A Brief History of Computer Viruses & What the Future Holds (2024)

When it comes to cybersecurity, there are few terms with more name recognition than "computer viruses." Despite the prevalence of these threats and their wide-spread impact, however, many users don't know about the basic nature of viruses. What follows is a brief history of the computer virus, and what the future holds for this widespread cyber threat.

Theory of Self-Replicating Automata

What is a computer virus? This idea was first discussed in a series of lectures by mathematician John von Neumann in the late 1940s and a paper published in 1966, Theory of Self-Reproducing Automata. The paper was effectively a thought experiment that speculated that it would be possible for a "mechanical" organism—such as a piece of computer code—to damage machines, copy itself and infect new hosts, just like a biological virus.

The Creeper Program

As noted by Discovery, the Creeper program, often regarded as the first virus, was created in 1971 by Bob Thomas of BBN. Creeper was actually designed as a security test to see if a self-replicating program was possible. It was—sort of. With each new hard drive infected, Creeper would try to remove itself from the previous host. Creeper had no malicious intent and only displayed a simple message: "I'M THE CREEPER. CATCH ME IF YOU CAN!"

The Rabbit Virus

According to InfoCarnivore, the Rabbit (or Wabbit) virus was developed in 1974, did have malicious intent and was able to duplicate itself. Once on a computer, it made multiple copies of itself, severely reducing system performance and eventually crashing the machine. The speed of replication gave the virus its name.

The First Trojan

Called ANIMAL, the first Trojan (although there is some debate as to whether this was a Trojan, or simply another virus) was developed by computer programmer John Walker in 1975, according to Fourmilab. At the time, "animal programs," which try to guess which animal the user is thinking of with a game of 20 questions, were extremely popular. The version Walker created was in high demand, and sending it to his friends meant making and transmitting magnetic tapes. To make things easier, Walker created PERVADE, which installed itself along with ANIMAL. While playing the game, PREVADE examined all computer directories available to the user and then made a copy of ANIMAL in any directories where it wasn't already present. There was no malicious intent here, but ANIMAL and PREVADE fit the definition of a Trojan: Hiding inside ANIMAL was another program that carried out actions without the user's approval.

The Brain Boot Sector Virus

Brain, the first PC virus, began infecting 5.2" floppy disks in 1986. As Securelist reports, it was the work of two brothers, Basit and Amjad Farooq Alvi, who ran a computer store in Pakistan. Tired of customers making illegal copies of their software, they developed Brain, which replaced the boot sector of a floppy disk with a virus. The virus, which was also the first stealth virus, contained a hidden copyright message, but did not actually corrupt any data.

The LoveLetter Virus

The introduction of reliable, speedy broadband networks early in the 21st century changed the way malware was transmitted. No longer confined to floppy disks or company networks, malware was now able to spread very quickly via email, via popular websites or even directly over the Internet. As a result, modern malware began to take shape. The threat landscape became a mixed environment shared by viruses, worms and Trojans—hence the name "malware" as an umbrella term for malicious software. One of the most serious epidemics of this new era was the LoveLetter, which appeared on May 4, 2000.

As Securelist notes, it followed the pattern of earlier email viruses of the time, but unlike the macro viruses that had dominated the threat landscape since 1995, it didn't take the form of an infected Word document, but arrived as a VBS file. It was simple and straightforward, and since users hadn't learned to be suspicious of unsolicited emails, it worked. The subject line was "I Love You," and each email contained an attachment, "LOVE-LETTER-FOR-YOU-TXT.vbs." The ILOVEYOU creator, Onel de Guzman, designed his worm to overwrite existing files and replace them with copies of itself, which were then used to spread the worm to all the victims' email contacts. Since the message often came to new victims from someone familiar, they were more likely to open it, making ILOVEYOU a proof-of-concept for the effectiveness of social engineering.

The Code Red Virus

The Code Red worm was a "file less" worm—it existed only in memory and made no attempt to infect files on the system. Taking advantage of a flaw in the Microsoft Internet Information Server, the fast-replicating worm wreaked havoc by manipulating the protocols that allow computers to communicate and spread globally in just hours. Eventually, as noted in Scientific American, compromised machines were used to launch a distributed denial of service attack on the Whitehouse.gov website.

Heartbleed

One of the most recent of the major viruses came out in 2014, Heartbleed burst onto the scene and put servers across the Internet at risk. Heartbleed, unlike viruses or worms, stems from a vulnerability in OpenSSL, a general purpose, open source cryptographic library used by companies worldwide. OpenSSL periodically sends out "heartbeats" to ensure that secure endpoints are still connected. Users can send OpenSSL a specific amount of data and then ask for the same amount back—for example, one byte. If users claim they're sending the maximum allowed, 64 kilobytes, but only send a single byte, the server will respond with the last 64 kilobytes of data stored in RAM, notes security technologist, Bruce Schneier, which could include anything from user names to passwords to secure encryption keys.

The Future of Computer Viruses

For more than 60 years, computer viruses have been part of collective human consciousness, however what was once simply cyber vandalism has turned quickly to cybercrime. Worms, Trojans and viruses are evolving. Hackers are motivated and clever, always willing push the boundaries of connection and code to devise new infection methods. The future of cybercrime seems to involve more PoS (point of sale) hacks, and, perhaps, the recent Moker remote access Trojan is a good example of what's to come. This newly-discovered malware is hard to detect, difficult to remove and bypasses all known defenses. Nothing is certain—change is the lifeblood of both attack and defense.

Other helpful reads and links related to Computer Viruses

  • What is a Computer Virus or a Computer Worm?
  • How to Fend Off a Computer Virus
  • What is a Trojan Virus?
  • What is a Boot Sector Virus?
  • What is a Stealth Virus?
  • What is a Macro Virus?
A Brief History of Computer Viruses & What the Future Holds (2024)

FAQs

What is the short history of computer viruses? ›

The existence of viruses dates back to the 1940s. It began when the mathematician John von Neumann developed the idea of infecting systems with a self-replicating mechanism called Replicating Automata. By the 1960s, this concept was tested and proved to be possible. The 1970s brought the development of the first virus.

What happened to computer viruses? ›

In the early days of computers, viruses were spread between devices using floppy disks. Nowadays, viruses can still be spread via hard disks and Universal Serial Bus (USB) devices, but they are more likely to be passed between devices through the internet.

What is the most computer virus in history? ›

1. Mydoom. Considered by many to be the most dangerous computer virus in history, the Mydoom virus cost around $38 billion worth of damage in 2004. [3] It scraped email addresses from infected machines and sent copies of the virus to those addresses.

What was the first virus in the world? ›

Tobacco plants are damaged sometimes with mosaic-like patterns on the leaves. These patterns are caused by the tobacco mosaic virus, which at the end of the 19th century became the first virus ever discovered.

What is the summary of computer virus? ›

Lesson Summary

Computer viruses are pieces of malicious computer coding that can be spread from one device to another. Viruses can be transmitted through the internet, removable media such as flash drives, or even via email.

What is the history and origin of virus? ›

To date, no clear explanation for the origin(s) of viruses exists. Viruses may have arisen from mobile genetic elements that gained the ability to move between cells. They may be descendants of previously free-living organisms that adapted a parasitic replication strategy.

Does the ILOVEYOU virus still work? ›

In total, it is estimated that the ILOVEYOU virus caused $15 billion in damages worldwide. Although the ILOVEYOU virus is no longer active, it serves as an example of how quickly malicious code can spread across the internet and cause widespread damage.

Is ILOVEYOU a virus or worm? ›

ILOVEYOU, sometimes referred to as the Love Bug or Loveletter, was a computer worm that infected over ten million Windows personal computers on and after 5 May 2000. It started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.TXT.vbs".

What is the scariest computer virus ever? ›

The 18 scariest computer viruses of all time
  • Nimda (2001) ...
  • ILOVEYOU (2000) ...
  • Cryptolocker (2014) ...
  • Netsky (2004) ...
  • Conficker (2008) ...
  • Michaelangelo (1992) ...
  • Sobig. F (2003) ...
  • MyDoom (2004) In September 2004, TechRepublic called MyDoom “the worst virus outbreak ever,” and it's no surprise why.

Who invented the computer virus? ›

As noted by Discovery, the Creeper program, often regarded as the first virus, was created in 1971 by Bob Thomas of BBN. Creeper was actually designed as a security test to see if a self-replicating program was possible.

What are the oldest viruses? ›

Smallpox and measles viruses are among the oldest that infect humans. Having evolved from viruses that infected other animals, they first appeared in humans in Europe and North Africa thousands of years ago.

Where do computer viruses come from? ›

Typically, computer viruses spread through malicious online downloads, infected email attachments, or by plugging in infected hardware like an external flash drive (USB stick). Computer viruses can spread through almost any method of file sharing, as long as the virus can avoid detection by antivirus programs.

What was the first computer virus called as a virus? ›

The first computer virus, called the 'Creeper Virus', was created in 1971 by computer engineer Robert Thomas.

What is the history of computer antivirus? ›

The first true antivirus software

The late '80s were to be landmark years that set up the foundations of the entire antivirus software industry. It was in 1987 that German computer security expert Bernd Robert Fix came up with a program to get rid of Vienna, a virus that infected .com files on DOS-based systems.

What is a computer and its history? ›

The first digital computer was invented in 1642 by Blaise Pascal. It consisted of numbers entered in dials but, it could only add. However in 1671, a computer was invented that was eventually built in 1694. The man to credit for this invention is Gottfried Wilhelm von Leibniz.

Who created the ILOVEYOU virus? ›

Onel de Guzman, a then-24-year-old computer science student at AMA Computer College and resident of Manila, Philippines, created the malware. Because there were no laws in the Philippines against making malware at the time of its creation, the Philippine Congress enacted Republic Act No.

Top Articles
Difference between Options Contracts and Future Contracts.
Management Expense Ratio (MER)
Section 4Rs Dodger Stadium
Skamania Lodge Groupon
Farepay Login
Sissy Hypno Gif
Kent And Pelczar Obituaries
Nwi Police Blotter
Stolen Touches Neva Altaj Read Online Free
Tlc Africa Deaths 2021
Find your energy supplier
Craigslist Chautauqua Ny
Best Restaurants Ventnor
Goldsboro Daily News Obituaries
charleston cars & trucks - by owner - craigslist
Pricelinerewardsvisa Com Activate
R Personalfinance
Officialmilarosee
Joann Ally Employee Portal
Craigslist List Albuquerque: Your Ultimate Guide to Buying, Selling, and Finding Everything - First Republic Craigslist
How to Watch the Fifty Shades Trilogy and Rom-Coms
Music Go Round Music Store
Tyrone Unblocked Games Bitlife
Team C Lakewood
Busted Mcpherson Newspaper
Panolian Batesville Ms Obituaries 2022
Ihub Fnma Message Board
Yale College Confidential 2027
Gopher Carts Pensacola Beach
*!Good Night (2024) 𝙵ull𝙼ovie Downl𝚘ad Fr𝚎e 1080𝚙, 720𝚙, 480𝚙 H𝙳 HI𝙽DI Dub𝚋ed Fil𝙼yz𝚒lla Isaidub
Angel del Villar Net Worth | Wife
County Cricket Championship, day one - scores, radio commentary & live text
Kristen Hanby Sister Name
Persona 4 Golden Taotie Fusion Calculator
Cheap Motorcycles Craigslist
2016 Honda Accord Belt Diagram
Mistress Elizabeth Nyc
Stanley Steemer Johnson City Tn
Craigslist Free Manhattan
Craigslist Lakeside Az
St Anthony Hospital Crown Point Visiting Hours
התחבר/י או הירשם/הירשמי כדי לראות.
If You're Getting Your Nails Done, You Absolutely Need to Tip—Here's How Much
Kb Home The Overlook At Medio Creek
Hkx File Compatibility Check Skyrim/Sse
The Pretty Kitty Tanglewood
Bluebird Valuation Appraiser Login
300 Fort Monroe Industrial Parkway Monroeville Oh
Unbiased Thrive Cat Food Review In 2024 - Cats.com
Laurel Hubbard’s Olympic dream dies under the world’s gaze
Coors Field Seats In The Shade
Emmi-Sellers
Latest Posts
Article information

Author: Nathanael Baumbach

Last Updated:

Views: 6538

Rating: 4.4 / 5 (55 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Nathanael Baumbach

Birthday: 1998-12-02

Address: Apt. 829 751 Glover View, West Orlando, IN 22436

Phone: +901025288581

Job: Internal IT Coordinator

Hobby: Gunsmithing, Motor sports, Flying, Skiing, Hooping, Lego building, Ice skating

Introduction: My name is Nathanael Baumbach, I am a fantastic, nice, victorious, brave, healthy, cute, glorious person who loves writing and wants to share my knowledge and understanding with you.