Timeline of computer viruses and worms

This timeline of computer viruses and worms presents a chronology of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.

1949

1971–1979

1971

1973 (Fiction)

In fiction, the 1973 Michael Crichton movie Westworld made an early mention of the concept of a computer virus, being a central plot theme that causes androids to run amok.[4] Alan Oppenheimer's character summarizes the problem by stating that "...there's a clear pattern here which suggests an analogy to an infectious disease process, spreading from one...area to the next." To which the replies are stated: "Perhaps there are superficial similarities to disease" and, "I must confess I find it difficult to believe in a disease of machinery."[5] (Crichton's earlier work, the 1969 novel The Andromeda Strain and 1971 film were about an extraterrestrial biological virus-like disease that threatened the human race.)

1974

1975

1981–1989

1981

1983

1984

1986

1987

1988

1989

1990–1999

1990

1992

1993

1994

1995

1996

1998

1999

2000–2009

2000

2001

2002

2003

2004

2005

2006

2007

2008

2009

2010–present

2010

2011

2012

2013

2014

2015

2016

2017

See also

References

  1. von Neumann, John (1966). Arthur W. Burks, ed. Theory of self-reproducing automata (PDF). University of Illinois Press. Retrieved June 12, 2010.
  2. Chen, Thomas; Robert, Jean-Marc (2004). "The Evolution of Viruses and Worms". Retrieved 2009-02-16.
  3. Russell, Deborah; Gangemi, G T (1991). Computer Security Basics. O'Reilly. p. 86. ISBN 0-937175-71-4.
  4. http://www.imdb.com/title/tt0070909/synopsis: IMDB synopsis of Westworld. Retrieved November 28, 2015.
  5. Michael Crichton (November 21, 1973). Westworld (movie). 201 S. Kinney Road, Tucson, Arizona, USA: Metro-Goldwyn-Mayer. Event occurs at 32 minutes. And there's a clear pattern here which suggests an analogy to an infectious disease process, spreading from one resort area to the next." ... "Perhaps there are superficial similarities to disease." "I must confess I find it difficult to believe in a disease of machinery.
  6. "The very first viruses: Creeper, Wabbit and Brain", Daniel Snyder, InfoCarnivore, May 30, 2010
  7. "ANIMAL Source Code". Fourmilab.ch. 1996-08-13. Retrieved 2012-03-29.
  8. "The Animal Episode". Fourmilab.ch. Retrieved 2012-03-29.
  9. Craig E. Engler (1997). "The Shockwave Rider". Classic Sci-Fi Reviews. Archived from the original on 2008-07-03. Retrieved 2008-07-28.
  10. "First virus hatched as a practical joke", Sydney Morning Herald (AP), 3 September 2007. Retrieved 9 September 2013.
  11. "Fred Cohen 1984 "Computer Viruses – Theory and Experiments"". Eecs.umich.edu. 1983-11-03. Retrieved 2012-03-29.
  12. Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763.
  13. Leyden, John (January 19, 2006). "PC virus celebrates 20th birthday". The Register. Retrieved March 21, 2011.
  14. The Art of Computer Virus Research and Defense, Peter Szor, Symantec Press / Addison-Wesley Professional, 2005, ISBN 978-0-321-30454-4
  15. 1 2 3 "Computer Virus!", Rob Wentworth, Reprinted from The Digital Viking, Twin Cities PC User Group, July 1996. Retrieved 9 September 2013.
  16. "Virus.DOS.Chameleon.1260 - Securelist". Viruslist.com. Retrieved 2010-07-10.
  17. "V2PX". Vil.nai.com. Retrieved 2010-07-10.
  18. "What we detect - Securelist". Viruslist.com. Retrieved 2010-07-10.
  19. "Leandro", Threat Encyclopedia, Trend Micro, 9 March 2000. Retrieved 9 September 2013.
  20. "Freddy Virus", Virus Information Summary List, December 1992. Retrieved 9 September 2013.
  21. "Glossary - Securelist". Viruslist.com. Retrieved 2010-07-10.
  22. "Wscript.KakWorm". Symantec. Retrieved 2012-03-29.
  23. "Kournikova computer virus hits hard". BBC News. February 13, 2001. Retrieved April 9, 2010.
  24. Evers, Joris (May 3, 2002). "Kournikova virus maker appeals sentence". Retrieved 20 November 2010.
  25. "MyLife Worm". Antivirus.about.com. 2002-03-07. Retrieved 2012-03-29.
  26. "The Spread of the Sapphire/Slammer Worm". Retrieved 2012-12-14.
  27. "Slammed!". July 2003. Retrieved 2012-12-14.
  28. Sevcenco, Serghei (February 10, 2006). "Symantec Security Response: Backdoor.Graybird". Symantec. Retrieved 2009-03-01.
  29. "Backdoor.Prorat". Symantec. February 13, 2007. Retrieved 2009-03-01.
  30. "Threat Description: Worm:W32/Swen". F-secure.com. Retrieved 2012-03-29.
  31. "Backdoor.Win32.Agobot.gen". Securelist. Retrieved 2012-03-29.
  32. "W32.Bolgi.Worm". Symantec. Retrieved 2012-03-29.
  33. "Threat Description:Bluetooth-Worm:SymbOS/Cabir". F-secure.com. Retrieved 2012-03-29.
  34. "SymbOS.Cabir". Symantec. Retrieved 2012-03-29.
  35. "Spyware Detail Nuclear RAT 1.0b1". Computer Associates. August 16, 2004. Archived from the original on 2009-09-11. Retrieved 2009-03-01.
  36. "Vundo". McAfee. Retrieved 2009-03-01.
  37. "Backdoor.Bifrose". Symantec, Inc. October 12, 2004. Retrieved 2009-02-28.
  38. "The ZLOB Show: Trojan Poses as Fake Video Codec, Loads More Threats". Trend Micro. Retrieved 2009-02-28.
  39. "Threat Description: Email-Worm:W32/Brontok.N". F-secure.com. Retrieved 2012-03-29.
  40. Peter Gutmann (31 August 2007). "World's most powerful supercomputer goes online". Full Disclosure. Retrieved 2007-11-04.
  41. Gage, Deborah (February 17, 2005). "Chinese PC virus may have hidden agenda". SeatlePI. Retrieved 2009-03-01.
  42. Kimmo (March 3, 2008). "MBR Rootkit, A New Breed of". F-Secure. Retrieved 2009-03-01.
  43. "Win32.Ntldrbot (aka Rustock)". Dr. Web Ltd. Retrieved 2009-03-01.
  44. "Virus Total". virustotal.com. July 8, 2008. Archived from the original on 2009-04-01. Retrieved 2009-03-01.
  45. "Koobface malware makes a comeback". cnet.com. April 9, 2010. Retrieved 2009-04-13.
  46. Willsher, Kim (2009-02-07). "French fighter planes grounded by computer virus". London: The Daily Telegraph. Retrieved 2009-04-01.
  47. Williams, Chris (2009-01-20). "MoD networks still malware-plagued after two weeks". The Register. Retrieved 2009-01-20.
  48. Williams, Chris (2009-01-20). "Conficker seizes city's hospital network". The Register. Retrieved 2009-01-20.
  49. "Conficker-Wurm infiziert hunderte Bundeswehr-Rechner" (in German). PC Professionell. 2009-02-16. Archived from the original on 2009-03-21. Retrieved 2009-04-01.
  50. Neild, Barry (2009-02-13). "$250K Microsoft bounty to catch worm creator". CNN. Retrieved 2009-03-29.
  51. "MS08-067: Vulnerability in Server service could allow remote code execution". Microsoft Corporation.
  52. Dancho Danchev. "Source code for Skype eavesdropping trojan in the wild". ZDNet.
  53. "Code for Skype Spyware Released to Thwart Surveillance". WIRED. 31 August 2009.
  54. "Waledac Takedown Successful". honeyblog.org. February 25, 2010. Retrieved 16 November 2012.
  55. "Alureon trojan caused Windows 7 BSoD". microsoft.com. February 18, 2010. Retrieved 2010-02-18.
  56. "VirusBlokAda News". Anti-virus.by. Retrieved 2012-03-29.
  57. Gregg Keizer (16 September 2010). "Is Stuxnet the 'best' malware ever?". InfoWorld. Retrieved 16 September 2010.
  58. Stuxnet virus: worm 'could be aimed at high-profile Iranian targets’, Telegraph, 23 Sep 2010
  59. "Possible New Rootkit Has Drivers Signed by Realtek". Kaspersky Labs. 15 July 2010.
  60. Harvison, Josh (September 27, 2010). "Blackmail virus infects computers, holds information ransom". kait8.com. Retrieved 20 November 2010.
  61. "Bastard child of SpyEye/ZeuS merger appears online". The Register. 2011. Retrieved April 11, 2011. Bastard child of SpyEye/ZeuS merger appears online
  62. "SpyEye mobile banking Trojan uses same tactics as ZeuS". The Register. 2011. Retrieved April 11, 2011. SpyEye mobile banking Trojan uses same tactics as ZeuS
  63. "XP AntiSpyware 2011 - Virus Solution and Removal". Precisesecurity.com. Retrieved 2012-03-29.
  64. "Morto Worm Spreads to Weak Systems". blogs.appriver.com. 2011.
  65. "Morto Post Mortem: Dissecting a Worm". blog.imperva.com. 2011.
  66. "Laboratory of Cryptography and System Security (CrySyS)". Retrieved 4 November 2011.
  67. "Duqu: A Stuxnet-like malware found in the wild, technical report" (PDF). Laboratory of Cryptography of Systems Security (CrySyS). 14 October 2011.
  68. "Statement on Duqu's initial analysis". Laboratory of Cryptography of Systems Security (CrySyS). 21 October 2011. Retrieved 25 October 2011.
  69. "W32.Duqu – The precursor to the next Stuxnet (Version 1.4)" (PDF). Symantec. 23 November 2011. Retrieved 30 December 2011.
  70. "sKyWIper: A Complex Malware for Targeted Attacks" (PDF). Budapest University of Technology and Economics. 28 May 2012. Archived from the original on 30 May 2012. Retrieved 29 May 2012.
  71. "NGRBot", Enigma Software Group, 15 October 2012. Retrieved 9 September 2013.
  72. "Dissecting the NGR bot framework: IRC botnets die hard", Aditya K. Sood and Richard J. Enbody, Michigan State University, USA, and Rohit Bansal, SecNiche Security, USA, with Helen Martin1 (ed.), January 2012. Retrieved 9 September 2013. (subscription required)
  73. Goodin, Dan (2013-11-27). "New Linux worm targets routers, cameras, “Internet of things” devices". Ars Technica. Retrieved October 24, 2016.
  74. Sterling, Bruce (2014-01-29). "Linux.Darlloz, the Internet-of-Things worm". Wired. Retrieved 24 October 2016.
  75. "Attack of Things!". Level 3 Threat Research Labs. 25 August 2016. Retrieved 6 November 2016.
  76. Ballano, Mario (1 Oct 2015). "Is there an Internet-of-Things vigilante out there?". Symantec. Retrieved 14 November 2016.
  77. Das, Samburaj (October 2, 2015). "Linux.Wifatch: Vigilante Hacker Infects Routers with Malware to Fight Bad Malware". hacked.com. Retrieved 14 November 2016.
  78. "linux.wifatch". The White Team. October 5, 2015. Retrieved 15 November 2016.
  79. Cimpanu, Catalin (Oct 7, 2015). "Creators of the Benevolent Linux.Wifatch Malware Reveal Themselves". Softpedia. Retrieved 14 November 2016.
  80. "Ransomware: Erpresserische Schadprogramme", bsi-fuer-buerger.de, 9 February 2016. Retrieved 10 March 2016.
  81. "Locky ransomware on aggressive hunt for victims", Symantec.com, 18 February 2016. Retrieved 10 March 2016.
  82. "Antivirus scan for (Locky)", virustotal.com, 16 February 2016. Retrieved 10 March 2016.
  83. http://www.massivealliance.com/2014/09/19/tiny-banker-malware-attempted-customers-us-banks
  84. "Modified Tiny Banker Trojan Found Targeting Major U.S. Banks". Entrust, Inc.
  85. Jeremy Kirk (15 September 2014). "'Tiny banker' malware targets US financial institutions". PCWorld.
  86. "‘Tiny Banker’ Malware Targets Dozens of Major US Financial Institutions". The State of Security.
  87. "Tiny 'Tinba' Banking Trojan Is Big Trouble". msnbc.com.
  88. The Economist, 8 October 2016, The internet of stings
  89. Bonderud, Douglas (October 4, 2016). "Leaked Mirai Malware Boosts IoT Insecurity Threat Level". securityintelligence.com. Retrieved 20 October 2016.
  90. "Today the web was broken by countless hacked devices". theregister.co.uk. 21 October 2016. Retrieved 24 October 2016.
  91. "Blame the Internet of Things for Destroying the Internet Today". Motherboard. VICE. Retrieved 27 October 2016.
  92. Wong, Julia Carrie; Solon, Olivia (2017-05-12). "Massive ransomware cyber-attack hits 74 countries around the world". The Guardian. ISSN 0261-3077. Retrieved 2017-05-12.
  93. Solon, Olivia (2017-05-13). "'Accidental hero' finds kill switch to stop spread of ransomware cyber-attack". The Guardian. ISSN 0261-3077. Retrieved 2017-05-13.
  94. Khandelwal, Swati. "It’s Not Over, WannaCry 2.0 Ransomware Just Arrived With No 'Kill-Switch'". The Hacker News. Retrieved 2017-05-14.
  95. https://www.symantec.com/connect/blogs/petya-ransomware-outbreak-here-s-what-you-need-know
  96. https://www.symantec.com/security_response/writeup.jsp?docid=2016-032913-4222-99
  97. https://krebsonsecurity.com/2017/06/petya-ransomware-outbreak-goes-global/
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.