Canadian Institute For Knowledge DevelopmentCanadian Institute For Knowledge Development
  • Home
  • About Us
  • Conferences
    • NTELT
    • NCM
    • ICNDBM
    • IE
    • SSH
    • CSCIT
  • Publishing
  • blog
  • Interview
  • Former Associations
  • Gallery
  • Consulting
  • Contact

Blog

  • Home
  • Blog
  • Most Destructive Computer Viruses of All Time

Most Destructive Computer Viruses of All Time

  • Posted by Admin
  • Categories Blog
  • Date December 17, 2019
  • Comments 0 comment

Share with:


When we talk about computer security, the destructive computer viruses are the leading threat. It can destroy a single program or the whole computer system instead.

The term computer virus was coined by US student of University of Southern California‘s School of Engineering, Fred Cohen, in 1985.

What is Virus?

A computer virus is a malicious program that self-replicates by copying itself to another program, doing serious damages to computer networks worldwide.

Computer virus spreads by itself into other executable code or documents, much like a flu virus.

Many viruses, loaded onto a user’s computer without the user’s knowledge, are harmful and can destroy data, perform malicious actions, slow down system resources, and log keystrokes.

Virus History

  • The Creeper virus was first detected on ARPANET, the forerunner of the Internet, in the early 1970s.
  • In 1982, a program called “Elk Cloner” was the first personal destructive computer virus to appear “in the wild”—that is, outside the single computer or [computer] lab where it was created.
  • In 1984 Fred Cohen from the University of Southern California wrote the first paper to explicitly call a self-reproducing program a “virus”.
  • In 1986, Farooq Alvi Brothers created the first IBM PC virus in the “wild” in Lahore, Pakistan, which was a boot sector virus dubbed (c)Brain, reportedly to deter unauthorized copying of the software they had written.
  • In 1992, the first virus to specifically target Microsoft Windows, WinVir was discovered, two years after the release of Windows 3.0.
  • In 1996, Australian hackers created the Bizatch virus (“Boza” virus), which was the first known virus to target Windows 95.
  • In late 1997 the encrypted, memory-resident stealth virus Win32.Cabanas was released—the first known virus that targeted Windows NT.

Computer viruses are now becoming malware and are getting more and more complicated, serving unhealthy targets.

Destructive computer viruses have so far attacked 55 million computers and victimized more than 2.5 to 3 million computers, and users have lost about $10 billion for such attacks.

Computer crimes are committed  thanks to these viruses, where malware programs are deceptively deployed on the user’s computer and steal sensitive user information such as bank account passwords and thus rob users’ money in the shortest time possible.

Some of these viruses even blackmail and threaten users of releasing their information.

The evolution of computer viruses has always been fascinating, and no matter how hard the security companies try, they will always be one step behind hackers and virus writers.

Here in this paper you can find a brief overview of the 10 most destructive and dangerous computer of all time:

ILOVEYOU

The virus infected a large number of Internet users in 2000, by sending the ILOVEYOU phrase to all those present in the victims’ address book. The malware was designed to hijack the passwords of users in the internet for its Filipino maker.

The ILOVEYOU destructive computer virus has been identified as one of the most destructive computer viruses ever created, and the reason is very clear: the virus has caused a great deal of damage and destruction around the systems of the world, causing some $ 10 billion in damage.

10% of all Internet-connected systems in the world had been infected with this virus, and governments and large organizations had been using the offline email system for some time to avoid being infected.

The virus was created by two Filipino programmers and the trick was that through social engines, they were trying to persuade millions of users to click an innocent looking email attachment labeled simply “I Love You.”

Once clicked, the infected file duplicated it to all of the users’ contacts and overwrote the users’ image files, making the system inaccessible. However, the two programmers were never found guilty because there was no rule for the crime at that time. The spread of ILOVEYOU virus led to the passage of legislation called the E-Commerce Law to deal with such crimes.

Code Red

Code Red Virus, unlike other malicious viruses that replicate, causing damages through e-mails, required an active Internet connection to infect the system, so that the user visiting different websites in the infected computer,  see the text “Hacked By Chinese”. The malicious virus could infiltrate more than one million computer devices that time.

Code Red destructive computer virus spread itself in different systems very fast  at the time. It’s interesting to know that in less than a week, Code Red was able to infect more than 7,000 servers, more interestingly, one of those servers belonged to the White House, and forced other government agencies to temporarily take down their own public websites as well.

Melissa

This destructive computer virus was created as a mass-mailing macro virus, an infected word document, in 1999 by David L. Smith.

This was posted online, claiming to be a list of passwords to adult websites. Once opened, it would mail itself to the user’s email contacts. The increased email traffic caused disruption to governments and corporations alike.

Storm Trojan

The Storm Worm (dubbed so by the Finnish company F-Secure) is a backdoor Trojan horse that affects computers using Microsoft operating systems, discovered on January 17, 2007.

The Storm Worm began attacking thousands of (mostly private) computers in Europe and the United States on Friday, January 19, 2007, using an e-mail message with a subject line about a recent weather disaster, “230 dead as storm batters Europe”.

During the weekend there were six subsequent waves of the attack. As of January 22, 2007, the Storm Worm accounted for 8% of all malware infections globally.

Sasser

Sasser is a computer worm that affects computers running vulnerable versions of the Microsoft operating systems Windows XP and Windows 2000. Sasser spreads by exploiting the system through a vulnerable port.

Sasser affected millions of Windows XP and 2000 computers. It found a way to manipulate an exploit in the Local Security Authority Subsystem Services. Damages were estimated in the billions of dollars as well as forcing airlines and governments to shut down.

My Doom

One of the fastest spreading virus of all time, My Doom (also known as a worm and as Win32. Mydoom. A) infected one in 12 emails at its peak in 2004.

Mydoom was named by Craig Schmugar, an employee of computer security firm McAfee and one of the earliest discoverers of the worm.

Users would open an attachment like “Mail Transaction Failed”. Its aim was to take down websites like Google and Lycos. It managed to take out Google for almost a day!

Zeus

Zeus is Trojan horse malware package that runs on versions of Microsoft Windows. In 2009, Zeus targeted windows computers to use them to perform criminal acts. It infected targets through phishing scams or downloads.

It compromised accounts from many leading banks and corporations. It stole details of social media accounts, bank accounts, and email addresses.

Zeus is very difficult to detect even with up-to-date antivirus and other security software as it hides itself using stealth techniques. Around $70 million was stolen and over 100 arrests made.

Conficker

Conficker is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008. It infected millions of computers including government, business and home computers in over 190 countries.

It would reset account lockout settings and block access to antivirus sites and windows updates. It would then lock out user accounts. Scareware was then used to scam money from users.

Stuxnet

Stuxnet is a malicious computer worm, first uncovered in 2010, and targets SCADA systems and is believed to be responsible for causing substantial damage to Iran’s nuclear program.

Spread through infected USB drives, it ruined 1/5 of Iran’s nuclear centrifuges. If the infected computer used Siemens software, it would alter the speed of the machinery it controlled, causing it to tear apart.

On 1 June 2012, an article in The New York Times said that Stuxnet is part of a US and Israeli intelligence operation called “Operation Olympic Games”, started under President George W. Bush and expanded under President Barack Obama.

CryptoLocker

Cryptolocker was a cyberattack using the CryptoLocker ransomware that occurred from 5 September 2013 to late May 2014. It is one of the first ransomware attacks.

This virus encrypted files on hard drives. The only way to remove the encryption was to pay a ransom by a certain deadline. The attack utilized a trojan that targeted computers running Microsoft Windows.

Law enforcement managed to stop the ransom operation, but not before $27 million was paid.

Tag:Code Red, Conficker, CryptoLocker, Destructive Viruses, Melissa, My Doom, Sasser, Storm Trojan, Stuxnet, Virus, Zeus

  • Share:
Admin

Previous post

Scopus’ Best Sources in Economy
December 17, 2019

Next post

Networking Tips to Attend a Conference
December 18, 2019

You may also like

Information disclosure in marketing
Information disclosure in marketing
27 June, 2022
Importance of Listening in the Workplace
Importance of Listening in the Workplace
20 June, 2022
PubMed online resource – Copy
PubMed, a practical free resource for medical students
23 May, 2022

Leave A Reply Cancel reply

Your email address will not be published. Required fields are marked *

Search

Latest Posts

Information disclosure in marketing
Information disclosure in marketing
27Jun2022
Importance of Listening in the Workplace
Importance of Listening in the Workplace
20Jun2022
PubMed, a practical free resource for medical students
7 tips every manager should know
25May2022

Contact Info

210-128 West Hastings Street
Vancouver, British Columbia, V6B1G8
Canada

About Us

Canadian Institute for Knowledge Development (CIKD) is an international, multi-disciplinary research, publishing, consulting and training institute based in Vancouver, British Columbia.

Useful Links

  • About Us
  • Publishing
  • Events
  • Former Associations

Subscribe Here

Copyright 2020 Canadian Institute for Knowledge Development . All rights reserved

No apps configured. Please contact your administrator.

Login with your site account

No apps configured. Please contact your administrator.
Lost your password?

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT