Monday, November 4, 2013




1. Creeper

The first real computer virus, Creeper was released "in lab" in 1971 by an employee of a company working on building ARPANET, the Internet’s ancestor, according to Guillaume Lovet, Senior Director, FortiGuard Labs.

The Creeper searched for a machine on the network, shifted to it, and displayed a message on the system “I’m the creeper, catch me if you can!” and started over, thereby hopping from system to system.

2. Elk Cloner


This virus was written in 1982 "by a 15-year old as a way to booby trap his friends' Apple II computer systems without physical access to them, Elk Cloner spread via floppy disks," according to FortiGuard Labs's Lovet. "Infected machines displayed a harmless poem, dedicated to the virus' glory."

3. Morris worm

Chris Larsen, Malware Lab Architect for Blue Coat Systems, points to the Morris worm, created in 1988 by Cornell University student Robert Tappan Morris, as the first internet worm.

"It's the one that got everyone's attention and demonstrated the possibility of computer malware for causing chaos," adds Kevin Haley, Director, Symantec Security Response.

4. Michelangelo


Lovet says, the dormant Michelangelo virus was designed to awaken in 1991 on March 6th, the birthday of Renaissance artist Michelangelo, and erase critical parts of infected computers’ hard drives.

"The promises of destruction it carried spawned a media frenzy. In the weeks preceding March 6th, media relayed, and some may say amplified, experts’ predictions forecasting 5 million computers going definitively down. These Tut Is Provided By Cyber Elite.Yet, on March 6th, only a few thousand data losses were reported – and public trust in AV companies’ ethics was tainted for a while."

5. Melissa

The Melissa virus which was breeded via infected Microsoft Word documents was found in 1999. The virus mailed itself to Outlook contacts of the contaminated user.

The bug was created to honor Melissa, a stripper he’d met in Florida.

"Whether he conquered her heart this way is somewhat unlikely, but one thing is sure: the malicious code earned him 20 months in jail and a $5,000 fine," says Lovet.

6. I Love You

Discovered in 2000, the "I love you" or "Love Letter" malware was not the first example of using social engineering to infect computers, but it was the first massively successful one," says Haley.

The malware was the foundation of cyber social engineering which works even today. The concept behind was that everyone wants to know that someone loves them. And it also explained to the computer users that they can't trust everything that they see online or receive in their inbox.

7. Anna Kournikova virus

The Anna Kournikova virus spreaded like wildfire which distributed emails promising a compromising picture of the tennis star. This proved how sex sells social engineering.

8. Code Red

In 2001, Code Red infected Web servers, where it automatically spread by exploiting a vulnerability in Microsoft IIS servers, says Lovet.

Within a week's span, around 400,000 servers were infected with their homepagesaying 'Hacked By Chinese!'

Lovet notes that Code Red had a distinguishing feature designed to flood the White House Website with traffic from the infected servers, probably making it the first case of documented hacktivism on a large scale.

9. SQLslammer

SQL Slammer came into existance in 2003. The worm infected about every vulnerable system within 15 minutes. While it caused denial of service on some hosts it dramatically slowed down general Internet traffic. It infected almost 75,000 victims within ten minutes. The basis of the worm was demonstrated at the Black Hat Briefings by David Litchfield.

10. Sasser

Lovet says, in 2004, Sasser malware exploited a vulnerability in Microsoft Windows to propagate, which made it particularly virulent. What’s more, due to a bug in the worm’s code, infected systems turned off every couple of minutes.

Around one million systems were infected. It also interrupted AFP’s communications satellites for hours, the Delta Airlines were required to cancel flights, the British coast guard did reprinting of maps and a hospital had to redirect its emergency room because its radiology department was completely paralyzed by the virus. The damage amount was estimated to be more than $18 billion.

A $250,000 bounty was placed by Microsoft placed on the author’s head, who turned out to be an 18-year old German student.

11. Mytob

One of first pieces of malware to combine the features of a bot and a mass-mailer, 2005's MyTob marked the beginning of the era of botnets and of cybercrime, says Lovet.

With this the business model of legitimized botnet started which included installation of spyware, dispersal of spam, illegal content hosting, interception of banking credentials, blackmail, etc.

The revenue generated from botnets which effect around 20 million machines estimated to be several billion dollars per year.

12. Storm botnet

By 2007, Lovet notes cybercriminals already had lucrative business models in place. Before then, however, botnets were fairly fragile: By neutralizing its unique Control Center, a botnet could be completely neutralized, because the bots no longer had anyone to report to or take commands from.

He says, by implementing a peer-to-peer architecture, Storm became the first botnet with decentralized command.

Storm managed to infect around 1 and 50 million systems and accounted for 8 percent of all malware running in the world.

13. Koobface

Koobface the anagram for Facebook came in limelight in 2008.

"It spread by pretending to be the infected user on social networks, prompting friends to download an update to their Flash player in order to view a video. The update is a copy of the virus," explains Lovet.

14. Zeus botnet

Chris Larsen, Malware Lab Architect for Blue Coat Systems, points to Zeus, first discovered in 2007, as the "king of the botnet kits."

This malware platform was used to create a Trojan horse that stole banking information with man-in-the-browser keystroke logging and form grabbing. The malware was spread mainly via drive-by downloads and phishing schemes.

15. Ikee

At a time when many people hadn't even heard of 'jailbreaking' a mobile device, Ikee threat showed up in 2009.

Ikee affected Apple's iPhone. Although the threat was rather harmless in payload, but it caught people's attention showed the world that even mobile devices are computers and must be protected from cyber threats just like any other computer and flies. It also obtained that wherever you have a popular operating system, malware will follow.

16. Operation Aurora

According to researchers at Kaspersky Lab, Operation Aurora was a cyber attack which began in mid-2009 and lasted through December 2009. Aurora gave birth to the concept of advanced persistent threats. The attack was publicly disclosed first by Google on January 12, 2010 in a blog post. Originated in China the attacks hit more than 30 organizations in the U.S.

Advanced techniques were used stay undetected for long surations while stealing valuable information, including source code and intellectual property.

17. Flashback

The Flashback Trojan was first discovered in 2011. It mostly affected computers running Mac OS X and using a security flaw in Java.

Blue Coat's Larsen notes Flashback is a "wake-up call for Mac users; no one should be feeling smug and safe these days."

18. Flame malware

"According to most threat researchers today, only governments have the necessary resources to design and implement a virus of such complexity," says Lovet of Flame and similar types of cyberespionage attacks.

Flame largely aimed on computers in the Middle East. In an Analysis conducted in 2012 which included the servers used to control the Flame malware it was found that several other related types of malware were existing, including some with direct connection to Stuxnet (worm believed to be created by the United States and Israel to attack Iran's nuclear facilities.)

0 comments :

Post a Comment