SlideShare ist ein Scribd-Unternehmen logo
1 von 22
The History and Details of
Computer Viruses
With Chuck Easttom
http://www.chuckeasttom.com
chuck@chuckeasttom.com
Terms

•What is a virus
•What is a worm
•What is a Trojan horse
The History of Computer Viruses
•1981 Apple Viruses 1, 2, & 3
•1980’s Fred Cohen
•1987 Lehigh Virus
•1988 The first anti virus software
•1990 The first polymorphic viruses
•1991 Symantec releases Norton Anti Virus
•1992 The Michelangelo Virus
•1994 Kaos4 virus spreads via adult websites.
•1996 The Concept virus
The History of Computer Viruses II
•1999 The Melissa Virus
•2000 The I Love You Virus
•2001 The Code Red Worm
•2003 The Slammer Worm.
•2004 MyDoom
The History of Computer Viruses Details
1981 Apple Viruses 1, 2, and 3 are some of the
first viruses "in the wild" or public domain.
Found on the Apple II operating system, the
viruses spread through Texas A&M via pirated
computer games.
The History of Computer Viruses Details
1980’s In the early 1980s, Fred Cohen did
extensive theoretical research, as well as setting
up and performing numerous practical
experiments, regarding viral type programs. His
dissertation was presented in 1986 as part of the
requirements for a doctorate in electrical
engineering from the University of Southern
California. This work is foundational, and any
serious student of viral programs disregards it at
his own risk Dr. Cohen's definition of a
computer virus as "a program that can 'infect'
other programs by modifying them to include a
version of itself
The History of Computer Viruses Details
1987 In November, the Lehigh virus was
discovered at Lehigh University in the U.S. It
was the first "memory resident file infector". A
file-infecting virus attacks executable files. It
gets control when the file is opened. The Lehigh
virus attacked a file called COMMAND.COM.
When the file was run (usually by booting from
an infected disk), the virus stayed in the resident
memory.
The History of Computer Viruses Details
1988 In March, the first anti-virus software was
written. It was designed to detect and remove
the Brain virus and immunized disks against
Brain infection.
The History of Computer Viruses Details
1990 Viruses combining various characteristics
spring up. They included Polymorphism
(involves encrypted viruses where the
decryption routine code is variable), Armoring
(used to prevent anti-virus researchers from
dissembling a virus) and Multipartite (can
infect both programs and boot sectors).
The History of Computer Viruses Details
1991 Symantec releases Norton Anti-Virus
software.
1992 Media mayhem greeted the virus
Michaelangelo in March. Predictions of
massive disruptions were made and anti-virus
software sales soared. As it turned out, the cases
of the virus were far and few between.
The History of Computer Viruses Details
1994 A virus called Kaos4 was posted on a
pornography news group file. It was encoded as
text and downloaded by a number of users.
1996 Concept, a macro-virus, becomes the most
common virus in the world.
1998 - The "RedTeam" virus infects Windows
executables dispatches the infected files through
Eudora e-mail.
The History of Computer Viruses Details
1998: The emergence of the sensational
"BackOrifice" ("Backdoor.BO") - utility of that
allowed hackers management of remote
computers and networks.
1999 The Melissa virus, a macro, appears. It
uses Microsoft Word to infect computers and is
passed on to others through Microsoft Outlook
and Outlook Express e-mail programs.
The History of Computer Viruses Details
2000 The "I Love You Virus" wreaks havoc around the
world. It is transmitted by e-mail and when opened, is
automatically sent to everyone in the user's address book
July 2001: The Code Red worm infects tens of thousands of
systems running Microsoft Windows NT and Windows 2000
server software, causing an estimated $2 billion in damages.
The worm is programmed to use the power of all infected
machines against the White House Web site at a
predetermined date. In an ad hoc partnership with virus
hunters and technology companies, the White House
deciphers the virus's code and blocks traffic as the worm
begins its attack.
.
The History of Computer Viruses Details
2002: Melissa virus author David L. Smith, 33,
is sentenced to 20 months in federal prison
Jan. 2003: The "Slammer" worm infects
hundreds of thousands of computers in less than
three hours. The fastest-spreading worm ever
wreaks havoc on businesses worldwide,
knocking cash machines offline and delaying
airline flights.
The History of Computer Viruses Details
2004: The "MyDoom" worm becomes the
fastest-spreading e-mail worm as it causes
headaches -- but very little damage -- almost a
year to the day after Slammer ran rampant in
late January 2003. MyDoom uses "social
engineering," or low-tech psychological tricks,
to persuade people to open the e-mail
attachment that contains the virus. It claims to
be a notification that an e-mail message sent
earlier has failed, and prompts the user to open
the attachment to see what the message text
originally said. Many people fall for it.
The History of Computer Viruses Details
2007: A new virus called "Storm Worm." is
released. This fast-spreading email spammer
disguises itself as a news email and asks you to
download film. The "Storm Worm" gathers
infected computers into a botnet, which it uses
to infect other machines. It was first identified
on Jan. 17 and within 13 days had infected 1.7
million computers
The History of Computer Viruses Details
2009 9 million computers running on Windows
operating system were hit with "Conficker"
worm. The malware spread via the Internet and
the main tools that helped the worm spread
were unpatched corporate networks and USB
memory sticks. First discovered last October, it
loads itself on to a computer by exploiting a
weakness in Windows servers. Once it has
infected a machine, the software also tries to
connect to up to 250 different domains with
random names every day.
The mechanics of Viruses
•Delivery
a. Via email
b. Copying over a network
c. Direct communication with exposed ports.
•Payload
•Types of Viruses
•Macro virus
•Script Virus
•Executable Virus
How Anti Virus Software Works
• Scanning for known files
•Scanning for worm infection vectors
•Heuristic scanning
Current Active Viruses
As of 13 November 2005

•Sober.S first noticed October 13, 2005
•Bagle variant started September 19, 2005
•Zotob-D August 16th, 2005
Rules for preventing viruses
Keep operating system and all software updated/patched
Use a virus scanner. McAffee and Norton are the two most widely
accepted and used virus scanners. It costs about $30 a year to keep
your virus scanner updated. Do it.
If you are not sure about an attachment, don’t open it.
You might even exchange a code word with friends and colleagues.
Tell them that if they wish to send you an attachment, to put the
code word in the title of the message. Without seeing the code
word, you will not open any attachment.
Don’t believe “security alerts” that you are sent. Microsoft does
not send out things in this manner. Go check the Microsoft website
regularly, as well as one of the anti-virus websites previously
mentioned.
Anti Virus Information Web Sites

http://www.f-secure.com/virus-info/virus-news/
http://www.cert.org/nav/index_red.html
http://securityresponse.symantec.com/

Weitere ähnliche Inhalte

Was ist angesagt?

New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Documentshoib_245
 
Computer Virus
Computer Virus Computer Virus
Computer Virus Study Hub
 
computer viruses
computer virusescomputer viruses
computer virusesishan2shawn
 
History of computer virus by mohsin ali dahar khairpur
History of computer virus by mohsin ali dahar khairpurHistory of computer virus by mohsin ali dahar khairpur
History of computer virus by mohsin ali dahar khairpurMohsin Dahar
 
The 15 deadliest computer viruses
The 15 deadliest computer virusesThe 15 deadliest computer viruses
The 15 deadliest computer virusesStefan Andrei
 
Web virus activity
Web virus activityWeb virus activity
Web virus activitySim_Dhillon
 
Most Malignant Viruses
Most Malignant VirusesMost Malignant Viruses
Most Malignant VirusesManish Prasad
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar pptvipinkumar940
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 
Computer worm
Computer wormComputer worm
Computer wormzelkan19
 

Was ist angesagt? (19)

Timeline of computer viruses
Timeline of computer virusesTimeline of computer viruses
Timeline of computer viruses
 
New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Document
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
computer viruses
computer virusescomputer viruses
computer viruses
 
εργασια
εργασιαεργασια
εργασια
 
History of computer virus by mohsin ali dahar khairpur
History of computer virus by mohsin ali dahar khairpurHistory of computer virus by mohsin ali dahar khairpur
History of computer virus by mohsin ali dahar khairpur
 
The 15 deadliest computer viruses
The 15 deadliest computer virusesThe 15 deadliest computer viruses
The 15 deadliest computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
Most Malignant Viruses
Most Malignant VirusesMost Malignant Viruses
Most Malignant Viruses
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 
I Love You =D
I Love You =DI Love You =D
I Love You =D
 
Wanna cry
Wanna cryWanna cry
Wanna cry
 
Conficker
ConfickerConficker
Conficker
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer worm
Computer wormComputer worm
Computer worm
 

Andere mochten auch (9)

Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Antivirus
AntivirusAntivirus
Antivirus
 
It kamus jaringan
It kamus jaringanIt kamus jaringan
It kamus jaringan
 
It kamus virus security glossary
It kamus virus   security glossaryIt kamus virus   security glossary
It kamus virus security glossary
 
Keamanan si (ugm)
Keamanan si (ugm)Keamanan si (ugm)
Keamanan si (ugm)
 
Linux dan security
Linux dan securityLinux dan security
Linux dan security
 
It menjaga keamanan sistem artikel
It menjaga keamanan sistem artikelIt menjaga keamanan sistem artikel
It menjaga keamanan sistem artikel
 
It keamanan sis inf berbasis internet
It keamanan sis inf berbasis internetIt keamanan sis inf berbasis internet
It keamanan sis inf berbasis internet
 
It keamanan sistem informasi ilkom ui
It keamanan sistem informasi ilkom uiIt keamanan sistem informasi ilkom ui
It keamanan sistem informasi ilkom ui
 

Ähnlich wie Historyofviruses

Ähnlich wie Historyofviruses (20)

History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Viruses
VirusesViruses
Viruses
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses
VirusesViruses
Viruses
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Ransomware
RansomwareRansomware
Ransomware
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer worm
Computer wormComputer worm
Computer worm
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 

Mehr von Fathoni Mahardika II

Mehr von Fathoni Mahardika II (12)

It lubang keamanan
It lubang keamananIt lubang keamanan
It lubang keamanan
 
It komdat 10 keamanan sistem
It komdat 10 keamanan sistemIt komdat 10 keamanan sistem
It komdat 10 keamanan sistem
 
It keamanan sistem informasi berbasis internet
It keamanan sistem informasi berbasis internetIt keamanan sistem informasi berbasis internet
It keamanan sistem informasi berbasis internet
 
It keamanan sistem informasi
It keamanan sistem informasiIt keamanan sistem informasi
It keamanan sistem informasi
 
It kamus istilah komputer good
It kamus istilah komputer goodIt kamus istilah komputer good
It kamus istilah komputer good
 
It domain keamanan sistem informasi ilkom ui
It domain keamanan sistem informasi ilkom uiIt domain keamanan sistem informasi ilkom ui
It domain keamanan sistem informasi ilkom ui
 
It 15 jenis serangan cracker
It 15 jenis serangan crackerIt 15 jenis serangan cracker
It 15 jenis serangan cracker
 
Diktat kuliah keamanan komputer
Diktat kuliah keamanan komputerDiktat kuliah keamanan komputer
Diktat kuliah keamanan komputer
 
Mohiqbal security act dan kriptografi 2011
Mohiqbal   security act dan kriptografi 2011Mohiqbal   security act dan kriptografi 2011
Mohiqbal security act dan kriptografi 2011
 
Mohiqbal pengantar keamanan sis inf 2011
Mohiqbal   pengantar keamanan sis inf 2011Mohiqbal   pengantar keamanan sis inf 2011
Mohiqbal pengantar keamanan sis inf 2011
 
Keamanan password dan enkripsi
Keamanan password dan enkripsiKeamanan password dan enkripsi
Keamanan password dan enkripsi
 
Mohiqbal net and database 2011
Mohiqbal   net and database 2011Mohiqbal   net and database 2011
Mohiqbal net and database 2011
 

Kürzlich hochgeladen

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxAneriPatwari
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptxAneriPatwari
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 

Kürzlich hochgeladen (20)

prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptx
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 

Historyofviruses

  • 1. The History and Details of Computer Viruses With Chuck Easttom http://www.chuckeasttom.com chuck@chuckeasttom.com
  • 2. Terms •What is a virus •What is a worm •What is a Trojan horse
  • 3. The History of Computer Viruses •1981 Apple Viruses 1, 2, & 3 •1980’s Fred Cohen •1987 Lehigh Virus •1988 The first anti virus software •1990 The first polymorphic viruses •1991 Symantec releases Norton Anti Virus •1992 The Michelangelo Virus •1994 Kaos4 virus spreads via adult websites. •1996 The Concept virus
  • 4. The History of Computer Viruses II •1999 The Melissa Virus •2000 The I Love You Virus •2001 The Code Red Worm •2003 The Slammer Worm. •2004 MyDoom
  • 5. The History of Computer Viruses Details 1981 Apple Viruses 1, 2, and 3 are some of the first viruses "in the wild" or public domain. Found on the Apple II operating system, the viruses spread through Texas A&M via pirated computer games.
  • 6. The History of Computer Viruses Details 1980’s In the early 1980s, Fred Cohen did extensive theoretical research, as well as setting up and performing numerous practical experiments, regarding viral type programs. His dissertation was presented in 1986 as part of the requirements for a doctorate in electrical engineering from the University of Southern California. This work is foundational, and any serious student of viral programs disregards it at his own risk Dr. Cohen's definition of a computer virus as "a program that can 'infect' other programs by modifying them to include a version of itself
  • 7. The History of Computer Viruses Details 1987 In November, the Lehigh virus was discovered at Lehigh University in the U.S. It was the first "memory resident file infector". A file-infecting virus attacks executable files. It gets control when the file is opened. The Lehigh virus attacked a file called COMMAND.COM. When the file was run (usually by booting from an infected disk), the virus stayed in the resident memory.
  • 8. The History of Computer Viruses Details 1988 In March, the first anti-virus software was written. It was designed to detect and remove the Brain virus and immunized disks against Brain infection.
  • 9. The History of Computer Viruses Details 1990 Viruses combining various characteristics spring up. They included Polymorphism (involves encrypted viruses where the decryption routine code is variable), Armoring (used to prevent anti-virus researchers from dissembling a virus) and Multipartite (can infect both programs and boot sectors).
  • 10. The History of Computer Viruses Details 1991 Symantec releases Norton Anti-Virus software. 1992 Media mayhem greeted the virus Michaelangelo in March. Predictions of massive disruptions were made and anti-virus software sales soared. As it turned out, the cases of the virus were far and few between.
  • 11. The History of Computer Viruses Details 1994 A virus called Kaos4 was posted on a pornography news group file. It was encoded as text and downloaded by a number of users. 1996 Concept, a macro-virus, becomes the most common virus in the world. 1998 - The "RedTeam" virus infects Windows executables dispatches the infected files through Eudora e-mail.
  • 12. The History of Computer Viruses Details 1998: The emergence of the sensational "BackOrifice" ("Backdoor.BO") - utility of that allowed hackers management of remote computers and networks. 1999 The Melissa virus, a macro, appears. It uses Microsoft Word to infect computers and is passed on to others through Microsoft Outlook and Outlook Express e-mail programs.
  • 13. The History of Computer Viruses Details 2000 The "I Love You Virus" wreaks havoc around the world. It is transmitted by e-mail and when opened, is automatically sent to everyone in the user's address book July 2001: The Code Red worm infects tens of thousands of systems running Microsoft Windows NT and Windows 2000 server software, causing an estimated $2 billion in damages. The worm is programmed to use the power of all infected machines against the White House Web site at a predetermined date. In an ad hoc partnership with virus hunters and technology companies, the White House deciphers the virus's code and blocks traffic as the worm begins its attack. .
  • 14. The History of Computer Viruses Details 2002: Melissa virus author David L. Smith, 33, is sentenced to 20 months in federal prison Jan. 2003: The "Slammer" worm infects hundreds of thousands of computers in less than three hours. The fastest-spreading worm ever wreaks havoc on businesses worldwide, knocking cash machines offline and delaying airline flights.
  • 15. The History of Computer Viruses Details 2004: The "MyDoom" worm becomes the fastest-spreading e-mail worm as it causes headaches -- but very little damage -- almost a year to the day after Slammer ran rampant in late January 2003. MyDoom uses "social engineering," or low-tech psychological tricks, to persuade people to open the e-mail attachment that contains the virus. It claims to be a notification that an e-mail message sent earlier has failed, and prompts the user to open the attachment to see what the message text originally said. Many people fall for it.
  • 16. The History of Computer Viruses Details 2007: A new virus called "Storm Worm." is released. This fast-spreading email spammer disguises itself as a news email and asks you to download film. The "Storm Worm" gathers infected computers into a botnet, which it uses to infect other machines. It was first identified on Jan. 17 and within 13 days had infected 1.7 million computers
  • 17. The History of Computer Viruses Details 2009 9 million computers running on Windows operating system were hit with "Conficker" worm. The malware spread via the Internet and the main tools that helped the worm spread were unpatched corporate networks and USB memory sticks. First discovered last October, it loads itself on to a computer by exploiting a weakness in Windows servers. Once it has infected a machine, the software also tries to connect to up to 250 different domains with random names every day.
  • 18. The mechanics of Viruses •Delivery a. Via email b. Copying over a network c. Direct communication with exposed ports. •Payload •Types of Viruses •Macro virus •Script Virus •Executable Virus
  • 19. How Anti Virus Software Works • Scanning for known files •Scanning for worm infection vectors •Heuristic scanning
  • 20. Current Active Viruses As of 13 November 2005 •Sober.S first noticed October 13, 2005 •Bagle variant started September 19, 2005 •Zotob-D August 16th, 2005
  • 21. Rules for preventing viruses Keep operating system and all software updated/patched Use a virus scanner. McAffee and Norton are the two most widely accepted and used virus scanners. It costs about $30 a year to keep your virus scanner updated. Do it. If you are not sure about an attachment, don’t open it. You might even exchange a code word with friends and colleagues. Tell them that if they wish to send you an attachment, to put the code word in the title of the message. Without seeing the code word, you will not open any attachment. Don’t believe “security alerts” that you are sent. Microsoft does not send out things in this manner. Go check the Microsoft website regularly, as well as one of the anti-virus websites previously mentioned.
  • 22. Anti Virus Information Web Sites http://www.f-secure.com/virus-info/virus-news/ http://www.cert.org/nav/index_red.html http://securityresponse.symantec.com/