- Timeline of notable computer viruses and worms
This is a
timeline of noteworthycomputer virus es and worms.1970-1979
Early 1970s
* Creeper virus was detected on
ARPANET infecting the Tenex operating system. Creeper gained access independently through a modem and copied itself to the remote system where the message, 'I'M THE CREEPER : CATCH ME IF YOU CAN.' was displayed. The Reaper program, itself being a virus, was created to delete Creeper. The creators of both programs are unknown.1974
*
Rabbit virus appears infecting other machines via multiplication. Named for the speed at which it clogged the system with copies of itself, reducing system performance, before reaching a threshold and crashing.1975
* ANIMAL was a popular game written for the
UNIVAC 1108 which asked a number of questions to the user in an attempt to guess the type of animal that the user was thinking of. When run, the related program PERVADE would also create a copy of itself and ANIMAL in every directory to which the current user had access. It spread across the multi-user UNIVACs when users with overlapping permissions discovered the game, and to other computers when tapes were shared. The program was carefully written to avoid damage to existing file or directory structure, and to not copy itself if permissions did not exist or if damage could result. Its spread was therefore halted by an OS upgrade which changed the format of the file status tables that PERVADE used for safe copying. Though non-malicious (and fairly entertaining) in nature, "Pervading Animal" represents the first Trojan "in the wild". [http://www.fourmilab.ch/documents/univac/animal.html The Animal Episode ] ]1980-1989
1980
* Jürgen Kraus wrote master thesis Selbstreproduktion bei Programmen (Self-reproduction of programs).
1982
* A program called Elk Cloner, written for Apple II systems and created by
Richard Skrenta . Apple II was seen as particularly vulnerable due to the storage of its operating system onfloppy disk . Elk Cloner's design combined with public ignorance about whatmalware was and how to protect against it led to Elk Cloner being responsible for the first large-scale computer virus outbreak in history.1983
* The term 'virus' is coined by Frederick Cohen in describing self-replicating computer programs. In 1984 Cohen uses the phrase "computer virus" – as suggested by his teacher
Leonard Adleman – to describe the operation of such programs in terms of "infection". He defines a 'virus' as "a program that can 'infect' other programs by modifying them to include a possibly evolved copy of itself."
*November 10 ,1983 , atLehigh University , Cohen demonstrates a virus-like program on a VAX11/750 system. The program was able to install itself to, or infect, other system objects.1986
* January: The Brain
boot sector virus (akaPakistani flu ) is released. Brain is considered the firstIBM PC compatible virus, and the program responsible for the first IBM PC compatible virus epidemic. The virus is also known as Lahore, Pakistani, Pakistani Brain, as it was created in Lahore, Pakistan by 19 year old Pakistani programmer,Basit Farooq Alvi , and his brother,Amjad Farooq Alvi .
* December 1986: Ralf Burger presented the Virdem model of programs at a meeting of the undergroundChaos Computer Club in Germany. The Virdem model represented the first programs that could replicate themselves via addition of their code to executable DOS files in COM format.1987
* Appearance of the Vienna virus, which was subsequently neutralized--the first time this had happened on the IBM platform. [ [http://www.viruslist.com/en/viruses/encyclopedia?chapter=153311150 Kaspersky Lab viruslist] ]
* Appearance of Lehigh virus, boot sector viruses such as Yale from USA, Stoned from New Zealand, Ping Pong from Italy, and appearance of first self-encrypting file virus, Cascade. Lehigh was stopped on campus before it spread to the wild, and has never been found elsewhere as a result. A subsequent infection of Cascade in the offices of IBM Belgium led to IBM responding with its own antivirus product development. Prior to this, antivirus solutions developed at IBM were intended for staff use only.
* October: The Jerusalem virus, part of the (at that time unknown) Suriv family, is detected in the city ofJerusalem . Jerusalem destroys all executable files on infected machines upon every occurrence of Friday the 13th (except Friday 13 November 1987 making its first trigger dateMay 13 1988 ). Jerusalem caused a worldwide epidemic in 1988.
* November: The SCA virus, a boot sector virus forAmiga s appears, immediately creating a pandemic virus-writer storm. A short time later, SCA releases another, considerably more destructive virus, theByte Bandit .
* December:Christmas Tree EXEC was the first widely disruptive replicating network program, which paralysed several international computer networks in December 1987.1988
* June: The
Festering Hate Apple ProDOS virus spreads from underground pirate BBS systems and starts infecting mainstream networks.
*November 2 : TheMorris worm , created byRobert Tappan Morris , infects DECVAX and Sun machines runningBSD UNIX connected to theInternet , and becomes the first worm to spread extensively "in the wild", and one of the first well-known programs exploitingbuffer overrun vulnerabilities.1989
*
October 1989 :Ghostball , the firstmultipartite virus , is discovered byFriðrik Skúlason 1990-1999
1990
* Mark Washburn working on an analysis of the Vienna and Cascade viruses with Ralf Burger develops the first family of polymorphic virus: the Chameleon family. Chameleon series debuted with the release of 1260.
1992
* Michelangelo was expected to create a digital apocalypse on March 6, with millions of computers having their information wiped according to mass media hysteria surrounding the virus. Later assessments of the damage showed the aftermath to be minimal.
1995
* The "Concept virus" the first Macro virus is created This virus did a lot of damage.
1996
* "Ply" - DOS 16-bit based complicated polymorphic virus appeared with built-in permutation engine.
1998
*
June 2 : The first version of the CIH virus appears.1999
*
March 26 : The Melissa worm is released, targeting Microsoft Word and Outlook-based systems, and creating considerable network traffic.
*June 6 : TheExploreZip worm, which destroysMicrosoft Office documents, is first detected.
* TheHappy1999 worm invisibly attached itself to emails. Displayed fireworks to hide changes being made and wished you a happy new year. Modified system files related toOutlook Express andInternet Explorer onWindows 95 andWindows 98 .2000 and later
2000
* May: The
VBS/Loveletter ('ILOVEYOU') worm appeared.As of 2004 this is the most costly virus to businesses, causing upwards of 5.5 to 10 billion dollars in damage. The backdoor trojan to the worm, Barok, was created by Filipino programmer Onel de Guzman; it is not known who created the attack vector or who (inadvertently) unleashed it; de Guzman himself denies being behind the outbreak although he suggests he may have been duped by someone using his own Barok code as a payload.
* Zmist - a fully metamorphic, code integrating virus.2001
* March: Simile - a multi-OS, metamorphic virus written in
assembly language .
*May 8 : TheSadmind worm spreads by exploiting holes in both Sun Solaris andMicrosoft IIS.
* July: TheSircam worm is released, spreading through e-mails and unprotectednetwork share s.
*July 13 : TheCode Red worm attacking the Index Server ISAPI Extension in MicrosoftInternet Information Services is released.
*August 4 : A complete re-write of theCode Red worm ,Code Red II begins aggressively spreading, primarily in China.
*September 18 : TheNimda worm is discovered and spreads through a variety of means including vulnerabilities in Microsoft Windows and backdoors left byCode Red II andSadmind worm .
*October 26 : TheKlez worm is first identified.2003
*
January 24 : TheSQL slammer worm , also known as theSapphire worm , attacks vulnerabilities inMicrosoft SQL Server andMSDE causes widespread problems on the Internet.
*August 12 : TheBlaster worm , also known as the "Lovesan" worm, spreads rapidly by exploiting a vulnerability in system services present onMicrosoft Windows computers.
*August 18 : TheWelchia (Nachi) worm is discovered. The worm tries to remove the blaster worm and patch Windows.
*August 19 : TheSobig worm (technically theSobig.F worm ) spreads rapidly via mail and network shares.
*October 24 : TheSober worm is first seen and maintains its presence until 2005 with many new variants.The simultaneous attacks on network weakpoints by the Blaster and Sobig worms caused a massive amount of damage .2004
* Late January:
MyDoom emerges, and currently holds the record for the fastest-spreading mass mailer worm.
*March 19 : TheWitty worm is a record-breaking worm in many regards. It exploited holes in severalInternet Security Systems (ISS) products. It was the fastest disclosure to worm, it was the first internet worm to carry a destructive payload and it spread rapidly using a pre-populated list of ground-zero hosts.
*May 1 : TheSasser worm emerges by exploiting a vulnerability in LSASS and causes problems in networks, even interrupting business in some cases.
* December:Santy , the first known "webworm" is launched. It exploited a vulnerability inphpBB and usedGoogle in order to find new targets. It infected around 40000 sites beforeGoogle filtered the search query used by the worm, preventing it from spreading.2005
*
August 16 : The Zotob worm and several variations ofmalware are discovered. The effect was overblown because severalUnited States media outlets were infected.
*October 13 : The Samy XSS worm became the fastest spreading virus by some definitionsas of 2006 .
*October 31 :Sony BMG was found to have purposefully infected music CDs with a rootkit in an attempt to prevent illegal copying of music.2006
* Late September:
Stration or Warezov worm first discovered.
*January 20 : TheNyxem worm was discovered. It spread by mass-mailing. Its payload, which activates on the third of every month, starting onFebruary 3 , attempts to disable security-related and file sharing software, and destroy files of certain types, such asMicrosoft Office files.
*February 16 : discovery of the first-ever malware for Mac OS X, a low-threat trojan-horse known as OSX/Leap-A or OSX/Oompa-A, is announced.2007
*
January 17 :Storm Worm identified as a fast spreading email spamming threat. It begins gathering infected computers into theStorm botnet . By around June 30th it had infected 1.7 million computers, comprised between 1 and 10 million computers by September. [cite web |title=World's most powerful supercomputer goes online |url=http://seclists.org/fulldisclosure/2007/Aug/0520.html |date=31 August 2007 |accessdate=2007-11-04 |publisher=Full Disclosure |author=Peter Gutmann ] Thought to have originated fromRussia , it disguises itself as a news email containing a film about bogus news stories asking you to download the attachment which it claims is a film.2008
*
May 6 :Rustock .C, a hitherto-rumoured spambot-type malware with extremely advanced rootkit capabilities, was announced to have been analysed and detected, having been in the wild and undetected since October 2007 at the very least. [http://www.pr.com/press-release/84130]
*Jun 29 : AnXSS Worm known as JTV.worm was initiated by a security group known as TheDefaced affectingJustin.tv , infecting 2,525 profiles within 24 hours. The worm was used for research purposes and the security team released detailed information never-before researched about the factors that affect XSS worms.ee also
*
Antivirus software
*List of computer viruses
*List of trojan horses
*Linux malware
*Virus hoax References
Wikimedia Foundation. 2010.