{"id":9903,"date":"2016-03-17T11:19:58","date_gmt":"2016-03-17T09:19:58","guid":{"rendered":"http:\/\/blogs.sun.ac.za\/it\/?p=9903"},"modified":"2016-03-17T11:25:28","modified_gmt":"2016-03-17T09:25:28","slug":"the-history-of-viruses-trojans-and-worms-part-3","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2016\/03\/the-history-of-viruses-trojans-and-worms-part-3\/","title":{"rendered":"[:en]The history of malware,Trojans and worms (part 3)[:af]Die geskiedenis van malware, Trojane en wurms (deel 3)[:]"},"content":{"rendered":"<p>[:en]<\/p>\n<p>Two weeks ago\u00a0we\u00a0explored <a href=\"http:\/\/blogs.sun.ac.za\/it\/2016\/03\/the-history-of-viruses-trojans-and-worms-part-2\/\" target=\"_blank\">lesser known malware, Trojans and worms, after 1985.<\/a> This time around, we look at more recent threats, starting with zombies&#8230;<\/p>\n<p><strong>2003 Zombie, Phishing<\/strong><br \/> The Sobig worm gave control of the PC to hackers, so that it became a \u201czombie,\u201d which could be used to send spam.\u00a0The Mimail worm posed as an email from Paypal, asking users to confirm credit card information.<\/p>\n<p> <strong>2004 IRC bots<\/strong><br \/> Malicious IRC (Internet Relay Chat) bots were developed. Trojans could place the bot on a computer, where it would connect to an IRC channel without the user\u2019s knowledge and give control of the computer to hackers.<\/p>\n<p> <strong>2005 Rootkits<\/strong><br \/> Sony\u2019s DRM copy protection system, included on music CDs, installed a \u201crootkit\u201d on users\u2019 PCs, hiding files so that they could not be duplicated. Hackers wrote Trojans to exploit this security weakness and installed a hidden \u201cback door.\u201d<\/p>\n<p> <strong>2006 Share price scams<\/strong><br \/> Spam mail hyping shares in small companies (\u201cpump-and-dump\u201d spam) became common.<\/p>\n<p> <strong>2006 Ransomware<\/strong><br \/> The Zippo and Archiveus Trojan horse programs, which encrypted users\u2019 files and demanded payment in exchange for the password, were early examples of ransomware.<\/p>\n<p> <strong>2006 First advanced persistent threat\u00a0(APT) identified\u00a0<\/strong><br \/> First coined by the U.S. Air Force in 2006 and functionally defined by Alexandria, Virginia security firm Mandiant in 2008 as a group of sophisticated, determined and coordinated attackers. APTs are equipped with both the capability and the intent to persistently and effectively target a specific entity. Recognized attack vectors include infected media, supply chain compromise and social engineering.<\/p>\n<p> <strong>2008 Fake antivirus software<\/strong><br \/> Scaremongering tactics encourage people to hand over credit card details for fake antivirus products like AntiVirus 2008.<\/p>\n<p> <strong>2008 First iPhone malware<\/strong><br \/> The US Computer Emergency Response Team (US-CERT) issues a warning that a fraudulent iPhone upgrade, \u201ciPhone firmware 1.1.3 prep,\u201d is making its way around the Internet and users should not be fooled into installing it. When a user installs the Trojan, other application components are altered. If the Trojan is uninstalled, the affected applications may also be removed.<\/p>\n<p> <strong>2009 Conficker hits the headlines<\/strong><br \/> Conficker, a worm that initially infects via unpatched machines, creates a media storm across the world.<\/p>\n<p> <strong>2009 Polymorphic viruses rise again<\/strong><br \/> Complex viruses return with a vengeance, including Scribble, a virus which mutates\u00a0its appearance on each infection and used\u00a0multiple vectors of attack.<\/p>\n<p> <strong>2009 First Android malware<\/strong><br \/> Android FakePlayerAndroid\/FakePlayer.A is a Trojan that sends SMS messages to premium rate phone numbers. The Trojan penetrates Android-based smartphones disguised as an ordinary application. Users are prompted to install a small file of around 13 KB that has the standard Android extension .APK. But once the \u201capp\u201d is installed on the device, the Trojan bundled with it begins texting premium rate phone numbers (those that charge). The criminals are the ones operating these numbers, so they end up collecting charges to the victims\u2019 accounts.<\/p>\n<p> <strong>2010 Stuxnet<\/strong><br \/> Discovered in June 2010 the Stuxnet worm initially spreads indiscriminately, but is later found to contain a highly specialized malware payload that is designed to target only Siemens supervisory control and data acquisition (SCADA) systems configured to control and monitor specific industrial processes. Stuxnet\u2019s most prominent target is widely believed to be uranium enrichment infrastructure in Iran.<\/p>\n<p> <strong>2012 First drive-by Android malware<\/strong><br \/> The first Android drive-by malware is discovered, a Trojan called NotCompatible that poses as a system update but acts as a proxy redirect. The site checks the victim\u2019s browser\u2019s user-agent string to confirm that it is an Android visiting, then automatically installs the Trojan. A device infected with NotCompatible could potentially be used to gain access to normally protected information or systems, such as those maintained by enterprise or government.<\/p>\n<p> <strong>2013 Ransomware is back<\/strong><br \/> Ransomware emerges as one of the top malware threats. With some variants using advanced encryption that makes recovering locked files nearly impossible, ransomware replaces fake antivirus as malicious actors\u2019 money-soliciting threat of choice.<\/p>\n<p><em>Take note that information below is an extract from the <a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/other\/sophosthreatsaurusaz.pdf?la=en\" target=\"_blank\">Sophos Threatsaurus,<\/a> compiled by\u00a0Sophos, a security software and hardware company.<\/em><\/p>\n<p>[:af]<\/p>\n<p>Twee weke gelede\u00a0het ons ondersoek ingestel na <a href=\"http:\/\/blogs.sun.ac.za\/it\/af\/2016\/03\/the-history-of-viruses-trojans-and-worms-part-2\/\" target=\"_blank\"><em>malware<\/em>, Trojaanse virusse en wurms na\u00a01985.<\/a>\u00a0Di\u00e9 keer is dit meer onlangse bedreigings se beurt. Ons begin by zombies &#8230;\u00a0<\/p>\n<p><strong>2003 Zombies en\u00a0<em>Phishing<\/em><\/strong><br \/>Met behulp van die <em>Sobig-<\/em>wurm kry krakers beheer oor rekenaars, verander dit in `n zombie en stuur daarmee gemorspos uit. Die <em>Mimail-<\/em>wurm kamoefleer\u00a0homself\u00a0as `n Paypal e-pos en vra gebruikers om kredietkaartinligting te bevestig.\u00a0<\/p>\n<p> <strong>2004 IRC robotte<\/strong><br \/> Kwaadwillige IRC (Internet Relay Chat) robotte word ontwikkel. Trojaanse virusse laai die robotte op rekenaars,\u00a0laat\u00a0dit aan `n IRC-kanaal verbind, sonder die gebruiker se medewete en kry beheer oor die rekenaars.<\/p>\n<p> <strong>2005 <em>Rootkits<\/em><\/strong><br \/> Sony se DRM kopie-beskermingstelsel op musiek CDs, installeer `n <em>rootkit, <\/em>wat\u00a0le\u00ears wegsteek sodat dit nie gedupliseer kan word nie,<em>\u00a0<\/em>op rekenaars. Kuberkrakers skryf Trojaanse virusse om hierdie sekuriteit-swakplek te misbruik en `n versteekte <em>back door <\/em>te<em>\u00a0<\/em>installeer.<\/p>\n<p> <strong>2006 Aandeleprys-bedrog<\/strong><br \/> Gemorspos wat aandele in klein maatskappye opjaag (<em>pump-and-dump-<\/em>gemorspos)\u00a0raak die nuutste kubergevaar.<\/p>\n<p> <strong>2006 <em>Ransomware<\/em><\/strong><br \/> Die <em>Zippo<\/em> en <em>Archiveus<\/em> Trojaanse virusprogramme word die eerste <em>ransomware<\/em>. Hulle enkripteer le\u00ears en\u00a0eis\u00a0`n losprys in ruil vir die wagwoord.<\/p>\n<p> <strong>2006 Eerste moderne\u00a0bedreiging (APT) identifiseer<\/strong><br \/> APTs is die eerste keer in 2006 deur die Amerikaanse lugmag uitgewys. Hulle is toegerus met beide die vermo\u00eb en oogmerk om `n spesifieke teiken effektief en aanhoudend te teiken. Die gesofistikeerde, doelgerigte en geko\u00f6rdineerde aanvalle word geloods geloods op media en verskaffingskettings en sluit sosiale manipulasie in.<\/p>\n<p> <strong>2008 Vervalste anti-virus sagteware<\/strong><br \/>Deur middel van bangmaak-taktieke word gebruikers oortuig om hul kredietkaartinligting te gee\u00a0vir vervalste anti-virus produkte soos\u00a0<em>AntiVirus 2008.<\/em><\/p>\n<p> <strong>2008 Eerste iPhone <em>malware<\/em><\/strong><br \/> Die <em>US Computer Emergency Response Team<\/em> (US-CERT) reik `n waarskuwing uit oor `n misleidende\u00a0iPhone opgradering, die\u00a0<em>iPhone firmware 1.1.3 prep<\/em>. As `n gebruiker die Trojaanse virus installeer, word komponente van die foontoepassing aangepas. As die virus verwyder word, word die toepassings wat aangetas is, daarmee saam\u00a0verwyder.\u00a0<\/p>\n<p> <strong>2009 <em>Conficker<\/em>\u00a0haal die nuus<\/strong><br \/> <em>Conficker,<\/em>\u00a0`n wurm wat aanvanklik versprei word deur middel van verouderde rekenaars, veroorsaak w\u00eareldwye mediadekking.<\/p>\n<p> <strong>2009 Polimorfiese virusse is terug<\/strong><br \/> Komplekse virusse maak met mening weer hul verskyning. Een van hulle is\u00a0<em>Scribble<\/em>, `n virus wat sy kenmerke met elke infeksie verander en talle\u00a0metodes gebruik om te versprei.<\/p>\n<p> <strong>2009 Eerste Android <em>malware<\/em><\/strong><br \/> <em>Android FakePlayer<\/em> is `n Trojaanse virus wat SMSe na foonnommers stuur en Android slimfone indring omdat dit soos `n gewone toepassings lyk. Gebruikers word versoek om `n klein l\u00eaer van ongeveer 13 KB, met die gewone Android uitbreidingnaam .APK, te installeer. Sodra die &#8220;toepassing&#8221; op die toestel installeer is, begin die Trojaanse virus premium tarief foonnommers SMS. Diegene wat hierdie nommers bestuur, is deel van die kriminele netwerk en\u00a0vorder die fooie vanaf die slagoffers se rekeninge in.<\/p>\n<p> <strong>2010 <em>Stuxnet<\/em><\/strong><br \/> Die <em>Stuxnet-<\/em>wurm, `n hoogs gespesialiseerde <em>malware<\/em>\u00a0program wat\u00a0Siemens se kontrolebeheer- en datawerwingstelsels \u00a0(SCADA), verantwoordelik is vir die monitering van spesifieke industri\u00eble prosesse, teiken, word in Junie 2010 ontdek.\u00a0<em>Stuxnet<\/em> se mees prominente teiken was blykbaar Iran se uraanverryking infrastruktuur.<\/p>\n<p> <strong>2012 Eerste <em>drive-by<\/em> Android <em>malware<br \/> <\/em><\/strong>`n Trojaanse virus,\u00a0<em>NotCompatible, <\/em>word waargeneem. Dit<em>\u00a0<\/em>lyk soos `n stelselopdatering, maar tree op as `n proxy herleier na `n ander webwerf.\u00a0Die webwerf kyk of die gebruiker `n Android-toestel is en installeer dan die Trojaanse virus. `n Toestel wat met\u00a0<em>NotCompatible\u00a0<\/em>besmet is, kan gebruik word om toegang te verkry tot informasie of stelsels wat normaalweg beskerm is, byvoorbeeld di\u00e9 van groot besighede of die regering.\u00a0<\/p>\n<p> <strong>2013 <em>Ransomware<\/em> is terug<\/strong><br \/> <em>Ransomware<\/em>\u00a0is terug as een van die grootste <em>malware<\/em> bedreigings. Sommige variante gebruik gevorderde enkripsie wat die herwinning\u00a0van gesluite l\u00eaers feitlik onmoontlik maak.\u00a0<\/p>\n<p><em>Neem kennis dat al hierdie inligting geneem is van die\u00a0<a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/other\/sophosthreatsaurusaz.pdf?la=en\" target=\"_blank\">Sophos Threatsaurus,<\/a>\u00a0saamgestel deur Sophos, `n sekuriteit sagte- en hardwaremaatskappy.\u00a0<\/em><\/p>\n<p>[:]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[:en] Two weeks ago\u00a0we\u00a0explored lesser known malware, Trojans and worms, after 1985. This time around, we look at more recent threats, starting with zombies&#8230; 2003 Zombie, Phishing The Sobig worm gave control of the PC to hackers, so that it became a \u201czombie,\u201d which could be used to send spam.\u00a0The Mimail worm posed as an [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20382,29187],"tags":[29207,29175,20362],"class_list":["post-9903","post","type-post","status-publish","format-standard","hentry","category-email","category-security-2","tag-ransomware","tag-trojan","tag-virus"],"publishpress_future_action":{"enabled":false,"date":"2026-05-08 07:09:58","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/9903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=9903"}],"version-history":[{"count":25,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/9903\/revisions"}],"predecessor-version":[{"id":10092,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/9903\/revisions\/10092"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=9903"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=9903"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=9903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}