Infection History– 2001 to Present

After the flurry of infections that haunted 2001, 2002 was remarkably peaceful. 2003 took off once again.

January saw the SQL Slammer worm contaminate over 75,000 systems in regarding 10 mins. It struck a defect in Microsoft’s SQL Server, as well as essentially reduced the whole Internet.

The Blaster worm struck in August. It was indicated to trigger a Denial of Service assault versus the Windows Update site, by triggering all contaminated systems to flooding the website on August 15th. Since private investigators in fact located his name in the infection code, the developer was founded guilty.

Just a couple of days later on, SoBig struck. This was an additional emailing infection. After infection, it browsed the data on the disk drive for e-mail addresses and also sent itself to any type of it located.

October saw the launch of the Sober emailing infection. Sober was noteworthy because it would certainly shut down antivirus programs after infection.

The fastest-spreading infection to this day was MyDoom, which struck in January 2004. At one factor, MyDoom was in charge of 1 from every 10 e-mails online.

2004 additionally saw the Witty, Sasser, as well as Santy infection episodes, and also in 2005, Zotob and also Samy.

In 2006, the very first Mac OS/X infection was introduced, in addition to the initial MySpace strike, “LordoftheNoose,” This program transformed the names of MySpace accounts, as well as shut out customers to maintain the names it established. At one factor, as numerous as 70% of all MySpace accounts were contaminated.

Much in 2007, an additional MySpace infection has actually emerged, and also the Peacomm Virus assaulted. Peacomm was an e-mail that asserted to be a video.

Historically, the majority of infections have actually utilized really comparable strike courses. Either they lugged an accessory which the customer needed to open up, or they made use of a recognized imperfection in the system which had actually not yet been repaired. The ethical of the tale is this: Keep your updates existing, and also watch out for uncommon add-ons.

It was implied to trigger a Denial of Service strike versus the Windows Update internet site, by creating all contaminated systems to flooding the website on August 15th. The developer was founded guilty due to the fact that private investigators in fact located his name in the infection code.

This was an additional emailing infection. Historically, a lot of infections have actually utilized really comparable assault courses.

Pin It on Pinterest

Share This