Monday, 6 March 2017

Malware Milestones


http://comptia-microsoft-it-training-dublin.blogspot.ie/2017/03/malware-milestones.html













By definition, Malware is a piece of software which is designed to destroy, damage or take ownership and privileges to access a computer system. Since ARPANET was developed (Advanced Research Projects Agency Network) on August 30, 1969, malware has been deployed to disrupt legacy systems. Today, these threats are much more sophisticated and powerful.


Let`s see the Malware Milestones:
 
1970
The Creeper Worm: Was not proper malware due to not causing damage to data. This program simply showed an output to the screen: "I'm the creeper: catch me if you can". This was the first virus.

The Reaper Virus: Moved through the network trying to find copies of Creeper and kick them out. This was the first anti-virus.
 
1974
The Rabbit (or Wabbit): Continually replicates itself, reducing the system performance and crashing the computer system.
 
1975
The Animal: Looks like a game, asking the user questions in an attempt to guess which animal the program is referring to. The thing here is: when ‘Animal’ is executed, it finds the directories that the user has access. If the directory does not contain the latest version of Animal, it will copy itself into this directory. The Animal is considered the first Trojan.
 
1980
Self- Reproduction of Programs: Jürgen Kraus wrote his master degree thesis at University of Dortmund. Kraus explained that software can behave in a way similar to biological viruses.
 
1982
Elk Cloner: first large-scale virus outbreak in history. First Apple 2 virus to spread using infected floppy drivers.
 
1983
The term is `virus` coined by Frederick Cogen, describing self-replicating software.
 
1986
The Brain Boot Sector: Brain is considered the first IBM PC compatible virus. The virus is also known as Lahore, Pakistani, Pakistani Brain, and Pakistani flu.
 
1987
Vienna virus, Lehigh virus, The Jerusalem virus, The SCA virus and the Christmas Tree EXEC virus.
 
1988
The Morris worm: first worm to spread extensively "in the wild".
 
1989
The Ghostball: First multipartite virus (infects and spreads in multiple ways). Threat: loss of information stored.
 
1990
The Chameleon family: First family of polymorphic viruses (Code changes itself each time it runs, but the semantics will not).
 
1992
The Michelangelo virus: basically a threat to stored data and master boot record. What’s curious is that the virus remained dormant until March 6, Michelangelo birthday.
 
1994
OneHalf: Polymorphic computer virus. Removable media first becomes a potential security threat.
 
1995
Concept: The first Macro virus is created. It attacks Microsoft Word docs.
 
1996
Ply: complicated polymorphic virus appeared with built-in permutation engine.

1998
The first version of the CIH virus appears, erasing flash BIOS chip and destroying motherboards.
 
1999
The Melissa worm: targeting Microsoft Word and Outlook-based systems.
 
2000
ILOVEYOU Worm: Also known as Love Letter and VBS, this worm is one of the most destructive threats. Caused loses of almost $10 billion.
 
2001
Simile: metamorphic virus written in assembly language to attack Windows OS.
 
2003
The SQL Slammer Worm: attacks vulnerabilities in Microsoft SQL Server.
 
2004
MyDoom: fastest-spreading mass mailer worm.
 
2005
Zotob: exploits security vulnerabilities in Microsoft OS.
 
2006
Osx/Leap-A or OSX/Oompa-A: first malware for Mac OS X.

2007
The Storm Worm: creates one of the largest botnets in history.

Zeus: Trojan developed to steal baking information in Windows OS.
 
2008
Rustock: backdoor Trojan with advanced rootkit capabilities.

Koobface: Worm targets Facebook, Myspace and Twitter users.
 
2009
Downadup or Kido: millions of XP systems infected. Propagated while forming a botnet.

2010
Banker Trojans become very popular.

SMS.AndroidOS.FakePlayer: First malware for Android appears in ‘’the wild’’.

Stuxnet: Windows Trojan. There are suggestions that it was developed to target Iranian nuclear facilities.
 
2011
Android.NickiBot: botnet activity on mobile devices.
Morto Worm: first worm to spread using Windows Remote Desktop Protocol.
 
2013
The CryptoLocker: Ramsonware malware. Encrypts the files on a user`s hard drive and require an amount of money to receive the decryption key.
 
2014
The Regin Trojan horse is discovered.
 
2015
The Bashlite malware: massive spike in DDoS attacks.
 
2016
Tiny Banker Trojan: infected more than two dozen major banking institutions in the United States.
 
Well, after this overview into the malware`s world, I ask to you: Do you have an up-to-date anti-virus software and a good firewall?
 

No comments:

Post a Comment