The most popular review of virus history has three

2022-07-25
  • Detail

Reviewing the history of viruses, there are "three fast" features

most of the earliest viruses were born based on research or games. 5 The hinterland affected by filling in the experiment record form is limited to the laboratory or mainframe. The advent and popularization of personal computers have led to a transformative change and development in the nature, technology and impact of viruses. However, compared with the impact of the coming Internet era, the development and impact of viruses in the PC era are as small as a wizard

with the advent of the personal computer era, viruses have begun to have an influence that turns pale. With the expansion of the territory of Wintel, the storm circle of viruses is also expanding and sweeping all over the world

most PC viruses at that time used disk, optical disk or other portable media (such as zip, Jaz, Mo, USB portable disk) as the media for transmission. Imagine how fast a piece of disk or disc can be infected? And how wide can it be extended to? Such a mode of communication can only affect the internal or regional size of the enterprise at most

however, the transnational and transcontinental Internet worms are different. They not only affect the region and spread all over the world, but also spread at an alarming speed. In Internet, viruses can choose many media and have a strong influence. These terrible viruses can be spread through different ways and means, such as page sharing, sharing software, P2P, real-time messages, network sharing, system vulnerabilities and e-mail

the "poison speed" is spreading faster and faster.

among them, the most terrible is the effect of proper oil replacement caused by system vulnerabilities and e-mail. System vulnerabilities have always been a pain for individuals and even enterprises, but they are the favorite of hackers and virus writers. They carry out various intrusion and attack actions through vulnerabilities, such as embedding backdoor programs and BOT remote control programs, resulting in the leakage of important private data of individuals or enterprises. Among them, through BOT programs, hackers can also remotely control the invaded computer to become a zombie and springboard to attack other computers, thus forming a more terrible zombie network and causing greater losses and damage to other specific targets

by using mass mailers and the extreme proliferation of spam, various viruses have found the ultimate propagation weapon. Also, due to the spread of spam, and the hybrid threat technology, various malicious programs continue to create speed records for conquering the world

for example, the I love you virus in 2000 spread several times faster than the Melissa macro virus in 1999, and its destructive power is also more powerful. In 2001, Nimda vermicular virus infected more than 2.2 million computers in just 24 hours, resulting in losses of more than 500million US dollars. In 2003, the SQL Slammer worm caused a global loss of 1billion dollars in just five days

the most terrible one is the sobig worm in august2003, which is regarded as the fastest spreading worm in history. According to ZDNet, the United States (AOL) received up to 11.5 million messages carrying sobig in just one day F. Also because of the far-reaching impact of the worm, Sophos has F was listed as the most harmful virus in 2003

next, Scud of the year 2004 should be regarded as Mydoom worm. According to the associated press, the tragic fate virus can send 100 toxic emails within 30 seconds, and the U.S. central control center received 3800 infection reports within 45 minutes. It can be seen that its propagation speed is no less than that of sobig worm

according to the 9th annual computer virus observation report of the International Computer Security Association (ICSA) in 2003, if the early file type virus wants to conquer the world through disks or CDs, it will probably take months or even years to achieve. After the appearance of macro virus, the time of virus's global journey was shortened to the point of "week"

since the first Melissa virus transmitted via email came out in 1999, the record of virus bypassing the world has been broken again, and it has been rapidly shortened to "days". Not long ago, in 2001, the world's first code red worm adopting hybrid threat technology took the lead in breaking a new record for the global speed of virus dissemination in the unit of "hours"

2003 was a year when viruses continued to show amazing speed. First, SQL Slammer hit the world in just 10 minutes, creating a new record again. As for the sobig worm, which is known as the fastest spreading worm in history, the speed is certainly faster. However, since there is no relevant report yet, it is impossible to provide accurate speed figures here. In any case, sobig and the 2004 Mydoom worm are definitely Scuds that can be recorded in 10 minutes

shorter and shorter attack time difference

in addition, thanks to the system and software vulnerabilities that constantly appear in Yuanyuan, malicious programs not only use these vulnerabilities to launch ruthless attacks, but also constantly create a world record for breaking the shortest attack time difference

on the whole, the time difference between the release of Microsoft vulnerabilities and the occurrence of virus attacks is becoming shorter and shorter. In 2001, Nimda was the first virus to shorten the time difference to less than one year (11 months). At that time, the time difference of the fastest virus attack was mostly calculated by years. For example, in 2002, bugbear and Klez worm, which also used Microsoft's IE vulnerability to automatically open infected email attachments, launched attacks more than a year after Microsoft announced the vulnerability information

in 2003, the blast worm that specifically attacked Microsoft RPC (remote procedure call) DCOM (Distributed Component Object Mode) buffer overflow vulnerability reduced the time difference to 26 days in "days"

next, the killer variant sasser The B worm launched a global attack within 17 days after Microsoft announced the windows LSASS buffer overrun vulnerability. Taiwan also reported that 40 post office ATM operations were suspended

however, the title of the record holder in 2004 was taken away by the witty worm, which began to attack computers with this vulnerability on the Internet within 48 hours after the vulnerability of the firewall software ISS (Internet Security Systems) was announced

according to Symantec's Security Threat Research Report for the first half of 2004, the average time difference between vulnerability release and related worm attacks is 5.8 days. For enterprises (especially large enterprises with a large number of PCs), it is almost impossible to repair all computer vulnerabilities in just 2 to 5.8 days, which highlights the seriousness of current vulnerabilities and related worms

the ever-changing "poison technique"

in addition to grasping the media such as email or vulnerability, the technology of the virus itself is also constantly changing with each passing day. More importantly, in the past, the virus spread slowly, affecting the hinterland in favor of the company. At the same time, the company also expanded its supply chain regionally by increasing warehouse locations around the world. Most of them were written by computer experts in a certain region behind closed doors

but now, with new technologies, spam and amazing spreading speed, viruses are attacking the world. In the borderless Internet, hackers can gain more benefits. Moreover, these hackers no longer work behind closed doors, and borrow countless experts, public virus codes, and even virus generators to learn from each other and improve their skills

in addition, there are too many reasons behind the continuous breakthrough of virus technology in order to escape the pursuit of anti-virus software, to cross the firewall, to remain famous in history, to retaliate, to play treasures, to steal secrets, and to make money

Copyright © 2011 JIN SHI