History of Computer Viruses & What the Future Holds (2024)

When it comes to cybersecurity, there are few terms with more name recognition than "computer viruses." Despite the prevalence of these threats and their wide-spread impact, however, many users don't know about the basic nature of viruses. What follows is a brief history of the computer virus, and what the future holds for this widespread cyber threat.

Theory of Self-Replicating Automata

What is a computer virus? This idea was first discussed in a series of lectures by mathematician John von Neumann in the late 1940s and a paper published in 1966, Theory of Self-Reproducing Automata. The paper was effectively a thought experiment that speculated that it would be possible for a "mechanical" organism—such as a piece of computer code—to damage machines, copy itself and infect new hosts, just like a biological virus.

The Creeper Program

As noted by Discovery, the Creeper program, often regarded as the first virus, was created in 1971 by Bob Thomas of BBN. Creeper was actually designed as a security test to see if a self-replicating program was possible. It was—sort of. With each new hard drive infected, Creeper would try to remove itself from the previous host. Creeper had no malicious intent and only displayed a simple message: "I'M THE CREEPER. CATCH ME IF YOU CAN!"

The Rabbit Virus

According to InfoCarnivore, the Rabbit (or Wabbit) virus was developed in 1974, did have malicious intent and was able to duplicate itself. Once on a computer, it made multiple copies of itself, severely reducing system performance and eventually crashing the machine. The speed of replication gave the virus its name.

The First Trojan

Called ANIMAL, the first Trojan (although there is some debate as to whether this was a Trojan, or simply another virus) was developed by computer programmer John Walker in 1975, according to Fourmilab. At the time, "animal programs," which try to guess which animal the user is thinking of with a game of 20 questions, were extremely popular. The version Walker created was in high demand, and sending it to his friends meant making and transmitting magnetic tapes. To make things easier, Walker created PERVADE, which installed itself along with ANIMAL. While playing the game, PREVADE examined all computer directories available to the user and then made a copy of ANIMAL in any directories where it wasn't already present. There was no malicious intent here, but ANIMAL and PREVADE fit the definition of a Trojan: Hiding inside ANIMAL was another program that carried out actions without the user's approval.

The Brain Boot Sector Virus

Brain, the first PC virus, began infecting 5.2" floppy disks in 1986. As Securelist reports, it was the work of two brothers, Basit and Amjad Farooq Alvi, who ran a computer store in Pakistan. Tired of customers making illegal copies of their software, they developed Brain, which replaced the boot sector of a floppy disk with a virus. The virus, which was also the first stealth virus, contained a hidden copyright message, but did not actually corrupt any data.

The LoveLetter Virus

The introduction of reliable, speedy broadband networks early in the 21st century changed the way malware was transmitted. No longer confined to floppy disks or company networks, malware was now able to spread very quickly via email, via popular websites or even directly over the Internet. As a result, modern malware began to take shape. The threat landscape became a mixed environment shared by viruses, worms and Trojans—hence the name "malware" as an umbrella term for malicious software. One of the most serious epidemics of this new era was the LoveLetter, which appeared on May 4, 2000.

As Securelist notes, it followed the pattern of earlier email viruses of the time, but unlike the macro viruses that had dominated the threat landscape since 1995, it didn't take the form of an infected Word document, but arrived as a VBS file. It was simple and straightforward, and since users hadn't learned to be suspicious of unsolicited emails, it worked. The subject line was "I Love You," and each email contained an attachment, "LOVE-LETTER-FOR-YOU-TXT.vbs." The ILOVEYOU creator, Onel de Guzman, designed his worm to overwrite existing files and replace them with copies of itself, which were then used to spread the worm to all the victims' email contacts. Since the message often came to new victims from someone familiar, they were more likely to open it, making ILOVEYOU a proof-of-concept for the effectiveness of social engineering.

The Code Red Virus

The Code Red worm was a "file less" worm—it existed only in memory and made no attempt to infect files on the system. Taking advantage of a flaw in the Microsoft Internet Information Server, the fast-replicating worm wreaked havoc by manipulating the protocols that allow computers to communicate and spread globally in just hours. Eventually, as noted in Scientific American, compromised machines were used to launch a distributed denial of service attack on the Whitehouse.gov website.

Heartbleed

One of the most recent of the major viruses came out in 2014, Heartbleed burst onto the scene and put servers across the Internet at risk. Heartbleed, unlike viruses or worms, stems from a vulnerability in OpenSSL, a general purpose, open source cryptographic library used by companies worldwide. OpenSSL periodically sends out "heartbeats" to ensure that secure endpoints are still connected. Users can send OpenSSL a specific amount of data and then ask for the same amount back—for example, one byte. If users claim they're sending the maximum allowed, 64 kilobytes, but only send a single byte, the server will respond with the last 64 kilobytes of data stored in RAM, notes security technologist, Bruce Schneier, which could include anything from user names to passwords to secure encryption keys.

The Future of Computer Viruses

For more than 60 years, computer viruses have been part of collective human consciousness, however what was once simply cyber vandalism has turned quickly to cybercrime. Worms, Trojans and viruses are evolving. Hackers are motivated and clever, always willing push the boundaries of connection and code to devise new infection methods. The future of cybercrime seems to involve more PoS (point of sale) hacks, and, perhaps, the recent Moker remote access Trojan is a good example of what's to come. This newly-discovered malware is hard to detect, difficult to remove and bypasses all known defenses. Nothing is certain—change is the lifeblood of both attack and defense.

Other helpful reads and links related to Computer Viruses

  • What is a Computer Virus or a Computer Worm?
  • How to Fend Off a Computer Virus
  • What is a Trojan Virus?
  • What is a Boot Sector Virus?
  • What is a Stealth Virus?
  • What is a Macro Virus?
  • Top 7 Mobile Security Threats
History of Computer Viruses & What the Future Holds (2024)

FAQs

What is the history of computer viruses? ›

The existence of viruses dates back to the 1940s. It began when the mathematician John von Neumann developed the idea of infecting systems with a self-replicating mechanism called Replicating Automata. By the 1960s, this concept was tested and proved to be possible. The 1970s brought the development of the first virus.

Have you ever had a computer virus What did it do? ›

There are many different kinds of viruses that affect devices and operating systems in many different ways. Computer viruses spread through networks and connected devices, and they can crash computers, disrupt systems, steal personal information, and cause a variety of other problems.

What happened to computer viruses? ›

In the early days of computers, viruses were spread between devices using floppy disks. Nowadays, viruses can still be spread via hard disks and Universal Serial Bus (USB) devices, but they are more likely to be passed between devices through the internet.

What was the first virus in the world? ›

Tobacco plants are damaged sometimes with mosaic-like patterns on the leaves. These patterns are caused by the tobacco mosaic virus, which at the end of the 19th century became the first virus ever discovered.

What is the summary of computer virus? ›

Lesson Summary

Computer viruses are pieces of malicious computer coding that can be spread from one device to another. Viruses can be transmitted through the internet, removable media such as flash drives, or even via email.

What is a real life example of a computer virus? ›

Examples of Computer Virus

Nimda – This particular type of worm targeted web servers and computers running Microsoft Windows operating systems, spreading through multiple infection vectors in 2001.

What is the Zeus virus? ›

Zeus is a Trojan horse malware package that runs on versions of Microsoft Windows. It is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing. Zeus is spread mainly through drive-by downloads and phishing schemes.

What is the number 1 computer virus? ›

1. Mydoom – $38 billion. The worst computer virus outbreak in history, Mydoom caused estimated damage of $38 billion in 2004, but its inflation-adjusted cost is actually $52.2 billion. Also known as Novarg, this malware is technically a “worm,” spread by mass emailing.

What kills a computer virus? ›

The easiest way to remove viruses is by using an antivirus program designed to clean your system safely. If a virus is already on your computer, however, you may need to run this program under very specific conditions.

What is the oldest computer virus in the world? ›

As noted by Discovery, the Creeper program, often regarded as the first virus, was created in 1971 by Bob Thomas of BBN.

How do computer viruses start? ›

Most viruses, Trojan horses, and worms are activated when you open an attachment or click a link contained in an email message. If your email client allows scripting, then it is possible to get a virus by simply opening a message. It's best to limit what HTML is available in your email messages.

What is the first computer virus known as? ›

The correct answer is Creeper. Key Points. The first computer virus, called the 'Creeper Virus', was created in 1971 by computer engineer Robert Thomas.

What is the history of computer antivirus? ›

The first true antivirus software

The late '80s were to be landmark years that set up the foundations of the entire antivirus software industry. It was in 1987 that German computer security expert Bernd Robert Fix came up with a program to get rid of Vienna, a virus that infected .com files on DOS-based systems.

What is a computer and its history? ›

The first digital computer was invented in 1642 by Blaise Pascal. It consisted of numbers entered in dials but, it could only add. However in 1671, a computer was invented that was eventually built in 1694. The man to credit for this invention is Gottfried Wilhelm von Leibniz.

Top Articles
2.6 GPA Colleges: Browse Schools That Accept a 2.6 GPA
How To Withdraw Money From PayPal Without A Bank Account (The Best Ways)
Antisis City/Antisis City Gym
Skylar Vox Bra Size
How Much Does Dr Pol Charge To Deliver A Calf
Comcast Xfinity Outage in Kipton, Ohio
Erskine Plus Portal
About Goodwill – Goodwill NY/NJ
Craigslist Labor Gigs Albuquerque
Red Heeler Dog Breed Info, Pictures, Facts, Puppy Price & FAQs
Theycallmemissblue
Kinkos Whittier
Flights To Frankfort Kentucky
Viha Email Login
NHS England » Winter and H2 priorities
Hennens Chattanooga Dress Code
Indiana Wesleyan Transcripts
Icivics The Electoral Process Answer Key
Heart and Vascular Clinic in Monticello - North Memorial Health
Morristown Daily Record Obituary
Trivago Myrtle Beach Hotels
eugene bicycles - craigslist
Hctc Speed Test
Discord Nuker Bot Invite
Urban Dictionary Fov
Nearest Ups Ground Drop Off
2004 Honda Odyssey Firing Order
LG UN90 65" 4K Smart UHD TV - 65UN9000AUJ | LG CA
Otis Inmate Locator
Used Safari Condo Alto R1723 For Sale
Prévisions météo Paris à 15 jours - 1er site météo pour l'île-de-France
Helloid Worthington Login
Play 1v1 LOL 66 EZ → UNBLOCKED on 66games.io
Marine Forecast Sandy Hook To Manasquan Inlet
Edict Of Force Poe
دانلود سریال خاندان اژدها دیجی موویز
Myql Loan Login
Mvnt Merchant Services
Stanley Steemer Johnson City Tn
Xxn Abbreviation List 2023
Best GoMovies Alternatives
Tgirls Philly
فیلم گارد ساحلی زیرنویس فارسی بدون سانسور تاینی موویز
Gabrielle Abbate Obituary
15 Best Places to Visit in the Northeast During Summer
Swsnj Warehousing Inc
Pas Bcbs Prefix
Enter The Gungeon Gunther
El Patron Menu Bardstown Ky
The 5 Types of Intimacy Every Healthy Relationship Needs | All Points North
Where Is Darla-Jean Stanton Now
Divisadero Florist
Latest Posts
Article information

Author: Msgr. Refugio Daniel

Last Updated:

Views: 5627

Rating: 4.3 / 5 (54 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Msgr. Refugio Daniel

Birthday: 1999-09-15

Address: 8416 Beatty Center, Derekfort, VA 72092-0500

Phone: +6838967160603

Job: Mining Executive

Hobby: Woodworking, Knitting, Fishing, Coffee roasting, Kayaking, Horseback riding, Kite flying

Introduction: My name is Msgr. Refugio Daniel, I am a fine, precious, encouraging, calm, glamorous, vivacious, friendly person who loves writing and wants to share my knowledge and understanding with you.