The history of malware
The 1980s and onward: The theoretical underpinning of “self-reproducing automata”
(i.e., viruses) dates back to a lecture delivered in 1949 by 20th century Renaissance
man John von Neumann. However, the history of modern viruses begins with a program
called Elk Cloner, which started infecting Apple II systems in 1982. Disseminated by
infected floppy disks, the virus itself was harmless, but it spread to all disks attached
to a system, exploding so virulently that it can be considered the first large-scale
computer virus outbreak in history. Note that this was prior to any Windows PC malware.
Since then, viruses and worms have become widespread.
The 1990s: Microsoft Windows began its long run as the most popular OS in the world
(not to be overtaken till Google’s Android many years later). As the Windows OS and
its built-in applications grew in popularity, so too did the number of viruses written
for the platform. In particular, malware authors started to write infectious code in the
macro language of Microsoft Word. These macro viruses infected documents and templates
rather than executable applications, although strictly speaking, the Word document macros
are a form of executable code.
2002 to 2007: Instant messaging (IM) worms spread across popular IM networks, including AOL AIM,
MSN Messenger, and Yahoo Messenger. Most attacks started with a social engineering ploy. Attackers
might send out an IM that reads something like “Who’s with you in this picture?” or “OMG, I think
you won the lottery!” along with a link to a malicious download. Once your system was infected, the
IM worm would further propagate itself by sending malicious download links to everyone on your contact list.
2005 to 2009: Adware attacks proliferated, presenting unwanted advertisements to computer screens,
sometimes in the form of a pop-up or in a window that users could not close. These ads often exploited
legitimate software as a means to spread, but around 2008, software publishers began suing adware companies
for fraud. The result was millions of dollars in fines. This eventually drove adware companies to shut down.
Today’s tech support scams owe much to the adware of yesteryear, employing many of the same tricks as the old
adware attacks; e.g., full screen ads that can’t be closed or exited.
2007 to 2009: Malware scammers turned to social networks such as Myspace as a channel for delivering rogue
advertisements, links to phishing pages, and malicious applications. After Myspace declined in popularity,
Facebook and Twitter became the preferred platforms.
2013: A new form of malware called ransomware launched an attack under the name CryptoLocker, which continued
from early September 2013 to late May 2014, targeting computers running Windows. CryptoLocker succeeded in
forcing victims to pay about $3 million in total, BBC News reported. Moreover, the ransomware’s success gave
rise to an unending series of copycats.
2013 to 2017: Delivered through Trojans, exploits, and malvertising, ransomware became the king of malware,
culminating in huge outbreaks in 2017 that affected businesses of all kinds.
2017: Cryptocurrency—and how to mine for it—has captured widespread attention, leading to a new malware scam
called cryptojacking, or the act of secretly using someone else’s device to surreptitiously mine for cryptocurrency
with the victims’ resources.
2018 to 2019: Ransomware made its big comeback. This time, however, cybercriminals shifted their focus from individual
consumers to business targets. Riding a wave of GandCrab and Ryuk ransomware infections, attacks on businesses went up
365 percent from 2018 to 2019. As of this writing, there’s no indication the ransomware attacks will slow down.
Read more on history of malware here!
|