{"id":10392,"date":"2011-12-29T18:43:12","date_gmt":"2011-12-29T23:43:12","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-07-29T08:15:58","modified_gmt":"2021-07-29T12:15:58","slug":"40-years-of-malware-part-4","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/40-years-of-malware-part-4\/","title":{"rendered":"40 Years of Malware &#8211; Part 4"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-6285\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"40 Years of Malware - Part 4\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/03\/malware2.jpg?resize=93%2C85&#038;ssl=1\" alt=\"40 Years of Malware - Part 4\" width=\"93\" height=\"85\" \/>2011 marks the 40th anniversary of the computer virus. <a href=\"https:\/\/www.helpnetsecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Help Net Security<\/em><\/a> notes that over the last four decades, malware instances have grown from 1,300 in 1990, to 50,000 in 2000, to over 200 million in 2010. <a href=\"https:\/\/www.fortinet.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Fortinet<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-FTNT\/\" target=\"_blank\" rel=\"noopener noreferrer\">FTNT<\/a>) marks this dubious milestone with an article that counts down some of the malware evolution low-lights.<\/p>\n<p>The Sunnyvale, CA network security firm says that viruses evolved from academic proof of concepts to geek pranks which have evolved into cybercriminal tools. By 2005, the virus scene had been monetized, and almost all viruses developed for the sole purpose of making money via more or less complex business models. According to <a href=\"https:\/\/www.fortiguard.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">FortiGuard Labs<\/a>, the most significant computer viruses over the last 40 years are:<\/p>\n<p style=\"text-align: left;\"><a title=\"rbach.net\" href=\"https:\/\/wp.me\/p2wgaW-1VJ\" target=\"_blank\" rel=\"noopener noreferrer\">See Part 1 Here<\/a>\u00a0 &#8211; <a title=\"rbach.net\" href=\"..\/index.php\/malware-history-part-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">See Part 2 Here<\/a>\u00a0 \u2013 <a title=\"rbach.net\" href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/40-years-of-malware-part-3\/\" target=\"_blank\" rel=\"noopener noreferrer\">See Part 3 Here<\/a>\u00a0 &#8211; See Part 4 Here<\/p>\n<p><strong><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-11074\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"Botnets\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/tornado.jpg?resize=85%2C85&#038;ssl=1\" alt=\"Botnets\" width=\"85\" height=\"85\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/tornado.jpg?w=300&amp;ssl=1 300w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/tornado.jpg?resize=150%2C150&amp;ssl=1 150w\" sizes=\"auto, (max-width: 85px) 100vw, 85px\" \/>2007<\/strong> &#8211; By 2007, <a title=\"www.us-cert.gov\" href=\"https:\/\/web.archive.org\/web\/20130217051422\/https:\/\/www.us-cert.gov\/cas\/tips\/ST06-001.html\" target=\"_blank\" rel=\"noopener noreferrer\">Botnets<\/a> have infected millions worldwide using <a title=\"searchmidmarketsecurity.techtarget.com\" href=\"https:\/\/web.archive.org\/web\/20200406182112\/https:\/\/searchmidmarketsecurity.techtarget.com\/definition\/zombie\" target=\"_blank\" rel=\"noopener noreferrer\">Zombie systems<\/a> to send spam to generate <a title=\"www.us-cert.gov\" href=\"https:\/\/web.archive.org\/web\/20130220134138\/https:\/\/www.us-cert.gov\/cas\/tips\/ST04-015.html\" target=\"_blank\" rel=\"noopener noreferrer\">Denial of Service<\/a> (<a title=\"Denial-of-service attack\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Denial-of-service_attack\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">DoS<\/a>) attacks, compromised passwords, and data. By 2007 cybercriminals had developed a lucrative business model\u00a0they were protecting. The attackers became more concerned about protecting their zombie computers. Until 2007, botnets lacked robustness, by neutralizing its unique <a title=\"www.nsci-va.org\" href=\"https:\/\/web.archive.org\/web\/20210930200633\/http:\/\/www.nsci-va.org\/WhitePapers\/2010-12-30-Malware%20C2%20Overview-Stephens.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Control Center<\/a> (PDF), a botnet could be taken down because Zombies didn\u2019t have anyone to report to (and take commands from) anymore. The <a title=\"Storm botnet\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Storm_botnet\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Storm botnet<\/a> was the first to feature a <a title=\"www.usenix.org\" href=\"https:\/\/db.usenix.org\/event\/hotbots07\/tech\/full_papers\/grizzard\/grizzard.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">peer-to-peer architecture<\/a> (PDF) to decentralize its command and control functions. At the peak of the outbreak, the Storm Botnet was more <a title=\"www.informationweek.com\" href=\"https:\/\/web.archive.org\/web\/20120706224402\/http:\/\/www.informationweek.com:80\/news\/201804528\" target=\"_blank\" rel=\"noopener noreferrer\">powerful than many supercomputers<\/a> and accounted for 8% of all malware running in the world according to FortiGuard.<\/p>\n<p><strong><a href=\"http:\/\/web.archive.org\/web\/20131209025933\/http:\/\/we-upgrade.com\/virus\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-11075\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"Koobface\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/fbvirus-e1562726835109.jpg?resize=85%2C63&#038;ssl=1\" alt=\"Koobface\" width=\"85\" height=\"63\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/fbvirus-e1562726835109.jpg?w=244&amp;ssl=1 244w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/fbvirus-e1562726835109.jpg?resize=75%2C55&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/fbvirus-e1562726835109.jpg?resize=150%2C111&amp;ssl=1 150w\" sizes=\"auto, (max-width: 85px) 100vw, 85px\" \/><\/a>2008<\/strong> &#8211; <a title=\"Koobface\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Koobface\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Koobface<\/a> (an anagram for <a href=\"https:\/\/www.facebook.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>) spreads by pretending to be the infected user on social networks, prompting friends to download an update to their <a title=\"Adobe Flash Player\" href=\"https:\/\/www.adobe.com\/products\/flashplayer\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Flash player<\/a> to view a video. The update is a copy of the virus. Once infected, users would serve as both vectors of infection for other social network contacts and as human robots to solve <a title=\"rbach.net\" href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/captchas-broken\/\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">CAPTCHA<\/a> challenges for cyber-criminals, among other things. Koobface is also the first botnet to recruit its <a title=\"Zombie computer\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Zombie_%28computer_science%29\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Zombie computers<\/a> across multiple <a title=\"whatis.techtarget.com\" href=\"http:\/\/whatis.techtarget.com\/definition\/0,,sid9_gci942884,00.html\" target=\"_blank\" rel=\"noopener noreferrer\">social networks<\/a> (Facebook, <a href=\"https:\/\/www.myspace.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">MySpace<\/a>, <a href=\"http:\/\/www.hi5.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">hi5<\/a>, <a href=\"https:\/\/web.archive.org\/web\/20221225161244\/https:\/\/bebo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bebo<\/a>, <a href=\"https:\/\/web.archive.org\/web\/20201101184549\/http:\/\/friendster.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Friendster<\/a>, etc). FortiGuard estimates that over 500,000 Koobface zombies are online at the same time.<\/p>\n<p><strong><a href=\"https:\/\/vizconsult.wordpress.com\/2011\/04\/15\/the-conficker-worm\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-11076\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"conficker\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/conficker.jpg?resize=65%2C85&#038;ssl=1\" alt=\"Conficker\" width=\"65\" height=\"85\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/conficker.jpg?resize=228%2C300&amp;ssl=1 228w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/conficker.jpg?resize=114%2C150&amp;ssl=1 114w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/conficker.jpg?w=252&amp;ssl=1 252w\" sizes=\"auto, (max-width: 65px) 100vw, 65px\" \/><\/a>2009<\/strong> &#8211; <a title=\"Conficker\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Conficker\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Conficker<\/a> (aka <a title=\"Downadup\" href=\"http:\/\/www.f-secure.com\/v-descs\/worm_w32_downadup_a.shtml\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Downadup<\/a>) is a particularly sophisticated and long-lived virus, as it\u2019s both a <a title=\"www.crn.com\" href=\"https:\/\/web.archive.org\/web\/20121008103235\/http:\/\/www.crn.com\/channel-encyclopedia\/definition.htm?term=worm\" target=\"_blank\" rel=\"noopener noreferrer\">worm<\/a>, much like <a title=\"rbach.net\" href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/40-years-of-malware-part-3\/\" target=\"_blank\" rel=\"noopener noreferrer\">Sasser<\/a>, and an ultra-resilient botnet, which downloads destructive code from a random Internet server. (<em>We still see it pop-up from time to time at work<\/em>). Conficker targeted the Microsoft Windows OS and used Windows flaws and <a title=\"Dictionary attack\" href=\"http:\/\/en.wikipedia.org\/wiki\/Dictionary_attack\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Dictionary attacks<\/a> on admin passwords to crack machines and link them to a computer under the control of the attacker. Conficker&#8217;s weakness is its propagation algorithm is poorly calibrated, causing it to be discovered more often according to Fortinet. In 2009 some networks were so saturated by Conficker, that it caused <a title=\"news.cnet.com\" href=\"https:\/\/web.archive.org\/web\/20120730054607\/http:\/\/news.cnet.com\/8301-17852_3-10159186-71.html\" target=\"_blank\" rel=\"noopener noreferrer\">planes to be grounded<\/a>, <a title=\"www.physorg.com\" href=\"http:\/\/www.physorg.com\/news160331005.html\" target=\"_blank\" rel=\"noopener noreferrer\">hospitals<\/a> and <a title=\"www.washingtonpost.com\" href=\"http:\/\/voices.washingtonpost.com\/securityfix\/2009\/04\/conficker_worm_strikes_militar.html\" target=\"_blank\" rel=\"noopener noreferrer\">military bases<\/a> were impacted. Conficker infected bout 7 million systems worldwide.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20130404121958\/http:\/\/community.websense.com\/blogs\/websense-insights\/archive\/2011\/06\/02\/advanced-persistent-threats.aspx\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-11077\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"Advanced Persistent Threat\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/Advanced-Persistent-Threat-e1562726802857-150x144.jpg?resize=85%2C82&#038;ssl=1\" alt=\"Advanced Persistent Threat\" width=\"85\" height=\"82\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/Advanced-Persistent-Threat-e1562726802857.jpg?resize=150%2C144&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/Advanced-Persistent-Threat-e1562726802857.jpg?resize=75%2C72&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/Advanced-Persistent-Threat-e1562726802857.jpg?w=255&amp;ssl=1 255w\" sizes=\"auto, (max-width: 85px) 100vw, 85px\" \/><\/a>Advanced Persistent Threat (aka APT, <a title=\"www.sophos.com\" href=\"https:\/\/web.archive.org\/web\/20130922060626\/http:\/\/www.sophos.com:80\/en-us\/security-news-trends\/security-trends\/operation-aurora.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Operation Aurora<\/a>) was a <a title=\"Cyber attack\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Cyber_attack\" target=\"_blank\" rel=\"noopener noreferrer\">cyber attack<\/a> that began in <a title=\"www.darkreading.com\" href=\"https:\/\/web.archive.org\/web\/20120722124936\/http:\/\/www.darkreading.com\/vulnerability-management\/167901026\/security\/attacks-breaches\/222700786\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">mid-2009 and continued through December 2009<\/a>. The attack was first publicly disclosed by <a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>) on January 12, 2010, in a <a title=\"googleblog.blogspot.com\" href=\"http:\/\/googleblog.blogspot.com\/2010\/01\/new-approach-to-china.html\" target=\"_blank\" rel=\"noopener noreferrer\">blog post<\/a>. In the blog post, Google said the attack originated in <a title=\"China\" href=\"https:\/\/wikitravel.org\/en\/China\" target=\"_blank\" rel=\"noopener noreferrer\">China<\/a> and was both sophisticated and well resourced and consistent with an <a title=\"Advanced persistent threat\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Advanced_persistent_threat\" target=\"_blank\" rel=\"noopener noreferrer\">advanced persistent threat<\/a> attack. According to <em><a title=\"Wikipedia\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Main_Page\" target=\"_blank\" rel=\"noopener noreferrer\">Wikipedia<\/a><\/em> the attack also included\u00a0<a title=\"Adobe\" href=\"https:\/\/www.adobe.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Adobe<\/a> (<a title=\"NASDAQ : ADBE\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-ADBE\/\" target=\"_blank\" rel=\"noopener noreferrer\">ADBE<\/a>), <a title=\"Dow Chemical\" href=\"http:\/\/www.dow.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Dow Chemical<\/a> (<a title=\"NYSE : DOW\" href=\"https:\/\/www.tradingview.com\/symbols\/NYSE-DOW\/\" target=\"_blank\" rel=\"noopener noreferrer\">DOW<\/a>), <a title=\"Juniper\" href=\"http:\/\/www.juniper.net\/us\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\">Juniper Networks<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NYSE-JNPR\/\" target=\"_blank\" rel=\"noopener noreferrer\">JNPR<\/a>), <a title=\"www.morganstanley.com\" href=\"http:\/\/www.morganstanley.com\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">Morgan Stanley<\/a> (<a title=\"NYSE : MS\" href=\"https:\/\/www.tradingview.com\/symbols\/NYSE-MS\/\" target=\"_blank\" rel=\"noopener noreferrer\">MS<\/a>), <a title=\"Northrop Grumman\" href=\"https:\/\/www.northropgrumman.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Northrop Grumman<\/a>,(<a title=\"NYSE : NOC\" href=\"https:\/\/www.tradingview.com\/symbols\/NYSE-NOC\/\" target=\"_blank\" rel=\"noopener noreferrer\">NOC<\/a>), <a title=\"www.rackspace.com\" href=\"http:\/\/www.rackspace.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Rackspace<\/a> (<a title=\"NYSE : RAX\" href=\"https:\/\/investorplace.com\/2016\/08\/rackspace-hosting-inc-rax-stock-apollo-global-buyout\/\" target=\"_blank\" rel=\"noopener noreferrer\">RAX<\/a>), <a title=\"Symantec\" href=\"https:\/\/securitycloud.symantec.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Symantec<\/a> (<a title=\"NASDAQ : SYMC\" href=\"https:\/\/wp.me\/p2wgaW-pra\" target=\"_blank\" rel=\"noopener noreferrer\">SYMC<\/a>), and <a href=\"http:\/\/www.yahoo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Yahoo<\/a> (<a href=\"https:\/\/www.tradingview.com\/chart\/YHOO\/EWjh1a3K-The-last-YHOO-chart-for-posterity-hello-AABA\/\" target=\"_blank\" rel=\"noopener noreferrer\">YHOO<\/a>). There is speculation that the primary goal of the attack was to gain access to and potentially change source code repositories at these high-tech, security, and defense contractor companies.<\/p>\n<p>The definition of an <a title=\"searchsecurity.techtarget.com\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/advanced-persistent-threat-APT\" target=\"_blank\" rel=\"noopener noreferrer\">Advanced Persistent Threat<\/a> depends on who you ask, <a title=\"Greg Hoglund\" href=\"http:\/\/en.wikipedia.org\/wiki\/Greg_Hoglund\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Greg Hoglund<\/a>, CEO at <a title=\"HBGary\" href=\"https:\/\/web.archive.org\/web\/20140707150352\/http:\/\/www.hbgary.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">HBGary<\/a> <a title=\"www.networkworld.com\" href=\"http:\/\/web.archive.org\/web\/20140122062847\/http:\/\/www.networkworld.com\/news\/2011\/020111-advanced-persistent-threat.html\" target=\"_blank\" rel=\"noopener noreferrer\">told<\/a> <a title=\"www.networkworld.com\" href=\"http:\/\/web.archive.org\/web\/20140122062847\/http:\/\/www.networkworld.com\/news\/2011\/020111-advanced-persistent-threat.html\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Network World<\/em><\/a> an <a title=\"Advanced Persistent Threat\" href=\"https:\/\/www.schneier.com\/blog\/archives\/2011\/11\/advanced_persis.html\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Advanced Persistent Threat<\/a> is a nice way for the <a title=\"U.S. Air Force\" href=\"http:\/\/www.airforce.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Air Force<\/a> and <a title=\"U.S. Department of Defense\" href=\"http:\/\/www.defense.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">DoD<\/a> to not have to keep saying &#8220;Chinese state-sponsored threat.&#8221; He says,&#8221; APT is &#8220;the Chinese government&#8217;s state-sponsored espionage that&#8217;s been going on for 20 years,&#8221; Mr. Hoglund told <em>Network World<\/em>.<\/p>\n<p><strong><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-11080\" style=\"margin-left: 3px; margin-right: 3px;\" title=\"Stuxnet\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/autorun-virus-from-usb.jpg?resize=117%2C85&#038;ssl=1\" alt=\"Stuxnet USB\" width=\"117\" height=\"85\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/autorun-virus-from-usb.jpg?resize=300%2C218&amp;ssl=1 300w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/autorun-virus-from-usb.jpg?resize=150%2C109&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/autorun-virus-from-usb.jpg?w=320&amp;ssl=1 320w\" sizes=\"auto, (max-width: 117px) 100vw, 117px\" \/>2010 <\/strong>&#8211; <a title=\"stuxnet worm\" href=\"https:\/\/web.archive.org\/web\/20220817131457\/https:\/\/www.csoonline.com\/article\/3218104\/what-is-stuxnet-who-created-it-and-how-does-it-work.html\" target=\"_blank\" rel=\"symantec noopener noreferrer\">Stuxnet<\/a>&#8216;s discovery in September 2010 ushered in the era of cyberwar. According to most threat researchers today, only governments have the necessary resources to design and implement a virus of such complexity. <a title=\"www.microsoft.com\" href=\"http:\/\/www.microsoft.com\/security\/portal\/Threat\/Encyclopedia\/Search.aspx?query=stuxnet\" target=\"_blank\" rel=\"noopener noreferrer\">Stuxnet<\/a> is the first piece of malware specifically designed to <a title=\"www.ted.com\" href=\"https:\/\/web.archive.org\/web\/20140201101050\/http:\/\/www.ted.com:80\/talks\/ralph_langner_cracking_stuxnet_a_21st_century_cyberweapon.html\" target=\"_blank\" rel=\"noopener noreferrer\">sabotage nuclear power plants<\/a>. It can be regarded as the first advanced tool of cyber-warfare. <a title=\"www.globalsecurity.org\" href=\"http:\/\/www.globalsecurity.org\/security\/library\/news\/2010\/09\/sec-100928-voa01.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Stuxnet<\/a> was almost certainly a joint U.S. \/ Israeli creation for damaging the Iranian nuclear weapons program, which it did, by <a title=\"www.jpost.com\" href=\"http:\/\/web.archive.org\/web\/20101226233703\/http:\/\/www.jpost.com:80\/Defense\/Article.aspx?ID=200843&amp;R=R1\" target=\"_blank\" rel=\"noopener noreferrer\">destroying a thousand centrifuges<\/a> used for uranium enrichment.<\/p>\n<p>To spread, Stuxnet exploited several critical vulnerabilities in <a href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>) Windows, which, until then, were unknown, including one guaranteeing its execution when inserting an infected <a title=\"USB flash drive\" href=\"http:\/\/en.wikipedia.org\/wiki\/USB_flash_drive\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">USB key<\/a> into the target system, even if a systems autorun capabilities were disabled. From the infected system, Stuxnet was then able to spread into an internal network, until it reached its target: a Siemens industrial software system that run <a title=\"www.cia.gov\" href=\"https:\/\/web.archive.org\/web\/20201229023715\/https:\/\/www.cia.gov\/library\/publications\/the-world-factbook\/geos\/ir.html\" target=\"_blank\" rel=\"noopener noreferrer\">Iran&#8217;s<\/a> <a title=\"www.globalsecurity.org\" href=\"http:\/\/www.globalsecurity.org\/wmd\/world\/iran\/bushehr.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Bushehr nuclear reactor<\/a> and most likely intended to destroy or neutralize the industrial system.<\/p>\n<p><strong><a href=\"https:\/\/web.archive.org\/web\/20130225154445\/http:\/\/www.hacktik.com\/hackers-find-link-duqu-virus-stuxnet.html\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-11078\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"duquword\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/duquword.jpg?resize=103%2C77&#038;ssl=1\" alt=\"Duqu\" width=\"103\" height=\"77\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/duquword.jpg?w=256&amp;ssl=1 256w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/duquword.jpg?resize=150%2C112&amp;ssl=1 150w\" sizes=\"auto, (max-width: 103px) 100vw, 103px\" \/><\/a>2011<\/strong> &#8211; <a href=\"http:\/\/www.f-secure.com\/v-descs\/backdoor_w32_duqu.shtml\" target=\"_blank\" rel=\"noopener noreferrer\">Duqu<\/a> is the current star in the world of malware but, as history shows, that fame will be short-lived. Just like fashion models, modern malware has a lifespan in the media eye of a couple of weeks to a couple of months, tops. They then fade into the shadow of more dangerous and advanced tools, according to <em>Help Net Security<\/em>.<\/p>\n<p>Gary Warner, director of <a title=\"www.cis.uab.edu\" href=\"https:\/\/web.archive.org\/web\/20140411045203\/http:\/\/www.cis.uab.edu:80\/forensics\/\" target=\"_blank\" rel=\"noopener noreferrer\">Research in Computer Forensics<\/a> in the <a title=\"www.uab.edu\" href=\"http:\/\/www.uab.edu\/cas\/\" target=\"_blank\" rel=\"noopener noreferrer\">UAB College of Arts and Sciences<\/a> <a title=\"garwarner.blogspot.com\" href=\"http:\/\/garwarner.blogspot.com\/2011\/11\/duqu-youre-safe-unless-you-use-truetype.html\" target=\"_blank\" rel=\"noopener noreferrer\">blogged<\/a> that <a title=\"www.f-secure.com\" href=\"http:\/\/www.f-secure.com\/weblog\/archives\/00002264.html\" target=\"_blank\" rel=\"noopener noreferrer\">Duqu<\/a> is a data-stealing program that shares several blocks of code with Stuxnet. In fact, one of the two pieces of malware we&#8217;ve seen that is described as being Duqu is also detected as Stuxnet by some AV vendors.<\/p>\n<p>Symantec disclosed in their report that one of the infections they were analyzing was\u00a0infected via a Word Document that exploited the system using a previously unknown <a title=\"Zero-day attack\" href=\"http:\/\/en.wikipedia.org\/wiki\/Zero-day_attack\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">0-day attack<\/a>.<\/p>\n<p>On November 3, 2011, Microsoft released a <a title=\"technet.microsoft.com\" href=\"http:\/\/technet.microsoft.com\/en-us\/security\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Security Advisory<\/a> (<a title=\"technet.microsoft.com\" href=\"https:\/\/technet.microsoft.com\/en-us\/security\/advisory\/2639658\" target=\"_blank\" rel=\"noopener noreferrer\">2639658<\/a>) <a title=\"vulnerability management\" href=\"https:\/\/www.tracesecurity.com\/blog\/articles\/easily-mitigate-the-security-risk-associated-with-wireless-printers\" target=\"_blank\" rel=\"symantec noopener noreferrer\">Vulnerability<\/a> in TrueType Font Parsing Could Allow Elevation of Privilege. The advisory starts with an executive summary which says, in part:<\/p>\n<p>Microsoft is investigating a vulnerability in a Microsoft Windows component, the Win32k TrueType font parsing engine. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. We are aware of targeted attacks that try to use the reported vulnerability; overall, we see low customer impact at this time. This vulnerability is related to the Duqu malware.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>Every couple of years a new malware is crowned the most innovative or dangerous cyber threat in the wild. The anti-malware industry is built on a game of chicken between malware creators and anti-malware creators, with end users stuck squarely in the middle. As this series of articles has shown this game has gone on for 40 years since computers were <a title=\"www.library.upenn.edu\" href=\"https:\/\/web.archive.org\/web\/20170324050431\/http:\/\/www.library.upenn.edu\/exhibits\/rbm\/mauchly\/img\/eniac4.jpg\" target=\"_blank\" rel=\"noopener noreferrer\">bigger than many houses<\/a> and were as user-friendly as the <a title=\"www.thenervousbreakdown.com\" href=\"https:\/\/web.archive.org\/web\/20160123215051\/http:\/\/www.thenervousbreakdown.com\/wp-content\/uploads\/2009\/11\/dmv1.jpg\" target=\"_blank\" rel=\"noopener noreferrer\">DMV<\/a>.<\/em><\/p>\n<p>&nbsp;<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20170901174407\/http:\/\/gizmodo.com:80\/5827405\/why-hackers-write-computer-viruses\" target=\"_blank\" rel=\"noopener noreferrer\">Why Hackers Write Computer Viruses [Video]<\/a> (gizmodo.com)<\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20111203101919\/http:\/\/www.informationweek.com:80\/news\/security\/vulnerabilities\/231600904\" target=\"_blank\" rel=\"noopener noreferrer\">Inside The Booming Botnet Industry<\/a> (informationweek.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>2011 is the 40th anniversary of computer malware this article counts down the malware evolution low-lights like Brain Creeper Melissa up to Y2K<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3045,58,767,768,872,104,871,689,685,4,764,765,1543],"class_list":["post-10392","post","type-post","status-publish","format-standard","hentry","category-security","tag-3045","tag-botnet","tag-conficker","tag-denial-of-service-attack","tag-duqu","tag-facebook","tag-friendster","tag-koobface","tag-myspace","tag-security","tag-storm-botnet","tag-stuxnet","tag-zombie"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=10392"}],"version-history":[{"count":55,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10392\/revisions"}],"predecessor-version":[{"id":131676,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10392\/revisions\/131676"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=10392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=10392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=10392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}