Vienna Virus
   HOME

TheInfoList



OR:

This timeline of computer viruses and worms presents a chronological timeline of noteworthy
computer virus A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and Code injection, inserting its own Computer language, code into those programs. If this replication succeeds, the affected areas ...
es,
computer worm A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will ...
s, Trojan horses, similar
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
, related research and events.


1960s

*
John von Neumann John von Neumann ( ; ; December 28, 1903 – February 8, 1957) was a Hungarian and American mathematician, physicist, computer scientist and engineer. Von Neumann had perhaps the widest coverage of any mathematician of his time, in ...
's article on the "Theory of self-reproducing automata" is published in 1966. The article is based on lectures given by von Neumann at the
University of Illinois The University of Illinois Urbana-Champaign (UIUC, U of I, Illinois, or University of Illinois) is a public university, public land-grant university, land-grant research university in the Champaign–Urbana metropolitan area, Illinois, United ...
about the "Theory and Organization of Complicated Automata" in 1949.


1970s


1970

* The first story written about a computer virus, ''The Scarred Man'' by
Gregory Benford Gregory Benford (born January 30, 1941) is an American science fiction author and astrophysicist who is professor emeritus at the department of physics and astronomy at the University of California, Irvine. He is a contributing editor of ''Reason ...
, was published in the May 1970 issue of ''
Venture Science Fiction ''Venture Science Fiction'' was an American digest-size science fiction magazine, first published from 1957 to 1958, and revived for a brief run in 1969 and 1970. Ten issues were published of the 1950s version, with another six in the second r ...
''.


1971

* The Creeper system, an experimental self-replicating program, is written by Bob Thomas at
BBN Technologies Raytheon BBN (originally Bolt, Beranek and Newman, Inc.) is an American research and development company based in Cambridge, Massachusetts. In 1966, the Franklin Institute awarded the firm the Frank P. Brown Medal, in 1999 BBN received the ...
to test John von Neumann's theory. Creeper infected DEC
PDP-10 Digital Equipment Corporation (DEC)'s PDP-10, later marketed as the DECsystem-10, is a mainframe computer family manufactured beginning in 1966 and discontinued in 1983. 1970s models and beyond were marketed under the DECsystem-10 name, especi ...
computers running the TENEX operating system. Creeper gained access via the
ARPANET The Advanced Research Projects Agency Network (ARPANET) was the first wide-area packet-switched network with distributed control and one of the first computer networks to implement the TCP/IP protocol suite. Both technologies became the tec ...
and copied itself to the remote system where the message "I'm the creeper, catch me if you can!" was displayed. The
Reaper A reaper is a farm implement that reaps (cuts and often also gathers) crops at harvest when they are ripe. Usually the crop involved is a cereal grass, especially wheat. The first documented reaping machines were Gallic reapers that were used ...
program was later created to delete Creeper. * At the
University of Illinois at Urbana-Champaign The University of Illinois Urbana-Champaign (UIUC, U of I, Illinois, or University of Illinois) is a public land-grant research university in the Champaign–Urbana metropolitan area, Illinois, United States. Established in 1867, it is the f ...
, a graduate student named
Alan Davis Alan Davis (born 18 June 1956) is an English comic book writer and artist, known for his work on ''Captain Britain'', ''The Uncanny X-Men'', ''The ClanDestine, ClanDestine'', ''Detective Comics'', ''Excalibur (comic book), Excalibur'', ''JLA: ...
(working for Prof. Donald Gillies) created a process on a
PDP-11 The PDP–11 is a series of 16-bit minicomputers originally sold by Digital Equipment Corporation (DEC) from 1970 into the late 1990s, one of a set of products in the Programmed Data Processor (PDP) series. In total, around 600,000 PDP-11s of a ...
that (a) checked to see if an identical copy of itself was currently running as an active process, and if not, created a copy of itself and started it running; (b) checked to see if any disk space (which all users shared) was available, and if so, created a file the size of that space; and (c) looped back to step (a). As a result, the process stole all available disk space. When users tried to save files, the operating system advised them that the disk was full and that they needed to delete some existing files. Of course, if they did delete a file, this process would immediately snatch up the available space. When users called in a system administrator (A. Ian Stocks) to fix the problem, he examined the active processes, discovered the offending process, and deleted it. Of course, before he left the room, the still existing process would create another copy of itself, and the problem would not go away. The only way to make the computer work again was to reboot.


1972

* The science fiction novel, ''
When HARLIE Was One ''When HARLIE Was One'' is a 1972 science fiction novel by American writer David Gerrold. It was nominated for the Nebula Award for Nebula Award for Best Novel, Best Novel in 1972 and the Hugo Award for Hugo Award for Best Novel, Best Novel in 19 ...
'', by
David Gerrold David Gerrold (born Jerrold David Friedman; January 24, 1944)Reginald, R. (September 12, 2010)''Science Fiction and Fantasy Literature, Volume 2'' Borgo Press p. 911. Archived at Google Books. Retrieved June 23, 2013. is an American science fict ...
, contains one of the first fictional representations of a
computer virus A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and Code injection, inserting its own Computer language, code into those programs. If this replication succeeds, the affected areas ...
, as well as one of the first uses of the word "virus" to denote a program that infects a computer.


1973

* In fiction, the 1973
Michael Crichton John Michael Crichton (; October 23, 1942 – November 4, 2008) was an American author, screenwriter and filmmaker. His books have sold over 200 million copies worldwide, and over a dozen have been adapted into films. His literary works heavil ...
movie ''
Westworld ''Westworld'' is an American science fiction dystopia media franchise that began with the Westworld (film), 1973 film ''Westworld'', written and directed by Michael Crichton. The film depicts a technologically advanced Wild West, Wild-West-th ...
'' made an early mention of the concept of a computer virus, being a central plot theme that causes androids to run amok.
Alan Oppenheimer Alan Oppenheimer (born April 23, 1930) is an American actor. He has performed numerous roles on live action television since the 1960s and has had an active career doing voice work since the 1970s. Early life Oppenheimer was born in New York ...
's character summarizes the problem by stating that "...there's a clear pattern here which suggests an analogy to an infectious disease process, spreading from one...area to the next." To which the replies are stated: "Perhaps there are superficial similarities to disease" and, "I must confess I find it difficult to believe in a disease of machinery." (Crichton's earlier work, the 1969 novel ''
The Andromeda Strain ''The Andromeda Strain'' is a 1969 novel by American writer Michael Crichton, his first novel under his own name and his sixth novel overall. It documents the outbreak of a deadly extraterrestrial microorganism in Arizona and the team of scie ...
'' and 1971 film were about an extraterrestrial biological virus-like disease that threatened the human race.)


1974

* The
Rabbit Rabbits are small mammals in the family Leporidae (which also includes the hares), which is in the order Lagomorpha (which also includes pikas). They are familiar throughout the world as a small herbivore, a prey animal, a domesticated ...
(or Wabbit) virus, more a
fork bomb In computing, a fork bomb (also called rabbit virus) is a denial-of-service (DoS) attack wherein a process continually replicates itself to deplete available system resources, slowing down or crashing the system due to resource starvation. ...
than a virus, is written. The Rabbit virus makes multiple copies of itself on a single computer (and was named "
rabbit Rabbits are small mammals in the family Leporidae (which also includes the hares), which is in the order Lagomorpha (which also includes pikas). They are familiar throughout the world as a small herbivore, a prey animal, a domesticated ...
" for the speed at which it did so) until it clogs the system, reducing system performance, before finally reaching a threshold and crashing the computer.


1975

* April: ANIMAL is written by John Walker for the
UNIVAC 1108 The UNIVAC 1100/2200 series is a series of compatible 36-bit computer systems, beginning with the UNIVAC 1107 in 1962, initially made by Sperry Rand. The series continues to be supported today by Unisys Corporation as the ClearPath Dorado Series ...
. ANIMAL asked several questions of the user in an attempt to guess the type of animal the user was thinking of, while the related program PERVADE would create a copy of itself and ANIMAL in every directory to which the current user had access. It spread across the multi-user UNIVACs when users with overlapping permissions discovered the game, and to other computers when tapes were shared. The program was carefully written to avoid damaging existing file or directory structures, and to avoid copying itself if permissions did not exist or if harm would result. Its spread was halted by an OS upgrade that changed the format of the file status tables PERVADE used. Though non-malicious, "Pervading Animal" represents the first
Trojan Trojan or Trojans may refer to: * Of or from the ancient city of Troy * Trojan language, the language of the historical Trojans Arts and entertainment Music * '' Les Troyens'' ('The Trojans'), an opera by Berlioz, premiered part 1863, part 18 ...
"in the wild". * The novel '' The Shockwave Rider'' by John Brunner is published, coining the word "
worm Worms are many different distantly related bilateria, bilateral animals that typically have a long cylindrical tube-like body, no limb (anatomy), limbs, and usually no eyes. Worms vary in size from microscopic to over in length for marine ...
" to describe a program that propagates itself through a
computer network A computer network is a collection of communicating computers and other devices, such as printers and smart phones. In order to communicate, the computers and devices must be connected by wired media like copper cables, optical fibers, or b ...
.


1977

*'' The Adolescence of P-1'' novel, describes a worm program that propagates through modem-based networks, eventually developing its own strategy-developing AI, which deals with cross-hardware and cross-os issues, eventually infecting hardware manufactures and defense organizations.


1980s


1982

* A program called
Elk Cloner Elk Cloner is one of the first known microcomputer viruses that spread "in the wild", i.e., outside the computer system or laboratory in which it was written. It attached itself to the Apple II operating system and spread by floppy disk. It was ...
, written for
Apple II Apple II ("apple Roman numerals, two", stylized as Apple ][) is a series of microcomputers manufactured by Apple Computer, Inc. from 1977 to 1993. The Apple II (original), original Apple II model, which gave the series its name, was designed ...
systems, was created by high school student Rich Skrenta, Richard Skrenta, originally as a prank. The Apple II was particularly vulnerable due to the storage of its operating system on a floppy disk. Elk Cloner's design combined with public ignorance about what
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
was and how to protect against it led to Elk Cloner being responsible for the first large-scale computer virus outbreak in history.


1983

* November: The term "virus" is re-coined by Frederick B. Cohen in describing self-replicating computer programs. In 1984 Cohen uses the phrase "computer virus" (suggested by his teacher
Leonard Adleman Leonard Adleman (born December 31, 1945) is an American computer scientist. He is one of the creators of the RSA encryption algorithm, for which he received the 2002 Turing Award. He is also known for the creation of the field of DNA computin ...
) to describe the operation of such programs in terms of "infection". He defines a "virus" as "a program that can 'infect' other programs by modifying them to include a possibly evolved copy of itself." Cohen demonstrates a virus-like program on a VAX11/750 system at
Lehigh University Lehigh University (LU), in Bethlehem, Pennsylvania, United States, is a private university, private research university. The university was established in 1865 by businessman Asa Packer. Lehigh University's undergraduate programs have been mixed ...
. The program could install itself in, or infect, other system objects.


1984

* August:
Ken Thompson Kenneth Lane Thompson (born February 4, 1943) is an American pioneer of computer science. Thompson worked at Bell Labs for most of his career where he designed and implemented the original Unix operating system. He also invented the B (programmi ...
publishes his seminal paper, "
Reflections on Trusting Trust Kenneth Lane Thompson (born February 4, 1943) is an American pioneer of computer science. Thompson worked at Bell Labs for most of his career where he designed and implemented the original Unix operating system. He also invented the B programmi ...
", in which he describes how he modified a C
compiler In computing, a compiler is a computer program that Translator (computing), translates computer code written in one programming language (the ''source'' language) into another language (the ''target'' language). The name "compiler" is primaril ...
so that when used to compile a specific version of the
Unix Unix (, ; trademarked as UNIX) is a family of multitasking, multi-user computer operating systems that derive from the original AT&T Unix, whose development started in 1969 at the Bell Labs research center by Ken Thompson, Dennis Ritchie, a ...
operating system, it inserts a backdoor into the
login In computer security, logging in (or logging on, signing in, or signing on) is the process by which an individual gains access to a computer system or program by identifying and authenticating themselves. Typically, user credential ...
command, and when used to compile a new copy of itself, it inserts the backdoor insertion code, even if neither the backdoor nor the backdoor insertion code is present in the
source code In computing, source code, or simply code or source, is a plain text computer program written in a programming language. A programmer writes the human readable source code to control the behavior of a computer. Since a computer, at base, only ...
of this new copy.


1986

* January: The
Brain The brain is an organ (biology), organ that serves as the center of the nervous system in all vertebrate and most invertebrate animals. It consists of nervous tissue and is typically located in the head (cephalization), usually near organs for ...
boot sector A boot sector is the disk sector, sector of a persistent data storage device (e.g., hard disk, floppy disk, optical disc, etc.) which contains machine code to be loaded into random-access memory (RAM) and then executed by a computer system's bui ...
virus is released. Brain is considered the first
IBM PC compatible An IBM PC compatible is any personal computer that is hardware- and software-compatible with the IBM Personal Computer (IBM PC) and its subsequent models. Like the original IBM PC, an IBM PC–compatible computer uses an x86-based central p ...
virus, and the program responsible for the first IBM PC compatible virus epidemic. The virus is also known as Lahore, Pakistani, Pakistani Brain, and Pakistani flu as it was created in
Lahore Lahore ( ; ; ) is the capital and largest city of the Administrative units of Pakistan, Pakistani province of Punjab, Pakistan, Punjab. It is the List of cities in Pakistan by population, second-largest city in Pakistan, after Karachi, and ...
, Pakistan, by 19-year-old Pakistani programmer Basit Farooq Alvi and his brother, Amjad Farooq Alvi. * December: Ralf Burger presented the Virdem model of programs at a meeting of the underground
Chaos Computer Club The Chaos Computer Club (CCC) is Europe's largest association of Hacker (computer security), hackers with 7,700 registered members. Founded in 1981, the association is incorporated as an ''eingetragener Verein'' in Germany, with local chapters ...
in Germany. The Virdem model represented the first programs that could replicate themselves via addition of their code to executable DOS files in COM format.


1987

* Appearance of the Vienna virus, which was subsequently neutralized – the first time this had happened on the
IBM International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American Multinational corporation, multinational technology company headquartered in Armonk, New York, and present in over 175 countries. It is ...
platform. * Appearance of Lehigh virus (discovered at its namesake university), boot sector viruses such as Yale from the US, Stoned from New Zealand,
Ping Pong Table tennis (also known as ping-pong) is a racket sport derived from tennis but distinguished by its playing surface being atop a stationary table, rather than the court on which players stand. Either individually or in teams of two, players ...
from Italy, and appearance of the first self-encrypting file virus,
Cascade Cascade, or Cascading may refer to: Science and technology Science * Air shower (physics), a cascade (particle shower) of subatomic particles and ionized nuclei ** Particle shower, a cascade of secondary particles produced as the result of a high ...
. Lehigh was stopped on campus before it spread to the "wild" (to computers beyond the university), and as a result, has never been found elsewhere. A subsequent infection of Cascade in the offices of IBM Belgium led to IBM responding with its own antivirus product development. Prior to this, antivirus solutions developed at IBM were intended for staff use only. * October: The Jerusalem virus, part of the (at that time unknown) Suriv family, is detected in the city of
Jerusalem Jerusalem is a city in the Southern Levant, on a plateau in the Judaean Mountains between the Mediterranean Sea, Mediterranean and the Dead Sea. It is one of the List of oldest continuously inhabited cities, oldest cities in the world, and ...
. The virus destroys all executable files on infected machines upon every occurrence of Friday the 13th (except Friday 13 November 1987 making its first trigger date May 13, 1988). Jerusalem caused a worldwide epidemic in 1988. * November: The SCA virus, a boot sector virus for
Amiga Amiga is a family of personal computers produced by Commodore International, Commodore from 1985 until the company's bankruptcy in 1994, with production by others afterward. The original model is one of a number of mid-1980s computers with 16-b ...
computers, appears. It immediately creates a pandemic virus-writer storm. A short time later, SCA releases another, considerably more destructive virus, the Byte Bandit. * December: Christmas Tree EXEC was the first widely disruptive replicating network program, which paralyzed several international computer networks in December 1987. It was written in
Rexx Rexx (restructured extended executor) is a high-level programming language developed at IBM by Mike Cowlishaw. Both proprietary and open-source software, open source Rexx interpreter (computing), interpreters exist for a wide range of comput ...
on the
VM/CMS VM (often: VM/CMS) is a family of IBM virtual machine operating systems used on IBM mainframes System/370, System/390, zSeries, System z and compatible systems, including the Hercules emulator for personal computers. Design The heart o ...
operating system and originated in
West Germany West Germany was the common English name for the Federal Republic of Germany (FRG) from its formation on 23 May 1949 until German reunification, its reunification with East Germany on 3 October 1990. It is sometimes known as the Bonn Republi ...
. It re-emerged in 1990.


1988

* March 1: The
Ping-Pong virus The Ping-Pong virus (also called Boot, Bouncing Ball, Bouncing Dot, Italian, Italian-A or VeraCruz) is a boot sector virus discovered on March 1, 1988, at the '' Politecnico di Torino'' (Turin Polytechnic University) in Italy Italy, offi ...
(also called Boot, Bouncing Ball, Bouncing Dot, Italian, Italian-A or VeraCruz), an MS-DOS boot sector virus, is discovered at the
University of Turin The University of Turin (Italian language, Italian: ''Università degli Studi di Torino'', UNITO) is a public university, public research university in the city of Turin, in the Piedmont (Italy), Piedmont region of Italy. It is one of the List ...
in Italy. * June: The CyberAIDS and Festering Hate
Apple ProDOS ProDOS is the name of two similar operating systems for the Apple II of personal computer. The original ProDOS, renamed ProDOS 8 in version 1.2, is the last official operating system usable by all 8-bit Apple II computers, and was distributed ...
viruses spreads from underground pirate BBS systems and starts infecting mainstream networks. Festering Hate was the last iteration of the CyberAIDS series extending back to 1985 and 1986. Unlike the few Apple viruses that had come before which were essentially annoying, but did no damage, the Festering Hate series of viruses was extremely destructive, spreading to all system files it could find on the host computer (hard drive, floppy, and system memory) and then destroying everything when it could no longer find any uninfected files. * November 2: The
Morris worm The Morris worm or Internet worm of November 2, 1988, is one of the oldest computer worms distributed via the Internet, and the first to gain significant mainstream media attention. It resulted in the first felony conviction in the US under the ...
, created by
Robert Tappan Morris Robert Tappan Morris (born November 8, 1965) is an American computer scientist and entrepreneur. He is best known for creating the Morris worm in 1988, considered the first computer worm on the Internet. Morris was prosecuted for releasing th ...
, infects DEC
VAX VAX (an acronym for virtual address extension) is a series of computers featuring a 32-bit instruction set architecture (ISA) and virtual memory that was developed and sold by Digital Equipment Corporation (DEC) in the late 20th century. The V ...
and
Sun The Sun is the star at the centre of the Solar System. It is a massive, nearly perfect sphere of hot plasma, heated to incandescence by nuclear fusion reactions in its core, radiating the energy from its surface mainly as visible light a ...
machines running
BSD UNIX The Berkeley Software Distribution (BSD), also known as Berkeley Unix or BSD Unix, is a discontinued Unix operating system developed and distributed by the Computer Systems Research Group (CSRG) at the University of California, Berkeley, beginni ...
that are connected to the
Internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
, and becomes the first worm to spread extensively "in the wild", and one of the first well-known programs exploiting buffer overrun vulnerabilities. * December: The Father Christmas worm attacks DEC
VAX VAX (an acronym for virtual address extension) is a series of computers featuring a 32-bit instruction set architecture (ISA) and virtual memory that was developed and sold by Digital Equipment Corporation (DEC) in the late 20th century. The V ...
machines running VMS that are connected to the DECnet Internet (an international scientific research network using
DECnet DECnet is a suite of network protocols created by Digital Equipment Corporation. Originally released in 1975 in order to connect two PDP-11 minicomputers, it evolved into one of the first peer-to-peer network architectures, thus transforming DEC ...
protocols), affecting
NASA The National Aeronautics and Space Administration (NASA ) is an independent agencies of the United States government, independent agency of the federal government of the United States, US federal government responsible for the United States ...
and other research centers. Its purpose was to deliver a Christmas greeting to all affected users.


1989

* October: Ghostball, the first multipartite virus, is discovered by Friðrik Skúlason. It infects both executable .COM files and boot sectors on MS-DOS systems. * December: Several thousand floppy disks containing the AIDS Trojan, the first known
ransomware Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
, are mailed to subscribers of PC Business World magazine and a WHO AIDS conference mailing list. This DOS Trojan lies dormant for 90 boot cycles, then encrypts all filenames on the system, displaying a notice asking for $189 to be sent to a post office box in Panama in order to receive a decryption program.


1990s


1990

* Mark Washburn, working on an analysis of the Vienna and Cascade viruses with Ralf Burger, develops the first family of polymorphic viruses, the Chameleon family. Chameleon series debuted with the release of
1260 Year 1260 ( MCCLX) was a leap year starting on Thursday of the Julian calendar. Events By place Africa * October 24 – Saif ad-Din Qutuz, Mamluk sultan of Egypt, is assassinated by Baibars, who seizes power for himself. * The civil se ...
. * June: The
Form Form is the shape, visual appearance, or configuration of an object. In a wider sense, the form is the way something happens. Form may also refer to: *Form (document), a document (printed or electronic) with spaces in which to write or enter dat ...
computer virus is isolated in Switzerland. It would remain in the wild for almost 20 years and reappear afterward; during the 1990s it tended to be the most common virus in the wild with 20 to more than 50 percent of reported infections.


1991

* Mattel releases a toyline called "Computer Warriors," bringing computer viruses into mainstream media. The villain, Megahert, is a sentient computer virus.


1992

* March: The Michelangelo virus was expected to create a digital apocalypse on March 6, with millions of computers having their information wiped, according to mass media hysteria surrounding the virus. Later assessments of the damage showed the aftermath to be minimal.
John McAfee John David McAfee ( ; 18 September 1945 – 23 June 2021) was a British and American computer programmer, businessman, and two-time presidential candidate who unsuccessfully sought the Libertarian Party (United States), Libertarian Party nominat ...
had been quoted by the media as saying that five million computers would be affected. He later said that pressed by the interviewer to come up with a number, he had estimated a range from five thousand to five million, but the media naturally went with just the higher number. * October: Milton-Bradley releases '' Omega Virus'', a board game containing one of the first examples of a sentient computer virus in mainstream media.


1993

* "Leandro" or "Leandro & Kelly" and "Freddy Krueger" spread quickly due to popularity of BBS and
shareware Shareware is a type of proprietary software that is initially shared by the owner for trial use at little or no cost. Often the software has limited functionality or incomplete documentation until the user sends payment to the software developer. ...
distribution.


1994

* April: OneHalf is a DOS-based polymorphic computer virus. * September: ''
ReBoot In computing, rebooting is the process by which a running computer system is restarted, either intentionally or unintentionally. Reboots can be either a cold reboot (alternatively known as a hard reboot) in which the power to the system is physi ...
'' first airs, containing another memorable fictional, sentient computer virus, Megabyte.


1995

* The first Macro virus, called "Concept", is created. It attacked Microsoft Word documents.


1996

* "Ply" – DOS 16-bit based complicated polymorphic virus appeared with a built-in permutation engine. *
Boza Boza, also bosa, is a fermented beverage originating from Central Asia and made in parts of the Balkans, Turkey, Central Asia, the Caucasus, and North Africa. It is a malt drink made by fermenting various grains: maize (corn) and wheat in Turkey ...
, the first virus designed specifically for Windows 95 files arrives. * Laroux, the first Excel macro virus appears. * Staog, the first
Linux Linux ( ) is a family of open source Unix-like operating systems based on the Linux kernel, an kernel (operating system), operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically package manager, pac ...
virus attacks Linux machines


1997

*
Esperanto Esperanto (, ) is the world's most widely spoken Constructed language, constructed international auxiliary language. Created by L. L. Zamenhof in 1887 to be 'the International Language' (), it is intended to be a universal second language for ...
, the first cross-platform virus, appears.


1998

*June 2: The first version of the CIH virus appears. It is the first known virus able to erase flash ROM BIOS content.


1999

* January 20: The Happy99 worm first appeared. It invisibly attaches itself to emails, displays fireworks to hide the changes being made, and wishes the user a happy New Year. It modifies system files related to
Outlook Express Outlook Express, formerly known as Microsoft Internet Mail and News, is a discontinued email and news client included with Internet Explorer versions 3.0 to 6.0. As such, it was bundled with several versions of Microsoft Windows, from Windows ...
and
Internet Explorer Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated as IE or MSIE) is a deprecation, retired series of graphical user interface, graphical web browsers developed by Microsoft that were u ...
(IE) on
Windows 95 Windows 95 is a consumer-oriented operating system developed by Microsoft and the first of its Windows 9x family of operating systems, released to manufacturing on July 14, 1995, and generally to retail on August 24, 1995. Windows 95 merged ...
and
Windows 98 Windows 98 is a consumer-oriented operating system developed by Microsoft as part of its Windows 9x family of Microsoft Windows operating systems. It was the second operating system in the 9x line, as the successor to Windows 95. It was Software ...
. * February : The Sub7 is released targeting the Windows 9x and on the Windows NT family of operating systems. * March 26: The Melissa virus was released, targeting
Microsoft Word Microsoft Word is a word processor program, word processing program developed by Microsoft. It was first released on October 25, 1983, under the name Multi-Tool Word for Xenix systems. Subsequent versions were later written for several other platf ...
and
Outlook Outlook or The Outlook may refer to: Computing * Microsoft Outlook, also referred to as ''the classic Outlook'' an e-mail client and personal information management software product from Microsoft * Outlook for Windows, also referred to as ''the ...
-based systems, and creating considerable network traffic. * June 6: The ExploreZip worm, which destroys
Microsoft Office Microsoft Office, MS Office, or simply Office, is an office suite and family of client software, server software, and services developed by Microsoft. The first version of the Office suite, announced by Bill Gates on August 1, 1988, at CO ...
documents, was first detected. * September: the CTX virus is isolated * December 30: The Kak worm is a
JavaScript JavaScript (), often abbreviated as JS, is a programming language and core technology of the World Wide Web, alongside HTML and CSS. Ninety-nine percent of websites use JavaScript on the client side for webpage behavior. Web browsers have ...
computer worm that spread itself by exploiting a bug in Outlook Express.


2000s


2000

* May 5: The ILOVEYOU worm (also known as the Love Letter, VBS, or Love Bug worm), a computer worm written in VBScript and using social engineering techniques, infected millions of Windows computers worldwide within a few hours of its release. * June 28: The Pikachu virus is believed to be the first computer virus geared at children. It contains the character "
Pikachu Pikachu (; Japanese: , Hepburn: ) is a Pokémon species in Nintendo and Game Freak's ''Pokémon'' media franchise, and the franchise's mascot. First introduced in the video games ''Pokémon Red'' and ''Blue'', it was created by Atsuko N ...
" from the
Pokémon is a Japanese media franchise consisting of List of Pokémon video games, video games, Pokémon (TV series), animated series and List of Pokémon films, films, Pokémon Trading Card Game, a trading card game, and other related media. The fran ...
series. The operating systems affected by this worm are
Windows 95 Windows 95 is a consumer-oriented operating system developed by Microsoft and the first of its Windows 9x family of operating systems, released to manufacturing on July 14, 1995, and generally to retail on August 24, 1995. Windows 95 merged ...
,
Windows 98 Windows 98 is a consumer-oriented operating system developed by Microsoft as part of its Windows 9x family of Microsoft Windows operating systems. It was the second operating system in the 9x line, as the successor to Windows 95. It was Software ...
, and Windows ME.


2001

* February 11: The Anna Kournikova virus hits e-mail servers hard by sending e-mail to contacts in the
Microsoft Outlook Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft 365 software suites. Primarily popular as an email client for businesses, Outlook also includes functions such as Calendari ...
addressbook. Its creator, Jan de Wit, was sentenced to 150 hours of community service. * March 13: Magistr, also called Disembowler, is discovered. It is a complex email worm for Windows systems with multiple payloads that trigger months apart from each other. It targets members of the Law profession by searching the files on a user's computer for various keywords relating to court proceedings, activating if such are found. * May 8: The Sadmind worm spreads by exploiting holes in both
Sun The Sun is the star at the centre of the Solar System. It is a massive, nearly perfect sphere of hot plasma, heated to incandescence by nuclear fusion reactions in its core, radiating the energy from its surface mainly as visible light a ...
Solaris Solaris is the Latin word for sun. It may refer to: Arts and entertainment Literature, television and film * ''Solaris'' (novel), a 1961 science fiction novel by Stanisław Lem ** ''Solaris'' (1968 film), directed by Boris Nirenburg ** ''Sol ...
and
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
IIS. * July: The Sircam worm is released, spreading through Microsoft systems via e-mail and unprotected network shares. * July 13: The Code Red worm attacking the Index Server ISAPI Extension in Microsoft
Internet Information Services Microsoft IIS (Internet Information Services, IIS, 2S) is an extensible web server created by Microsoft for use with the Windows NT family. IIS supports HTTP, HTTP/2, HTTP/3, HTTPS, FTP, FTPS, SMTP and NNTP. It has been an integral part o ...
is released. * August 4: A complete re-write of the Code Red worm,
Code Red II Code Red II is a computer worm similar to the Code Red worm. Released two weeks after Code Red on August 4, 2001, it is similar in behavior to the original, but analysis showed it to be a new worm instead of a variant. Unlike the first, the seco ...
begins aggressively spreading onto Microsoft systems, primarily in China. * September 18: The
Nimda The Nimda virus is a malicious file-infecting computer worm. The first released advisory about this threat (worm) was released on September 18, 2001. Nimda affected both user workstations ( clients) running Windows 95, 98, NT, 2000, or XP an ...
worm is discovered and spreads through a variety of means including vulnerabilities in Microsoft Windows and backdoors left by
Code Red II Code Red II is a computer worm similar to the Code Red worm. Released two weeks after Code Red on August 4, 2001, it is similar in behavior to the original, but analysis showed it to be a new worm instead of a variant. Unlike the first, the seco ...
and Sadmind worm. * October 26: The Klez worm is first identified. It exploits a vulnerability in Microsoft Internet Explorer and Microsoft Outlook and Outlook Express.


2002

* February 11: The Simile virus is a
metamorphic Metamorphic rocks arise from the transformation of existing rock to new types of rock in a process called metamorphism. The original rock (protolith) is subjected to temperatures greater than and, often, elevated pressure of or more, causi ...
computer virus written in assembly. * Beast is a Windows-based backdoor Trojan horse, more commonly known as a RAT ( Remote Administration Tool). It is capable of infecting almost all versions of Windows. Written in
Delphi Delphi (; ), in legend previously called Pytho (Πυθώ), was an ancient sacred precinct and the seat of Pythia, the major oracle who was consulted about important decisions throughout the ancient Classical antiquity, classical world. The A ...
and released first by its author Tataye in 2002, its most current version was released on October 3, 2004. * March 7: Mylife is a computer worm that spread itself by sending malicious emails to all the contacts in Microsoft Outlook.


2003

* January 24: The
SQL Slammer SQL Slammer is a 2003 computer worm that caused a denial of service on some Internet hosts and dramatically slowed general Internet traffic. It also crashed routers around the world, causing even more slowdowns. It spread rapidly, infecting most o ...
worm, aka ''Sapphire worm'', ''Helkern'' and other names, attacks vulnerabilities in
Microsoft SQL Server Microsoft SQL Server is a proprietary relational database management system developed by Microsoft using Structured Query Language (SQL, often pronounced "sequel"). As a database server, it is a software product with the primary function of ...
and
MSDE Microsoft SQL Server Data Engine (MSDE, also Microsoft Data Engine or Microsoft Desktop Engine) is a relational database management system developed by Microsoft. It is a scaled-down version of Microsoft SQL Server 7.0 or 2000 which is free for no ...
becomes the fastest spreading worm of all time (measured by doubling time at the peak rate of growth), causing massive Internet access disruptions worldwide just fifteen minutes after infecting its first victim. * April 2: Graybird is a trojan horse also known as Backdoor.Graybird. * June 13: ProRat is a Turkish-made Microsoft Windows based backdoor trojan horse, more commonly known as a RAT (Remote Administration Tool). * August 12: The
Blaster worm Blaster (also known as Lovsan, Lovesan, or MSBlast) was a computer worm that spread on computers running operating systems Windows XP and Windows 2000 during August 2003. The worm was first noticed and started spreading on August 11, 2003. The ...
, aka the ''Lovesan'' worm, rapidly spreads by exploiting a vulnerability in system services present on Windows computers. * August 18: The Welchia (Nachi) worm is discovered. The worm tries to remove the
Blaster worm Blaster (also known as Lovsan, Lovesan, or MSBlast) was a computer worm that spread on computers running operating systems Windows XP and Windows 2000 during August 2003. The worm was first noticed and started spreading on August 11, 2003. The ...
and patch Windows. * August 19: The Sobig worm (technically the SobigF worm) spreads rapidly through Microsoft systems via mail and network shares. * September 18: Swen is a computer worm written in C++. * October 24: The Sober worm is first seen on Microsoft systems and maintains its presence until 2005 with many new variants. The simultaneous attacks on network weak points by the Blaster and Sobig worms cause massive damage. * November 10: Agobot is a computer worm that can spread itself by exploiting vulnerabilities on Microsoft Windows. Some of the vulnerabilities are MS03-026 and MS05-039. * November 20: Bolgimo is a computer worm that spread itself by exploiting a buffer overflow vulnerability at Microsoft Windows DCOM RPC Interface (CVE-2003-0352).


2004

* January 18: Bagle is a mass-mailing worm affecting all versions of Microsoft Windows. There were two variants of Bagle worm, BagleA and Bagle.B. BagleB was discovered on February 17, 2004. *January 26: The
MyDoom Mydoom was a computer worm that targeted computers running Microsoft Windows. It was first sighted on January 26, 2004. It became the fastest-spreading e-mail worm ever, exceeding previous records set by the Sobig worm and ILOVEYOU, a record wh ...
worm emerges, and currently holds the record for the fastest-spreading mass mailer worm. The worm was most notable for performing a distributed denial-of-service (DDoS) attack on www.sco.com, which belonged to
The SCO Group The SCO Group (often referred to SCO and later called The TSG Group) was an American software company in existence from 2002 to 2012 that became known for owning Unix operating system assets that had belonged to the Santa Cruz Operation (the o ...
. * February 16: The Netsky worm is discovered. The worm spreads by email and by copying itself to folders on the local hard drive as well as on mapped network drives if available. Many variants of the Netsky worm appeared. * March 19: The Witty worm is a record-breaking worm in many regards. It exploited holes in several Internet Security Systems (ISS) products. It spread rapidly using a pre-populated list of ground-zero hosts. * May 1: The Sasser worm emerges by exploiting a vulnerability in the Microsoft Windows LSASS service and causes problems in networks, while removing
MyDoom Mydoom was a computer worm that targeted computers running Microsoft Windows. It was first sighted on January 26, 2004. It became the fastest-spreading e-mail worm ever, exceeding previous records set by the Sobig worm and ILOVEYOU, a record wh ...
and Bagle variants, even interrupting business. * June 15:
Caribe Caribe may refer to: * Caribe (Venezuelan TV series), ''Caribe'' (Venezuelan TV series), a Venezuelan telenovela * Caribe (American TV series), ''Caribe'' (American TV series), a 1975 television series produced by Quinn Martin * Caribe, or Cabir ( ...
or Cabir is a computer worm that is designed to infect mobile phones that run
Symbian OS Symbian is a discontinued mobile operating system (OS) and computing platform designed for smartphones. It was originally developed as a proprietary software OS for personal digital assistants in 1998 by the Symbian Ltd. consortium. Symbian OS ...
. It is the first computer worm that can infect mobile phones. It spread itself through
Bluetooth Bluetooth is a short-range wireless technology standard that is used for exchanging data between fixed and mobile devices over short distances and building personal area networks (PANs). In the most widely used mode, transmission power is li ...
. More information can be found on
F-Secure F-Secure Corporation is a global cyber security and privacy company, which has its headquarters in Helsinki, Finland. The company has offices in Denmark, Finland, France, Germany, India, Italy, Japan, Malaysia, Netherlands, Norway, Poland, Swed ...
and Symantec. * August 16: Nuclear RAT (short for Nuclear Remote Administration Tool) is a backdoor
trojan Trojan or Trojans may refer to: * Of or from the ancient city of Troy * Trojan language, the language of the historical Trojans Arts and entertainment Music * '' Les Troyens'' ('The Trojans'), an opera by Berlioz, premiered part 1863, part 18 ...
that infects
Windows NT Windows NT is a Proprietary software, proprietary Graphical user interface, graphical operating system produced by Microsoft as part of its Windows product line, the first version of which, Windows NT 3.1, was released on July 27, 1993. Original ...
family systems (
Windows 2000 Windows 2000 is a major release of the Windows NT operating system developed by Microsoft, targeting the server and business markets. It is the direct successor to Windows NT 4.0, and was Software release life cycle#Release to manufacturing (RT ...
,
Windows XP Windows XP is a major release of Microsoft's Windows NT operating system. It was released to manufacturing on August 24, 2001, and later to retail on October 25, 2001. It is a direct successor to Windows 2000 for high-end and business users a ...
,
Windows 2003 Windows Server 2003, codenamed "Whistler Server", is the sixth major version of the Windows NT operating system produced by Microsoft and the first server version to be released under the Windows Server brand name. It is part of the Windows NT ...
). * August 20: Vundo, or the Vundo Trojan (also known as Virtumonde or Virtumondo and sometimes referred to as MS Juan) is a trojan known to cause popups and advertising for rogue antispyware programs, and sporadically other misbehavior including performance degradation and denial of service with some websites including
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
and
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
. * October 12: Bifrost, also known as Bifrose, is a backdoor trojan which can infect
Windows 95 Windows 95 is a consumer-oriented operating system developed by Microsoft and the first of its Windows 9x family of operating systems, released to manufacturing on July 14, 1995, and generally to retail on August 24, 1995. Windows 95 merged ...
through
Vista Vista may refer to: Software *Windows Vista, the line of Microsoft Windows client operating systems released in 2006 and 2007 * VistA, (Veterans Health Information Systems and Technology Architecture) a medical records system of the United States ...
. Bifrost uses the typical server, server builder, and client backdoor program configuration to allow a remote attack. * December: Santy, the first known "webworm" is launched. It exploited a vulnerability in
phpBB phpBB is an Internet forum package written in the PHP scripting language. The name "phpBB" is an abbreviation of ''PHP Bulletin Board''. Available under the GNU General Public License, phpBB is Free and open-source software, free and open-sourc ...
and used
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
to find new targets. It infected around 40000 sites before Google filtered the search query used by the worm, preventing it from spreading.


2005

* August 2005:
Zotob "The Zotob worm and several variations of it, known as Rbot.cbq, SDBot.bzh and Zotob.d, infected computers at companies such as ABC, CNN, The Associated Press, ''The New York Times'', and Caterpillar Inc." — ''Business Week'', August 16, 20 ...
is a computer worm which exploits security vulnerabilities in Microsoft operating systems like Windows 2000, including the MS05-039 plug-and-play vulnerability (CVE-2005-1983). This worm has been known to spread on Microsoft-ds or TCP port 445. * October 2005: The copy protection rootkit deliberately and surreptitiously included on music CDs sold by
Sony BMG Sony BMG Music Entertainment was an American record company owned as a 50–50 joint venture between Sony Corporation of America and Bertelsmann. The venture's successor, the revived Sony Music, is wholly owned by Sony, following their buyout o ...
is exposed. The rootkit creates vulnerabilities on affected computers, making them susceptible to infection by worms and viruses. * Late 2005: The
Zlob Trojan The Zlob Trojan, identified by some antiviruses as Trojan.Zlob, is a trojan horse (computing), Trojan horse which masquerades as a required video Fake codec, codec in the form of ActiveX. It was first detected in late 2005, but only started gain ...
, is a Trojan horse program that masquerades as a required video codec in the form of the Microsoft Windows ActiveX component. It was first detected in late 2005.


2006

* January 20: The Nyxem worm was discovered. It spread by mass-mailing. Its payload, which activates on the third of every month, starting on February 3, attempts to disable security-related and file-sharing software, and destroy files of certain types, such as Microsoft Office files. * February 16: Discovery of the first-ever malware for Mac OS X, a low-threat trojan-horse known as OSX/ Leap-A or OSX/Oompa-A, is announced. * Late March: Brontok variant N was found in late March. Brontok was a mass-email worm and the origin for the worm was from Indonesia. * June: Starbucks is a virus that infects StarOffice and OpenOffice. * Late September: Stration or Warezov worm first discovered. * Development of
Stuxnet Stuxnet is a Malware, malicious computer worm first uncovered on June 17, 2010, and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsibl ...
is presumed to have been started between 2005 and 2006.


2007

* January 17:
Storm Worm The Storm Worm (dubbed so by the Finnish company F-Secure) is a phishing backdoor Trojan horse that affects computers using Microsoft operating systems, discovered on January 17, 2007. The worm is also known as: * Small.dam or Trojan-Download ...
identified as a fast-spreading email spamming threat to Microsoft systems. It begins gathering infected computers into the
Storm botnet The Storm botnet or Storm Worm botnet (also known as Dorf botnet and Ecard malware) was a remotely controlled network of "zombie" computers (or "botnet") that had been linked by the Storm Worm, a Trojan horse spread through e-mail spam. At i ...
. By around June 30, it had infected 1.7 million computers, and it had compromised between 1 and 10 million computers by September. Thought to have originated from Russia, it disguises itself as a news email containing a film about bogus news stories asking the user to download the attachment which it claims is a film. * July:
Zeus Zeus (, ) is the chief deity of the List of Greek deities, Greek pantheon. He is a sky father, sky and thunder god in ancient Greek religion and Greek mythology, mythology, who rules as king of the gods on Mount Olympus. Zeus is the child ...
is a trojan that targets Microsoft Windows to steal banking information by keystroke logging.


2008

* February 17:
Mocmex Mocmex is a trojan, which was found in a digital photo frame in February 2008. It was the first serious computer virus on a digital photo frame. The virus was traced back to a group in China. Overview Mocmex collects passwords for online games. ...
is a trojan, which was found in a digital photo frame in February 2008. It was the first serious computer virus on a digital photo frame. The virus was traced back to a group in China. * March 3: Torpig, also known as Sinowal and Mebroot, is a Trojan horse that affects Windows, turning off anti-virus applications. It allows others to access the computer, modifies data, steals confidential information (such as user passwords and other sensitive data) and installs more malware on the victim's computer. * May 6: Rustock.C, a hitherto-rumored spambot-type malware with advanced rootkit capabilities, was announced to have been detected on Microsoft systems and analyzed, having been in the wild and undetected since October 2007 at the very least. * July 6: Bohmini.A is a configurable remote access tool or trojan that exploits security flaws in Adobe Flash 9.0.115 with Internet Explorer 7.0 and Firefox 2.0 under Windows XP SP2. * July 31: The Koobface computer worm targets users of
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
and
Myspace Myspace (formerly stylized as MySpace, currently myspace; and sometimes my␣, with an elongated Whitespace character#Substitute images, open box symbol) is a social networking service based in the United States. Launched on August 1, 2003, it w ...
. New variants constantly appear. * November 21: Computer worm Conficker infected anywhere from 9 to 15 million Microsoft server systems running everything from
Windows 2000 Windows 2000 is a major release of the Windows NT operating system developed by Microsoft, targeting the server and business markets. It is the direct successor to Windows NT 4.0, and was Software release life cycle#Release to manufacturing (RT ...
to the
Windows 7 Windows 7 is a major release of the Windows NT operating system developed by Microsoft. It was Software release life cycle#Release to manufacturing (RTM), released to manufacturing on July 22, 2009, and became generally available on October 22, ...
Beta. The French Navy,
UK Ministry of Defence The Ministry of Defence (MOD or MoD) is a ministerial department of the Government of the United Kingdom. It is responsible for implementing the defence policy set by the government and serves as the headquarters of the British Armed Forces. ...
(including Royal Navy warships and submarines), Sheffield Hospital network, German
Bundeswehr The (, ''Federal Defence'') are the armed forces of the Germany, Federal Republic of Germany. The is divided into a military part (armed forces or ''Streitkräfte'') and a civil part, the military part consists of the four armed forces: Germ ...
, and Norwegian Police were all affected among many others.
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
set a bounty of US$250,000 for information leading to the capture of the worm's author(s). Five main variants of the worm are known and have been dubbed Conficker A, B, C, D and E, increasingly adding self-defense mechanisms. They were discovered 21 November 2008, 29 December 2008, 20 February 2009, 4 March 2009, and 7 April 2009, respectively. On December 16, 2008, Microsoft releases KB958644 patching the server service vulnerability (CVE-2008-4250) responsible for the spread of Conficker.


2009

* July 4: The July 2009 cyber attacks occur and the W32.Dozer attack on the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
and
South Korea South Korea, officially the Republic of Korea (ROK), is a country in East Asia. It constitutes the southern half of the Korea, Korean Peninsula and borders North Korea along the Korean Demilitarized Zone, with the Yellow Sea to the west and t ...
emerges. * July 15: Symantec discovers
Daprosy Worm Daprosy worm was a malicious computer program that spreads via local area network (LAN) connections, Spam (e-mail), spammed e-mails and Universal Serial Bus, USB Data storage device, mass storage devices. Infection comes from a single read1st.EX ...
, a trojan worm intended to steal online game passwords in internet cafes by intercepting all keystrokes and sending them to its author. * August 24: Source code for MegaPanzer is released by its author under GPLv3 and appears to have been detected in the wild. * November 27: The virus Kenzero is a virus that spreads online from
peer-to-peer Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network, forming a peer-to-peer network of Node ...
networks (P2P) taking browsing history.


2010s


2010

*January: The Waledac botnet sent spam emails. In February 2010, an international group of security researchers and Microsoft took Waledac down. *January: The Psyb0t worm is discovered. It is thought to be unique in that it can infect routers and high-speed modems. * February 18:
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
announced that a BSoD problem on some Windows machines which was triggered by a batch of
Patch Tuesday Patch Tuesday (also known as Update Tuesday) is an unofficial term used to refer to when Microsoft, Adobe, Oracle and others regularly release software patches for their software products. It is widely referred to in this way by the industry. Micro ...
updates was caused by the
Alureon Alureon (also known as TDSS or TDL-4) is a trojan and rootkit created to steal data by intercepting a system's network traffic and searching for banking usernames and passwords, credit card data, PayPal information, social security numbers, and ot ...
Trojan. * June 17:
Stuxnet Stuxnet is a Malware, malicious computer worm first uncovered on June 17, 2010, and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsibl ...
, a Windows Trojan, was detected. It is the first worm to attack
SCADA SCADA (an acronym for supervisory control and data acquisition) is a control system architecture comprising computers, networked data communications and graphical user interfaces for high-level supervision of machines and processes. It also cove ...
systems. There are suggestions that it was designed to target Iranian nuclear facilities. It uses a valid certificate from
Realtek Realtek Semiconductor Corp. () is a Taiwanese fabless semiconductor company situated in the Hsinchu Science Park, Hsinchu, Taiwan. Realtek was founded in October 1987 and subsequently listed on the Taiwan Stock Exchange in 1998. Realtek has manu ...
. * September 9: The virus, called " here you have" or "VBMania", is a simple Trojan horse that arrives in the inbox with the odd-but-suggestive subject line "here you have". The body reads "This is The Document I told you about, you can find it Here" or "This is The Free Download Sex Movies, you can find it Here".


2011

* SpyEye and
Zeus Zeus (, ) is the chief deity of the List of Greek deities, Greek pantheon. He is a sky father, sky and thunder god in ancient Greek religion and Greek mythology, mythology, who rules as king of the gods on Mount Olympus. Zeus is the child ...
merged code is seen. New variants attack mobile phone banking information. * Anti-Spyware 2011, a Trojan horse that attacks Windows 9x, 2000, XP, Vista, and Windows 7, posing as an anti-spyware program. It disables security-related processes of anti-virus programs, while also blocking access to the Internet, which prevents updates. * Summer 2011: The Morto worm attempts to propagate itself to additional computers via the Microsoft Windows
Remote Desktop Protocol Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft Corporation which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this pu ...
(RDP). Morto spreads by forcing infected systems to scan for Windows servers allowing RDP login. Once Morto finds an RDP-accessible system, it attempts to log into a domain or local system account named 'Administrator' using several common passwords. A detailed overview of how the worm works – along with the password dictionary Morto uses – was done by Imperva. * July 13: the ZeroAccess rootkit (also known as Sirefef or max++) was discovered. * September 1:
Duqu Duqu is a collection of computer malware discovered on 1 September 2011, thought by Kaspersky Labs to be related to the Stuxnet worm and to have been created by Unit 8200. The Laboratory of Cryptography and System Security ( CrySyS Lab) of the ...
is a worm thought to be related to the
Stuxnet Stuxnet is a Malware, malicious computer worm first uncovered on June 17, 2010, and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsibl ...
worm. The Laboratory of Cryptography and System Security (
CrySyS Lab CrySyS Lab () is part of the Department of Telecommunications at the Budapest University of Technology and Economics. The name is derived from "Laboratory of Cryptography and System Security", the full Hungarian name is . History CrySyS Lab. w ...
) of the
Budapest University of Technology and Economics The Budapest University of Technology and Economics ( or in short ), official abbreviation BME, is a public research university located in Budapest, Hungary. It is the most significant university of technology in the country and is considered ...
in
Hungary Hungary is a landlocked country in Central Europe. Spanning much of the Pannonian Basin, Carpathian Basin, it is bordered by Slovakia to the north, Ukraine to the northeast, Romania to the east and southeast, Serbia to the south, Croatia and ...
discovered the threat, analysed the malware, and wrote a 60-page report naming the threat Duqu. Duqu gets its name from the prefix "~DQ" it gives to the names of files it creates.


2012

* May:
Flame A flame () is the visible, gaseous part of a fire. It is caused by a highly exothermic chemical reaction made in a thin zone. When flames are hot enough to have ionized gaseous components of sufficient density, they are then considered plasm ...
– also known as Flamer, sKyWIper, and Skywiper – a modular computer malware that attacks computers running Microsoft Windows. Used for targeted cyber espionage in Middle Eastern countries. Its discovery was announced on 28 May 2012 by MAHER Center of Iranian National Computer Emergency Response Team (CERT), Kaspersky Lab and CrySyS Lab of the Budapest University of Technology and Economics. CrySyS stated in their report that "sKyWIper is certainly the most sophisticated malware we encountered during our practice; arguably, it is the most complex malware ever found". * August 16:
Shamoon Shamoon (), also known as W32.DistTrack, is a modular computer virus that was discovered in 2012, targeting then-recent 32-bit architecture of Windows NT, NT kernel versions of Microsoft Windows. The virus was notable due to the destructive nature ...
is a computer virus designed to target computers running Microsoft Windows in the energy sector. Symantec, Kaspersky Lab, and Seculert announced its discovery on August 16, 2012. * September 20: NGRBot is a worm that uses the IRC network for file transfer, sending and receiving commands between zombie network machines and the attacker's IRC server, and monitoring and controlling network connectivity and intercept. It employs a user-mode rootkit technique to hide and steal its victim's information. This family of bot is also designed to infect HTML pages with inline frames (
iframes An HTML element is a type of HTML (HyperText Markup Language) document component, one of several types of HTML nodes (there are also text nodes, comment nodes and others). The first used version of HTML was written by Tim Berners-Lee in 1993 ...
), causing redirections, blocking victims from getting updates from security/antimalware products, and killing those services. The bot is designed to connect via a predefined IRC channel and communicate with a remote botnet."NGRBot"
Enigma Software Group, 15 October 2012. Retrieved 9 September 2013.
"Dissecting the NGR bot framework: IRC botnets die hard"
Aditya K. Sood and Richard J. Enbody, Michigan State University, USA, and Rohit Bansal, SecNiche Security, USA, with Helen Martin1 (ed.), January 2012. Retrieved 9 September 2013.


2013

* September: The CryptoLocker Trojan horse is discovered. CryptoLocker encrypts the files on a user's hard drive, then prompts them to pay a ransom to the developer to receive the decryption key. In the following months, several copycat ransomware Trojans were also discovered. * December: The
Gameover ZeuS GameOver ZeuS (GOZ), also known as peer-to-peer (P2P) ZeuS, ZeuS3, and GoZeus, is a Trojan horse (computing), Trojan horse developed by Russian cybercriminal Evgeniy Bogachev. Created in 2011 as a successor to Jabber Zeus, another project of Bog ...
Trojan is discovered. This type of virus steals one's login details on popular Web sites that involve monetary transactions. It works by detecting a login page, then proceeds to inject malicious code into the page,
keystroke logging Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitore ...
the computer user's details. * December: Linux.Darlloz targets the
Internet of things Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communication networks. The IoT encompasse ...
and infects routers,
security camera A closed-circuit television camera is a type of surveillance camera that transmits video signals to a specific set of monitors or video recording devices, rather than broadcasting the video over public airwaves. The term "closed-circuit televisi ...
s,
set-top box A set-top box (STB), also known as a cable converter box, cable box, receiver, or simply box, and historically television decoder or a converter, is an information appliance device that generally contains a Tuner (radio)#Television, TV tuner inpu ...
es by exploiting a
PHP PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995. The PHP reference implementation is now produced by the PHP Group. ...
vulnerability.


2014

* November: The
Regin In Norse mythology, Reginn (; often anglicized as Regin or Regan) is a son of Hreiðmarr and the foster father of Sigurð. His brothers are Fáfnir and Ótr. Attestations Völsunga saga When Loki mistakenly kills Ótr, Hreiðmarr demands to ...
Trojan horse is discovered. Regin is a dropper, primarily spread via spoofed Web pages. Once installed, it quietly downloads additional malware, making it difficult for signature-based anti-virus programs to detect. It is believed to have been created by the United States and United Kingdom as a tool for espionage and mass surveillance.


2015

* The BASHLITE malware is leaked leading to a massive spike in DDoS attacks. * Linux.Wifatch is revealed to the general public. It is found to attempt to secure devices from other more malicious malware.


2016

* January: A trojan named " MEMZ" is created. The creator, Leurak, explained that the trojan was intended merely as a joke. The trojan alerts the user to the fact that it is a trojan and warns them that if they proceed, the computer may no longer be usable. It contains complex payloads that corrupt the system, displaying artifacts on the screen as it runs. Once run, the application cannot be closed without causing further damage to the computer, which will stop functioning properly regardless. When the computer is restarted, in place of the bootsplash is a message that reads "Your computer has been trashed by the MEMZ Trojan. Now enjoy the Nyan cat...", which follows with an animation of the
Nyan Cat Nyan Cat is a YouTube video uploaded in April 2011, which became an Internet meme. The video merged a Japanese pop song with an animated cartoon cat with a Pop-Tarts, Pop-Tart for a torso flying through space and leaving a rainbow trail behind. Th ...
. * February: Ransomware Locky with its over 60 derivatives spread throughout Europe and infected several million computers. At the height of the spread over five thousand computers per hour were infected in Germany alone."Ransomware: Erpresserische Schadprogramme"
, bsi-fuer-buerger.de, 9 February 2016. Retrieved 10 March 2016.
Although
ransomware Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
was not a new thing at the time, insufficient cyber security as well as a lack of standards in IT was responsible for the high number of infections."Locky ransomware on aggressive hunt for victims"
Symantec.com, 18 February 2016. Retrieved 10 March 2016.
Unfortunately, even up to date antivirus and internet security software was unable to protect systems from early versions of Locky."Antivirus scan for (Locky)"
virustotal.com, 16 February 2016. Retrieved 10 March 2016.
* February: Tiny Banker Trojan (Tinba) makes headlines. Since its discovery, it has been found to have infected more than two dozen major banking institutions in the United States, including TD Bank, Chase, HSBC, Wells Fargo, PNC and Bank of America. Tiny Banker Trojan uses HTTP injection to force the user's computer to believe that it is on the bank's website. This spoof page will look and function just as the real one. The user then enters their information to log on, at which point Tinba can launch the bank webpage's "incorrect login information" return, and redirect the user to the real website. This is to trick the user into thinking they had entered the wrong information and proceed as normal, although now Tinba has captured the credentials and sent them to its host. * August: Journalists and researchers report the discovery of
spyware Spyware (a portmanteau for spying software) is any malware that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's securit ...
, called
Pegasus Pegasus (; ) is a winged horse in Greek mythology, usually depicted as a white stallion. He was sired by Poseidon, in his role as horse-god, and foaled by the Gorgon Medusa. Pegasus was the brother of Chrysaor, both born from Medusa's blood w ...
, developed and distributed by a private company which can and has been used to infect
iOS Ios, Io or Nio (, ; ; locally Nios, Νιός) is a Greek island in the Cyclades group in the Aegean Sea. Ios is a hilly island with cliffs down to the sea on most sides. It is situated halfway between Naxos and Santorini. It is about long an ...
and Android
smartphone A smartphone is a mobile phone with advanced computing capabilities. It typically has a touchscreen interface, allowing users to access a wide range of applications and services, such as web browsing, email, and social media, as well as multi ...
s often – based on 0-day exploits – without the need for any user-interaction or significant clues to the user and then be used to exfiltrate data, track user locations, capture film through its camera, and activate the microphone at any time. The investigation suggests it was used on many targets worldwide and revealed its use for e.g. governments' espionage on journalists, opposition politicians, activists, business people and others. * September: Mirai creates headlines by launching some of the most powerful and disruptive DDoS attacks seen to date by infecting the
Internet of Things Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communication networks. The IoT encompasse ...
. Mirai ends up being used in the DDoS attack on 20 September 2016 on the Krebs on Security site which reached 620 Gbit/s.''
The Economist ''The Economist'' is a British newspaper published weekly in printed magazine format and daily on Electronic publishing, digital platforms. It publishes stories on topics that include economics, business, geopolitics, technology and culture. M ...
'', 8 October 2016
The internet of stings
/ref>
Ars Technica ''Ars Technica'' is a website covering news and opinions in technology, science, politics, and society, created by Ken Fisher and Jon Stokes in 1998. It publishes news, reviews, and guides on issues such as computer hardware and software, sci ...
also reported a 1 Tbit/s attack on French web host OVH. On 21 October 2016 multiple major DDoS attacks in
DNS The Domain Name System (DNS) is a hierarchical and distributed name service that provides a naming system for computers, services, and other resources on the Internet or other Internet Protocol (IP) networks. It associates various informatio ...
services of DNS service provider Dyn occurred using Mirai malware installed on a large number of IoT devices, resulting in the inaccessibility of several high-profile websites such as
GitHub GitHub () is a Proprietary software, proprietary developer platform that allows developers to create, store, manage, and share their code. It uses Git to provide distributed version control and GitHub itself provides access control, bug trackin ...
,
Twitter Twitter, officially known as X since 2023, is an American microblogging and social networking service. It is one of the world's largest social media platforms and one of the most-visited websites. Users can share short text messages, image ...
,
Reddit Reddit ( ) is an American Proprietary software, proprietary social news news aggregator, aggregation and Internet forum, forum Social media, social media platform. Registered users (commonly referred to as "redditors") submit content to the ...
,
Netflix Netflix is an American subscription video on-demand over-the-top streaming service. The service primarily distributes original and acquired films and television shows from various genres, and it is available internationally in multiple lang ...
,
Airbnb Airbnb, Inc. ( , an abbreviation of its original name, "Air Bed and Breakfast") is an American company operating an online marketplace for short-and-long-term homestays, experiences and services in various countries and regions. It acts as a ...
and many others. The attribution of the attack to the Mirai botnet was originally reported by BackConnect Inc., a security firm.


2017

* May: The
WannaCry ransomware attack The WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the form ...
spreads globally. Exploits revealed in the
NSA The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
hacking toolkit leak of late 2016 were used to enable the propagation of the malware. Shortly after the news of the infections broke online, a UK cybersecurity researcher in collaboration with others found and activated a "kill switch" hidden within the ransomware, effectively halting the initial wave of its global propagation. The next day, researchers announced that they had found new variants of the malware without the kill switch. *June: The Petya attack spreads globally affecting Windows systems. Researchers at Symantec reveal that this ransomware uses the EternalBlue exploit, similar to the one used in the
WannaCry ransomware attack The WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the form ...
. *September: The Xafecopy Trojan attacks 47 countries, affecting only Android operating systems. Kaspersky Lab identified it as a malware from the Ubsod family, stealing money through click based WAP billing systems. *September: A new variety of Remote Access Trojan (RAT), Kedi RAT, is distributed in a Spear Phishing Campaign. The attack targeted
Citrix Citrix Systems, Inc. is an American multinational cloud computing and virtualization technology company that provides server, application and desktop virtualization, networking, software as a service (SaaS), and cloud computing technologies. C ...
users. The Trojan was able to evade usual system scanners. Kedi Trojan had all the characteristics of a common Remote Access Trojan and it could communicate to its Command and Control center via Gmail using common HTML, HTTP protocols.


2018

*February: Thanatos, a ransomware, becomes the first ransomware program to accept ransom payment in
Bitcoin Cash Bitcoin Cash (also referred to as Bcash) is a cryptocurrency that is a fork of bitcoin. Launched in 2017, Bitcoin Cash is considered an altcoin or spin-off of bitcoin. In November 2018, Bitcoin Cash further split into two separate cryptocurren ...
.


2019

*November:
Titanium Titanium is a chemical element; it has symbol Ti and atomic number 22. Found in nature only as an oxide, it can be reduced to produce a lustrous transition metal with a silver color, low density, and high strength, resistant to corrosion in ...
is an advanced backdoor
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
, developed by the
PLATINUM Platinum is a chemical element; it has Symbol (chemistry), symbol Pt and atomic number 78. It is a density, dense, malleable, ductility, ductile, highly unreactive, precious metal, precious, silverish-white transition metal. Its name origina ...
APT.


2020s


2024

* March 2: Researchers Nassi, Cohen, and Bitton developed a computer worm called Morris II, targeting generative AI email assistants to steal data and send spam, thereby breaching security protections of systems like
ChatGPT ChatGPT is a generative artificial intelligence chatbot developed by OpenAI and released on November 30, 2022. It uses large language models (LLMs) such as GPT-4o as well as other Multimodal learning, multimodal models to create human-like re ...
and Gemini. Conducted in a test environment, this research highlights the security risks of multimodal large language models (LLMs) that now generate text, images, and videos. Generative AI systems, which operate on prompts, can be exploited through weaponized prompts. For instance, hidden text on a webpage could instruct an
LLM A large language model (LLM) is a language model trained with Self-supervised learning, self-supervised machine learning on a vast amount of text, designed for natural language processing tasks, especially Natural language generation, language g ...
to perform malicious activities, such as phishing for bank details. While generative AI worms like Morris II haven’t been observed in the public, their potential threat is a concern for the tech industry. * March 29:
XZ Utils backdoor In February 2024, a malware, malicious Backdoor (computing), backdoor was introduced to the Linux build of the XZ Utils, xz utility within the liblzma library in versions 5.6.0 and 5.6.1 by an account using the name "Jia Tan". The backdoor gives ...
is discovered. * April 1: The Linux's WALLSCAPE Bug is discovered. * June 29: Brain Cipher - a variant of LockBit 3.0 Ransomware behind Indonesia's Data Center attacks.


See also

* History of computer viruses * List of security hacking incidents * Timeline of computing 2020–present


References


External links


A short history of hacks, worms, and cyberterror
by Mari Keefe, Computerworld, April 2009
5th Utility Ltd list of the 10 worst computer viruses of all time
{{Timelines of computing
viruses A virus is a submicroscopic infectious agent that replicates only inside the living cells of an organism. Viruses infect all life forms, from animals and plants to microorganisms, including bacteria and archaea. Viruses are found in almo ...
Malware Trojan horses