01 logo

Dangerous Malwares in Computer History

Intresting facts about malware

By Dhinesh kumar.PPublished about a year ago 4 min read

Computer viruses, worms, Trojans, and other malicious software (malware) have been a threat to cybersecurity since the early days of computing. While technology has advanced, so too have the methods used by cybercriminals to compromise computer systems. In this article, we will examine some of the most dangerous malware in computer history and the impact they had on the world.

1.ILOVEYOU Virus (2000)

The ILOVEYOU virus was a computer worm that spread via email. The subject line of the email read "ILOVEYOU" and the message contained a VBS file attached to it. Once the attachment was opened, the virus would infect the user's computer and spread to all contacts in the address book. The ILOVEYOU virus caused widespread panic and was estimated to have caused $10 billion in damages worldwide.

2.Code Red Worm (2001)

The Code Red worm was a highly destructive computer worm that first appeared in the summer of 2001. It targeted Microsoft's Internet Information Server (IIS) web server software, exploiting a vulnerability in the software to infect computers and cause widespread disruption on the internet. The worm was a major threat to internet security and caused significant damage to businesses and organizations around the world. In this article, we will examine the history, technical details, and impact of the Code Red worm.

History of the Code Red Worm

The Code Red worm was discovered on July 13, 2001, by eEye Digital Security, a computer security firm. The worm spread rapidly and infected thousands of computers within just a few hours. The worm was named after the "Code Red" Mountain Dew that was consumed by the eEye security researchers while they were working on the solution.

Technical Details of the Code Red Worm

The Code Red worm was a computer worm that targeted Microsoft's IIS web server software. The worm exploited a vulnerability in the IIS software, specifically a buffer overflow in the Index Server ISAPI extension. Once a server was infected, the worm would begin to attack other servers on the internet, using a flood of traffic to disrupt their normal operation. The worm was also designed to deface web pages, replacing the content with a message that read "Hacked By Chinese!"

Impact of the Code Red Worm

The Code Red worm caused widespread disruption and was estimated to have caused over $2 billion in damages. The worm infected hundreds of thousands of computers and caused significant downtime for many businesses and organizations. The worm also affected the performance of the internet as a whole, as the large number of infected computers created a massive amount of traffic that congested network routes and slowed down internet speeds.

Prevention and Response

To prevent the spread of the Code Red worm, it was recommended that administrators install the security patch provided by Microsoft and take steps to secure their IIS web servers. In response to the worm, the FBI established a task force to investigate the source of the attack and the United States government issued a warning to businesses and organizations to take steps to secure their computer systems.

3.SQL Slammer (2003)

SQL Slammer was a computer worm that targeted unpatched Microsoft SQL servers. The worm spread rapidly, infecting thousands of computers in just a few hours. The worm caused widespread disruption and was estimated to have caused over $1 billion in damages.

4.Conficker Worm (2008)

The Conficker worm was a computer worm that targeted Microsoft Windows computers. The worm was designed to spread rapidly and infect as many computers as possible. Once a computer was infected, the worm would download other malware and take control of the system. Conficker was estimated to have infected millions of computers worldwide and caused significant disruption.

5.Stuxnet Worm (2010)

The Stuxnet worm was a computer worm that was designed to target industrial control systems. The worm was specifically designed to target the centrifuges used to enrich uranium in Iran's nuclear program. The Stuxnet worm was considered to be the first publicly known cyber weapon and was widely reported in the media.

6.WannaCry Ransomware (2017)

WannaCry was a ransomware attack that affected hundreds of thousands of computers in over 150 countries. The attack used a vulnerability in Microsoft Windows to spread rapidly and encrypt the data on affected computers. The attackers demanded a ransom payment in order to restore access to the encrypted data. WannaCry was considered to be one of the largest ransomware attacks in history and caused significant disruption.

7.NotPetya Ransomware (2017)

NotPetya was a ransomware attack that affected computers in several countries, including Ukraine, Russia, and the United States. The attack used a vulnerability in Microsoft Windows to spread rapidly and encrypt the data on affected computers. Unlike other ransomware attacks, the attackers behind NotPetya did not actually intend to restore access to the encrypted data. Instead, they used the attack as a smokescreen for a destructive cyberattack.

8.Emotet Malware (2019-2021)

Emotet is a Trojan that has been active since 2014 and has evolved into one of the most dangerous and persistent threats in the cyber world. Emotet is typically spread via phishing emails and once a computer is infected, the malware can steal sensitive information and spread to other computers on the same network.

tech newshistoryhackerscybersecurity

About the Creator

Dhinesh kumar.P

As an adventurer and storyteller, I share my journey to inspire others to chase their dreams and embrace life's challenges. I wrote dark poems and crime stories, please support my work

Enjoyed the story?
Support the Creator.

Subscribe for free to receive all their stories in your feed. You could also pledge your support or give them a one-off tip, letting them know you appreciate their work.

Subscribe For Free

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments

There are no comments for this story

Be the first to respond and start the conversation.

    Dhinesh kumar.PWritten by Dhinesh kumar.P

    Find us on social media

    Miscellaneous links

    • Explore
    • Contact
    • Privacy Policy
    • Terms of Use
    • Support

    © 2024 Creatd, Inc. All Rights Reserved.