Teknologi Informatika    
   
Daftar Isi
(Sebelumnya) List of computer size categoriesList of conjectures (Berikutnya)

Daftar/Tabel -- computer viruses

To aid the fight against computer viruses and other types of malicious software, many security advisory organizations and developers of anti-virus software compile and publish lists of viruses.

The compilation of a unified list of viruses is made difficult because of naming. When a new virus appears, the rush begins to identify and understand it as well as develop appropriate counter-measures to stop its propagation. Along the way, a name is attached to the virus. As the developers of anti-virus software compete partly based on how quickly they react to the new threat, they usually study and name the viruses independently. By the time the virus is identified, many names denote the same virus.

Another source of ambiguity in names is that sometimes a virus initially identified as a completely new virus is found to be a variation of an earlier known virus, in which cases, it is often renamed. For example, the second variation of the Sobig worm was initially called "Palyh" but later renamed "Sobig.b". Again, depending on how quickly this happens, the old name may persist.

Contents

Scope

In terms of scope, there are two major variants: the list of "in-the-wild" viruses, which list viruses in active circulation, and lists of all known viruses, which also contain viruses believed not be in active circulation (also called "zoo viruses"). The sizes are vastly different, in-the-wild lists contain a hundred viruses but full lists contain tens of q.

Daftar/Tabel -- viruses and related programs

NameAlias(es)typesSubtypeIsolation DateIsolationOriginAuthorNotes
1260V2PxMS-DOSPolymorphic1990   First virus to use polymorphic encryption
4K4096MS-DOS 1990-01   The first virus to use stealth
5lo MS-DOS 1992-10   Infects .EXE files only
A and A MS-DOS
Windows 95/98
      
AbraxasAbraxas5MS-DOS
Windows 95/98
 1993-04Europe ARCV groupInfects COM file. Disk directory listing will be set to the system date and time when infection occurred.
AcidAcid.670, Acid.670a, Avatar.Acid.670, Keeper.Acid.670MS-DOS
Windows 95/98
 1992  Corp-$MZUInfects COM file. Disk directory listing will not be altered.
Acme DOS (Windows 95 MS-DOS)     Upon executing infected EXE, this infects another EXE in current directory by making a hidden COM file with same base name.
ABCABC-2378, ABC.2378, ABC.2905MS-DOS 1992-10   ABC causes keystrokes on the compromised machine to be repeated.
Actifed MS-DOS      
Ada MS-DOS 1991-10 Argentina The Ada virus mainly targets .COM files, specifically COMMAND.COM.
AgenaAgena.723MS-DOS 1992-09Spain  Infected programs will have a file length increase of 723 to 738 bytes
AGI-PlanMonth 4-6MS-DOS  Mülheim an der Ruhr, Germany  AGI-Plan is notable for reappearing in South Africa in what appeared to be an intentional re-release.
AhDavid-1173, TuesdayMS-DOS 1991-05Italy  Systems infected with Ah will experience frequent system hangs.
AI MS-DOS      
AIDSAIDSB, Hahaha, TauntMS-DOS 1990  Dr. Joseph PoppAIDS is the first virus known to exploit the MS-DOS "corresponding file" vulnerability.
AIDS II        
AirCopAir cop-B, Red StateMS-DOS 1990-01   Infects the boot sector of floppy disks.
AlabamaAlabama.BMS-DOS 1989-10 Hebrew University, Jerusalem Files infected by Alabama increase in size by 1,560 bytes.
AlconRSY, Kendesm, Ken&Desmond, EtherMS-DOS 1997-12   Overwrites random information on disk causing damage over time.
Ambulance        
Anna Kournikova Email
VBScript
 2001-02-11 Sneek, NetherlandsJan de WitA Dutch court stated that US$166,000 in damages was caused by the worm.
AntiCMOS       Due a bug in the virus code, the virus fails to erase CMOS information as intended.
ARCV-n MS-DOS 1992-10/1992-11 England, United KingdomARCV GroupARCV-n is a term for a large family of viruses written by the ARCV group.
BomberCommanderBomberMS-DOS   Bulgaria Polymorphic virus which infects systems by inserting fragments of its code randomly into executable files.
BrainPakistani flu  1986-01 Lahore, PakistanBasit and Amjad Farooq AlviConsidered to be the first computer virus for the PC
Byte Bandit Amiga, Bootsector virus 1988-01  Swiss Cracking AssociationIt was one of the most feared Amiga viruses until the infamous Lamer Exterminator.
Christmas Tree        
Commwarrior Symbian Bluetooth worm     Famous for being the first worm to spread via MSS and Bluetooth.
Creeper TENEX operating system 1971  Bob ThomasAn experimental self-replicating program which gained access via the ARPANET and copied itself to the remote system.
Eliza MS-DOS 1991-12    
Elk Cloner Apple II 1982Mt. Lebanon, Pennsylvania, United StatesMt. Lebanon, Pennsylvania, United StatesRich SkrentaThe first virus observed "in the wild"
GraybirdGraybird P       
Hare MS-DOS
Windows 95, Windows 98
 1996-08   Famous for press coverage which blew its destructiveness out of proportion
ILOVEYOU   2000-05-05 Manila, PhilippinesReomel Ramores, Onel de GuzmanA computer worm that attacked tens of millions of Windows personal computers
INIT 1984 Mac OS 1992-03-13   Malicious, triggered on Friday the 13th. Shows a message "fuck this PC."
Jeefo        
Jerusalem DOS 1987-10   Jerusalem was initially very common and spawned a large number of variants.
Kama SutraBlackworm, Nyxem, and Blackmal  2006-01-16   Designed to destroy common files such as Microsoft Word, Excel, and PowerPoint documents.
Koko DOS 1991-03   The payload of this virus activates on July 29 and February 15 and may erase data on the users hard drive
Lamer Exterminator Amiga, Boot sector virus 1989-10 Germany Random encryption, fills random sector with "LAMER"
MacMagDrew, Bradow, Aldus, Peace  1987-12  
MDEFGarfield, Top Cat  1990-05    
MelissaMailissa, Simpsons, Kwyjibo, KwejeeboMicrosoft Word macro virus 1999-03-26 New Jersey, United StatesDavid L. SmithPart macro virus and part worm
Michelangelo MS-DOS 1991-02-04Australia  Ran March 6 (Michelangelo's birthday)
Navidad   2000-12    
Natas Multipartite, stealth, Polymorphic 1994  "Priest" 
nVIRMODM, nCAM, nFLU, kOOL, SHIT, prod, Fuck, Hpat, JudeMac OS 1987   nVIR has been known to 'hybridize' with different variants of nVIR on the same machine.
OneHalfSlovak Bomber, Freelove or Explosion-IIMS-DOS 1994 SlovakiaVyvojarIt is also known as one of the first viruses to implement a technique of "patchy infection"
Ontario.1024        
Ontario.2048        
OntarioSBCMS-DOS 1990-07 Ontario, Canada Death Angel
Pikachu virus   2000-06-28 Asia The Pikachu virus is believed to be the first computer virus geared at children.
Ping-pongBoot, Bouncing Ball, Bouncing Dot, Italian, Italian-A, VeraCruzBoot sector virus     Harmless to most computers  
RavMonE.exeRJump.A, Rajump, JisxWorm 2006-06-20   Once distributed in Apple iPods, but a Windows-only virus
SCA Amiga, Boot sector virus 1987-11 SwitzerlandSwiss Cracking AssociationPuts a message on screen. Harmless except it might destroy a legitimate non-standard boot block.
ScoresEric, Vult, NASA, San Jose FluMac OS 1988 Spring   Designed to attack two specific applications which were never released.
Scott's Valley MS-DOS 1990-09Scotts Valley, California, United States  Infected files will contain the seemingly meaningless hex string 5E8BDE909081C63200B912082E.
SevenDust666, MDEF, 9806, Graphics Accelerator, SevenDMac OS 1998    
Shankar's VirusW97M.Marker.oPolymorphic Virus 1999-06-03  Sam RogersInfects Word Documents
Shoerec Windows 32
SimileEtap, MetaPHORWindowsPolymorphic   The Mental DrillerThe metamorphic code accounts for around 90% of the virus' code
Stoned   1987Wellington, New Zealand  One of the earliest and most prevalent boot sector viruses
Sunday MS-DOSJerusalem.Sunday1989-11Seattle, Washington, United States  Because of an error in coding, the virus fails to execute its payload.
TDL-4 Botnet  JD virus   
Techno MS-DOS     The virus plays a tune that was created by the author of the virus
Whale MS-DOSPolymorphic1990-07-01 Hamburg, GermanyR HomerAt 9216 bytes, was for its time the largest virus ever discovered.
ZMistZMistfall, Zombie.MistfallZombie.Mistfall    Z0mbieIt was the first virus to use a technique known as "code integration".

Related lists

Unusual subtypes

Notable instances

  • Conficker
  • Creeper virus - The first malware that ran on ARPANET
  • ILOVEYOU
  • Leap - Mac OS X Trojan horse
  • Storm Worm - A Windows trojan horse that forms the Storm botnet

Similar software

Security topics

See also

External links

(Sebelumnya) List of computer size categoriesList of conjectures (Berikutnya)