- #HISTORY OF WORM VIRUS PATCH#
- #HISTORY OF WORM VIRUS CODE#
- #HISTORY OF WORM VIRUS PC#
- #HISTORY OF WORM VIRUS OFFLINE#
- #HISTORY OF WORM VIRUS WINDOWS#
This led to more than a million infections, taking out critical infrastructures, such as airlines, news agencies, public transportation, hospitals, public transport, etc. The effects of the virus were widespread as while the exploit was already patched, many computers haven’t updated. It will also use the system resources to propagate itself to other machines through the Internet and infect others automatically. The worm took advantage of a buffer overflow vulnerability in Local Security Authority Subsystem Service (LSASS), which controls the security policy of local accounts causing crashes to the computer. While the payload itself may be seen as simply annoying (it slows down and crashes the computer, while making it hard to reset without cutting the power), t he effects were incredibly disruptive, with millions of computers being infected, and important, critical infrastructure affected.
#HISTORY OF WORM VIRUS WINDOWS#
SasserĪ Windows worm first discovered in 2004, it was created by computer science student Sven Jaschan, who also created the Netsky worm. The virus reportedly caused $80 million in damages. For his cooperation, he served only 20 months and paid a fine of $5000 of his 10 year sentence.
![history of worm virus history of worm virus](https://ars.els-cdn.com/content/image/3-s2.0-B9780123849175000044-f04-02-9780123849175.jpg)
He cooperated with the FBI in capturing other virus creators, famous among them the creator of the Anna Kournikova virus. The file was uploaded using a stolen AOL account and with their help, law enforcement was able to arrest him less than a week since the outbreak began. Smith was eventually caught when they traced the Word document to him. It also sometimes corrupted documents by inserting a Simpsons reference into them. The virus will mail itself to the top 50 people in the user’s email address book and this caused an increase of email traffic, disrupting the email services of governments and corporations. This got people curious and when it was downloaded and opened, it would trigger the macro inside and unleash its payload. It started as an infected Word document that was posted up on the alt.sex usenet group, claiming to be a list of passwords for pornographic sites. Named after an exotic dancer from Florida, it was created by David L. A total of 1-2 million servers were affected, which is amazing when you consider there were 6 million IIS servers at the time.
#HISTORY OF WORM VIRUS PATCH#
A patch was later released and it was estimate that it caused $2 billion in lost productivity.
![history of worm virus history of worm virus](https://malwaretips.com/blogs/wp-content/uploads/2017/06/RDN_YahLover.worm-virus.jpg)
The most memorable symptom is the message it leaves behind on affected web pages, "Hacked By Chinese!", which has become a meme itself. It also allows backdoor access to the server, allowing for remote access to the machine. It will then launch a denial of service attack on several IP address, famous among them was the attack on the White House website. Once infected, it will proceed to make a hundred copies of itself but due to a bug in the programming, it will duplicate even more and ends up eating a lot of the systems resources. It leaves very little trace on the hard disk as it is able to run entirely on memory, with a size of 3,569 bytes. The worm targeted computers with Microsoft IIS web server installed, exploiting a buffer overflow problem in the system.
#HISTORY OF WORM VIRUS CODE#
It was named Code Red because the the pair were drinking Code Red Mountain Dew at the time of discovery. Code RedĬode Red first surfaced on 2001 and was discovered by two eEye Digital Security employees. This led to the enactment of the E-Commerce Law to address the problem.
![history of worm virus history of worm virus](https://techsoftcenter.com/wp-content/uploads/2018/12/Morris-Worm-Source-Code-and-History-1.jpg)
The two were never charged, as there were no laws about malware. Once clicked, it will send itself to everyone in the user’s mailing list and proceed to overwrite files with itself, making the computer unbootable.
![history of worm virus history of worm virus](https://resources.infosecinstitute.com/wp-content/uploads/2020/10/History-of-Malware05132014.gif)
The attachment was actually a script that poses as a TXT file, due to Windows at the time hiding the actual extension of the file. What it did was use social engineering to get people to click on the attachment in this case, a love confession. The virus was created by two Filipino programers, Reonel Ramones and Onel de Guzman.
#HISTORY OF WORM VIRUS OFFLINE#
It was so bad that governments and large corporations took their mailing system offline to prevent infection. 10% of the world’s computers were believed to have been infected. It managed to wreck havoc on computer systems all over the world with around $10 billion worth of damages. ILOVEYOU is considered one of the most virulent computer virus ever created.
#HISTORY OF WORM VIRUS PC#
We are all tired of our PC getting infected or compromised but truth is sometimes, instead of having.