Timeline of computer viruses and worms

This is a timeline of noteworthy computer viruses, worms and Trojan horses.

Contents

1960–1969

1966

1970–1979

1971

1974

1974/1975

1980–1989

1980

1981

1983

1984

1986

1987

1988

1989

1990–1999

1990

1992

1993

1994

1995

1996

1998

1999

2000 and later

2000

2001

2002

2003

2004

2005

2006

2007

2008

2009

2010

2011

See also

References

  1. ^ von Neumann, John (1966). "Theory of self-reproducing automata". http://cba.mit.edu/events/03.11.ASE/docs/VonNeumann.pdf. Retrieved June 12, 2010. 
  2. ^ Chen, Thomas; Robert, Jean-Marc (2004). "The Evolution of Viruses and Worms". http://vx.netlux.org/lib/atc01.html. Retrieved 2009-02-16. 
  3. ^ Russell, Deborah; Gangemi, G T (1991). Computer Security Basics. O'Reilly. p. 86. ISBN 0937175714. http://books.google.com/?id=BtB1aBmLuLEC&printsec=frontcover. 
  4. ^ ANIMAL Source Code
  5. ^ The Animal Episode
  6. ^ "Jurgen Kraus 'Selbstreproduktion bei programmen' (VX heavens)". Vx.netlux.org. http://vx.netlux.org/lib/mjk00.html. Retrieved 2010-07-10. 
  7. ^ Fred Cohen 1984 „Computer Viruses – Theory and Experiments“
  8. ^ Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763.
  9. ^ Kaspersky Lab viruslist
  10. ^ "Virus.DOS.Chameleon.1260 - Securelist". Viruslist.com. http://www.viruslist.com/en/viruses/encyclopedia?virusid=2008. Retrieved 2010-07-10. 
  11. ^ "V2PX". Vil.nai.com. http://vil.nai.com/vil/content/v_98074.htm. Retrieved 2010-07-10. 
  12. ^ "What we detect - Securelist". Viruslist.com. http://www.viruslist.com/en/viruses/encyclopedia?chapter=153311162. Retrieved 2010-07-10. 
  13. ^ http://virus.wikia.com/wiki/Onehalf
  14. ^ "Glossary - Securelist". Viruslist.com. http://www.viruslist.com/en/glossary?glossid=189267795. Retrieved 2010-07-10. 
  15. ^ http://www.symantec.com/security_response/writeup.jsp?docid=2000-121908-3951-99
  16. ^ http://radsoft.net/news/roundups/luv/
  17. ^ http://radsoft.net/news/roundups/luv/
  18. ^ http://www.geek.com/articles/news/pikachus-new-computer-attack-20000824/
  19. ^ "Kournikova computer virus hits hard". BBC News. February 13, 2001. http://news.bbc.co.uk/2/hi/science/nature/1167453.stm. Retrieved April 9, 2010. 
  20. ^ Evers, Joris (May 3, 2002). "Kournikova virus maker appeals sentence". http://www.computerworld.com/s/article/70752/Kournikova_virus_maker_appeals_sentence_. Retrieved 20 November 2010. 
  21. ^ http://virus.wikia.com/wiki/MetaPHOR
  22. ^ http://antivirus.about.com/library/weekly/aa030802a.htm
  23. ^ Sevcenco, Serghei (August 30, 2002). "Security Updates: Backdoor.OptixPro.12". Symantec. http://securityresponse1.symantec.com/sarc/sarc.nsf/html/backdoor.optixpro.12.html/. Retrieved 2009-03-01. 
  24. ^ Sevcenco, Serghei (February 10, 2006). "Symantec Security Response: Backdoor.Graybird". Symantec. http://securityresponse1.symantec.com/sarc/sarc.nsf/html/backdoor.graybird.html. Retrieved 2009-03-01. 
  25. ^ "Backdoor.Prorat". Symantec. February 13, 2007. http://www.symantec.com/security_response/writeup.jsp?docid=2003-061315-4216-99. Retrieved 2009-03-01. 
  26. ^ http://www.f-secure.com/v-descs/swen.shtml
  27. ^ http://www.securelist.com/en/descriptions/old61021
  28. ^ http://www.symantec.com/security_response/writeup.jsp?docid=2003-112019-2425-99
  29. ^ http://www.f-secure.com/v-descs/cabir.shtml
  30. ^ http://www.symantec.com/security_response/writeup.jsp?docid=2004-061419-4412-99
  31. ^ "Spyware Detail Nuclear RAT 1.0b1". Computer Associates. August 16, 2004. http://www.ca.com/securityadvisor/pest/pest.aspx?id=453078396. Retrieved 2009-03-01. 
  32. ^ "Vundo". McAfee. http://vil.nai.com/vil/content/v_127690.htm. Retrieved 2009-03-01. 
  33. ^ "Backdoor.Bifrose". Symantec, Inc.. October 12, 2004. http://www.symantec.com/security_response/writeup.jsp?docid=2004-101214-5358-99. Retrieved 2009-02-28. 
  34. ^ http://www.symantec.com/security_response/writeup.jsp?docid=2005-081615-4443-99
  35. ^ "The ZLOB Show: Trojan Poses as Fake Video Codec, Loads More Threats". Trend Micro. http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VNAME=The+ZLOB+Show%3A+Trojan+poses+as+fake+video+codec%2C+loads+more+threats. Retrieved 2009-02-28. 
  36. ^ http://www.f-secure.com/v-descs/brontok_n.shtml
  37. ^ Peter Gutmann (31 August 2007). "World's most powerful supercomputer goes online". [[Full Disclosure (mailing list)|]]. http://seclists.org/fulldisclosure/2007/Aug/0520.html. Retrieved 2007-11-04. 
  38. ^ Gage, Deborah (February 17, 2005). "Chinese PC virus may have hidden agenda". SeatlePI. http://www.seattlepi.com/business/351670_picframevirus18.html. Retrieved 2009-03-01. 
  39. ^ Kimmo (March 3, 2008). "MBR Rootkit, A New Breed of". F-Secure. http://www.f-secure.com/weblog/archives/00001393.html. Retrieved 2009-03-01. 
  40. ^ "Win32.Ntldrbot (aka Rustock)". Dr. Web Ltd.. http://www.pr.com/press-release/84130. Retrieved 2009-03-01. 
  41. ^ "Virus Total". virustotal.com. July 8, 2008. http://www.virustotal.com/analisis/a5d8b3ba9226285dd14619fd8faf12a7. Retrieved 2009-03-01. 
  42. ^ "Koobface malware makes a comeback". cnet.com. April 9, 2010. http://news.cnet.com/8301-1009_3-20002112-83.html?. Retrieved 2009-04-13. 
  43. ^ Willsher, Kim (2009-02-07). French fighter planes grounded by computer virus. London: The Daily Telegraph. http://telegraph.co.uk/news/worldnews/europe/france/4547649/French-fighter-planes-grounded-by-computer-virus.html. Retrieved 2009-04-01. 
  44. ^ Williams, Chris (2009-01-20). MoD networks still malware-plagued after two weeks. The Register. http://theregister.co.uk/2009/01/20/mod_malware_still_going_strong. Retrieved 2009-01-20. 
  45. ^ Williams, Chris (2009-01-20). Conficker seizes city's hospital network. The Register. http://theregister.co.uk/2009/01/20/sheffield_conficker. Retrieved 2009-01-20. 
  46. ^ (in German) Conficker-Wurm infiziert hunderte Bundeswehr-Rechner. PC Professionell. 2009-02-16. http://www.pc-professionell.de/news/2009/02/16/conficker_wurm_infiziert_hunderte_bundeswehr_rechner. Retrieved 2009-04-01. 
  47. ^ Neild, Barry (2009-02-13). "$250K Microsoft bounty to catch worm creator". CNN. http://www.cnn.com/2009/TECH/ptech/02/13/virus.downadup/index.html. Retrieved 2009-03-29. 
  48. ^ "MS08-067: Vulnerability in Server service could allow remote code execution". Microsoft Corporation. http://support.microsoft.com/kb/958644. 
  49. ^ "Alureon trojan caused Windows 7 BSoD". microsoft.com. February 18, 2010. http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Win32%2fAlureon. Retrieved 2010-02-18. 
  50. ^ VirusBlokAda News
  51. ^ Gregg Keizer (16 September 2010). "Is Stuxnet the 'best' malware ever?". Infoworld. http://www.infoworld.com/print/137598. Retrieved 16 September 2010. 
  52. ^ Stuxnet virus: worm 'could be aimed at high-profile Iranian targets’, Telegraph, 23 Sep 2010
  53. ^ "Possible New Rootkit Has Drivers Signed by Realtek". Kaspersky Labs. 15 July 2010. http://threatpost.com/en_us/blogs/possible-new-rootkit-has-drivers-signed-realtek-071510. 
  54. ^ Harvison, Josh (September 27, 2010). "Blackmail virus infects computers, holds information ransom". kait8.com. http://www.kait8.com/Global/story.asp?S=13220447. Retrieved 20 November 2010. 
  55. ^ "Bastard child of SpyEye/ZeuS merger appears online • The Register". theregister.co.uk. 2011 [last update]. http://www.theregister.co.uk/2011/01/25/spyeye_zeus_merger/. Retrieved April 11, 2011. "Bastard child of SpyEye/ZeuS merger appears online" 
  56. ^ "SpyEye mobile banking Trojan uses same tactics as ZeuS • The Register". theregister.co.uk. 2011 [last update]. http://www.theregister.co.uk/2011/04/05/spyeye_mobile_trojan/. Retrieved April 11, 2011. "SpyEye mobile banking Trojan uses same tactics as ZeuS" 
  57. ^ http://www.precisesecurity.com/rogue/xp-anti-spyware-2011/
  58. ^ "Morto Worm Spreads to Weak Systems". blogs.appriver.com. 2011 [last update]. http://blogs.appriver.com/blog/digital-degenerate-2/morto-worm-spreads-to-weak-systems. 
  59. ^ "Morto Post Mortem: Dissecting a Worm". blog.imperva.com. 2011 [last update]. http://blog.imperva.com/2011/09/morto-post-mortem-a-worm-deep-dive.html. 

External links