0% found this document useful (0 votes)
29 views3 pages

Viruses HTML

The document provides an overview of several infamous computer viruses, detailing their origins, methods of propagation, and impacts. Notable examples include the ILOVEYOU virus, Mydoom, Stuxnet, and WannaCry, each with unique characteristics and consequences. The document highlights the evolution of computer malware and its significant effects on individuals and organizations worldwide.

Uploaded by

naomi.chen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views3 pages

Viruses HTML

The document provides an overview of several infamous computer viruses, detailing their origins, methods of propagation, and impacts. Notable examples include the ILOVEYOU virus, Mydoom, Stuxnet, and WannaCry, each with unique characteristics and consequences. The document highlights the evolution of computer malware and its significant effects on individuals and organizations worldwide.

Uploaded by

naomi.chen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd

<html>

<body>
<center><h1 style="font-size: 40px;">Infamous Computer
Viruses</h1></center>
<h4 style="font-size: 30px;">The ILOVEYOU Virus</h4>
<img src="[Link]" width="55%" height="25%">
<p>ILOVEYOU, sometimes referred to as the Love Bug or Loveletter, was a
computer worm that infected over ten million Windows personal computers on
and after May 5, 2000. It started spreading as an email message with the
subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-
[Link].</p>

<h4 style="font-size: 30px;">The Mydoom Virus</h4>


<img src="[Link]" width="65%" height="35%">
<p>Mydoom was a computer worm that targeted computers running Microsoft
Windows. It was first sighted on January 26, 2004. It became the fastest-
spreading e-mail worm ever, exceeding previous records set by the Sobig
worm and ILOVEYOU, a record which as of 2024 has yet to be
surpassed.</p>

<h4 style="font-size: 30px;">The Stuxnet Virus</h4>


<img src="[Link]">
<p>Stuxnet is a malicious computer worm first uncovered in 2010 and thought
to have been in development since at least 2005. Stuxnet targets supervisory
control and data acquisition (SCADA) systems and is believed to be
responsible for causing substantial damage to the nuclear program of
[Link] neither country has openly admitted responsibility, multiple
independent news organizations recognize Stuxnet to be a cyberweapon built
jointly by the United States and Israel in a collaborative effort known as
Operation Olympic [Link] program, started during the Bush
administration, was rapidly expanded within the first months of Barack
Obama's presidency.</p>

<h4 style="font-size: 30px;">The Code Red Virus</h4>


<img src="[Link]" width="60%" height="30%">
<p>Code Red was a computer worm observed on the Internet on July 15,
2001. It attacked computers running Microsoft's IIS web server. It was the first
large-scale, mixed-threat attack to successfully target enterprise networks.
The Code Red worm was first discovered and researched by eEye Digital
Security employees Marc Maiffret and Ryan Permeh when it exploited a
vulnerability discovered by Riley Hassell. They named it "Code Red" because
they were drinking the Mountain Dew flavor of the same name at the time of
discovery.</p>

<h4 style="font-size: 30px;">The Conficker Virus</h4>


<img src="[Link]">
<p>Conficker, also known as Downup, Downadup and Kido, is a computer
worm targeting the Microsoft Windows operating system that was first
detected in November 2008. It uses flaws in Windows OS software (MS08-
067 / CVE-2008-4250) and dictionary attacks on administrator passwords to
propagate while forming a botnet, and has been unusually difficult to counter
because of its combined use of many advanced malware techniques. The
Conficker worm infected millions of computers including government, business
and home computers in over 190 countries, making it the largest known
computer worm infection since the 2003 SQL Slammer worm.</p>

<h4 style="font-size: 30px;">The CryptoLocker Virus</h4>


<img src="[Link]" width="50%" height="30%">
<p>The CryptoLocker ransomware attack was a cyberattack using the
CryptoLocker ransomware that occurred from 5 September 2013 to late May
2014. The attack utilized a trojan that targeted computers running Microsoft
Windows, and was believed to have first been posted to the Internet on 5
September 2013. It propagated via infected email attachments, and via an
existing Gameover ZeuS botnet. When activated, the malware encrypted
certain types of files stored on local and mounted network drives using RSA
public-key cryptography, with the private key stored only on the malware's
control servers.</p>

<h4 style="font-size: 30px;">The Klez Virus</h4>


<img src="[Link]">
<p>Klez is a computer worm that propagates via e-mail. It first appeared in
October 2001. A number of variants of the worm exist.
Klez infects Microsoft Windows systems, exploiting a vulnerability in Internet
Explorer's Trident layout engine, used by both Microsoft Outlook and Outlook
Express to render HTML [Link] e-mail through which the worm spreads
always includes a text portion and one or more attachments. The text portion
consists of either an HTML internal frame tag which causes buggy e-mail
clients to automatically execute the worm, or a few lines of text that attempt to
induce the recipient to execute the worm by opening the attachment
(sometimes by claiming that the attachment is a patch from Microsoft;
sometimes by claiming that the attachment is an antidote for the Klez worm).
The first attachment is always the worm, whose internals vary.</p>

<h4 style="font-size: 30px;">The Sobig Virus</h4>


<img src="[Link]">
<p>The Sobig Worm was a computer worm that infected millions of Internet-
connected, Microsoft Windows computers in August 2003. Although there
were indications that tests of the worm were carried out as early as August
2002, Sobig.A was first found in the wild in January 2003. Sobig.B was
released on May 18, 2003. It was first called Palyh, but was later renamed to
Sobig.B after anti-virus experts discovered it was a new generation of Sobig.
Sobig.C was released May 31 and fixed the timing bug in Sobig.B. Sobig.D
came a couple of weeks later followed by Sobig.E on June 25. On August 19,
Sobig.F became known and set a record in sheer volume of e-mails.</p>

<h4 style="font-size: 30px;">The WannaCry Virus</h4>


<img src="[Link]">
<p>The WannaCry computer virus was one of the first examples of
ransomware. It worked by taking over your computer files and then holding
them hostage until the victim paid a ransom [Link] in 2017, this
ransomware virus spread through 150 countries. It infected more than
200,000 computers and cost around $4 billion. A 22-year-old security
researcher was able to turn it off. He reportedly could have saved companies
billions of dollars by stopping the spread at the [Link] WannaCry virus may
have been contained, but it’s still around today. An interesting point is that the
creator of the WannaCry virus only demanded a $300 ransom, which means
the viral infection was more about disruption than monetary gain.</p>

<h4 style="font-size: 30px;">The Zeus Virus</h4>


<img src="[Link]">
<p>Zeus is considered one of the most dangerous computer viruses because
it breached about 88% of all Fortune 500 companies. It also cost $3 billion in
total damages and was responsible for about 44% of all banking malware
attacks in 2007, the year it was created. The virus was a group of programs
that took over machines remotely. It sent out phishing emails and used
malicious downloads to infect new hosts. Once the user clicked on the
attachments or links, the virus installed the Zeus malware [Link] Zeus
virus is particularly nasty because it can steal your sensitive data, such as
banking information. (It’s also known as a banking Trojan horse.) The other
way it works is by remotely contacting the hacker so they can hijack your
computer and install more malware.</p>

</body>
</html>

You might also like