%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 14 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240513004156+00'00') /ModDate (D:20240513004156+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4689 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 66.754 521.469 679.980 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 66.754 l 565.984 66.754 l 565.984 745.984 l f 45.266 746.734 m 45.266 66.754 l 46.016 66.754 l 46.016 745.984 l f 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(HISTORY OF MALWARE, TROJANS AND WORMS \(PART 2\))] TJ ET 0.373 0.169 0.255 rg BT 61.016 564.033 Td /F3 9.0 Tf [(Last time)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 61.016 562.882 m 97.529 562.882 l S 0.400 0.400 0.400 rg BT 97.529 564.033 Td /F3 9.0 Tf [( we explored the more unknown viruses, Trojans and worms, up to 1985. Now we start off in 1986, where most )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(histories do, with the first PC virus.)] TJ ET BT 61.016 533.055 Td /F4 9.0 Tf [(1986 The first virus for PCs)] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(The first virus for IBM PCs, )] TJ ET BT 171.041 522.066 Td /F3 9.0 Tf [(Brain)] TJ ET BT 192.047 522.066 Td /F3 9.0 Tf [(, was allegedly written by two brothers in Pakistan, when they noticed that people were )] TJ ET BT 61.016 511.077 Td /F3 9.0 Tf [(copying their software. The virus put a copy of itself and a copyright message on any floppy disk copies their customers )] TJ ET BT 61.016 500.088 Td /F3 9.0 Tf [(made.)] TJ ET BT 61.016 469.299 Td /F4 9.0 Tf [(1987 The Christmas tree worm)] TJ ET BT 61.016 458.310 Td /F3 9.0 Tf [(This was an email Christmas card that included program code. If the user ran it, it drew a Christmas tree as promised, but )] TJ ET BT 61.016 447.321 Td /F3 9.0 Tf [(also forwarded itself to everyone in the user’s address book. The traffic paralyzed the IBM worldwide network.)] TJ ET BT 61.016 416.532 Td /F4 9.0 Tf [(1988 The Internet Worm)] TJ ET BT 61.016 405.543 Td /F3 9.0 Tf [(Robert Morris, a 23-year-old student, released a worm on the US DARPA Internet. It spread to thousands of computers )] TJ ET BT 61.016 394.554 Td /F3 9.0 Tf [(and, due to an error, kept re-infecting computers many times, causing them to crash.)] TJ ET BT 61.016 363.765 Td /F4 9.0 Tf [(1989 Trojan demands ransom)] TJ ET BT 61.016 352.776 Td /F3 9.0 Tf [(The AIDS Trojan horse came on a floppy disk that offered information about AIDS and HIV. The Trojan encrypted the )] TJ ET BT 61.016 341.787 Td /F3 9.0 Tf [(computer’s hard disk and demanded payment in exchange for the password.)] TJ ET BT 61.016 310.998 Td /F4 9.0 Tf [(1991 The first polymorphic virus)] TJ ET BT 61.016 300.009 Td /F3 9.0 Tf [(Tequila)] TJ ET BT 90.527 300.009 Td /F3 9.0 Tf [( was the first widespread polymorphic virus. Polymorphic viruses make detection difficult for virus scanners by )] TJ ET BT 61.016 289.020 Td /F3 9.0 Tf [(changing their appearance with each new infection.)] TJ ET BT 61.016 258.231 Td /F4 9.0 Tf [(1992 The Michelangelo panic)] TJ ET BT 61.016 247.242 Td /F3 9.0 Tf [(The )] TJ ET BT 79.025 247.242 Td /F3 9.0 Tf [(Michelangelo)] TJ ET BT 132.044 247.242 Td /F3 9.0 Tf [( virus was designed to erase computer hard disks each year on March 6 \(Michelangelo’s birthday\). After )] TJ ET BT 61.016 236.253 Td /F3 9.0 Tf [(two companies accidentally distributed infected disks and PCs, there was worldwide panic, but few computers were )] TJ ET BT 61.016 225.264 Td /F3 9.0 Tf [(infected.)] TJ ET BT 61.016 194.475 Td /F4 9.0 Tf [(1994 The first email virus hoax)] TJ ET BT 61.016 183.486 Td /F3 9.0 Tf [(The first email hoax warned of a malicious virus that would erase an entire hard drive just by opening an email with the )] TJ ET BT 61.016 172.497 Td /F3 9.0 Tf [(subject line “Good Times.”)] TJ ET BT 61.016 141.708 Td /F4 9.0 Tf [(1995 The first document virus)] TJ ET BT 61.016 130.719 Td /F3 9.0 Tf [(The first document or “macro” virus, Concept, appeared. It spread by exploiting the macros in Microsoft Word.)] TJ ET BT 61.016 99.930 Td /F4 9.0 Tf [(1998 The first virus to affect hardware)] TJ ET BT 61.016 88.941 Td /F3 9.0 Tf [(CIH)] TJ ET BT 76.514 88.941 Td /F3 9.0 Tf [( or )] TJ ET BT 89.519 88.941 Td /F3 9.0 Tf [(Chernobyl)] TJ ET BT 130.532 88.941 Td /F3 9.0 Tf [( became the first virus to paralyze computer hardware. The virus attacked the BIOS, which is needed to )] TJ ET BT 61.016 77.952 Td /F3 9.0 Tf [(boot up the computer.)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 563.2006 97.5287 572.3581 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/2016/02/the-history-of-viruses-trojans-and-worms-part-1/) >> endobj 14 0 obj << /Type /Page /Parent 3 0 R /Annots [ 16 0 R 18 0 R ] /Contents 15 0 R >> endobj 15 0 obj << /Length 3030 >> stream 0.400 0.400 0.400 rg 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 461.710 521.469 296.274 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 461.710 m 566.734 461.710 l 565.984 462.460 l 46.016 462.460 l f 566.734 757.984 m 566.734 461.710 l 565.984 462.460 l 565.984 757.984 l f 45.266 757.984 m 45.266 461.710 l 46.016 462.460 l 46.016 757.984 l f 0.400 0.400 0.400 rg BT 61.016 729.393 Td /F4 9.0 Tf [(1999 Email viruses)] TJ ET BT 61.016 718.404 Td /F3 9.0 Tf [(Melissa)] TJ ET BT 91.517 718.404 Td /F3 9.0 Tf [(, a virus that forwards itself by email, spread worldwide. )] TJ ET BT 314.591 718.404 Td /F3 9.0 Tf [(Bubbleboy)] TJ ET BT 357.116 718.404 Td /F3 9.0 Tf [(, the first virus to infect a computer when email )] TJ ET BT 61.016 707.415 Td /F3 9.0 Tf [(is viewed, appeared.)] TJ ET BT 61.016 676.626 Td /F4 9.0 Tf [(2000 Denial-of-service attacks)] TJ ET BT 61.016 665.637 Td /F3 9.0 Tf [(“Distributed denial-of-service” attacks by hackers put Yahoo!, eBay, Amazon and other high profile websites offline for )] TJ ET BT 61.016 654.648 Td /F3 9.0 Tf [(several hours. )] TJ ET BT 120.038 654.648 Td /F3 9.0 Tf [(Love Bug)] TJ ET BT 158.063 654.648 Td /F3 9.0 Tf [( became the most successful email virus yet.)] TJ ET BT 61.016 623.859 Td /F4 9.0 Tf [(2000 Palm virus)] TJ ET BT 61.016 612.870 Td /F3 9.0 Tf [(The first virus appeared for the Palm operating system, although no users were infected.)] TJ ET BT 61.016 582.081 Td /F4 9.0 Tf [(2001 Viruses spread via websites or network shares)] TJ ET BT 61.016 571.092 Td /F3 9.0 Tf [(Malicious programs began to exploit vulnerabilities in software, so that they could spread without user intervention. )] TJ ET BT 518.711 571.092 Td /F3 9.0 Tf [(Nimda)] TJ ET BT 61.016 560.103 Td /F3 9.0 Tf [(infected users who simply browsed a website. )] TJ ET BT 246.083 560.103 Td /F3 9.0 Tf [(Sircam)] TJ ET BT 274.082 560.103 Td /F3 9.0 Tf [( used its own email program to spread, and also spread via network )] TJ ET BT 61.016 549.114 Td /F3 9.0 Tf [(shares.)] TJ ET BT 61.016 529.125 Td /F3 9.0 Tf [(If this history timeline hasn't satisfied your curiosity, the recently launched )] TJ ET 0.373 0.169 0.255 rg BT 355.352 529.125 Td /F3 9.0 Tf [(Malware Museum )] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 355.352 527.974 m 428.864 527.974 l S 0.400 0.400 0.400 rg BT 428.864 529.125 Td /F3 9.0 Tf [(might peak your interest. )] TJ ET BT 61.016 509.136 Td /F3 9.0 Tf [(Take note that information below is an extract from the)] TJ ET 0.373 0.169 0.255 rg BT 278.114 509.136 Td /F3 9.0 Tf [(Sophos Threatsaurus,)] TJ ET 0.18 w 0 J [ ] 0 d 278.114 507.985 m 366.656 507.985 l S 0.400 0.400 0.400 rg BT 366.656 509.136 Td /F3 9.0 Tf [( compiled by Sophos, a security software and )] TJ ET BT 61.016 498.147 Td /F3 9.0 Tf [(hardware company.)] TJ ET BT 61.016 479.658 Td /F3 9.0 Tf [(Posted in:E-mail,Security | Tagged:Trojan,Virus,Worm | With 0 comments)] TJ ET endstream endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 355.3517 528.2926 428.8637 537.4501 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://www.techcentral.co.za/computer-viruses-as-an-art-form/63321/) >> endobj 18 0 obj << /Type /Annot /Subtype /Link /A 19 0 R /Border [0 0 0] /H /I /Rect [ 278.1137 508.3036 366.6557 517.4611 ] >> endobj 19 0 obj << /Type /Action /S /URI /URI (https://www.sophos.com/en-us/medialibrary/PDFs/other/sophosthreatsaurusaz.pdf?la=en) >> endobj xref 0 20 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000312 00000 n 0000000341 00000 n 0000000476 00000 n 0000000558 00000 n 0000005299 00000 n 0000005411 00000 n 0000005518 00000 n 0000005634 00000 n 0000005754 00000 n 0000005880 00000 n 0000006014 00000 n 0000006105 00000 n 0000009188 00000 n 0000009316 00000 n 0000009435 00000 n 0000009563 00000 n trailer << /Size 20 /Root 1 0 R /Info 5 0 R >> startxref 9698 %%EOF History of malware, Trojans and worms (Part 2) « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

History of malware, Trojans and worms (Part 2)

Last time we explored the more unknown viruses, Trojans and worms, up to 1985. Now we start off in 1986, where most histories do, with the first PC virus.

1986 The first virus for PCs
The first virus for IBM PCs, Brain, was allegedly written by two brothers in Pakistan, when they noticed that people were copying their software. The virus put a copy of itself and a copyright message on any floppy disk copies their customers made.

1987 The Christmas tree worm
This was an email Christmas card that included program code. If the user ran it, it drew a Christmas tree as promised, but also forwarded itself to everyone in the user’s address book. The traffic paralyzed the IBM worldwide network.

1988 The Internet Worm
Robert Morris, a 23-year-old student, released a worm on the US DARPA Internet. It spread to thousands of computers and, due to an error, kept re-infecting computers many times, causing them to crash.

1989 Trojan demands ransom
The AIDS Trojan horse came on a floppy disk that offered information about AIDS and HIV. The Trojan encrypted the computer’s hard disk and demanded payment in exchange for the password.

1991 The first polymorphic virus
Tequila was the first widespread polymorphic virus. Polymorphic viruses make detection difficult for virus scanners by changing their appearance with each new infection.

1992 The Michelangelo panic
The Michelangelo virus was designed to erase computer hard disks each year on March 6 (Michelangelo’s birthday). After two companies accidentally distributed infected disks and PCs, there was worldwide panic, but few computers were infected.

1994 The first email virus hoax
The first email hoax warned of a malicious virus that would erase an entire hard drive just by opening an email with the subject line “Good Times.”

1995 The first document virus
The first document or “macro” virus, Concept, appeared. It spread by exploiting the macros in Microsoft Word.

1998 The first virus to affect hardware
CIH or Chernobyl became the first virus to paralyze computer hardware. The virus attacked the BIOS, which is needed to boot up the computer.

1999 Email viruses
Melissa, a virus that forwards itself by email, spread worldwide. Bubbleboy, the first virus to infect a computer when email is viewed, appeared.

2000 Denial-of-service attacks
“Distributed denial-of-service” attacks by hackers put Yahoo!, eBay, Amazon and other high profile websites offline for several hours. Love Bug became the most successful email virus yet.

2000 Palm virus
The first virus appeared for the Palm operating system, although no users were infected.

2001 Viruses spread via websites or network shares
Malicious programs began to exploit vulnerabilities in software, so that they could spread without user intervention. Nimda infected users who simply browsed a website. Sircam used its own email program to spread, and also spread via network shares.

If this history timeline hasn’t satisfied your curiosity, the recently launched Malware Museum might peak your interest. 

Take note that information below is an extract from the Sophos Threatsaurus, compiled by Sophos, a security software and hardware company.

Tags: , ,

Comments are closed.

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.