SlideShare uma empresa Scribd logo
The 15 deadliest viruses of all time
https://factsempire.com/
1 The Creeper(1971)
• The Creeper, the first
computer virus was
created in 1971 by Bob
Thomas. The virus did not
affect computers, he just
self-replicate and leave
behind the following
message: `I'm the
creeper, catch me if you
can!". For his removal
was created the first
program "The Reaper",
the first anti-virus in
history.
2 Morris(1988)
• The virus was created by a
Cornell University graduate
Robert T Morris. This virus
initially wanted to find out
how big the internet
network, but an error
caused the virus to infect
6,000 computers in
universities and military
bases. Estimated damage:
between 10 million and 100
million US dollars.
•
3 Mellissa(1999)
• The virus was created by
David L.Smith, and named
after a lap dancer from
Florida. Mellissa is one of
the first viruses transmitted
via email. Once activated
the virus multiplies and
sends itself to 50 contacts in
the user’s Windows address
book.
• The impact of this virus was
so big that giant companies:
Alcatel, Microsoft, Intel
closed their operating
systems through email to
find a solution.
•
4 CIH(1998)
• The creator of the virus is
Chen Ing-Hau, a student at
Tatung University in Taiwan.
He wanted to test the
efficiency of the
• The virus infects and
destroys the BIOS.
• 60 million computers from
around the world were
infected. Damages are
estimated at 1 billion US
Dollar
• Creator came with an anti-
virus and the problem was
solved
5 I LOVE YOU(2000)
• Onel De Guzman has created the
virus in the year 2000.
• The purpose for which it was created:
the theft of passwords.
• Its mode of transmission is via email.
If the victim opened the attachment:
LOVE-LETTER-FOR-YOU.TXT.vbs , the
virus overwrites all image files on the
PC and steals all the passwords. Also,
the virus multiplies and emails itself
to all contacts in the user’s Windows
address book.
• 10% of Internet-connected PCs have
been infected during that time.
• Damage: 15 billion dollars
•
6 Stuxnet(2009)
• The virus spreads through
USB. It was developed by
Israel in collaboration
with the Americans for
sabotage Iran's nuclear
program. The virus was
discovered in 2010, but it
affecting the system since
2009. The virus has
managed to destroy one-
fifth of the number of
centrifuges Iran.
7 Conficker(2009)
• The creator of the virus
remains unknown.
• The virus uses the errors
from the operating
system to create a botnet
(military computers) to
launch DDOS
• 9 million computers were
infected and the damage
is estimated at $ 9 billion.
•
8 Cryptolocker(2013)
• It was discovered in
2013. It spreads via
email and botnet. After
encrypting files, the
virus displays a message
demanding a ransom.
The virus was isolated
in 2014.
9 Code Red (2001)
• The virus has infected a
million computers and
360,000 hosts. The
contaminated PC Were
Used for a DDOS attack
on White House website.
• This worm exploited an
OS vulnerability in
machines with W 2000
and NT.
• The White House
managed to repulse the
attack.
10 Nimida(2001)
• Nimda was a worm designed
to infect servers, considerably
slowing the internet traffic.
The virus has been released a
week after the 11 September
2001 terrorist attacks. The
virus was spreading through
four pathways: email,
vulnerable server, shared
folder, file transfer.
• Many considered it a terrorist
attack and made the link with
Al Qaeda.
•
11 Zeus(2009)
• Zeus is a Trojan virus
created by a criminal
organization in 2009. The
targets of this virus were big
banks and corporations. The
criminals managed to steal
70 million dollars but were
caught. 74000 FTP accounts
were compromised PC and
3.6 million were infected in
the US.
•
12 Slammer (2003)
• A worm virus that caused
DDoS attacks on internet
hosts. The virus could double
its size every 8.5 seconds.
• The virus randomly selects IP
addresses and launch DDoS
attacks. In total 200,000
computers were infected.
Among the victims are Bank
America ATM, 911 in
Washington D.C emergency,
Continental Airlines and a
nuclear power plant in Ohio.
Damage: $ 1200000000.
13 Sasser(2004)
• Compared to other
viruses, does not spread
via email and requires no
user action. He exploits a
flaw in the operating
system. A million PCs
were infected and vital
infrastructures were
affected. Estimated
damage: 18 billion US
Dollars.
14 Sobig.F (2003)
• It is both worm and Trojan.
Once the user opened the
email, it triggered the virus,
which then went hunting
for addresses.
• The virus managed to
paralyze airlines in Canada
and closed / slowed the
activity of several
corporations.Two million
computers have been
compromised .Estimated
Damage: 37 billion US
dollars.
15 My Doom(2004)
• The fastest spreading
virus ever
• It spreads via email.
When the victim
opened the email, the
virus was transmitted to
all addresses. Estimated
damage: 38.5 billion
dollars.
For more interesting facts please visit
my website:
https://factsempire.com/

Mais conteúdo relacionado

Mais procurados

Computer viruses
Computer virusesComputer viruses
Computer viruses
kamrannasiriiui
 
εργασια
εργασιαεργασια
εργασια
Stefanos MrPerfection
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
sameer1993
 
computer viruses
computer virusescomputer viruses
computer viruses
ishan2shawn
 
Computer viruses and criminal internet business
Computer viruses and criminal internet businessComputer viruses and criminal internet business
Computer viruses and criminal internet business
Andrei Kolesnikov
 
Timeline of computer viruses
Timeline of computer virusesTimeline of computer viruses
Timeline of computer viruses
Smart Technology Services, Inc.
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
Sadaf Walliyani
 
Computer virus
Computer virusComputer virus
Computer virus
dineshrwt911
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
Nishant Reshwal
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Abdul Wadood Khan
 
Viruses And Hacking
Viruses And HackingViruses And Hacking
Viruses And Hacking
Muhammad Fahd Un-Nabi Khan
 
What is social media
What is social mediaWhat is social media
What is social media
tessausman
 
Spreading virus
Spreading virusSpreading virus
Spreading virus
dixitas
 
Eh34803812
Eh34803812Eh34803812
Eh34803812
IJERA Editor
 

Mais procurados (14)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
εργασια
εργασιαεργασια
εργασια
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Computer viruses and criminal internet business
Computer viruses and criminal internet businessComputer viruses and criminal internet business
Computer viruses and criminal internet business
 
Timeline of computer viruses
Timeline of computer virusesTimeline of computer viruses
Timeline of computer viruses
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses And Hacking
Viruses And HackingViruses And Hacking
Viruses And Hacking
 
What is social media
What is social mediaWhat is social media
What is social media
 
Spreading virus
Spreading virusSpreading virus
Spreading virus
 
Eh34803812
Eh34803812Eh34803812
Eh34803812
 

Semelhante a The 15 deadliest computer viruses

computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
sonykhan3
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
Study Hub
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
VijayPatidar71
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
NORTHCUSTOMS
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
PrinceYdvz
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
Priyanka Aggarwal
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
AsimRaza464161
 
Viruses
VirusesViruses
Viruses
AlyssaFerrer7
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
LadyChristianneCalic
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
Leonor Costa
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
AlefyaM
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
EdwinGervacio2
 
Viruses
VirusesViruses
Viruses
yuvan80
 
The ‘Love Bug’ or the so-called 'Iloveyou virus'
The ‘Love Bug’ or the so-called 'Iloveyou virus'The ‘Love Bug’ or the so-called 'Iloveyou virus'
The ‘Love Bug’ or the so-called 'Iloveyou virus'
johannesgetu60
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
anbersattar
 
Most Malignant Viruses
Most Malignant VirusesMost Malignant Viruses
Most Malignant Viruses
Manish Prasad
 
New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Document
shoib_245
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
shopnil786
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
Rahman_Hussain
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
Protik Roy
 

Semelhante a The 15 deadliest computer viruses (20)

computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses
VirusesViruses
Viruses
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Viruses
VirusesViruses
Viruses
 
The ‘Love Bug’ or the so-called 'Iloveyou virus'
The ‘Love Bug’ or the so-called 'Iloveyou virus'The ‘Love Bug’ or the so-called 'Iloveyou virus'
The ‘Love Bug’ or the so-called 'Iloveyou virus'
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Most Malignant Viruses
Most Malignant VirusesMost Malignant Viruses
Most Malignant Viruses
 
New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Document
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 

Mais de Stefan Andrei

15 interesting facts about Pope Gregory V
15 interesting facts about Pope Gregory V15 interesting facts about Pope Gregory V
15 interesting facts about Pope Gregory V
Stefan Andrei
 
5 newest countries in the world
5 newest countries in the world5 newest countries in the world
5 newest countries in the world
Stefan Andrei
 
Only in Russia: funniest photo collection
Only in Russia: funniest photo collectionOnly in Russia: funniest photo collection
Only in Russia: funniest photo collection
Stefan Andrei
 
40 be like bro memes that will make you laugh every time
40 be like bro memes that will make you laugh every time40 be like bro memes that will make you laugh every time
40 be like bro memes that will make you laugh every time
Stefan Andrei
 
12 interesting facts about ancient rome
12 interesting facts about ancient rome12 interesting facts about ancient rome
12 interesting facts about ancient rome
Stefan Andrei
 
Interesting facts about Mars
Interesting facts about MarsInteresting facts about Mars
Interesting facts about Mars
Stefan Andrei
 
Amazing facts you need to know about Austria
Amazing facts you need to know about AustriaAmazing facts you need to know about Austria
Amazing facts you need to know about Austria
Stefan Andrei
 
Animals who went into space
Animals who went into spaceAnimals who went into space
Animals who went into space
Stefan Andrei
 

Mais de Stefan Andrei (8)

15 interesting facts about Pope Gregory V
15 interesting facts about Pope Gregory V15 interesting facts about Pope Gregory V
15 interesting facts about Pope Gregory V
 
5 newest countries in the world
5 newest countries in the world5 newest countries in the world
5 newest countries in the world
 
Only in Russia: funniest photo collection
Only in Russia: funniest photo collectionOnly in Russia: funniest photo collection
Only in Russia: funniest photo collection
 
40 be like bro memes that will make you laugh every time
40 be like bro memes that will make you laugh every time40 be like bro memes that will make you laugh every time
40 be like bro memes that will make you laugh every time
 
12 interesting facts about ancient rome
12 interesting facts about ancient rome12 interesting facts about ancient rome
12 interesting facts about ancient rome
 
Interesting facts about Mars
Interesting facts about MarsInteresting facts about Mars
Interesting facts about Mars
 
Amazing facts you need to know about Austria
Amazing facts you need to know about AustriaAmazing facts you need to know about Austria
Amazing facts you need to know about Austria
 
Animals who went into space
Animals who went into spaceAnimals who went into space
Animals who went into space
 

Último

Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 

Último (20)

Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 

The 15 deadliest computer viruses

  • 1. The 15 deadliest viruses of all time https://factsempire.com/
  • 2. 1 The Creeper(1971) • The Creeper, the first computer virus was created in 1971 by Bob Thomas. The virus did not affect computers, he just self-replicate and leave behind the following message: `I'm the creeper, catch me if you can!". For his removal was created the first program "The Reaper", the first anti-virus in history.
  • 3. 2 Morris(1988) • The virus was created by a Cornell University graduate Robert T Morris. This virus initially wanted to find out how big the internet network, but an error caused the virus to infect 6,000 computers in universities and military bases. Estimated damage: between 10 million and 100 million US dollars. •
  • 4. 3 Mellissa(1999) • The virus was created by David L.Smith, and named after a lap dancer from Florida. Mellissa is one of the first viruses transmitted via email. Once activated the virus multiplies and sends itself to 50 contacts in the user’s Windows address book. • The impact of this virus was so big that giant companies: Alcatel, Microsoft, Intel closed their operating systems through email to find a solution. •
  • 5. 4 CIH(1998) • The creator of the virus is Chen Ing-Hau, a student at Tatung University in Taiwan. He wanted to test the efficiency of the • The virus infects and destroys the BIOS. • 60 million computers from around the world were infected. Damages are estimated at 1 billion US Dollar • Creator came with an anti- virus and the problem was solved
  • 6. 5 I LOVE YOU(2000) • Onel De Guzman has created the virus in the year 2000. • The purpose for which it was created: the theft of passwords. • Its mode of transmission is via email. If the victim opened the attachment: LOVE-LETTER-FOR-YOU.TXT.vbs , the virus overwrites all image files on the PC and steals all the passwords. Also, the virus multiplies and emails itself to all contacts in the user’s Windows address book. • 10% of Internet-connected PCs have been infected during that time. • Damage: 15 billion dollars •
  • 7. 6 Stuxnet(2009) • The virus spreads through USB. It was developed by Israel in collaboration with the Americans for sabotage Iran's nuclear program. The virus was discovered in 2010, but it affecting the system since 2009. The virus has managed to destroy one- fifth of the number of centrifuges Iran.
  • 8. 7 Conficker(2009) • The creator of the virus remains unknown. • The virus uses the errors from the operating system to create a botnet (military computers) to launch DDOS • 9 million computers were infected and the damage is estimated at $ 9 billion. •
  • 9. 8 Cryptolocker(2013) • It was discovered in 2013. It spreads via email and botnet. After encrypting files, the virus displays a message demanding a ransom. The virus was isolated in 2014.
  • 10. 9 Code Red (2001) • The virus has infected a million computers and 360,000 hosts. The contaminated PC Were Used for a DDOS attack on White House website. • This worm exploited an OS vulnerability in machines with W 2000 and NT. • The White House managed to repulse the attack.
  • 11. 10 Nimida(2001) • Nimda was a worm designed to infect servers, considerably slowing the internet traffic. The virus has been released a week after the 11 September 2001 terrorist attacks. The virus was spreading through four pathways: email, vulnerable server, shared folder, file transfer. • Many considered it a terrorist attack and made the link with Al Qaeda. •
  • 12. 11 Zeus(2009) • Zeus is a Trojan virus created by a criminal organization in 2009. The targets of this virus were big banks and corporations. The criminals managed to steal 70 million dollars but were caught. 74000 FTP accounts were compromised PC and 3.6 million were infected in the US. •
  • 13. 12 Slammer (2003) • A worm virus that caused DDoS attacks on internet hosts. The virus could double its size every 8.5 seconds. • The virus randomly selects IP addresses and launch DDoS attacks. In total 200,000 computers were infected. Among the victims are Bank America ATM, 911 in Washington D.C emergency, Continental Airlines and a nuclear power plant in Ohio. Damage: $ 1200000000.
  • 14. 13 Sasser(2004) • Compared to other viruses, does not spread via email and requires no user action. He exploits a flaw in the operating system. A million PCs were infected and vital infrastructures were affected. Estimated damage: 18 billion US Dollars.
  • 15. 14 Sobig.F (2003) • It is both worm and Trojan. Once the user opened the email, it triggered the virus, which then went hunting for addresses. • The virus managed to paralyze airlines in Canada and closed / slowed the activity of several corporations.Two million computers have been compromised .Estimated Damage: 37 billion US dollars.
  • 16. 15 My Doom(2004) • The fastest spreading virus ever • It spreads via email. When the victim opened the email, the virus was transmitted to all addresses. Estimated damage: 38.5 billion dollars.
  • 17. For more interesting facts please visit my website: https://factsempire.com/