{"id":9834,"date":"2016-03-03T12:00:25","date_gmt":"2016-03-03T10:00:25","guid":{"rendered":"http:\/\/blogs.sun.ac.za\/it\/?p=9834"},"modified":"2016-03-17T11:26:54","modified_gmt":"2016-03-17T09:26:54","slug":"the-history-of-viruses-trojans-and-worms-part-2","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2016\/03\/the-history-of-viruses-trojans-and-worms-part-2\/","title":{"rendered":"[:en]History of malware, Trojans and worms (Part 2)[:af]Geskiedenis van malware, Trojaanse virusse en wurms[:]"},"content":{"rendered":"<p>[:en]<\/p>\n<p><a href=\"http:\/\/blogs.sun.ac.za\/it\/2016\/02\/the-history-of-viruses-trojans-and-worms-part-1\/\" target=\"_blank\">Last time<\/a> we explored the more unknown viruses, Trojans and worms, up to 1985. Now we start off in 1986, where most histories do, with the first PC virus.<\/p>\n<p><strong>1986 The first virus for PCs<\/strong><br \/> The first virus for IBM PCs, <em>Brain<\/em>, was allegedly written by two brothers in Pakistan, when they noticed that people were copying their software. The virus put a copy of itself and a copyright message on any floppy disk copies their customers made.<\/p>\n<p> <strong>1987 The Christmas tree worm<\/strong><br \/> This was an email Christmas card that included program code. If the user ran it, it drew a Christmas tree as promised, but also forwarded itself to everyone in the user\u2019s address book.\u00a0The traffic paralyzed the IBM worldwide network.<\/p>\n<p> <strong>1988 The Internet Worm<\/strong><br \/> Robert Morris, a 23-year-old student, released a worm on the US DARPA Internet. It spread to thousands of computers and, due to an error, kept re-infecting computers many times, causing them to crash.<\/p>\n<p> <strong>1989 Trojan demands ransom<\/strong><br \/> The AIDS Trojan horse came on a floppy disk\u00a0that offered information about AIDS and HIV.\u00a0The Trojan encrypted the computer\u2019s hard\u00a0disk and demanded payment in exchange for\u00a0the password.<\/p>\n<p> <strong>1991 The first polymorphic virus<\/strong><br \/> <em>Tequila<\/em> was the first widespread polymorphic virus. Polymorphic viruses make detection difficult for virus scanners by changing their appearance with each new infection.<\/p>\n<p> <strong>1992 The Michelangelo panic<\/strong><br \/> The <em>Michelangelo<\/em> virus was designed to erase computer hard disks each year on March 6 (Michelangelo\u2019s birthday). After two companies accidentally distributed infected disks and PCs, there was worldwide panic, but few computers were infected.<\/p>\n<p> <strong>1994 The first email virus hoax<\/strong><br \/> The first email hoax warned of a malicious\u00a0virus that would erase an entire hard drive\u00a0just by opening an email with the subject line \u201cGood Times.\u201d<\/p>\n<p> <strong>1995 The first document virus<\/strong><br \/> The first document or \u201cmacro\u201d virus, Concept, appeared. It spread by exploiting the macros in Microsoft Word.<\/p>\n<p> <strong>1998 The first virus to affect hardware<\/strong><br \/> <em>CIH<\/em> or <em>Chernobyl<\/em> became the first virus to paralyze computer hardware. The virus\u00a0attacked the BIOS, which is needed to boot up\u00a0the computer.<\/p>\n<p> <strong>1999 Email viruses<\/strong><br \/> <em>Melissa<\/em>, a virus that forwards itself by email, spread worldwide.\u00a0<em>Bubbleboy<\/em>, the first virus to infect a computer when email is viewed, appeared.<\/p>\n<p> <strong>2000 Denial-of-service attacks<\/strong><br \/> \u201cDistributed denial-of-service\u201d attacks by hackers put Yahoo!, eBay, Amazon and other high profile websites offline for several hours.\u00a0<em>Love Bug<\/em> became the most successful email\u00a0virus yet.<\/p>\n<p> <strong>2000 Palm virus<\/strong><br \/> The first virus appeared for the Palm operating system, although no users were infected.<\/p>\n<p> <strong>2001 Viruses spread via websites or network shares<\/strong><br \/> Malicious programs began to exploit vulnerabilities in software, so that they could spread without user intervention. <em>Nimda<\/em> infected users who simply browsed a website. <em>Sircam<\/em> used its own email program to spread, and also spread via network shares.<\/p>\n<p>If this history timeline hasn&#8217;t satisfied your curiosity, the recently launched\u00a0<a href=\"http:\/\/www.techcentral.co.za\/computer-viruses-as-an-art-form\/63321\/\">Malware Museum <\/a>might peak your interest.\u00a0<\/p>\n<p><em>Take note that information below is an extract from the <a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/other\/sophosthreatsaurusaz.pdf?la=en\" target=\"_blank\">Sophos Threatsaurus,<\/a> compiled by\u00a0Sophos, a security software and hardware company.<\/em><\/p>\n<p>[:af]<\/p>\n<p><a href=\"http:\/\/blogs.sun.ac.za\/it\/af\/2016\/02\/the-history-of-viruses-trojans-and-worms-part-1\/\" target=\"_blank\">Verlede keer<\/a> het ons meer te wete gekom oor die geskiedenis van ouer, onbekende virusse, Trojane en wurms v\u00f3\u00f3r 1985. Di\u00e9 keer begin ons in 1985 met die eerste PC virus.<\/p>\n<p><strong>1986 Die eerste virus vir PCs<\/strong><br \/> Die eerste virus vir IBM PCs, <em>Brain,<\/em> is geskryf deur twee broers in Pakistan, toe hulle opgemerk het dat hul sagteware gekopieer word. Die virus vermeerder\u00a0homself en plaas `n kopiereg boodskap op enige floppieskyf kopie\u00eb wat kli\u00ebnte maak.<\/p>\n<p> <strong>1987 Die Kersfeesboomwurm<\/strong><br \/> Hierdie was `n Kersfeeskaartjie e-pos wat programkode ingesluit het. As die gebruiker dit aktiveer\u00a0het, het dit, soos verwag, `n Kersfeesboom geteken, maar dit ook aangestuur aan almal in die se adresboek. Die Kersfeesboomwurm se verkeer het die hele IBM netwerk w\u00eareldwye\u00a0lamgel\u00ea.<\/p>\n<p> <strong>1988 Die Internetwurm<\/strong><br \/>23-jarige student, Robert Morris,\u00a0laat,\u00a0per ongeluk,`n wurm op die US DARPA Internet los. Dit versprei na duisende rekenaars en gaan voort om rekenaars telkens\u00a0te besmet en ineen te laat stort.\u00a0<\/p>\n<p> <strong>1989 Trojaanse virus\u00a0eis `n losprys<\/strong><br \/> Die<em> AIDS<\/em> Trojaan is op `n floppieskyf, wat inligting bied oor AIDS en HIV, versprei. Die Trojaanse virus het die rekenaar se hardeskyf enkripteer en betaling vereis in ruil vir die wagwoord.\u00a0<\/p>\n<p> <strong>1991 Die eerste polimorfiese virus<\/strong><br \/> <em>Tequila<\/em> was die eerste wydverspreide polimorfiese virus. Polimorfiese virusse verander hulle voorkoms met elke nuwe infeksie en maak dit dus besonder moeilik om op te spoor.\u00a0<\/p>\n<p> <strong>1992 Die <em>Michelangelo\u00a0<\/em>bohaai<\/strong><br \/> Die <em>Michelangelo<\/em> virus is ontwerp om elke jaar op Michelangelo se verjaardag (6 Maart) rekenaars se hardeskywe uit te vee. Nadat twee maatskappye per ongeluk besmette diskette versprei het, was daar w\u00eareldwye paniek, maar min rekenaars is werklik aangetas.\u00a0<\/p>\n<p> <strong>1994 Die eerste e-pos virus kullery<\/strong><br \/> Die eerste e-pos kullery het gedreig\u00a0dat `n vyandige\u00a0virus jou hele hardeskyf sou uitvee as jy `n e-pos met die onderwerp\u00a0\u201cGood Times\u201d oopmaak.<\/p>\n<p> <strong>1995 Die eerste dokument virus<\/strong><br \/> Die eerste dokument of makro-virus, <em>Concept<\/em>, verskyn en word\u00a0versprei deur die misbruik van makros in Microsoft Word.<\/p>\n<p> <strong>1998 Die eerste virus wat hardeware be\u00efnvloed het<\/strong><br \/> <em>CIH<\/em> of <em>Chernobyl<\/em>\u00a0het die eerste virus geword wat rekenaarhardeware buite aksie gelaat het. Die virus het die BIOS, wat nodig is om die rekenaar aan die gang te kry, aangeval.<\/p>\n<p> <strong>1999 E-pos virusse<\/strong><br \/> <em>Melissa,<\/em>\u00a0`n virus wat homself versprei deur middel van e-pos, het w\u00eareldwyd versprei. <em>Bubbleboy<\/em>, die eerste virus wat versprei wanneer `n e-pos slegs besigtig word, maak sy opwagting.\u00a0<\/p>\n<p> <strong>2000 <em>Denial-of-service<\/em> aanvalle<\/strong><br \/><em>Distributed denial-of-service-<\/em>aanvalle deur kuberkrakers het Yahoo!, eBay, Amazon en ander ho\u00eb-profiel webwerwe onbruikbaar gelaat\u00a0vir etlike ure.<em> Love Bug<\/em>\u00a0word die mees suksesvolle e-pos virus ooit.<\/p>\n<p> <strong>2000 <em>Palm<\/em> virus<\/strong><br \/> Die eerste virus vir die Palm-bedryfstelsel is ontwikkel, maar geen gebruikers is aangetas\u00a0nie.\u00a0<\/p>\n<p> <strong>2001 Virusse versprei via webwerwe of netwerkdeelspasies<\/strong><br \/>Vyandige\u00a0programme begin om swakplekke in sagteware te misbruik sodat dit kan versprei\u00a0sonder die hulp van `n gebruiker.<em>\u00a0Nimda<\/em>\u00a0besmet gebruikers as hulle `n webwerf besoek en <em>Sircam<\/em>\u00a0gebruik sy eie e-posprogram en netwerkdeelspasies om te versprei.<\/p>\n<p>As jy nog nie genoeg gehad het van virusse en die magdom sekuriteitsrisikos nie, sal die <a href=\"http:\/\/www.techcentral.co.za\/computer-viruses-as-an-art-form\/63321\/\">Malware Museum <\/a>\u00a0dalk jou nuuskierigheid tevrede stel.\u00a0<\/p>\n<p><em>Neem kennis dat bostaande inligting \u0149 uittreksel is uit die\u00a0<a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/other\/sophosthreatsaurusaz.pdf?la=en\" target=\"_blank\">Sophos Threatsaurus,<\/a>\u00a0saamgestel deur Sophos, \u0149 sekuriteit-sagteware en -hardeware maatskappy.<\/em><\/p>\n<p>[:]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[:en] Last time we explored the more unknown viruses, Trojans and worms, up to 1985. Now we start off in 1986, where most histories do, with the first PC virus. 1986 The first virus for PCs The first virus for IBM PCs, Brain, was allegedly written by two brothers in Pakistan, when they noticed that [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20382,29187],"tags":[29175,20362,48700],"class_list":["post-9834","post","type-post","status-publish","format-standard","hentry","category-email","category-security-2","tag-trojan","tag-virus","tag-worm"],"publishpress_future_action":{"enabled":false,"date":"2026-05-08 04:01:13","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/9834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=9834"}],"version-history":[{"count":21,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/9834\/revisions"}],"predecessor-version":[{"id":10093,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/9834\/revisions\/10093"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=9834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=9834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=9834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}