Timeline of computer viruses and worms

Computer malware timeline
(Learn how and when to remove this message)
Hex dump of the Blaster worm, showing a message left for Microsoft co-founder Bill Gates by the worm's programmer

This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.

1960s

1970s

1970

1971

1972

1973

1974

1975

1977

1980s

1982

1983

1984

1986

1987

1988

1989

1990s

1990

1991

1992

1993

1994

1995

1996

1997

1998

1999

2000s

2000

2001

2002

2003

2004

2005

2006

2007

2008

2009

2010s

2010

2011

2012

2013

2014

2015

2016

2017

2018

2019

2020s

2024

Researchers Nassi, Cohen, and Bitton developed a computer worm called Morris II, targeting generative AI email assistants to steal data and send spam, thereby breaching security protections of systems like ChatGPT and Gemini. Conducted in a test environment, this research highlights the security risks of multimodal large language models (LLMs) that now generate text, images, and videos. Generative AI systems, which operate on prompts, can be exploited through weaponized prompts. For instance, hidden text on a webpage could instruct an LLM to perform malicious activities, such as phishing for bank details. While generative AI worms like Morris II haven’t been observed in the public, their potential threat is a concern for the tech industry.[110]

See also

References

  1. ^ von Neumann, John (1966). Arthur W. Burks (ed.). Theory of self-reproducing automata (PDF). University of Illinois Press. Retrieved June 12, 2010.
  2. ^ "The Scarred Man Returns | GREGORY BENFORD". Retrieved 2021-09-12.
  3. ^ Chen, Thomas; Robert, Jean-Marc (2004). "The Evolution of Viruses and Worms". Archived from the original on 2009-05-17. Retrieved 2009-02-16.
  4. ^ Russell, Deborah; Gangemi, G T (1991). Computer Security Basics. O'Reilly. p. 86. ISBN 0-937175-71-4.
  5. ^ "IMDB synopsis of Westworld". www.imdb.com. Retrieved November 28, 2015.
  6. ^ Michael Crichton (November 21, 1973). Westworld (movie). 201 S. Kinney Road, Tucson, Arizona, USA: Metro-Goldwyn-Mayer. Event occurs at 32 minutes. And there's a clear pattern here which suggests an analogy to an infectious disease process, spreading from one resort area to the next." ... "Perhaps there are superficial similarities to disease." "I must confess I find it difficult to believe in a disease of machinery.{{cite AV media}}: CS1 maint: location (link)
  7. ^ "The very first viruses: Creeper, Wabbit and Brain", Daniel Snyder, InfoCarnivore, May 30, 2010,
  8. ^ "ANIMAL Source Code". Fourmilab.ch. 1996-08-13. Retrieved 2012-03-29.
  9. ^ "The Animal Episode". Fourmilab.ch. Retrieved 2012-03-29.
  10. ^ Craig E. Engler (1997). "The Shockwave Rider". Classic Sci-Fi Reviews. Archived from the original on 2008-07-03. Retrieved 2008-07-28.
  11. ^ Ryan, Thomas J. (1977). The Adolescence of P-1 (1st ed.). New York: Macmillan. ISBN 0-02-606500-2.
  12. ^ "First virus hatched as a practical joke". The Sydney Morning Herald (AP). 3 September 2007. Retrieved 9 September 2013.
  13. ^ Fred Cohen (1983-11-03). "Computer Viruses – Theory and Experiments". eecs.umich.edu. Retrieved 2012-03-29.
  14. ^ Thompson, Ken (August 1984). "Reflections on Trusting Trust". Communications of the ACM. 27 (8): 761–763. doi:10.1145/358198.358210. S2CID 34854438.
  15. ^ Leyden, John (January 19, 2006). "PC virus celebrates 20th birthday". The Register. Retrieved March 21, 2011.
  16. ^ Szor, Peter (2005). The Art of Computer Virus Research and Defense. Symantec Press / Addison-Wesley Professional. ISBN 978-0-321-30454-4.
  17. ^ a b c Wentworth, Rob (July 1996). "Computer Virus!" (reprinted from The Digital Viking). Twin Cities PC User Group. Archived from the original on 24 December 2013. Retrieved 9 September 2013.
  18. ^ "Virus.DOS.Chameleon.1260 – Securelist". Viruslist.com. Archived from the original on 2012-09-19. Retrieved 2010-07-10.
  19. ^ "V2PX". Vil.nai.com. Archived from the original on 2009-07-22. Retrieved 2010-07-10.
  20. ^ "What we detect – Securelist". Viruslist.com. Archived from the original on 2009-07-13. Retrieved 2010-07-10.
  21. ^ "Leandro", Threat Encyclopedia, Trend Micro, 9 March 2000. Retrieved 9 September 2013.
  22. ^ "Freddy Virus", Virus Information Summary List, December 1992. Retrieved 9 September 2013.
  23. ^ "Glossary – Securelist". Viruslist.com. Retrieved 2010-07-10.
  24. ^ "Wscript.KakWorm". Symantec. Archived from the original on August 30, 2006. Retrieved 2012-03-29.
  25. ^ "Kournikova computer virus hits hard". BBC News. February 13, 2001. Retrieved April 9, 2010.
  26. ^ Evers, Joris (May 3, 2002). "Kournikova virus maker appeals sentence". Retrieved 20 November 2010.
  27. ^ "Magistr - the Virus Encyclopedia". The Virus Encyclopedia. Retrieved 21 October 2021.
  28. ^ "MyLife Worm". Antivirus.about.com. 2002-03-07. Retrieved 2012-03-29.
  29. ^ "The Spread of the Sapphire/Slammer Worm". Retrieved 2012-12-14.
  30. ^ "Slammed!". Wired. July 2003. Retrieved 2012-12-14.
  31. ^ Sevcenco, Serghei (February 10, 2006). "Symantec Security Response: Backdoor.Graybird". Symantec. Archived from the original on December 11, 2003. Retrieved 2009-03-01.
  32. ^ "Backdoor.Prorat". Symantec. February 13, 2007. Archived from the original on September 1, 2006. Retrieved 2009-03-01.
  33. ^ "Threat Description: Worm:W32/Swen". F-secure.com. Retrieved 2012-03-29.
  34. ^ "Backdoor.Win32.Agobot.gen". Securelist. Archived from the original on 2012-03-15. Retrieved 2012-03-29.
  35. ^ "W32.Bolgi.Worm". Symantec. Archived from the original on January 7, 2007. Retrieved 2012-03-29.
  36. ^ "Threat Description:Bluetooth-Worm:SymbOS/Cabir". F-secure.com. Retrieved 2012-03-29.
  37. ^ "SymbOS.Cabir". Symantec. Archived from the original on January 2, 2007. Retrieved 2012-03-29.
  38. ^ "Spyware Detail Nuclear RAT 1.0b1". Computer Associates. August 16, 2004. Archived from the original on 2009-09-11. Retrieved 2009-03-01.
  39. ^ "Vundo". McAfee. Archived from the original on 2009-02-17. Retrieved 2009-03-01.
  40. ^ "Backdoor.Bifrose". Symantec, Inc. October 12, 2004. Archived from the original on January 7, 2007. Retrieved 2009-02-28.
  41. ^ "The ZLOB Show: Trojan Poses as Fake Video Codec, Loads More Threats". Trend Micro. Retrieved 2009-02-28.
  42. ^ "Threat Description: Email-Worm:W32/Brontok.N". F-secure.com. Retrieved 2012-03-29.
  43. ^ Peter Gutmann (31 August 2007). "World's most powerful supercomputer goes online". Full Disclosure. Retrieved 2007-11-04.
  44. ^ Gage, Deborah (February 17, 2005). "Chinese PC virus may have hidden agenda". Seattle Post-Intelligencer. Seattle PI. Retrieved 2009-03-01.
  45. ^ Kimmo (March 3, 2008). "MBR Rootkit, A New Breed of". F-Secure. Retrieved 2009-03-01.
  46. ^ "Win32.Ntldrbot (aka Rustock)". Dr. Web Ltd. Retrieved 2009-03-01.
  47. ^ "Virus Total". virustotal.com. July 8, 2008. Archived from the original on 2009-04-01. Retrieved 2009-03-01.
  48. ^ "Koobface malware makes a comeback". cnet.com. April 9, 2010. Retrieved 2009-04-13.
  49. ^ Willsher, Kim (2009-02-07). "French fighter planes grounded by computer virus". The Daily Telegraph. London. Retrieved 2009-04-01.
  50. ^ Williams, Chris (2009-01-20). "MoD networks still malware-plagued after two weeks". The Register. Retrieved 2009-01-20.
  51. ^ Williams, Chris (2009-01-20). "Conficker seizes city's hospital network". The Register. Retrieved 2009-01-20.
  52. ^ "Conficker-Wurm infiziert hunderte Bundeswehr-Rechner" (in German). PC Professionell. 2009-02-16. Archived from the original on 2009-03-21. Retrieved 2009-04-01.
  53. ^ Neild, Barry (2009-02-13). "$250K Microsoft bounty to catch worm creator". CNN. Retrieved 2009-03-29.
  54. ^ "MS08-067: Vulnerability in Server service could allow remote code execution". Microsoft Corporation.
  55. ^ Dancho Danchev. "Source code for Skype eavesdropping trojan in the wild". ZDNet.
  56. ^ "Code for Skype Spyware Released to Thwart Surveillance". WIRED. 31 August 2009.
  57. ^ Harvison, Josh (September 27, 2010). "Blackmail virus infects computers, holds information ransom". kait8.com. Archived from the original on 2016-06-11. Retrieved 20 November 2010.
  58. ^ "Waledac Takedown Successful". honeyblog.org. February 25, 2010. Retrieved 16 November 2012.
  59. ^ Paul, Ian (25 March 2009). "Nasty New Worm Targets Home Routers, Cable Modems". PC World. Retrieved 2009-03-26.
  60. ^ "Alureon trojan caused Windows 7 BSoD". microsoft.com. February 18, 2010. Retrieved 2010-02-18.
  61. ^ "VirusBlokAda News". Anti-virus.by. Retrieved 2012-03-29.
  62. ^ Gregg Keizer (16 September 2010). "Is Stuxnet the 'best' malware ever?". InfoWorld. Archived from the original on 5 December 2012. Retrieved 16 September 2010.
  63. ^ Stuxnet virus: worm 'could be aimed at high-profile Iranian targets’, Telegraph, 23 Sep 2010
  64. ^ "Possible New Rootkit Has Drivers Signed by Realtek". Kaspersky Labs. 15 July 2010.
  65. ^ "Bastard child of SpyEye/ZeuS merger appears online". The Register. 2011. Retrieved April 11, 2011. Bastard child of SpyEye/ZeuS merger appears online
  66. ^ "SpyEye mobile banking Trojan uses same tactics as ZeuS". The Register. 2011. Retrieved April 11, 2011. SpyEye mobile banking Trojan uses same tactics as ZeuS
  67. ^ "XP AntiSpyware 2011 – Virus Solution and Removal". Precisesecurity.com. Retrieved 2012-03-29.
  68. ^ "Morto Worm Spreads to Weak Systems". blogs.appriver.com. 2011. Archived from the original on 2011-10-14. Retrieved 2011-08-31.
  69. ^ "Morto Post Mortem: Dissecting a Worm". blog.imperva.com. 2011.
  70. ^ "Laboratory of Cryptography and System Security (CrySyS)". Retrieved 4 November 2011.
  71. ^ "Duqu: A Stuxnet-like malware found in the wild, technical report" (PDF). Laboratory of Cryptography of Systems Security (CrySyS). 14 October 2011.
  72. ^ "Statement on Duqu's initial analysis". Laboratory of Cryptography of Systems Security (CrySyS). 21 October 2011. Archived from the original on 2 October 2012. Retrieved 25 October 2011.
  73. ^ "W32.Duqu – The precursor to the next Stuxnet (Version 1.4)" (PDF). Symantec. 23 November 2011. Archived from the original (PDF) on December 13, 2011. Retrieved 30 December 2011.
  74. ^ "sKyWIper: A Complex Malware for Targeted Attacks" (PDF). Budapest University of Technology and Economics. 28 May 2012. Archived from the original (PDF) on 28 May 2012. Retrieved 29 May 2012.
  75. ^ "NGRBot", Enigma Software Group, 15 October 2012. Retrieved 9 September 2013.
  76. ^ "Dissecting the NGR bot framework: IRC botnets die hard", Aditya K. Sood and Richard J. Enbody, Michigan State University, USA, and Rohit Bansal, SecNiche Security, USA, with Helen Martin1 (ed.), January 2012. Retrieved 9 September 2013. (subscription required)
  77. ^ Goodin, Dan (2013-11-27). "New Linux worm targets routers, cameras, "Internet of things" devices". Ars Technica. Retrieved October 24, 2016.
  78. ^ Sterling, Bruce (2014-01-29). "Linux.Darlloz, the Internet-of-Things worm". Wired. Retrieved 24 October 2016.
  79. ^ "Attack of Things!". Level 3 Threat Research Labs. 25 August 2016. Retrieved 6 November 2016.
  80. ^ Ballano, Mario (1 Oct 2015). "Is there an Internet-of-Things vigilante out there?". Symantec. Retrieved 14 November 2016.
  81. ^ "linux.wifatch". The White Team. October 5, 2015. Retrieved 15 November 2016.
  82. ^ Cimpanu, Catalin (Oct 7, 2015). "Creators of the Benevolent Linux.Wifatch Malware Reveal Themselves". Softpedia. Retrieved 14 November 2016.
  83. ^ Oberhaus, Daniel (July 9, 2016). "Watch This Malware Turn a Computer into a Digital Hellscape". Motherboard. Retrieved July 4, 2018.
  84. ^ Dean, Madeleine (August 26, 2016). "MEMZ virus: what is it and how it affects Windows PC?". Windows Report. Retrieved July 4, 2018.
  85. ^ "Ransomware: Erpresserische Schadprogramme" Archived 2016-02-21 at the Wayback Machine, bsi-fuer-buerger.de, 9 February 2016. Retrieved 10 March 2016.
  86. ^ "Locky ransomware on aggressive hunt for victims", Symantec.com, 18 February 2016. Retrieved 10 March 2016.
  87. ^ "Antivirus scan for (Locky)", virustotal.com, 16 February 2016. Retrieved 10 March 2016.
  88. ^ danielevir (19 September 2014). "'Tiny Banker' Malware Attempted At Customers Of US Banks". Massive Alliance. Retrieved 10 September 2017.
  89. ^ "Modified Tiny Banker Trojan Found Targeting Major U.S. Banks". Entrust, Inc.
  90. ^ Jeremy Kirk (15 September 2014). "'Tiny banker' malware targets US financial institutions". PCWorld.
  91. ^ "'Tiny Banker' Malware Targets Dozens of Major US Financial Institutions". The State of Security. 2014-09-16.
  92. ^ "Tiny 'Tinba' Banking Trojan Is Big Trouble". msnbc.com. 2012-05-31.
  93. ^ "What is Pegasus spyware and how does it hack phones?". The Guardian. 18 July 2021. Retrieved 13 August 2021.
  94. ^ The Economist, 8 October 2016, The internet of stings
  95. ^ Bonderud, Douglas (October 4, 2016). "Leaked Mirai Malware Boosts IoT Insecurity Threat Level". securityintelligence.com. Retrieved 20 October 2016.
  96. ^ "Today the web was broken by countless hacked devices". theregister.co.uk. 21 October 2016. Retrieved 24 October 2016.
  97. ^ "Blame the Internet of Things for Destroying the Internet Today". Motherboard. VICE. 2016-10-21. Retrieved 27 October 2016.
  98. ^ Wong, Julia Carrie; Solon, Olivia (2017-05-12). "Massive ransomware cyber-attack hits 74 countries around the world". The Guardian. ISSN 0261-3077. Retrieved 2017-05-12.
  99. ^ Solon, Olivia (2017-05-13). "'Accidental hero' finds kill switch to stop spread of ransomware cyber-attack". The Guardian. ISSN 0261-3077. Retrieved 2017-05-13.
  100. ^ Khandelwal, Swati. "It's Not Over, WannaCry 2.0 Ransomware Just Arrived With No 'Kill-Switch'". The Hacker News. Retrieved 2017-05-14.
  101. ^ "Petya ransomware outbreak: Here's what you need to know". Archived from the original on June 29, 2017. Retrieved 10 September 2017.
  102. ^ "Ransom.Petya - Symantec". Symantec. Archived from the original on September 2, 2016. Retrieved 10 September 2017.
  103. ^ "'Petya' Ransomware Outbreak Goes Global — Krebs on Security". krebsonsecurity.com. 28 June 2017. Retrieved 10 September 2017.
  104. ^ "New malware steals users' money through mobile phones: Report". The Economic Times. 10 September 2017. Retrieved 10 September 2017.
  105. ^ "Xafecopy Trojan, a new malware detected in India; it disguises itself as an app to steals money via mobile phones". Tech2. 2017-09-10. Retrieved 10 September 2017.
  106. ^ "Kedi RAT can steal your information and send it through gmail".
  107. ^ "Beware the Kedi RAT pretending to be a Citrix file that Gmails home". 2017-09-12.
  108. ^ Abrams, Lawrence (February 26, 2018). "Thanatos Ransomware Is First to Use Bitcoin Cash. Messes Up Encryption". Bleeping Computer. Retrieved June 25, 2019.
  109. ^ AMR, GReAT (8 November 2019). "Titanium: the Platinum group strikes again". Kaspersky Lab. Retrieved 9 November 2019.
  110. ^ WIRED (2024-03-02). "Researchers create AI worms that can spread from one system to another". Ars Technica. Retrieved 2024-03-07.
  111. ^ Corbet, Jonathan (2024-03-29). "A backdoor in xz". LWN. Retrieved 2024-04-03.

External links

  • v
  • t
  • e
Malware topics
Infectious malware
Concealment
Malware for profit
By operating system
Protection
Countermeasures
  • v
  • t
  • e
Timelines of computing
Computing
Computer science
Software
Internet
Notable people