Timeline of computer viruses and worms

Not to be confused with List of computer worms.


This timeline of computer viruses and worms presents a chronology of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.

1949

1970–1979

1971

1974

1975

1979

1980–1989

1981

1983

1984

1986

1987

1988

1989

1990–1999

1990

1992

1993

1994

1995

1996

1998

1999

2000–2009

2000

2001

2002

2003

2004

2005

2006

2007

2008

2009

2010 and later

2010

2011

2012

2013

2014

See also

References

  1. von Neumann, John (1966). Arthur W. Burks, ed. Theory of self-reproducing automata (PDF). University of Illinois Press. Retrieved June 12, 2010.
  2. Chen, Thomas; Robert, Jean-Marc (2004). "The Evolution of Viruses and Worms". Retrieved 2009-02-16.
  3. Russell, Deborah; Gangemi, G T (1991). Computer Security Basics. O'Reilly. p. 86. ISBN 0-937175-71-4.
  4. "The very first viruses: Creeper, Wabbit and Brain", Daniel Snyder, InfoCarnivore, May 30, 2010
  5. "ANIMAL Source Code". Fourmilab.ch. 1996-08-13. Retrieved 2012-03-29.
  6. "The Animal Episode". Fourmilab.ch. Retrieved 2012-03-29.
  7. Craig E. Engler (1997). "The Shockwave Rider". Classic Sci-Fi Reviews. Archived from the original on 2008-07-03. Retrieved 2008-07-28.
  8. "First virus hatched as a practical joke", Sydney Morning Herald (AP), 3 September 2007. Retrieved 9 September 2013.
  9. "Fred Cohen 1984 "Computer Viruses – Theory and Experiments"". Eecs.umich.edu. 1983-11-03. Retrieved 2012-03-29.
  10. "The Arf-Arf Virus", Eric Peters, Eric's blog, 5 May 2013. Retrieved 9 September 2013.
  11. Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763.
  12. Leyden, John (January 19, 2006). "PC virus celebrates 20th birthday". The Register. Retrieved March 21, 2011.
  13. The Art of Computer Virus Research and Defense, Peter Szor, Symantec Press / Addison-Wesley Professional, 2005, ISBN 978-0-321-30454-4
  14. 14.0 14.1 14.2 "Computer Virus!", Rob Wentworth, Reprinted from The Digital Viking, Twin Cities PC User Group, July 1996. Retrieved 9 September 2013.
  15. "Virus.DOS.Chameleon.1260 - Securelist". Viruslist.com. Retrieved 2010-07-10.
  16. "V2PX". Vil.nai.com. Retrieved 2010-07-10.
  17. "What we detect - Securelist". Viruslist.com. Retrieved 2010-07-10.
  18. "Leandro", Threat Encyclopedia, Trend Micro, 9 March 2000. Retrieved 9 September 2013.
  19. "Freddy Virus", Virus Information Summary List, December 1992. Retrieved 9 September 2013.
  20. "Glossary - Securelist". Viruslist.com. Retrieved 2010-07-10.
  21. "Wscript.KakWorm". Symantec. Retrieved 2012-03-29.
  22. "Kournikova computer virus hits hard". BBC News. February 13, 2001. Retrieved April 9, 2010.
  23. Evers, Joris (May 3, 2002). "Kournikova virus maker appeals sentence". Retrieved 20 November 2010.
  24. "MyLife Worm". Antivirus.about.com. 2002-03-07. Retrieved 2012-03-29.
  25. Sevcenco, Serghei (August 30, 2002). "Security Updates: Backdoor.OptixPro.12". Symantec. Retrieved 2009-03-01.
  26. "The Spread of the Sapphire/Slammer Worm". Retrieved 2012-12-14.
  27. "Slammed!". July 2003. Retrieved 2012-12-14.
  28. Sevcenco, Serghei (February 10, 2006). "Symantec Security Response: Backdoor.Graybird". Symantec. Retrieved 2009-03-01.
  29. "Backdoor.Prorat". Symantec. February 13, 2007. Retrieved 2009-03-01.
  30. "Threat Description: Worm:W32/Swen". F-secure.com. Retrieved 2012-03-29.
  31. "Backdoor.Win32.Agobot.gen". Securelist. Retrieved 2012-03-29.
  32. "W32.Bolgi.Worm". Symantec. Retrieved 2012-03-29.
  33. "Threat Description:Bluetooth-Worm:SymbOS/Cabir". F-secure.com. Retrieved 2012-03-29.
  34. "SymbOS.Cabir". Symantec. Retrieved 2012-03-29.
  35. "Spyware Detail Nuclear RAT 1.0b1". Computer Associates. August 16, 2004. Retrieved 2009-03-01.
  36. "Vundo". McAfee. Retrieved 2009-03-01.
  37. "Backdoor.Bifrose". Symantec, Inc. October 12, 2004. Retrieved 2009-02-28.
  38. "The ZLOB Show: Trojan Poses as Fake Video Codec, Loads More Threats". Trend Micro. Retrieved 2009-02-28.
  39. "Threat Description: Email-Worm:W32/Brontok.N". F-secure.com. Retrieved 2012-03-29.
  40. Peter Gutmann (31 August 2007). "World's most powerful supercomputer goes online". Full Disclosure. Retrieved 2007-11-04.
  41. Gage, Deborah (February 17, 2005). "Chinese PC virus may have hidden agenda". SeatlePI. Retrieved 2009-03-01.
  42. Kimmo (March 3, 2008). "MBR Rootkit, A New Breed of". F-Secure. Retrieved 2009-03-01.
  43. "Win32.Ntldrbot (aka Rustock)". Dr. Web Ltd. Retrieved 2009-03-01.
  44. "Virus Total". virustotal.com. July 8, 2008. Retrieved 2009-03-01.
  45. "Koobface malware makes a comeback". cnet.com. April 9, 2010. Retrieved 2009-04-13.
  46. Willsher, Kim (2009-02-07). "French fighter planes grounded by computer virus". London: The Daily Telegraph. Retrieved 2009-04-01.
  47. Williams, Chris (2009-01-20). "MoD networks still malware-plagued after two weeks". The Register. Retrieved 2009-01-20.
  48. Williams, Chris (2009-01-20). "Conficker seizes city's hospital network". The Register. Retrieved 2009-01-20.
  49. "Conficker-Wurm infiziert hunderte Bundeswehr-Rechner" (in German). PC Professionell. 2009-02-16. Retrieved 2009-04-01.
  50. Neild, Barry (2009-02-13). "$250K Microsoft bounty to catch worm creator". CNN. Retrieved 2009-03-29.
  51. "MS08-067: Vulnerability in Server service could allow remote code execution". Microsoft Corporation.
  52. "Waledac Takedown Successful". honeyblog.org. February 25, 2010. Retrieved 16 November 2012.
  53. "Alureon trojan caused Windows 7 BSoD". microsoft.com. February 18, 2010. Retrieved 2010-02-18.
  54. "VirusBlokAda News". Anti-virus.by. Retrieved 2012-03-29.
  55. Gregg Keizer (16 September 2010). "Is Stuxnet the 'best' malware ever?". InfoWorld. Retrieved 16 September 2010.
  56. Stuxnet virus: worm 'could be aimed at high-profile Iranian targets’, Telegraph, 23 Sep 2010
  57. "Possible New Rootkit Has Drivers Signed by Realtek". Kaspersky Labs. 15 July 2010.
  58. Harvison, Josh (September 27, 2010). "Blackmail virus infects computers, holds information ransom". kait8.com. Retrieved 20 November 2010.
  59. "Bastard child of SpyEye/ZeuS merger appears online". The Register. 2011. Retrieved April 11, 2011. Bastard child of SpyEye/ZeuS merger appears online
  60. "SpyEye mobile banking Trojan uses same tactics as ZeuS". The Register. 2011. Retrieved April 11, 2011. SpyEye mobile banking Trojan uses same tactics as ZeuS
  61. "XP AntiSpyware 2011 - Virus Solution and Removal". Precisesecurity.com. Retrieved 2012-03-29.
  62. "Morto Worm Spreads to Weak Systems". blogs.appriver.com. 2011.
  63. "Morto Post Mortem: Dissecting a Worm". blog.imperva.com. 2011.
  64. "Laboratory of Cryptography and System Security (CrySyS)". Retrieved 4 November 2011.
  65. "Duqu: A Stuxnet-like malware found in the wild, technical report" (PDF). Laboratory of Cryptography of Systems Security (CrySyS). 14 October 2011.
  66. "Statement on Duqu's initial analysis". Laboratory of Cryptography of Systems Security (CrySyS). 21 October 2011. Retrieved 25 October 2011.
  67. "W32.Duqu – The precursor to the next Stuxnet (Version 1.4)" (PDF). Symantec. 23 November 2011. Retrieved 30 December 2011.
  68. "sKyWIper: A Complex Malware for Targeted Attacks" (PDF). Budapest University of Technology and Economics. 28 May 2012. Archived from the original on 30 May 2012. Retrieved 29 May 2012.
  69. "NGRBot", Enigma Software Group, 15 October 2012. Retrieved 9 September 2013.
  70. "Dissecting the NGR bot framework: IRC botnets die hard", Aditya K. Sood and Richard J. Enbody, Michigan State University, USA, and Rohit Bansal, SecNiche Security, USA, with Helen Martin1 (ed.), January 2012. Retrieved 9 September 2013. (subscription required)

External links