A List of 14 Most Destructive Computer Viruses & Cyber-attacks that Jolted the World

Computer viruses can be dreadful that might cause extensive damage to your device be its your PC, laptop or smartphone & MAC device. It can altogether disturb your framework’s execution and can possibly wipe out everything on your hard circle.

A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive. When this replication succeeds, the affected areas are then said to be “infected”, making your device helpless and sick.

In this article, we are compiling and highlight some of the biggest &worst computer viruses that have caused a lot of damage in real life. These malware have caused tremendous harm, amounting to billions of dollars and disrupting critical real life infrastructure.

Here are the 14 most famous and malicious computer viruses that have worse affected the World.

ILOVEYOU (2000)

The ILOVEYOU virus has jolted the world back in 2000 where an innocent looking email attachment labeled, “I Love You” unleashed a malicious program that overwrote the users’ image files. This virus is considered one of the most virulent computer virus ever created.

This virus managed to wreck havoc on computer systems all over the world, causing damages totaling in at an estimate of $10 billion. 10% of the world’s Internet-connected computers were believed to have been infected. It was so bad that governments and large corporations took their mailing system offline to prevent infection.

Code Red (2001)

Code Red virus was first seen in the year 2001 and was discovered by two eEye Digital Security employees. The code red worm targeted computers with Microsoft IIS web server installed, exploiting a buffer overflow problem in the system. It leaves very little trace on the hard disk as it is able to run entirely on memory, with a size of 3,569 bytes. Code red virus leaves behind on affected web pages, “Hacked By Chinese!”Once infected, it will proceed to make a hundred copies of itself but due to a bug in the programming, it will duplicate even more and ends up eating a lot of the systems resources.

It will then launch a denial of service attack on several IP address, famous among them the website of the White House.  A total of 1-2 million servers were affected, which is amazing when you consider there were 6 million IIS servers at the time.

Melissa (1999)

Named after a fascinating artist from Florida, it was made by David L. Smith in 1999. It started as an infected Word document that was posted up on the alt.sexusenet group, claiming to be a list of passwords for pornographic sites. The infection will mail itself to the main 50 individuals in the client’s email address book and this brought about an expansion of email movement, disturbing the email administrations of governments and organizations. The infection apparently brought about $80 million in harms.

Sasser (2004)

Sasser is a Windows worm initially found in 2004. This infection backs off and crashes the PC, while making it difficult to reset without cutting the power. The impacts were staggeringly troublesome, with a huge number of PCs being tainted, and vital, basic framework influenced. It will also use the system resources to propagate itself to other machines through the Internet and infect others automatically.

The impacts of the infection were across the board as while the endeavor was at that point fixed, numerous PCs haven’t refreshed. This prompted more than a million diseases, taking out basic foundations, for example, aircrafts, news organizations, open transportation, doctor’s facilities, open transport, and so forth. In general, the harm was assessed to have taken a toll $18 billion.

Zeus (2007)

Zeus is a Trojan steed made to taint Windows PCs in 2007 with the goal that it will perform different criminal errands. It can be utilized to appropriate passwords and in addition documents, making a strict underground economy for traded off characters that can be purchased and sold for as meager 50 pennies.

The dominant part of PCs were contaminated either through drive-by downloads or phishing tricks. To start with distinguished in 2009, it figured out how to trade off a huge number of FTP records and PCs from vast multinational organizations and banks, for example, Amazon, Oracle, Bank of America, Cisco, and so forth. Controllers of the Zeus botnet utilized it to take the login accreditations of interpersonal organization, email and managing an account accounts.

About $70 million were stolen and in possession of the ring.

Conficker (2009)

In 2009, another PC worm slithered its way into a large number of Windows-based PCs around the globe, making a huge botnet armed force of remotely controlled PCs fit for taking money related information and other data.

The worm works by abusing a system benefit defenselessness that was available and unpatched in Windows. Once tainted, the worm will then reset account lockout arrangements, piece access to Windows refresh and antivirus destinations kill certain administrations and bolt out client accounts among numerous. At that point, it continues to introduce programming that will transform the PC into a botnet slave and scareware to trick cash off the client. The malware could taint more than 9 million PCs all around the globe, influencing governments, organizations and people.

Stuxnet(2009-2010)

Stuxnet (2009-2010) was the primary PC infection composed particularly to bring about harm in the genuine, rather than virtual, world. It particularly gone for those made by Siemens and was spread through tainted USB drives. In the event that the contaminated PC didn’t contain Siemens programming, it would lay lethargic and taint others in a constrained manner as to not give itself away.

agent.btz (2008)

When agent.btz was found on Pentagon computers in 2008, officials suspected the work of foreign spies. agent.btz created a digital beachhead, from which data could be transferred to servers under foreign control.

Mydoom (2004)

Surfacing in 2004, Mydoom was a worm for Windows that wound up noticeably one of the speediest spreading email worm since ILOVEYOU. The creator is obscure and it is trusted that the maker was paid to make it since it contains the instant message, “andy; I’m simply doing my employment, nothing individual, sad,”. It was named by McAfee www.mcafee.com/activate representative Craig Schmugar, one of the general population who had initially found it. “mydom” was a line of content in the program’s code (my space) and detecting this would have been enormous, included “doom” into it.

The infection spread through email as what seemed, by all accounts, to be a ricocheted message. At the point when the clueless casualty opened the email, the malevolent code downloaded itself and afterward appropriated the new casualty’s Outlook address book. From there, it spread to the victim’s friends, family and colleagues.

It caused an estimate of $38.5 billion in damages and the worm is still active in some form today.

CryptoLocker

Crypto Locker is a type of Trojan stallion ransom ware focused at PCs running Windows. It utilizes a few strategies to spread itself, for example, email, and once a PC is tainted, it will continue to encode certain documents on the hard drive and any mounted stockpiling associated with it with RSA open key cryptography. While it is sufficiently simple to expel the malware from the PC, the documents will at present remain scrambled. The best way to open the records is to pay a payment by a due date. In the event that the due date is not met, the payoff will increment fundamentally or the unscrambling keys erased. The payment for the most part adds up to $400 in prepaid money or bitcoin.

From data collected from the raid, the number of infections is estimated to be 500,000, with the number of those who paid the ransom to be at 1.3%, amounting to $3 million.

PoisonIvy (2005)

Poison Ivy is a PC security bad dream; it enables the attacker to furtively control the infected user’s computer. Malware like Poison Ivy is known as a “remote accesstrojan,” since it gives full control to the culprit through a secondary passage. Once the infection is introduced, the culprit can actuate the controls of the focused on PC to record or control its substance or even utilize the PC’s speaker and webcam to record sound and video.

Fizzer (2003)

By 2003, many worms were spreading over email, however Fizzer was a completely new virus form. Computers infected with Fizzer began conveying pharmacy spam. At the end of the day, Fizzer didn’t simply assume control over your deliver book to spread for spreading, it utilized your deliver book to convey the now commonplace porn and pills spam.

Slammer (2003)

Slammer works by discharging a downpour of system parcels, units of information transmitted over the Internet, conveying the Internet on numerous servers to a close sudden end. Among its rundown of casualties: Bank of America’s ATMs, a 911 crisis reaction framework in Washington State, and maybe most irritatingly, an atomic plant in Ohio.

WannaCryRansomware (2017)

The WannaCryransomware attack is an ongoing cyber-attack that has jolted the World targeting the Microsoft Windows operating system. The attack started on 12 May 2017 and infected more than 230,000 computers in 150 countries, with the software demanding ransom payments in the cryptocurrencyBitcoin in 28 languages. Ransom ware- a form of crime ware, is the malicious software used by hackers to block access to a computer system to extort money from an affected user.

The attack affected several large companies of Britain’s National Health Service (NHS), FedEx, Deutsche Bahn, and LATAM Airlines. Other targets in at least 99 countries were also reported to have been attacked around the same time.

Be Safe of All Viruses with McAfee Internet Security Antivirus

Today, McAfee antivirus reached at mostly computers from all over the world, because of its advanced feature and fully protected security which is developed by Intel Security, and most users prefers this as computer security cause of it provide total security in front of any type of virus file.

McAfee Antivirus Support number 1-800-445-2810 Toll Free to scan your device or troubleshoot any problem.

There are many reasons behind the popularity of this antivirus software or why most users prefer this as computer security. But users are confronted with such technical issues at the time of using the antivirus which is very common in every antivirus or software.

For any help, just note down our McAfee customer care number are 1-800-445-2810 (USA), +61-1800-769-903 (AUS), +44-800-046-5700 (UK) – Toll Free.

Disclaimer: We are an independent provider of remote technical support for software and peripheral devices. We have no affiliation with any of third-party companies unless such relationship is expressly specified. We collect information from the user but we never share the information to other parties. This information is so valuable for us. The use of any third party trademarks, logos, or brand names is for informational purposes only, and does not imply an endorsement by us or vice versa. If you find any kind of deceitful things present on our website then please inform us.

2 thoughts on “A List of 14 Most Destructive Computer Viruses & Cyber-attacks that Jolted the World”

Leave a Reply

Your email address will not be published. Required fields are marked *