20 Year History of Computer Viruses

20 Year History of Computer Viruses
On November 3, 1983, the so-called first computer virus was born. Since then, a whole new world of code and attack programs has emerged and evolved with tremendous speed. Comes with it is an industry that produces prevention and destruction tools. As a result, today, we have tens of thousands of different families of viruses present on the computer system. Major milestones: 1949. The first theory of self-replicating programs was born. 1981. Apple II is the first virus to be distributed through Apple's operating system, spread throughout Texas A & M's system, through pirated software piracy. The first to discover it was Elk Cloner. 1983. Fred Cohen, an American university student, made the first definition of a virus: "It is a computer program that can manipulate other computer programs by modifying them by the method of inserting a computer. its copy ". Fred Cohen is always mentioned when talking about the history of the virus. 1986. The two Pakistani programmers, Basit and Amjad, replaced the executable code in the boot sector of a floppy disk with their own code, designed to distribute from a floppy disk. 360 K when inserted into any drive. This type of floppy disk bearing the mark "© Brain". These are the earliest MS-DOS viruses. 1987. Lehigh, one of the first file viruses to infect command.com files (which later evolved into the Jerusalem virus). Another virus, called Christmas IBM, with a very fast propagation speed (500,000 copies / hour), was a nightmare for the Big Blue mainframe during that year. 1988. One of the most popular viruses, Jerusalem, appears. Activated on Friday the 13th, this virus acts as a .exe and. Com file, deleting all applications running that day. In the same year, the MacMag and the Scores virus caused the first major outbreak of the Macintosh. This is the first Internet crisis that has caused a large number of computer crises. Since then, the Rapid Response Center (CERT) has emerged to deal with similar incidents. 1989. A Trojan horse program called AIDS. This virus is famous for its ability to hold hostage-like content. It is sent in the form of a program of information about immunodeficiency. When activated, AIDS will encrypt the victim's hard drive and ask the user to pay if they want to be decrypted. 1990. Symantec released Norton AntiVirus, one of the first antivirus programs developed by a large company. The first viral exchange market (VX) was launched in Bulgaria. Here, hackers can trade code and exchange ideas. In the same year, the book of computer viruses by Mark Ludwig was published. 1991. Tequila, one of the first viruses to be discovered in the form of viruses. These worms make identifying and scanning them difficult due to mutation after each infection. In 1992, a total of 1,300 viruses were recorded, an increase of 420% compared to December 1990. Appearance DAME (Dark Avenger Mutation Engine), a toolkit that turns ordinary viruses into programmable shapes. Then there is the VCL (Virus Creation Laboratory), a real virus-writing tool. The emergence of the Michelangelo virus has sparked warnings of massive global damage, although in the end what happens is not as worrisome. 1994. The first e-mail scam appeared in the computer community. This warns the user of a virus that can erase the entire hard drive as soon as it opens the e-mail subject line "Good Times." Although this does not cause any damage, it is only a scare tactic that continues to appear in the cycle of 6 to 12 months. 1995. Word Concept appeared, attacked the Microsoft Word documents and became one of the most formidable viruses in the mid-decade. 1996. Baza, Laroux (virus macro) and some Staog viruses appear for the first time, attacking files in the Windows 95 operating system, Excel spreadsheet programs and even Linux. Not rated as dangerous and not widely distributed, StrangeBrew is the first virus to infect Java files. This virus modifies the CLASS file to put a copy of it in the middle of the code so that it can start running a virus. The Chernobyl virus, also known as CIH, spreads very quickly through .exe files. As the name implies, this virus has tremendous power, not only to attack files that are infected with the chip. 1999. Melissa Virus (W97M / Melissa) runs a macro in the e-mail attachment, forwarding it to 50 other people using Outlook. The virus also infects the Word documents and then sends them as attachments. Melissa spread faster than any virus ever before, reaching a total of 1 million computer victims. Bubble Boy is the first computer worm not to rely on whether an e-mail recipient has opened an attachment. As long as the message is open, it will still work. Tristate is the first multi-programmable macro virus to attack multiple applications such as Word, Excel and PowerPoint. 2000. Love Bug, also known as ILOVEYOU virus, spreads via OutLook (like Melissa) in a VBS attachment and deletes all MP3, MP2, and .JPG files. It also steals and sends usernames and passwords for hackers. W97M.Resume.A, a new variant of Melissa, is released, using a macro in Word to spread into Outlook. Virus Stage, disguised as an e-mail with fun content about life stages, spread on the Internet. Unlike previous viruses, it hides in an attached file with a ".txt" extension, which makes it easy to trick recipients into opening the file. So far, the virus is no longer affected. Denial of service attacks by hackers have knocked out websites such as Yahoo, eBay, Amazon, and many more hours. Nimda (still referred to as Multi-Headed Monster) with the combined power of five different types of viruses that attack hundreds of thousands of computers around the world. This is one of the most complex viruses that people have ever identified. The virus, which bears the name of Russian tennis queen Anna Kournikova, copied itself into Microsoft Outlook's e-mail address list, and although it does not hurt much, analysts fear this is a product designed from scratch. Virus signature engine, so that hackers with the least programming experience can also manipulate malicious programs. New worms have appeared with names such as Sircam, CodeRed and BadTrans. Sircam spreads through Internet e-mail text. CodeRed attacks defective websites and even drives the attack on the home page of the US Presidential Palace. Within the first 12 hours, the virus has penetrated 359,000 computers. BadTrans is a worm designed to steal passwords and credit card information. 2002. David L. Smith, author of the Melissa virus, was sentenced to 20 years in prison. In January, the LFM-926 virus appeared in Shockwave Flash (.swf) files with a movie download message (Loading.Flash.Movie). Constantly detecting viruses using the names of celebrities and artists such as Shakira, Britney Spears and Jennifer Lopez. Klez, a typical example of the growing trend of e-mail worms, overwrites files, makes hidden copies of the original, and disables many common defense tools. Bugbear was first introduced in September, with its complexity and use of various modes of transmission. In January, the Slammer worm was born and is still considered the fastest-spreading virus: 75,000 computers in just 10 minutes, that is, in the first minute, averaging 8.5 seconds per child. This number is doubled. Sobig virus was born and became a favorite tool of the spam community. These infected computer systems became the uninvited mail distribution station. Many of the spam techniques used in Sobig help send out huge amounts of e-mail. However, the most notable event this year is Blaster (also known as MBlast or LoveSan), which is one of the most virulent viruses targeted to computers running Windows 2000 and XP. Starting in August 11, Blaster has infiltrated at least 300,000 computers in less than a week in many countries, including Vietnam. When it enters a corrupted Windows PC, Blaster automatically downloads the code from the previously infected PC for self-replication and continues to spread. Then, it scans for other computers with similar vulnerabilities and attacks. The infected computer, every time the Internet connection is shutdown for several minutes automatically.