SEARCH
  • [:en]Recent Posts[:af]Onlangse bydraes

  • [:en]Categories[:af]Kategorieë

  • [:en]Archives[:af]Argiewe

trojan

[:en]Virus warning[:]

Monday, February 5th, 2018

[:en]

If you receive an email with the subject: “URGENT – CCMA Final Reminder: Case GAJK0238819-18 (GAJK) is scheduled for ‘Arbitration’…” allegedly sent by the CCMA, and with an attachment with a .DOC.gz extension, DO NOT try to open it. The attachment is a rather nasty Trojan-variant of a Crypto virus.

This virus opens the “back door” of your computer to hackers once it infects your PC. The trojan is programmed to run at every start-up, giving the hackers, who originated the program, access to your hard drive. In addition, this trojan can re-create itself, making it hard to remove it completely.

If you received this email or any similar ones, please it to the Information Technology Security Team using the following method:

Send the spam/phishing mail to help@sun.ac.za and sysadm@sun.ac.za

Attach the phishing or suspicious mail on to the message if possible. There is a good tutorial on how to do this at the following link (Which is safe) : http://stbsp01.stb.sun.ac.za/innov/it/it-help/Wiki%20Pages/Spam%20sysadmin%20Eng.aspx

  1. Start up a new mail addressed to sysadm@sun.ac.za (CC: help@sun.ac.za)
  2. Use the Title “SPAM” (without quotes) in the Subject.
  3. With this New Mail window open, drag the suspicious spam/phishing mail from your Inbox into the New Mail Window. It will attach the mail as an enclosure and a small icon with a light yellow envelope will appear in the attachments section of the New Mail.
  4. Send the mail.

IF YOU HAVE FALLEN FOR THE SCAM:

If you did click on the link of this phishing spam and unwittingly give the scammers your username, e-mail address and password you should immediately go to http://www.sun.ac.za/useradm and change the passwords on ALL your university accounts (making sure the new password is completely different, and is a strong password that will not be easily guessed.) as well as changing the passwords on your social media and private e-mail accounts (especially if you use the same passwords on these accounts.)

IT have set up a website page with useful information on how to report and combat phishing and spam. The address is: https://blogs.sun.ac.za/it/en/2017/11/reporting-spam-malware-and-phishing/

 

[Article by David Wiles]

 

 

[:]

[:en]The history of malware,Trojans and worms (part 3)[:af]Die geskiedenis van malware, Trojane en wurms (deel 3)[:]

Thursday, March 17th, 2016

[:en]

Two weeks ago we explored lesser known malware, Trojans and worms, after 1985. This time around, we look at more recent threats, starting with zombies…

2003 Zombie, Phishing
The Sobig worm gave control of the PC to hackers, so that it became a “zombie,” which could be used to send spam. The Mimail worm posed as an email from Paypal, asking users to confirm credit card information.

2004 IRC bots
Malicious IRC (Internet Relay Chat) bots were developed. Trojans could place the bot on a computer, where it would connect to an IRC channel without the user’s knowledge and give control of the computer to hackers.

2005 Rootkits
Sony’s DRM copy protection system, included on music CDs, installed a “rootkit” on users’ PCs, hiding files so that they could not be duplicated. Hackers wrote Trojans to exploit this security weakness and installed a hidden “back door.”

2006 Share price scams
Spam mail hyping shares in small companies (“pump-and-dump” spam) became common.

2006 Ransomware
The Zippo and Archiveus Trojan horse programs, which encrypted users’ files and demanded payment in exchange for the password, were early examples of ransomware.

2006 First advanced persistent threat (APT) identified 
First coined by the U.S. Air Force in 2006 and functionally defined by Alexandria, Virginia security firm Mandiant in 2008 as a group of sophisticated, determined and coordinated attackers. APTs are equipped with both the capability and the intent to persistently and effectively target a specific entity. Recognized attack vectors include infected media, supply chain compromise and social engineering.

2008 Fake antivirus software
Scaremongering tactics encourage people to hand over credit card details for fake antivirus products like AntiVirus 2008.

2008 First iPhone malware
The US Computer Emergency Response Team (US-CERT) issues a warning that a fraudulent iPhone upgrade, “iPhone firmware 1.1.3 prep,” is making its way around the Internet and users should not be fooled into installing it. When a user installs the Trojan, other application components are altered. If the Trojan is uninstalled, the affected applications may also be removed.

2009 Conficker hits the headlines
Conficker, a worm that initially infects via unpatched machines, creates a media storm across the world.

2009 Polymorphic viruses rise again
Complex viruses return with a vengeance, including Scribble, a virus which mutates its appearance on each infection and used multiple vectors of attack.

2009 First Android malware
Android FakePlayerAndroid/FakePlayer.A is a Trojan that sends SMS messages to premium rate phone numbers. The Trojan penetrates Android-based smartphones disguised as an ordinary application. Users are prompted to install a small file of around 13 KB that has the standard Android extension .APK. But once the “app” is installed on the device, the Trojan bundled with it begins texting premium rate phone numbers (those that charge). The criminals are the ones operating these numbers, so they end up collecting charges to the victims’ accounts.

2010 Stuxnet
Discovered in June 2010 the Stuxnet worm initially spreads indiscriminately, but is later found to contain a highly specialized malware payload that is designed to target only Siemens supervisory control and data acquisition (SCADA) systems configured to control and monitor specific industrial processes. Stuxnet’s most prominent target is widely believed to be uranium enrichment infrastructure in Iran.

2012 First drive-by Android malware
The first Android drive-by malware is discovered, a Trojan called NotCompatible that poses as a system update but acts as a proxy redirect. The site checks the victim’s browser’s user-agent string to confirm that it is an Android visiting, then automatically installs the Trojan. A device infected with NotCompatible could potentially be used to gain access to normally protected information or systems, such as those maintained by enterprise or government.

2013 Ransomware is back
Ransomware emerges as one of the top malware threats. With some variants using advanced encryption that makes recovering locked files nearly impossible, ransomware replaces fake antivirus as malicious actors’ money-soliciting threat of choice.

Take note that information below is an extract from the Sophos Threatsaurus, compiled by Sophos, a security software and hardware company.

[:af]

Twee weke gelede het ons ondersoek ingestel na malware, Trojaanse virusse en wurms na 1985. Dié keer is dit meer onlangse bedreigings se beurt. Ons begin by zombies … 

2003 Zombies en Phishing
Met behulp van die Sobig-wurm kry krakers beheer oor rekenaars, verander dit in `n zombie en stuur daarmee gemorspos uit. Die Mimail-wurm kamoefleer homself as `n Paypal e-pos en vra gebruikers om kredietkaartinligting te bevestig. 

2004 IRC robotte
Kwaadwillige IRC (Internet Relay Chat) robotte word ontwikkel. Trojaanse virusse laai die robotte op rekenaars, laat dit aan `n IRC-kanaal verbind, sonder die gebruiker se medewete en kry beheer oor die rekenaars.

2005 Rootkits
Sony se DRM kopie-beskermingstelsel op musiek CDs, installeer `n rootkit, wat leêrs wegsteek sodat dit nie gedupliseer kan word nie, op rekenaars. Kuberkrakers skryf Trojaanse virusse om hierdie sekuriteit-swakplek te misbruik en `n versteekte back door te installeer.

2006 Aandeleprys-bedrog
Gemorspos wat aandele in klein maatskappye opjaag (pump-and-dump-gemorspos) raak die nuutste kubergevaar.

2006 Ransomware
Die Zippo en Archiveus Trojaanse virusprogramme word die eerste ransomware. Hulle enkripteer leêrs en eis `n losprys in ruil vir die wagwoord.

2006 Eerste moderne bedreiging (APT) identifiseer
APTs is die eerste keer in 2006 deur die Amerikaanse lugmag uitgewys. Hulle is toegerus met beide die vermoë en oogmerk om `n spesifieke teiken effektief en aanhoudend te teiken. Die gesofistikeerde, doelgerigte en gekoördineerde aanvalle word geloods geloods op media en verskaffingskettings en sluit sosiale manipulasie in.

2008 Vervalste anti-virus sagteware
Deur middel van bangmaak-taktieke word gebruikers oortuig om hul kredietkaartinligting te gee vir vervalste anti-virus produkte soos AntiVirus 2008.

2008 Eerste iPhone malware
Die US Computer Emergency Response Team (US-CERT) reik `n waarskuwing uit oor `n misleidende iPhone opgradering, die iPhone firmware 1.1.3 prep. As `n gebruiker die Trojaanse virus installeer, word komponente van die foontoepassing aangepas. As die virus verwyder word, word die toepassings wat aangetas is, daarmee saam verwyder. 

2009 Conficker haal die nuus
Conficker, `n wurm wat aanvanklik versprei word deur middel van verouderde rekenaars, veroorsaak wêreldwye mediadekking.

2009 Polimorfiese virusse is terug
Komplekse virusse maak met mening weer hul verskyning. Een van hulle is Scribble, `n virus wat sy kenmerke met elke infeksie verander en talle metodes gebruik om te versprei.

2009 Eerste Android malware
Android FakePlayer is `n Trojaanse virus wat SMSe na foonnommers stuur en Android slimfone indring omdat dit soos `n gewone toepassings lyk. Gebruikers word versoek om `n klein lêer van ongeveer 13 KB, met die gewone Android uitbreidingnaam .APK, te installeer. Sodra die “toepassing” op die toestel installeer is, begin die Trojaanse virus premium tarief foonnommers SMS. Diegene wat hierdie nommers bestuur, is deel van die kriminele netwerk en vorder die fooie vanaf die slagoffers se rekeninge in.

2010 Stuxnet
Die Stuxnet-wurm, `n hoogs gespesialiseerde malware program wat Siemens se kontrolebeheer- en datawerwingstelsels  (SCADA), verantwoordelik is vir die monitering van spesifieke industriële prosesse, teiken, word in Junie 2010 ontdek. Stuxnet se mees prominente teiken was blykbaar Iran se uraanverryking infrastruktuur.

2012 Eerste drive-by Android malware
`n Trojaanse virus, NotCompatible, word waargeneem. Dit lyk soos `n stelselopdatering, maar tree op as `n proxy herleier na `n ander webwerf. Die webwerf kyk of die gebruiker `n Android-toestel is en installeer dan die Trojaanse virus. `n Toestel wat met NotCompatible besmet is, kan gebruik word om toegang te verkry tot informasie of stelsels wat normaalweg beskerm is, byvoorbeeld dié van groot besighede of die regering. 

2013 Ransomware is terug
Ransomware is terug as een van die grootste malware bedreigings. Sommige variante gebruik gevorderde enkripsie wat die herwinning van gesluite lêers feitlik onmoontlik maak. 

Neem kennis dat al hierdie inligting geneem is van die Sophos Threatsaurus, saamgestel deur Sophos, `n sekuriteit sagte- en hardwaremaatskappy. 

[:]

[:en]Trojans still dangerous in modern times[:af]Trojane ook in moderne tye gevaarlik[:]

Thursday, March 3rd, 2016

[:en]

horse-220321_960_720Trojans are malicious programmes pretending to be legitimate software, but they actually carry out hidden, harmful functions.

It pretends to do one thing, but actually does something different, without your knowledge. Popular examples are video codecs that some sites require to view online videos.

When a Trojan codec is installed, it may also install spyware or other malicious software. Another example is a malicious link that says “Cool Game.” When you download and install the game program, it turns out not to be a game, but a harmful Trojan that compromises your computer or erases the data on your hard drive.

Trojans are often distributed with pirated software applications and keygens that create illegal license codes for downloadable software. (See Backdoor Trojan)

A backdoor Trojan allows someone to take control of a user’s computer without their permission.

It may pose as legitimate software to fool users into running it. Alternatively—as is increasingly common—users may unknowingly allow Trojans onto their computer by following a link in spam email or visiting a malicious webpage.

Once the Trojan runs, it adds itself to the computer’s startup routine. It can then monitor the computer until the user is connected to the Internet. When the computer goes online, the person who sent the Trojan can perform many actions—for example, run programs on the infected computer, access personal files, modify and upload files, track the user’s keystrokes, or send out spam email.

Well-known backdoor Trojans include Netbus, OptixPro, Subseven, BackOrifice and, more recently, Zbot or ZeuS.

To avoid backdoor Trojans, you should keep your computers up to date with the latest patches (to close down vulnerabilities in the operating system), and run anti-spam and antivirus software. 

Take note that information below is an extract from the Sophos Threatsaurus, compiled by Sophos, a security software and hardware company.

[:af]

horse-220321_960_720Trojane is vyandige programme wat voorgee dat hulle wettig is, maar eintlik voer hulle skelm skadelike aksies uit.

Dit veins een handeling, maar doen werklik iets heeltemal anders, sonder jou medewete. Gewilde voorbeelde is die video-kodek (codec) vereis deur sommige webwerwe om videos aanlyn te kyk. 

Wanneer `n Trojaanse kodek installeer word, kan dit ook loerprogramme (spyware) of ander vyandige sagteware installeer. Nog `n voorbeeld is `n kwaadwillige skakel wat sê “Cool Game”. Wanneer jy die “speletjie” aflaai en installeer, is dit nie `n speletjie nie, maar `n skadelike Trojaanse virus wat jou rekenaar onbeskermd laat of alle data op jou hardeskyf uitvee.

Trojaanse virusse word dikwels versprei met behulp van roofsagteware en programme wat onwettige lisensieëringskodes genereer vir aflaaibare sagteware. 

`n Trojaanse agterdeur-virus laat iemand toe om `n gebruiker se rekenaar oor te neem sonder sy toestemming. 

Weereens kan die sagteware hom voordoen as wettig en derhalwe gebruikers mislei om dit te inisieer. Dis ook deesdae algemeen dat gebruikers onwetend Trojaanse virusse op hulle rekenaars laat kom deur op skakels te kliek in gemorspos of kwaadwillige webwerwe te besoek. 

Sodra die Trojaanse virus aktiveer is, voeg dit homself toe in die rekenaar se aanvangsroetine (startup) Dit monitor dan die rekenaar totdat die gebruiker aan die internet verbind. Wanneer die rekenaar aanlyn gaan, kan die persoon wat die Trojaanse virus gestuur het, verskeie aksies uitvoer. So kan hy programme loods op die aangetaste rekenaar, toegang kry tot persoonlike leêrs, leêrs oplaai en wysig, gebruikers se sleutelslae naspeur of selfs gemorspos namens die gebruiker uitstuur.

Bekende Trojaanse agterdeur-virusse sluit Netbus, OptixPro, Subseven, BackOrifice, Zbot en ZeuS in.

Om hierdie risikos te vermy, sorg dat jou rekenaar altyd op datum is met die nuutste sagteware-opdaterings (om swakplekke in die bedryfstelsel te voorkom) en voer gereeld anti-gemorspos en -virus sagteware uit. 

Neem kennis dat bostaande inligting ʼn uittreksel is uit die Sophos Threatsaurus, saamgestel deur Sophos, ʼn sekuriteit-sagteware en -hardeware maatskappy.

[:]

[:en]History of malware, Trojans and worms (Part 2)[:af]Geskiedenis van malware, Trojaanse virusse en wurms[:]

Thursday, March 3rd, 2016

[:en]

Last time we explored the more unknown viruses, Trojans and worms, up to 1985. Now we start off in 1986, where most histories do, with the first PC virus.

1986 The first virus for PCs
The first virus for IBM PCs, Brain, was allegedly written by two brothers in Pakistan, when they noticed that people were copying their software. The virus put a copy of itself and a copyright message on any floppy disk copies their customers made.

1987 The Christmas tree worm
This was an email Christmas card that included program code. If the user ran it, it drew a Christmas tree as promised, but also forwarded itself to everyone in the user’s address book. The traffic paralyzed the IBM worldwide network.

1988 The Internet Worm
Robert Morris, a 23-year-old student, released a worm on the US DARPA Internet. It spread to thousands of computers and, due to an error, kept re-infecting computers many times, causing them to crash.

1989 Trojan demands ransom
The AIDS Trojan horse came on a floppy disk that offered information about AIDS and HIV. The Trojan encrypted the computer’s hard disk and demanded payment in exchange for the password.

1991 The first polymorphic virus
Tequila was the first widespread polymorphic virus. Polymorphic viruses make detection difficult for virus scanners by changing their appearance with each new infection.

1992 The Michelangelo panic
The Michelangelo virus was designed to erase computer hard disks each year on March 6 (Michelangelo’s birthday). After two companies accidentally distributed infected disks and PCs, there was worldwide panic, but few computers were infected.

1994 The first email virus hoax
The first email hoax warned of a malicious virus that would erase an entire hard drive just by opening an email with the subject line “Good Times.”

1995 The first document virus
The first document or “macro” virus, Concept, appeared. It spread by exploiting the macros in Microsoft Word.

1998 The first virus to affect hardware
CIH or Chernobyl became the first virus to paralyze computer hardware. The virus attacked the BIOS, which is needed to boot up the computer.

1999 Email viruses
Melissa, a virus that forwards itself by email, spread worldwide. Bubbleboy, the first virus to infect a computer when email is viewed, appeared.

2000 Denial-of-service attacks
“Distributed denial-of-service” attacks by hackers put Yahoo!, eBay, Amazon and other high profile websites offline for several hours. Love Bug became the most successful email virus yet.

2000 Palm virus
The first virus appeared for the Palm operating system, although no users were infected.

2001 Viruses spread via websites or network shares
Malicious programs began to exploit vulnerabilities in software, so that they could spread without user intervention. Nimda infected users who simply browsed a website. Sircam used its own email program to spread, and also spread via network shares.

If this history timeline hasn’t satisfied your curiosity, the recently launched Malware Museum might peak your interest. 

Take note that information below is an extract from the Sophos Threatsaurus, compiled by Sophos, a security software and hardware company.

[:af]

Verlede keer het ons meer te wete gekom oor die geskiedenis van ouer, onbekende virusse, Trojane en wurms vóór 1985. Dié keer begin ons in 1985 met die eerste PC virus.

1986 Die eerste virus vir PCs
Die eerste virus vir IBM PCs, Brain, is geskryf deur twee broers in Pakistan, toe hulle opgemerk het dat hul sagteware gekopieer word. Die virus vermeerder homself en plaas `n kopiereg boodskap op enige floppieskyf kopieë wat kliënte maak.

1987 Die Kersfeesboomwurm
Hierdie was `n Kersfeeskaartjie e-pos wat programkode ingesluit het. As die gebruiker dit aktiveer het, het dit, soos verwag, `n Kersfeesboom geteken, maar dit ook aangestuur aan almal in die se adresboek. Die Kersfeesboomwurm se verkeer het die hele IBM netwerk wêreldwye lamgelê.

1988 Die Internetwurm
23-jarige student, Robert Morris, laat, per ongeluk,`n wurm op die US DARPA Internet los. Dit versprei na duisende rekenaars en gaan voort om rekenaars telkens te besmet en ineen te laat stort. 

1989 Trojaanse virus eis `n losprys
Die AIDS Trojaan is op `n floppieskyf, wat inligting bied oor AIDS en HIV, versprei. Die Trojaanse virus het die rekenaar se hardeskyf enkripteer en betaling vereis in ruil vir die wagwoord. 

1991 Die eerste polimorfiese virus
Tequila was die eerste wydverspreide polimorfiese virus. Polimorfiese virusse verander hulle voorkoms met elke nuwe infeksie en maak dit dus besonder moeilik om op te spoor. 

1992 Die Michelangelo bohaai
Die Michelangelo virus is ontwerp om elke jaar op Michelangelo se verjaardag (6 Maart) rekenaars se hardeskywe uit te vee. Nadat twee maatskappye per ongeluk besmette diskette versprei het, was daar wêreldwye paniek, maar min rekenaars is werklik aangetas. 

1994 Die eerste e-pos virus kullery
Die eerste e-pos kullery het gedreig dat `n vyandige virus jou hele hardeskyf sou uitvee as jy `n e-pos met die onderwerp “Good Times” oopmaak.

1995 Die eerste dokument virus
Die eerste dokument of makro-virus, Concept, verskyn en word versprei deur die misbruik van makros in Microsoft Word.

1998 Die eerste virus wat hardeware beïnvloed het
CIH of Chernobyl het die eerste virus geword wat rekenaarhardeware buite aksie gelaat het. Die virus het die BIOS, wat nodig is om die rekenaar aan die gang te kry, aangeval.

1999 E-pos virusse
Melissa, `n virus wat homself versprei deur middel van e-pos, het wêreldwyd versprei. Bubbleboy, die eerste virus wat versprei wanneer `n e-pos slegs besigtig word, maak sy opwagting. 

2000 Denial-of-service aanvalle
Distributed denial-of-service-aanvalle deur kuberkrakers het Yahoo!, eBay, Amazon en ander hoë-profiel webwerwe onbruikbaar gelaat vir etlike ure. Love Bug word die mees suksesvolle e-pos virus ooit.

2000 Palm virus
Die eerste virus vir die Palm-bedryfstelsel is ontwikkel, maar geen gebruikers is aangetas nie. 

2001 Virusse versprei via webwerwe of netwerkdeelspasies
Vyandige programme begin om swakplekke in sagteware te misbruik sodat dit kan versprei sonder die hulp van `n gebruiker. Nimda besmet gebruikers as hulle `n webwerf besoek en Sircam gebruik sy eie e-posprogram en netwerkdeelspasies om te versprei.

As jy nog nie genoeg gehad het van virusse en die magdom sekuriteitsrisikos nie, sal die Malware Museum  dalk jou nuuskierigheid tevrede stel. 

Neem kennis dat bostaande inligting ʼn uittreksel is uit die Sophos Threatsaurus, saamgestel deur Sophos, ʼn sekuriteit-sagteware en -hardeware maatskappy.

[:]

[:en]History of malware, Trojans and worms (Part 1)[:af]Geskiedenis van malware, Trojaanse virusse en wurms (Deel 1)[:]

Wednesday, February 17th, 2016

[:en]

We’re always warning you against phishing, viruses and other nasty software which might harm your PC and data. For a change, let’s look at the history of these nasties. Where do they come from? How long have they been around for? Are they a recent phenomenon?

It seems not. Viruses have been doing the rounds for more than 50 years.

1949 Self-reproducing “cellular automata”
John von Neumann, the father of cybernetics, published a paper suggesting that a computer program could reproduce itself.

1959 Core Wars
H Douglas McIlroy, Victor Vysottsky, and Robert P Morris of Bell Labs developed a computer game called Core Wars, in which programs called organisms competed for computer processing time.

1960 “Rabbit” programs
Programmers began to write placeholders for mainframe computers. If no jobs were waiting, these programs added a copy of themselves to the end of the queue. They were nicknamed “rabbits” because they multiplied, using up system resources.

1971 The first worm
Bob Thomas, a developer working on ARPANET, a precursor to the Internet, wrote a program called Creeper that passed from computer to computer, displaying a message.

1975 Replicating code
A K Dewdney wrote Pervade as a sub-routine for a game run on computers using the UNIVAC 1100 system. When any user played the game, it silently copied the latest version of itself into every accessible directory, including shared directories, consequently spreading throughout the network.

1978 The Vampire worm
John Shoch and Jon Hupp at Xerox PARC began experimenting with worms designed to perform helpful tasks. The Vampire worm was idle during the day, but at night it assigned tasks to under-used computers.

1981 Apple virus
Joe Dellinger, a student at Texas A&M University, modified the operating system on Apple II diskettes so that it would behave as a virus. As the virus had unintended side-effects, it was never released, but further versions were written and allowed to spread.

1982 Apple virus with side effects
Rich Skrenta, a 15-year-old, wrote Elk Cloner for the Apple II operating system. Elk Cloner ran whenever a computer was started from an infected floppy disk, and would infect any other floppy put into the disk drive. It displayed a message every 50 times the computer was started.

1985 Mail Trojan
The EGABTR Trojan horse was distributed via mailboxes, posing as a program designed to improve graphics display. However, once run, it deleted all files on the hard disk and displayed a message.

Take note that information above is an extract from the Sophos Threatsaurus, compiled by Sophos, a security software and hardware company.

[:af]

Ons waarsku jou gedurig teen phishing, virusse en ander nare sagteware wat ʼn gevaar is vir jou rekenaar en jou data. Kom ons kyk vir ʼn slag na die geskiedenis van hierdie verskynsels. Waar kom hulle vandaan? Hoe lank verpes hulle al ons lewens? Is dit ʼn onlangse verskynsel?

Tog nie. Virusse bestaan al vir meer as 50 jaar. 

1949 Self-kopieërende “sellulêre outomate”
John von Neumann, die vader van kubernetika, publiseer ʼn verhandeling wat beweer dat ʼn rekenaarprogram  homself kan kopieer.

1959 Core Wars
H Douglas McIlroy, Victor Vysottsky, en Robert P Morris van Bell Labs ontwikkel ʼn rekenaarprogram genaamd Core Wars, waar programme, wat organismes genoem word, kompeteer vir rekenaarverwerkingstyd.

1960 Rabbit programme
Programmeerders begin plekhouers skryf vir hoofraamrekenaars. As geen take wag nie, het hierdie programme ʼn kopie van hulself by die einde van die ry gelas. Hulle is rabbits genoem omdat hulle vermeerder het en die stelselhulpbronne opgebruik het. 

1971 Die eerste wurm
Bob Thomas, ʼn ontwikkelaar by  die voorganger van die Internet, ARPANET, skryf Creeper, ʼn program wat aangestuur word van rekenaar tot rekenaar en wat ʼn boodskap vertoon. 

1975 Kode wat reproduseer
A K Dewdney skryf Pervade as ʼn sub-roetine vir ʼn speletjie wat op rekenaars loop met die UNIVAC 1100 stelsel. Wanneer enige speler die speletjie speel, kopieer dit stilweg sy nuutste weergawe binne-in elke beskikbare lêergids, insluitende gedeelte gidse. Gevolglik versprei dit regoor die hele netwerk.

1978 Die Vampierwurm
John Shoch en Jon Hupp by Xerox PARC het begin eksperimenteer met wurms wat ontwerp is om te help met take. Die Vampierwurm het bedags geluier, maar snags het dit take toegeken aan rekenaars wat minder gebruik is.

1981 Apple virus
Joe Dellinger, ʼn student by die Texas A&M Universiteit, pas die bedryfstelsel op Apple II diskette aan sodat dit sal optree asof dit ʼn virus het. As die virus onbeplande newe-effekte gehad het, is dit nooit vrygestel nie, maar addisionele weergawes is geskryf en toegelaat om te versprei. 

1982 Apple virus met newe-effekte
Rich Skrenta, ʼn 15-jarige, skryf Elk Cloner vir die Apple II bedryfstelsel. Elk Cloner het geloop wanneer ʼn rekenaar aangesit is deur middel van ʼn besmette floppie. Dit het ʼn boodskap vertoon elke 50 keer wanneer die rekenaar aangesit is.

1985 E-pos Trojaan
Die EGABTR Trojaanse virus is versprei deur middel van posbusse deur voor te gee dat dit ʼn program is wat die grafiese beeld verbeter. Wanneer dit egter loop, vee dit alle lêers op die hardeskyf uit en vertoon ʼn boodskap.

Neem kennis dat bostaande inligting ʼn uittreksel is uit die Sophos Threatsaurus, saamgestel deur Sophos, ʼn sekuriteit-sagteware en -hardeware maatskappy.

[:]