{"id":6280,"date":"2011-10-06T20:09:58","date_gmt":"2011-10-07T00:09:58","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2022-01-13T17:05:51","modified_gmt":"2022-01-13T22:05:51","slug":"40-years-of-malware-part-3","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/40-years-of-malware-part-3\/","title":{"rendered":"40 Years of Malware &#8211; Part 3"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-6285\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"40 Years of Malware - Part 3\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/03\/malware2-e1565403404134.jpg?resize=93%2C85&#038;ssl=1\" alt=\"40 Years of Malware - Part 3\" width=\"93\" height=\"85\" \/>2011 marks the 40th anniversary of the computer virus. <a href=\"https:\/\/www.helpnetsecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Help Net Security<\/em><\/a> notes that over the last four decades, malware instances have grown from 1,300 in 1990, to 50,000 in 2000, to over 200 million in 2010. <a href=\"https:\/\/www.fortinet.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Fortinet<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-FTNT\/\" target=\"_blank\" rel=\"noopener noreferrer\">FTNT<\/a>) marks this dubious milestone with an article that counts down some of the malware evolution low-lights.<\/p>\n<p>The Sunnyvale, CA network security firm says that viruses evolved from academic proof of concepts to geek pranks which have evolved into cybercriminal tools. By 2005, the virus scene had been monetized, and almost all viruses developed for the sole purpose of making money via more or less complex business models. According to <a href=\"https:\/\/www.fortiguard.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">FortiGuard Labs<\/a>, the most significant computer viruses over the last 40 years are:<\/p>\n<p>&#8211; <a title=\"rbach.net\" href=\"https:\/\/wp.me\/p2wgaW-1VJ\" target=\"_blank\" rel=\"noopener noreferrer\">See Part 1 Here<\/a> &#8211; <a title=\"rbach.net\" href=\"https:\/\/wp.me\/p2wgaW-1Df\" target=\"_blank\" rel=\"noopener\">See Part 2 Here<\/a> &#8211; See Part 3 Here\u00a0 &#8211; <a title=\"rbach.net\" href=\"https:\/\/wp.me\/p2wgaW-1Di\" target=\"_blank\" rel=\"noopener noreferrer\">See Part 4 Here<\/a><\/p>\n<p><strong><a title=\"Code Red\" href=\"http:\/\/buenaflordaphnejoy.blogspot.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-10364 \" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"code_red\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/03\/code_red-e1565403468204-150x114.jpg?resize=132%2C100&#038;ssl=1\" alt=\"Code Red Worm\" width=\"132\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/03\/code_red-e1565403468204.jpg?resize=150%2C114&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/03\/code_red-e1565403468204.jpg?resize=75%2C57&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/03\/code_red-e1565403468204.jpg?w=416&amp;ssl=1 416w\" sizes=\"auto, (max-width: 132px) 100vw, 132px\" \/><\/a>2001 &#8211;<\/strong> E-mail and the Internet become primary transmission vectors for malware by 2001 as scripts automatically load viruses from infected Websites. <a title=\"Code Red\" href=\"https:\/\/www.cert.org\/advisories\/CA-2001-19.html\" target=\"_blank\" rel=\"noopener noreferrer\">The Code Red<\/a> <a title=\"Computer worm\" href=\"https:\/\/web.archive.org\/web\/20170722123745\/http:\/\/www.antivirusworld.com:80\/articles\/computer-worm.php\" target=\"_blank\" rel=\"noopener noreferrer\">worm<\/a> targeted Web servers and not users. By exploiting a <a title=\"Microsoft\" href=\"http:\/\/support.microsoft.com\/gp\/codered\" target=\"_blank\" rel=\"noopener noreferrer\">vulnerability<\/a> in <a title=\"Internet Information Services\" href=\"http:\/\/www.microsoft.com\/iis\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Microsoft IIS<\/a> servers Code Red automatically spread to nearly 400,000 servers in less than one week. The Code red worm replaced the homepage of the compromised websites with a \u201c<a title=\"Code Red (computer worm)\" href=\"http:\/\/en.wikipedia.org\/wiki\/Code_Red_%28computer_worm%29\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Hacked By Chinese!<\/a>\u201d page.\u00a0 Code Red had a distinguishing feature designed to flood the White House Website with traffic (from the infected servers), probably making it the first case of documented \u2018<a title=\"Hacktivism\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Hacktivism\" target=\"_blank\" rel=\"noopener noreferrer\">hacktivism<\/a>\u2019 on a large scale.<\/p>\n<p>Shortly after the <a title=\"September 11 attacks\" href=\"http:\/\/www.911memorial.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">September 11 attacks<\/a>, the <a title=\"Nimda\" href=\"http:\/\/www.f-secure.com\/v-descs\/nimda.shtml\" target=\"_blank\" rel=\"noopener noreferrer\">Nimda<\/a> worm (<em>admin<\/em> spelled backward) infected hundreds of thousands of computers worldwide. Nimda is one of the most <a title=\"www.theregister.co.uk\" href=\"http:\/\/www.theregister.co.uk\/2011\/09\/17\/nimda_anniversary\/\" target=\"_blank\" rel=\"noopener noreferrer\">complicated viruses<\/a>, having many different methods of infecting computers systems and duplicating itself.<\/p>\n<p><strong><a href=\"https:\/\/searchdatamanagement.techtarget.com\/definition\/SQL-Server\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-118317\" title=\"Microsoft SQL Server\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/msft_sql_server.jpg?resize=110%2C36&#038;ssl=1\" alt=\"Microsoft SQL Server\" width=\"110\" height=\"36\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/msft_sql_server.jpg?resize=75%2C25&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/msft_sql_server.jpg?resize=150%2C49&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/msft_sql_server.jpg?w=431&amp;ssl=1 431w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>2003<\/strong> &#8211; Widespread Internet attacks emerge as <a title=\"www.f-secure.com\" href=\"http:\/\/www.f-secure.com\/v-descs\/mssqlm.shtml\" target=\"_blank\" rel=\"noopener noreferrer\">SQL Slammer<\/a> (or Sapphire) infects the memory in servers worldwide, clogging networks and causing shutdowns. on January 25, 2003, Slammer first appeared as a single-packet, 376-byte worm that generated random IP addresses and sent itself to those IP addresses. If the IP address was a computer running an unpatched copy of <a href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft&#8217;s<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>) <a title=\"SQL Server\" href=\"https:\/\/web.archive.org\/web\/20160307074007\/http:\/\/blogs.technet.com:80\/b\/dataplatforminsider\/\" target=\"_blank\" rel=\"noopener noreferrer\">SQL Server<\/a> Desktop Engine, that computer would immediately begin firing the virus off to random IP addresses. Slammer was remarkably effective at spreading, it infected 75,000 computers in 10 minutes. The explosion of traffic overloaded routers across the globe, which created higher demands on other routers, which shut them down, and so on.<\/p>\n<p>The summer of 2003 saw the release of both the Blaster and Sobig worms. <a title=\"Blaster\" href=\"https:\/\/web.archive.org\/web\/20160424214451\/http:\/\/www.sans.org:80\/security-resources\/malwarefaq\/w32_blasterworm.php\" target=\"_blank\" rel=\"noopener noreferrer\">Blaster<\/a> (aka Lovsan or <a title=\"Blaster (computer worm)\" href=\"http:\/\/en.wikipedia.org\/wiki\/Blaster_%28computer_worm%29\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">MSBlast<\/a>) was the first to hit. The worm was detected on August 11 and spread rapidly, peaking in just two days. Transmitted via network and Internet traffic, this worm exploited a <a title=\"Microsoft\" href=\"http:\/\/support.microsoft.com\/kb\/826955\" target=\"_blank\" rel=\"noopener noreferrer\">vulnerability<\/a> in Windows 2000 and <a title=\"Windows XP\" href=\"http:\/\/www.microsoft.com\/windows\/windows-xp\/default.aspx\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Windows XP<\/a>, and when activated, presented the PC user with a menacing dialog box indicating that a system shutdown was imminent.<\/p>\n<p>The <a title=\"www.f-secure.com\" href=\"http:\/\/www.f-secure.com\/v-descs\/sobig_f.shtml\" target=\"_blank\" rel=\"noopener noreferrer\">Sobig worm<\/a> hit right on the heels of Blaster. The most destructive variant was Sobig.F, which generated over 1 million copies of itself in its first 24 hours. The worm infected host computers via e-mail attachments such as application.pif and thank_you.pif. When activated, the worm transmitted itself to e-mail addresses discovered on a host of local file types. The result was massive amounts of Internet traffic. Microsoft has announced a $250,000 bounty for anyone who identifies Sobig.F\u2019s author, but to date, the perpetrator has not been caught.<\/p>\n<p><strong><a href=\"http:\/\/www.tech-faq.com\/computer-worm.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-99980 \" title=\"Sasser shutdown\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/sasser.png?resize=126%2C112&#038;ssl=1\" alt=\"Sasser shutdown\" width=\"126\" height=\"112\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/sasser.png?w=150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/sasser.png?resize=75%2C67&amp;ssl=1 75w\" sizes=\"auto, (max-width: 126px) 100vw, 126px\" \/><\/a>2004<\/strong> &#8211; The <a title=\"Sasser\" href=\"http:\/\/www.f-secure.com\/v-descs\/sasser.shtml\" target=\"_blank\" rel=\"noopener noreferrer\">Sasser worm<\/a> built on the autonomous nature of Code Red. It spread without anyone\u2019s help by exploiting a vulnerability in Microsoft Windows XP and Windows 2000 operating systems called the <a title=\"Microsoft\" href=\"https:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/MS10-068\" target=\"_blank\" rel=\"noopener noreferrer\">Local Security Authority Subsystem Service<\/a>\u00a0or LSASS. Microsoft Security Bulletin MS04-011 <a href=\"https:\/\/web.archive.org\/web\/20110726145518\/http:\/\/www.microsoft.com:80\/technet\/security\/bulletin\/ms04-011.mspx\">here<\/a>. This is the first widespread Windows malware, made even more annoying by a bug in the worm\u2019s code, that turned infected systems off every couple of minutes.<\/p>\n<p>This is the first time that systems whose function isn\u2019t normally related to the Internet (and that mostly existed before the Internet) were severely affected. Sasser infected more than one million systems. The damage amount is thought to be more than $18 billion.<\/p>\n<p><a title=\"www.f-secure.com\" href=\"http:\/\/www.f-secure.com\/v-descs\/bagle_at.shtml\" target=\"_blank\" rel=\"noopener noreferrer\">Bagle<\/a> was first detected in 2004, it infected users through an email attachment, and used email to spread itself. Unlike earlier mass-mailing viruses, Bagle did not rely on the MS Outlook contact list rather it harvested email addresses from various document files stored in the infected computer to attack. Bagle opened a <a title=\"www.f-secure.com\" href=\"http:\/\/www.f-secure.com\/v-descs\/backdoor.shtml\" target=\"_blank\" rel=\"noopener noreferrer\">backdoor<\/a> where a hacker could gain access and control of the infected computer. Through the backdoor, the attacker could download more components to either spy and steal information from the user or launch <a title=\"Distributed denial-of-service attack \" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/distributed-denial-of-service-attack\" target=\"_blank\" rel=\"noopener noreferrer\">DDoS<\/a> attacks.<\/p>\n<p><a title=\"www.f-secure.com\" href=\"http:\/\/www.f-secure.com\/v-descs\/novarg.shtml\" target=\"_blank\" rel=\"noopener noreferrer\">MyDoom<\/a> is another mass-mailing worm discovered in 2004. It spread primarily through email but it also attacked computers by infecting programs stored in the shared folder of the <a title=\"Peer-to-Peer\" href=\"http:\/\/searchnetworking.techtarget.com\/definition\/peer-to-peer\" target=\"_blank\" rel=\"noopener noreferrer\">Peer-to-Peer software<\/a> <a title=\"KaZaa\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Kazaa\" target=\"_blank\" rel=\"noopener noreferrer\">KaZaA<\/a>. MyDoom slowed down global Internet access by ten percent and caused some website access to be reduced by 50 percent. It is estimated that during the first few days, one out of ten email messages sent contained the virus.<\/p>\n<p><strong>2005<\/strong> &#8211; In 2005 <a title=\"www.eff.org\" href=\"https:\/\/www.eff.org\/cases\/sony-bmg-litigation-info\" target=\"_blank\" rel=\"noopener noreferrer\">Sony BMG<\/a> introduced <a title=\"www.chron.com\" href=\"https:\/\/web.archive.org\/web\/20201025230302\/https:\/\/blog.chron.com\/brokenrecord\/2010\/04\/secret-drm-it-always-feels-like-somebodys-watching-me\/\" target=\"_blank\" rel=\"noopener noreferrer\">secret DRM software<\/a> to report music copying; Other <a title=\"searchmidmarketsecurity.techtarget.com\" href=\"https:\/\/web.archive.org\/web\/20180328134147\/http:\/\/searchmidmarketsecurity.techtarget.com:80\/definition\/rootkit\" target=\"_blank\" rel=\"noopener noreferrer\">rootkits<\/a> appear, providing hidden access to systems.<\/p>\n<p><a title=\"MyTob\" href=\"http:\/\/www.f-secure.com\/v-descs\/mytob_a.shtml\" target=\"_blank\" rel=\"noopener noreferrer\">MyTob<\/a> appeared in 2005 and was one of the first worms to combine a <a title=\"botnet\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/botnet\" target=\"_blank\" rel=\"noopener noreferrer\">botnet<\/a> and a mass-mailer. MyTob marks the emergence of <a title=\"Cybercrime\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/cybercrime\" target=\"_blank\" rel=\"noopener noreferrer\">cybercrime<\/a>. The cybercriminals developed business models to \u201cmonetize\u201d botnets that installed spyware, sent spam, hosted illegal content, and intercepted banking credentials, etc. The revenue generated from these new botnets quickly reached <a title=\"www.msnbc.msn.com\" href=\"https:\/\/web.archive.org\/web\/20111220042018\/http:\/\/www.msnbc.msn.com:80\/id\/44291945\/ns\/technology_and_science-security\/t\/how-cyber-crime-gang-stole-million-day\" target=\"_blank\" rel=\"noopener noreferrer\">billions of dollars per year today<\/a>.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>By 2005 cybercriminals are starting to put all the parts together, Slammer proves that Microsoft systems can be used to spread attacks, Blaster and SoBig improved the infection rate, Bagel began to mine the targets for data and install backdoors so the attackers could continue to re-use the victims&#8217; systems. MyDoom stated to use the first social network, the P2P networks for attacks. Sony proved that rootkits could be widely distributed and MyTob was the first of the modern botnet, leading the world into today&#8217;s monetized cybercrime age, described in part 4.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/nakedsecurity.sophos.com\/2011\/09\/16\/memories-of-the-nimda-virus\/\" target=\"_blank\" rel=\"noopener noreferrer\">Memories of the Nimda virus<\/a> (nakedsecurity.sophos.com)<\/li>\n<li><a href=\"https:\/\/www.paranoidprose.com\/2011\/10\/11\/how-malware-gets-in\/\" target=\"_blank\" rel=\"noopener noreferrer\">how malware gets in<\/a> (paranoidprose.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\"><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware evolves Slammer proved MSFT can be attacked Blaster improved infection rates Bagel mined for data &#038; installed backdoors MyDoom first social media attack MyTob first modern botnet<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3045,2972,806,1871,1748,2971,82,421,2973,808,386,4,807,809,1214,810,445,97,1756],"class_list":["post-6280","post","type-post","status-publish","format-standard","hentry","category-security","tag-3045","tag-bagle","tag-blaster","tag-code-red","tag-ddos","tag-hacktivism","tag-microsoft","tag-msft","tag-mydoom","tag-nimda","tag-sasser","tag-security","tag-sobig","tag-sql-slammer","tag-trojan-horse","tag-virus","tag-windows","tag-worm","tag-xp"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/6280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=6280"}],"version-history":[{"count":24,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/6280\/revisions"}],"predecessor-version":[{"id":132963,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/6280\/revisions\/132963"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=6280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=6280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=6280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}