Malware

1986

The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems.

1987

His 1987 doctoral dissertation was on the subject of computer viruses.

1988

The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems.

1990

This same behavior is used by today's worms as well. With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs.

2003

Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes.

2004

The term came into use around 2004. Another term, potentially unwanted program (PUP) or potentially unwanted application (PUA), refers to applications that would be considered unwanted despite often having been downloaded by the user, possibly after failing to read a download agreement.

2012

It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent. In addition to criminal money-making, malware can be used for sabotage, often for political motives.

2014

It was reported in 2014 that US government agencies had been diverting computers purchased by those considered "targets" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world.

2015

Backdoors may be installed by Trojan horses, worms, implants, or other methods. === Evasion === Since the beginning of 2015, a sizable portion of malware has been utilizing a combination of many techniques designed to avoid detection and analysis.

2016

According to Symantec’s 2018 Internet Security Threat Report (ISTR), malware variants number has got up to 669,947,865 in 2017, which is the double of malware variants in 2016. === Insecure design or user error === Early PCs had to be booted from floppy disks.

2017

Recently these type attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018.

According to Symantec’s 2018 Internet Security Threat Report (ISTR), malware variants number has got up to 669,947,865 in 2017, which is the double of malware variants in 2016. === Insecure design or user error === Early PCs had to be booted from floppy disks.

2018

in 2018. Another type of evasion technique is Fileless malware or Advanced Volatile Threats (AVTs).

Recently these type attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018.

According to Symantec’s 2018 Internet Security Threat Report (ISTR), malware variants number has got up to 669,947,865 in 2017, which is the double of malware variants in 2016. === Insecure design or user error === Early PCs had to be booted from floppy disks.

The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 92% of malware delivery around the world. === Over-privileged users and over-privileged code === In computing, privilege refers to how much a user or program is allowed to modify a system.




All text is taken from Wikipedia. Text is available under the Creative Commons Attribution-ShareAlike License .

Page generated on 2021-08-05