SlideShare une entreprise Scribd logo
1  sur  17
The 15 deadliest viruses of all time
https://factsempire.com/
1 The Creeper(1971)
• The Creeper, the first
computer virus was
created in 1971 by Bob
Thomas. The virus did not
affect computers, he just
self-replicate and leave
behind the following
message: `I'm the
creeper, catch me if you
can!". For his removal
was created the first
program "The Reaper",
the first anti-virus in
history.
2 Morris(1988)
• The virus was created by a
Cornell University graduate
Robert T Morris. This virus
initially wanted to find out
how big the internet
network, but an error
caused the virus to infect
6,000 computers in
universities and military
bases. Estimated damage:
between 10 million and 100
million US dollars.
•
3 Mellissa(1999)
• The virus was created by
David L.Smith, and named
after a lap dancer from
Florida. Mellissa is one of
the first viruses transmitted
via email. Once activated
the virus multiplies and
sends itself to 50 contacts in
the user’s Windows address
book.
• The impact of this virus was
so big that giant companies:
Alcatel, Microsoft, Intel
closed their operating
systems through email to
find a solution.
•
4 CIH(1998)
• The creator of the virus is
Chen Ing-Hau, a student at
Tatung University in Taiwan.
He wanted to test the
efficiency of the
• The virus infects and
destroys the BIOS.
• 60 million computers from
around the world were
infected. Damages are
estimated at 1 billion US
Dollar
• Creator came with an anti-
virus and the problem was
solved
5 I LOVE YOU(2000)
• Onel De Guzman has created the
virus in the year 2000.
• The purpose for which it was created:
the theft of passwords.
• Its mode of transmission is via email.
If the victim opened the attachment:
LOVE-LETTER-FOR-YOU.TXT.vbs , the
virus overwrites all image files on the
PC and steals all the passwords. Also,
the virus multiplies and emails itself
to all contacts in the user’s Windows
address book.
• 10% of Internet-connected PCs have
been infected during that time.
• Damage: 15 billion dollars
•
6 Stuxnet(2009)
• The virus spreads through
USB. It was developed by
Israel in collaboration
with the Americans for
sabotage Iran's nuclear
program. The virus was
discovered in 2010, but it
affecting the system since
2009. The virus has
managed to destroy one-
fifth of the number of
centrifuges Iran.
7 Conficker(2009)
• The creator of the virus
remains unknown.
• The virus uses the errors
from the operating
system to create a botnet
(military computers) to
launch DDOS
• 9 million computers were
infected and the damage
is estimated at $ 9 billion.
•
8 Cryptolocker(2013)
• It was discovered in
2013. It spreads via
email and botnet. After
encrypting files, the
virus displays a message
demanding a ransom.
The virus was isolated
in 2014.
9 Code Red (2001)
• The virus has infected a
million computers and
360,000 hosts. The
contaminated PC Were
Used for a DDOS attack
on White House website.
• This worm exploited an
OS vulnerability in
machines with W 2000
and NT.
• The White House
managed to repulse the
attack.
10 Nimida(2001)
• Nimda was a worm designed
to infect servers, considerably
slowing the internet traffic.
The virus has been released a
week after the 11 September
2001 terrorist attacks. The
virus was spreading through
four pathways: email,
vulnerable server, shared
folder, file transfer.
• Many considered it a terrorist
attack and made the link with
Al Qaeda.
•
11 Zeus(2009)
• Zeus is a Trojan virus
created by a criminal
organization in 2009. The
targets of this virus were big
banks and corporations. The
criminals managed to steal
70 million dollars but were
caught. 74000 FTP accounts
were compromised PC and
3.6 million were infected in
the US.
•
12 Slammer (2003)
• A worm virus that caused
DDoS attacks on internet
hosts. The virus could double
its size every 8.5 seconds.
• The virus randomly selects IP
addresses and launch DDoS
attacks. In total 200,000
computers were infected.
Among the victims are Bank
America ATM, 911 in
Washington D.C emergency,
Continental Airlines and a
nuclear power plant in Ohio.
Damage: $ 1200000000.
13 Sasser(2004)
• Compared to other
viruses, does not spread
via email and requires no
user action. He exploits a
flaw in the operating
system. A million PCs
were infected and vital
infrastructures were
affected. Estimated
damage: 18 billion US
Dollars.
14 Sobig.F (2003)
• It is both worm and Trojan.
Once the user opened the
email, it triggered the virus,
which then went hunting
for addresses.
• The virus managed to
paralyze airlines in Canada
and closed / slowed the
activity of several
corporations.Two million
computers have been
compromised .Estimated
Damage: 37 billion US
dollars.
15 My Doom(2004)
• The fastest spreading
virus ever
• It spreads via email.
When the victim
opened the email, the
virus was transmitted to
all addresses. Estimated
damage: 38.5 billion
dollars.
For more interesting facts please visit
my website:
https://factsempire.com/

Contenu connexe

Tendances

What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
sameer1993
 
computer viruses
computer virusescomputer viruses
computer viruses
ishan2shawn
 
Computer viruses and criminal internet business
Computer viruses and criminal internet businessComputer viruses and criminal internet business
Computer viruses and criminal internet business
Andrei Kolesnikov
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
Sadaf Walliyani
 

Tendances (14)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
εργασια
εργασιαεργασια
εργασια
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Computer viruses and criminal internet business
Computer viruses and criminal internet businessComputer viruses and criminal internet business
Computer viruses and criminal internet business
 
Timeline of computer viruses
Timeline of computer virusesTimeline of computer viruses
Timeline of computer viruses
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses And Hacking
Viruses And HackingViruses And Hacking
Viruses And Hacking
 
What is social media
What is social mediaWhat is social media
What is social media
 
Spreading virus
Spreading virusSpreading virus
Spreading virus
 
Eh34803812
Eh34803812Eh34803812
Eh34803812
 

Similaire à The 15 deadliest computer viruses

10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
AlefyaM
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
anbersattar
 
Most Malignant Viruses
Most Malignant VirusesMost Malignant Viruses
Most Malignant Viruses
Manish Prasad
 
New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Document
shoib_245
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
shopnil786
 

Similaire à The 15 deadliest computer viruses (20)

computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Viruses
VirusesViruses
Viruses
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Viruses
VirusesViruses
Viruses
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Most Malignant Viruses
Most Malignant VirusesMost Malignant Viruses
Most Malignant Viruses
 
New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Document
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Virus
Virus  Virus
Virus
 

Plus de Stefan Andrei

Plus de Stefan Andrei (8)

15 interesting facts about Pope Gregory V
15 interesting facts about Pope Gregory V15 interesting facts about Pope Gregory V
15 interesting facts about Pope Gregory V
 
5 newest countries in the world
5 newest countries in the world5 newest countries in the world
5 newest countries in the world
 
Only in Russia: funniest photo collection
Only in Russia: funniest photo collectionOnly in Russia: funniest photo collection
Only in Russia: funniest photo collection
 
40 be like bro memes that will make you laugh every time
40 be like bro memes that will make you laugh every time40 be like bro memes that will make you laugh every time
40 be like bro memes that will make you laugh every time
 
12 interesting facts about ancient rome
12 interesting facts about ancient rome12 interesting facts about ancient rome
12 interesting facts about ancient rome
 
Interesting facts about Mars
Interesting facts about MarsInteresting facts about Mars
Interesting facts about Mars
 
Amazing facts you need to know about Austria
Amazing facts you need to know about AustriaAmazing facts you need to know about Austria
Amazing facts you need to know about Austria
 
Animals who went into space
Animals who went into spaceAnimals who went into space
Animals who went into space
 

Dernier

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Dernier (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 

The 15 deadliest computer viruses

  • 1. The 15 deadliest viruses of all time https://factsempire.com/
  • 2. 1 The Creeper(1971) • The Creeper, the first computer virus was created in 1971 by Bob Thomas. The virus did not affect computers, he just self-replicate and leave behind the following message: `I'm the creeper, catch me if you can!". For his removal was created the first program "The Reaper", the first anti-virus in history.
  • 3. 2 Morris(1988) • The virus was created by a Cornell University graduate Robert T Morris. This virus initially wanted to find out how big the internet network, but an error caused the virus to infect 6,000 computers in universities and military bases. Estimated damage: between 10 million and 100 million US dollars. •
  • 4. 3 Mellissa(1999) • The virus was created by David L.Smith, and named after a lap dancer from Florida. Mellissa is one of the first viruses transmitted via email. Once activated the virus multiplies and sends itself to 50 contacts in the user’s Windows address book. • The impact of this virus was so big that giant companies: Alcatel, Microsoft, Intel closed their operating systems through email to find a solution. •
  • 5. 4 CIH(1998) • The creator of the virus is Chen Ing-Hau, a student at Tatung University in Taiwan. He wanted to test the efficiency of the • The virus infects and destroys the BIOS. • 60 million computers from around the world were infected. Damages are estimated at 1 billion US Dollar • Creator came with an anti- virus and the problem was solved
  • 6. 5 I LOVE YOU(2000) • Onel De Guzman has created the virus in the year 2000. • The purpose for which it was created: the theft of passwords. • Its mode of transmission is via email. If the victim opened the attachment: LOVE-LETTER-FOR-YOU.TXT.vbs , the virus overwrites all image files on the PC and steals all the passwords. Also, the virus multiplies and emails itself to all contacts in the user’s Windows address book. • 10% of Internet-connected PCs have been infected during that time. • Damage: 15 billion dollars •
  • 7. 6 Stuxnet(2009) • The virus spreads through USB. It was developed by Israel in collaboration with the Americans for sabotage Iran's nuclear program. The virus was discovered in 2010, but it affecting the system since 2009. The virus has managed to destroy one- fifth of the number of centrifuges Iran.
  • 8. 7 Conficker(2009) • The creator of the virus remains unknown. • The virus uses the errors from the operating system to create a botnet (military computers) to launch DDOS • 9 million computers were infected and the damage is estimated at $ 9 billion. •
  • 9. 8 Cryptolocker(2013) • It was discovered in 2013. It spreads via email and botnet. After encrypting files, the virus displays a message demanding a ransom. The virus was isolated in 2014.
  • 10. 9 Code Red (2001) • The virus has infected a million computers and 360,000 hosts. The contaminated PC Were Used for a DDOS attack on White House website. • This worm exploited an OS vulnerability in machines with W 2000 and NT. • The White House managed to repulse the attack.
  • 11. 10 Nimida(2001) • Nimda was a worm designed to infect servers, considerably slowing the internet traffic. The virus has been released a week after the 11 September 2001 terrorist attacks. The virus was spreading through four pathways: email, vulnerable server, shared folder, file transfer. • Many considered it a terrorist attack and made the link with Al Qaeda. •
  • 12. 11 Zeus(2009) • Zeus is a Trojan virus created by a criminal organization in 2009. The targets of this virus were big banks and corporations. The criminals managed to steal 70 million dollars but were caught. 74000 FTP accounts were compromised PC and 3.6 million were infected in the US. •
  • 13. 12 Slammer (2003) • A worm virus that caused DDoS attacks on internet hosts. The virus could double its size every 8.5 seconds. • The virus randomly selects IP addresses and launch DDoS attacks. In total 200,000 computers were infected. Among the victims are Bank America ATM, 911 in Washington D.C emergency, Continental Airlines and a nuclear power plant in Ohio. Damage: $ 1200000000.
  • 14. 13 Sasser(2004) • Compared to other viruses, does not spread via email and requires no user action. He exploits a flaw in the operating system. A million PCs were infected and vital infrastructures were affected. Estimated damage: 18 billion US Dollars.
  • 15. 14 Sobig.F (2003) • It is both worm and Trojan. Once the user opened the email, it triggered the virus, which then went hunting for addresses. • The virus managed to paralyze airlines in Canada and closed / slowed the activity of several corporations.Two million computers have been compromised .Estimated Damage: 37 billion US dollars.
  • 16. 15 My Doom(2004) • The fastest spreading virus ever • It spreads via email. When the victim opened the email, the virus was transmitted to all addresses. Estimated damage: 38.5 billion dollars.
  • 17. For more interesting facts please visit my website: https://factsempire.com/