There seems to be various kinds of computer viruses people don’t think are as serious as they really are; the newer viruses hit PCs and company computers worldwide are more dangerous than ever. Such criminal activity is an underground criminal scheme. Sounds pathetic, but that’s because they are.
Here are the most deadly computer viruses that you need to be on the look out for if you are on a computer daily.
Code Red (2001) – The White House was attacked by “Code Red” in the summer of 2001. Caught by employees working security under eEye Digital Security were, ironically, drinking Code Red Mountain Dew. Is it odd, yes, but what does a drink have to do with this? Yet, for a dangerous virus like this to bring down 4K servers in a week, that’s a call for “code red,” literally.
Unmasking the true way it struck wasn’t by an email attachment nor was it downloading any files. In fact, it was defacing webpages that displayed “HACKED BY CHINESE!” It happened on July 13th. This was very sneaky-like. It took advantage of a Microsoft internet information server flaw. The estimation of total damages was approximately $2.6B! There was more than 1M computers that received the virus.
Sobig F (2003) – If you were on a computer at the end of the summer of 2003 and opened a confusing looking email without thinking twice about it, you may have gotten one of the most dangerous viruses to fool millions. This, ladies and gentlemen, was called Sobig F. It was one of the most dangerous and miserable four weeks for millions of computer users worldwide.
Those computer hackers smashed internal PC computer users and the corporate computer users globally. It also was considered one of the most dangerous and destructive demon-like acts to take over the internet. A host of computers were infected by it. It was an email attachment that had a ‘security hole’ which would ‘worm’ it’s way in systems. The ‘hole’ was within the computer system allowing the exposure to send all sorts of messages. The user’s email was “trapped,” so this beast ate it’s way within computer motherboards. Within one day, it set a world record because it replicated itself 1M times. But, it did finally get broken by another beast. That was the mass computer murderer called MY DOOM. It caused approximately $4B in damages leaving its wake in more than $2M personal computers worldwide!
Stuxnet (2009-2010) – This particular computer virus was for the sole purpose of destroying a real-world computer machine’s external parts as opposed to the virtual components. Introducing Stuxnet which was specifically designed to destroy the machinery of an uranium facility in Iran’s Natanz. It was like a villain from the “Transformers” movie that came to life and damaged the facility and won!
It targeted software which controlled industrial systems in countries that were basically considered bad according to the creator of it. In the past, malware software destroyed secondary physical problems to computers. Stuxnet was different because it brought viruses to LIFE! The available information suggests it damaged information data from the International Atomic Energy Agency. Computer experts believe it caused a large number of Iran’s centrifuges to self-destruct. Centrifuges are big washing machines used to enrich the uranium. It prompted a coalition to end it.
Conficker (current) – While Stuxnet was going on in that region, other regions were getting attacked by worse viruses. They were happening within personal and corporate computers and millions of computers received internal damages because of the virus called the Conficker worm. It infected millions. This is when anti-virus researchers coined the names “super worm or super bug.”
Although, it had no purpose, nor did it have a motive, but to destroy PCs. The virus did infect them and still is known today. They are called “botnet armies” and because it has no significance, the purpose of these virtual armies are still puzzling to CSI (Computer Security Investigators) today.
Zeus (2007) – There is no shortage of malware kits. Targeting personal information, this virus God known as Zeus has become the go-to tool for many of today’s cyber criminals. It’s readily available for sale by the cyber criminals underground. Buying them can actually or possibly destroy your computer. Blackmarkets are more dangerous than ever before. This is why there’s no shortage. The so-called malware kits are meant to target PCs and Zeus is no exception.
It gets passwords from files then smashes those files when it’s done. It also was for the purpose of creating an underground economy. Some examples of this were for compromised personal identities. Buying and selling personal informatio for less than a dollar is Zeus’ purpose. Zeus is the internet banking scheme and online shopping hacker’s tool.
ILOVEYOU – In the Philippines, May 2000, there was one evil and tricky computer malware that was detected by experts. There were approximately 10% of users which made a big mistake. It opened up the most hazardous worm only because the words “I Love You” were embedded in the text (aka .txt) attachment. It played on human emotions; it was a “global pandemic” in 24 hours. The subject line read…”ILOVEYOU.”
This is what it did: “It e-mailed itself to the first 50 contacts present in the Windows address book…infected multimedia files saved in the system causing damages…[worth] $5.5 billion.” (PC.com)
My Doom – This dangerous virus entered computer systems on January 2004 sending “shockwaves” worldwide. Like wildfire, emails with random senders’ addresses got hit, also called Novarg. The most dangerous virus ever to be released was MY DOOM. It infected 2M computers. In other words, it really hurt the cyber world for awhile. “Mail Transaction Failed” read across computer screens when users would send an email. It transmitted quite fast. Once the text was clicked on, it opened the attachment and the worm was released. It became the quickest mass mailer worm ever causing more than $38B in damages.
Finally, when you go on your computer and check your emails, make sure your anti-virus software is ON, and periodically, take it to a “computer geek” you trust in order to make sure you have everything working properly. Not to mention, always read the subject lines, times, and senders. They may not be what you think they are, so beware because those dangerous computer viruses are still going on today.