December 15, 2019
For educational institutions
Computer Virus and Malware Timeline
1st working draft of computer virus timeline
⟶ Updated 25 days ago ⟶
List of edits
1st Known Computer Virus. Not Malicious, Self-Repleclating. Displayed " IM THE CREEPER CATCH ME IF YOU CAN". Bob Thomas
Rabbit or Wabbit Virus. Self-Replicating. First recorded malicious virus
First Trojan Virus. "Animal" was not malicious. Was part of a popular computer game. John Walker
1st PC virus. Non-malicious. Displayed a copyright message. Farooq Brothers
Malware transmitted through the Internet. "Love Letter". It also was the start of social engineering. Cited as most destructive worm, infected millions of machines
Infected computers gathered into Botnet. Storm worm infects users through email
1st Worm to carry destructive payload
1st Buffer-overflow. Morris Worm
Stuxnet, first worm designed to attack SCADA
1st Recorded Ransomware. AIDS Trojan. Joseph Popp
Staog, 1st Linux Virus
Thanos. 1st Ransomware to accept Cryptocurrency.
Archievus. Targeted Windows Users. Blackmailed users to make purchases to unlock PC
Reveton Ransomware. Used Web Cam images to look official.
Cryptolocker Ransomware. Used AES-256 encryption. A 2048-bit key was held on Tor Servers.
Sypeng & Koler. 1st Android Ransomware.
KeRanger. 1st confirmed Mac OSX ransomware. Signed with official dev certs
Jigsaw Ransomware. Files were deleted every 60 Sec. 1000 files were deleted for every attempt to stop the virus
1st Gen Firewall - Packet Filtering. Dropped packets according to destination, protocol, and port number
2nd Gen Firewall - "Stateful" filters. Circuit level gateways held packets until a determination was made.
3d Gen - Application Firewalls. Identified com protocols. Examined FTP and HTTP and how they were used.
Next-Gen Firewall Created by Palo Alto Networks. Layer 7 traffic control, User-based access control, IPS, and all functions of the predecessor firewalls.
Hacking was a term used to describe exceptional computer users
Phreakers. Users created dial tones for free calls. Also is when Security Officals noticed the need for testers to discover system vulnerabilities.
Cyber crime increased - Hacking became synomous with illegal activities, Black Hat was coined
Certified Ethical Hacker certification introduced
Computer Security Solutions first emerge
Anti-Virus Scanners Emerge. Signature based, hash and string.
Cloud Based AV is created. Next-Gen Security Tools are being developed
Pentagon JASON project concluded. The need to further develop cybersecurity was concluded
The white-label approach started. Only allowing approved software from trusted sources
USAF concludes computer security will be a future concern
First Model of real-time IDS developed
Real-time attack recognition deployed - Signature based
APE (IPS/IDS) Developed. Later renamed to Snort
Anomaly-based intrusion detection engine. Applied towards IoT devices
414 Group Hacks several high profile targets including Los Alamos National Labs. House of Reps pass new security laws
Computer Fraud and Abuse Act passed
Clifford Stoll stops Markus Hess from stealing national secrets
Russian Hackers Steal $10 Mil from Citi Bank
Hackers Deface DOJ, CIA, and USAF websites
GAO reports Hackers repeatly gained entry into DOD networks
Dept. of Homeland Security Created
Hacktivist group Anonymous formed
N Korea confirms 1st group state trained hackers are trained
SecDef is compromised by spearficshing
Bank of America website hacked
Playstation Network Hacked. Payment info and personal info stolen
Hacker sl1nk releases info from DOD servers
White House Hacked, Foreign State Hackers Suspected
OPM Hacked. 21.5 million employee records compromised
Dating site Ashley Madison Hacked
City Govt. Computer in Atlanta GA seized by randsomware
Jackson County GA City computers infected with randsomware
About & Feedback