

Millions of viruses have existed since Brain in 1986. However, some have been considerably worse than others.

Table of Contents

Toggle
  • Melissa – 1999
  • ILOVEYOU – 2000
  • Code Red – 2001
  • Nimda – 2001
  • Sobig – 2003
  • Mydoom – 2004
  • Zeus – 2007
  • Stuxnet – 2010
  • PoisonIvy – 2011
    • READ ALSO
    • Mastering Your Shots: Essential Photography Equipment and Gadgets
    • Level Up Your Game: Must-Have Gaming Gear!
  • WannaCry – 2017
  • The Computer Virus Is Alive and Well

Melissa – 1999

In 1999, computer viruses were still a relatively new concept. However, the Melissa virus, known as the fastest-growing virus of that time, quickly highlighted them as a growing concern for all.

It all started when a man named David Lee Smith used an AOL account to upload a file to the internet that, when downloaded, would hijack early versions of Microsoft Word. If a user also had Microsoft Outlook, the virus would send itself via email to the top 50 people in a user’s address book.

While that may not seem like that big of a deal, it was. According to the FBI, many corporate and government email servers became overloaded and had to be shut down. In addition, internet traffic slowed to a trickle.

This virus did have a happy ending. A few months after David Lee Smith was sentenced for his crime, the FBI developed its Cyber Division, which still investigates cyber crime to this day.

ILOVEYOU – 2000

Who doesn’t want to find a love letter in their inbox? Unfortunately, many Romeos and Juliets in 2000 fell victim to a virus after clicking what looked like a love letter in Microsoft Outlook.

The ILOVEYOU virus (known as Love Bug back then) was technically a worm and started as a seemingly innocent email. The subject line, “ILOVEYOU,” drew email users to click. Inside, a text file titled “LOVE-LETTER-FOR-YOU.TXT.VBS” was waiting.

Once the text file was opened, the worm would go on to permanently damage files such as photos and critical documents on a user’s computer. Even worse, it would attach itself to all the addresses in Microsoft Outlook, spreading like wildfire.

As a worm, no further human intervention was required to keep ILOVEYOU moving. As a result, millions of computers became infected in only a matter of days.

Code Red – 2001

Computer screen with potential virusAudrius Merfeldas/Shutterstock.com

One of the more ominous-sounding viruses on our list, Code Red took over corporate IT in 2001. In fact, it’s regarded by many as the first severe attack on a corporate system.

The Code Red worm specifically targeted systems running Microsoft Internet Information Services (IIS) for Windows Server. As described in a Microsoft Security Bulletin, the attacker could use an unchecked buffer, establish a server session, conduct a buffer overrun, and execute code on the web server.

The result? Important websites would display “Welcome to http://www.worm.com! Hacked by Chinese!” and nothing else. The worm was also the cause of various dangerous denial-of-service (DoS) attacks.

But that ominous-sounding name? It was inspired by the drink the security employees were sipping when they found the worm: Mountain Dew Code Red.

Nimda – 2001

Nimda struck just a few months after Code Red and just a short time after the September 11th attacks that left us in shock. As a worm, Nimda was similar to ILOVEYOU and Code Red in that it replicated itself.

However, Nimda was particularly damaging as it was able to spread in various ways, including via email and compromised websites. Nimda affected Windows operating systems and was able to modify system files and even create guest accounts.

Due to Nimda, millions of machines were infected, and many large corporations had to shut down their networks and operations. The actual cost of Nimda has yet to be fully estimated. But trust us when we say it’s a lot.

Sobig – 2003

Person using a laptop displaying an email inboxTero Vesalainen/Shutterstock.com

While opening an email may not lead to infection, email attachments are a whole other can of worms (pun intended). Opening weird attachments from email addresses you don’t recognize is a big no-no. And while many email users today know this, things were different in 2003.

The Sobig worm infected millions of Microsoft computers via email. The threat would arrive in your inbox with a subject line like “Details” or “Thank you!” And inside, there would be an attachment just begging for a click.

When clicked, Sobig would infect the computer, search for other email addresses in various computer files, and then quickly replicate by sending itself to those addresses.

What’s worse, Sobig had multiple variants, including A, B, C, D, E, and F. The “F” variant was by far the worst of the group. In August of 2003, it was reported that one out of every 17 emails was a copy of the Sobig.F virus.

Due to its spreading capabilities, Sobig overwhelmed networks worldwide and resulted in billions of dollars in damages.

Mydoom – 2004

“I’m just doing my job, nothing personal, sorry.”

This was the email message sent by the email worm, Mydoom, first discovered in 2004. And a job it did, indeed. Mydoom quickly became the fastest-growing email worm in history. In fact, it still holds the title.

Similar to Sobig and other worms on this list, Mydoom was primarily spread through email attachments. If the attachment was opened, the worm would send itself to other email addresses found in the user’s address book or other local files.

The fast growth of Mydoom slowed internet traffic worldwide. At the time, it was reported that some websites were experiencing response times 8 to 10% lower than the average. Mydoom was also behind multiple DoS and DDoS attacks, including attacks against the US and South Korea.

Zeus – 2007

Zeus, also known as Zbot, is trojan malware infecting Microsoft Windows. The malware most commonly targets financial or banking information. The first sighting of Zeus was in 2007, when the malware was found stealing information from the US Department of Transportation.

Zeus works by developing a botnet, which is a network of remote-controlled computers or bots that have been infected by malware. As a result, an attacker can control multiple computers at once. Zeus often infects a computer after a user clicks a malicious link in an email or downloads an infected file.

Why is Zeus so dangerous? For example, the malware can use keylogging to capture sensitive information such as online banking passwords. In fact, in 2010, the FBI busted a crime ring that used the Zeus trojan to steal around $70 million from its victims.

Stuxnet – 2010

Stuxnet made headlines in 2010 as the first worm developed to target industrial control systems. The worm inflicted physical damage on Iran’s nuclear facilities, particularly centrifuges. How? By exploiting vulnerabilities found within Windows to gain access to the software used to control the industrial equipment.

Stuxnet was also unique in that the worm was first introduced to computers using infected USB drives. Yes, physical USB drives. Even now, Stuxnet is hailed as the world’s first cyberweapon.

PoisonIvy – 2011

PoisonIvy does more than make its victims itch. Known as a backdoor trojan or remote access trojan (RAT), PoisonIvy is used to gain access to a victim’s computer. While PoisonIvy isn’t a virus but a type of malware, it deserves a place on our list nonetheless.

READ ALSO

Latest Smart Home Gadgets for a Connected Life

Latest Smart Home Gadgets for a Connected Life

September 1, 2023
Eco-Friendly Products for Students

Eco-Friendly Products for Students

August 24, 2023

PoisonIvy was first identified in 2005. However, one of the most notable attacks using the trojan occurred in 2011. Known as the Nitro hacking attacks, PoisonIvy was used to steal critical information from chemical manufacturers, government agencies, and other organizations.

PoisonIvy is dangerous because threat actors can access a computer for keylogging, screen capturing, and more. The trojan is also used to steal passwords and other critical personal information.

WannaCry – 2017

Wannacry-like virus windowNice Scene/Shutterstock.com

The WannaCry ransomware attack took place in May 2017. The goal was simple: to hold a user’s files hostage and get paid in Bitcoin.

The WannaCry attack used a leaked hack known as EternalBlue to gain access to computers running Microsoft Windows. Once in, WannaCry would encrypt the computer’s data. Then, users would see a message demanding a Bitcoin payment for the release of their files.

Unfortunately, WannaCry did have its victims. In 2017, the damage was estimated to be in the billions. Even today, WannaCry still exists, highlighting the importance of protecting ourselves from ransomware.

The Computer Virus Is Alive and Well

As technology evolves, so does the work of cybercriminals. While you may see the years listed above and get the impression that viruses are a thing of the past, that couldn’t be further from the truth.

Serious threats such as ransomware are alive and well. The best thing you can do? Protect yourself. Even the most basic security practices can help prevent viruses from infecting your devices.



Source by www.howtogeek.com

Related Posts

The New Galaxy Watch Ultra and Galaxy Ring Are Announced by Samsung
Smartphone

The New Galaxy Watch Ultra and Galaxy Ring Are Announced by Samsung

July 11, 2024
Exploring the Innovative Features of Pear Phones
Smartphone

Exploring the Innovative Features of Pear Phones

October 25, 2023
Latest Smart Home Gadgets for a Connected Life
Gadget and Gear

Latest Smart Home Gadgets for a Connected Life

September 1, 2023
Eco-Friendly Products for Students
Gadget and Gear

Eco-Friendly Products for Students

August 24, 2023

Recommended.

At the Monaco Yacht Show, there's no sign global turmoil is hurting sales

At the Monaco Yacht Show, there’s no sign global turmoil is hurting sales

October 3, 2022
New York attorney general could bar Donald Trump from doing any business for five years

New York attorney general could bar Donald Trump from doing any business for five years

September 21, 2022

Trending.

No Content Available
  • Home
  • About
  • Contact
  • Privacy
  • Terms
  • DCMA
  • Write For Us / Submit
Contact us for submission queries. editor[at]geekyinsider.com.
No Result
View All Result
  • Home
  • Review
  • Apple
  • Gaming
  • Gadget and Gear
    • Camera
    • Smartphone
  • Microsoft
  • Security