Komputer Sains    
   
Daftar Isi
(Sebelumnya) Timeline of artificial intelligenceTimeline of operating systems (Berikutnya)

Timeline of computer viruses and worms

This timeline of computer viruses and worms presents a chronology of noteworthy computer viruses, computer worms, trojan horses, similar malicious software, related research and events.

1966

  • John von Neumann's article on the "Theory of self-reproducing automata" is published.[1] The article is based on lectures given by von Neumann at the University of Illinois about the "Theory and Organization of Complicated Automata" in 1949.

1970–1979

1971

  • The Creeper virus, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies.[2] Creeper infected DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed. The Reaper program was later created to delete Creeper.[3]

1974

  • The Rabbit (or Wabbit) virus, more a fork bomb than a virus, is written. The Rabbit virus makes multiple copies of itself on a single computer (and was named "Rabbit" for the speed at which it did so) until it clogs the system, reducing system performance, before finally reaching a threshold and crashing the computer.[4]

1975

  • April: ANIMAL is written by John Walker for the UNIVAC 1108.[5] ANIMAL asked a number of questions to the user in an attempt to guess the type of animal that the user was thinking of, while the related program PERVADE would create a copy of itself and ANIMAL in every directory to which the current user had access. It spread across the multi-user UNIVACs when users with overlapping permissions discovered the game, and to other computers when tapes were shared. The program was carefully written to avoid damage to existing file or directory structures, and not to copy itself if permissions did not exist or if damage could result. Its spread was therefore halted by an OS upgrade which changed the format of the file status tables that PERVADE used for safe copying. Though non-malicious, "Pervading Animal" represents the first Trojan "in the wild".[6]

1975

  • The novel The Shockwave Rider by John Brunner is published, coining the word "worm" to describe a program that propagates itself through a computer network.

1980–1989

1980

  • Jürgen Kraus wrote his Diplom thesis "Selbstreproduktion bei Programmen" (Self-reproduction of Programs).[7][8]

1981

  • A program called Elk Cloner, written for Apple II systems, was created by Richard Skrenta. The Apple II was seen as particularly vulnerable due to the storage of its operating system on floppy disk. Elk Cloner's design combined with public ignorance about what malware was and how to protect against it led to Elk Cloner being responsible for the first large-scale computer virus outbreak in history.

1983

  • November: The term 'virus' is coined by Frederick Cohen in describing self-replicating computer programs. In 1984 Cohen uses the phrase "computer virus" – as suggested by his teacher Leonard Adleman – to describe the operation of such programs in terms of "infection". He defines a 'virus' as "a program that can 'infect' other programs by modifying them to include a possibly evolved copy of itself." Cohen demonstrates a virus-like program on a VAX11/750 system at Lehigh University. The program could install itself in, or infect, other system objects.[9]
  • A very early Trojan Horse designed for the IBM PC called ARF-ARF was downloaded from BBS sites and claimed to “Sort” the DOS Diskette Directory. This was a very desirable feature because DOS didn’t list the files in alphabetical order in 1983. Instead, the program deleted all of the files on the diskette, cleared the screen and typed ARF – ARF. ARF was a reference to the common “Abort, Retry Fail” message you would get when a PC could not boot from a diskette.[citation needed]

1984

  • August: Ken Thompson publishes his seminal paper, Reflections on Trusting Trust, in which he describes how he modified a C compiler so that when used to compile a specific version of the Unix operating system, it inserted a backdoor into the login command, and when used to compile itself, it inserted the backdoor insertion code, even if neither the backdoor nor the backdoor insertion code were present in the source code.[10]

1986

  • January: The Brain boot sector virus is released. Brain is considered the first IBM PC compatible virus, and the program responsible for the first IBM PC compatible virus epidemic. The virus is also known as Lahore, Pakistani, Pakistani Brain, and Pakistani flu as it was created in Lahore, Pakistan by 19 year old Pakistani programmer, Basit Farooq Alvi, and his brother, Amjad Farooq Alvi.
  • December: Ralf Burger presented the Virdem model of programs at a meeting of the underground Chaos Computer Club in Germany. The Virdem model represented the first programs that could replicate themselves via addition of their code to executable DOS files in COM format.[11][12]

1987

  • Appearance of the Vienna virus, which was subsequently neutralized—the first time this had happened on the IBM platform.[13]
  • Appearance of Lehigh virus, boot sector viruses such as Yale from USA, Stoned from New Zealand, Ping Pong from Italy, and appearance of first self-encrypting file virus, Cascade. Lehigh was stopped on campus before it spread to the wild, and has never been found elsewhere as a result. A subsequent infection of Cascade in the offices of IBM Belgium led to IBM responding with its own antivirus product development. Prior to this, antivirus solutions developed at IBM were intended for staff use only.
  • October: The Jerusalem virus, part of the (at that time unknown) Suriv family, is detected in the city of Jerusalem. The virus destroys all executable files on infected machines upon every occurrence of Friday the 13th (except Friday 13 November 1987 making its first trigger date May 13, 1988). Jerusalem caused a worldwide epidemic in 1988.
  • November: The SCA virus, a boot sector virus for Amigas appears, immediately creating a pandemic virus-writer storm. A short time later, SCA releases another, considerably more destructive virus, the Byte Bandit.
  • December: Christmas Tree EXEC was the first widely disruptive replicating network program, which paralyzed several international computer networks in December 1987.

1988

  • March 1: The Ping-Pong virus (also called Boot, Bouncing Ball, Bouncing Dot, Italian, Italian-A or VeraCruz), an MS-DOS boot sector virus, is discovered at University of Turin in Italy.
  • June: The CyberAIDS and Festering Hate Apple ProDOS viruses spreads from underground pirate BBS systems and starts infecting mainstream networks. Festering Hate was the last iteration of the CyberAIDS series extending back to 1985 and 1986. Unlike the few Apple viruses that had come before which were essentially annoying, but did no damage, the Festering Hate series of viruses was extremely destructive, spreading to all system files it could find on the host computer (hard drive, floppy, and system memory) and then destroying everything when it could no longer find any uninfected files.

1989

  • October: Ghostball, the first multipartite virus, is discovered by Friðrik Skúlason. It infects both executable .COM-files and boot sectors on MS-DOS systems. It captures certain information entered or saved by the user, with the corresponding threat to privacy, causes the loss of information stored on the computer, either specific files or data in general, affects the productivity of the computer, the network to which it’s connected or other remote sites, decrease the security level of the computer, but does not automatically spread itself.

1990–1999

1990

  • Mark Washburn working on an analysis of the Vienna and Cascade viruses with Ralf Burger develops the first family of polymorphic virus: the Chameleon family. Chameleon series debuted with the release of 1260.[14][15][16]

1992

  • March: The Michelangelo virus was expected to create a digital apocalypse on March 6, with millions of computers having their information wiped according to mass media hysteria surrounding the virus. Later assessments of the damage showed the aftermath to be minimal. John McAfee had been quoted by the media as saying that 5 million computers would be affected. He later said that, pressed by the interviewer to come up with a number, he had estimated a range from 5 thousand to 5 million, but the media naturally went with just the higher number.

1993

1994

  • April: OneHalf is a DOS-based polymorphic computer virus.[17]

1995

  • The first Macro virus, called "Concept," is created. It attacked Microsoft Word documents.[18]

1996

  • "Ply" - DOS 16-bit based complicated polymorphic virus appeared with built-in permutation engine.[citation needed]

1998

  • June 2: The first version of the CIH virus appears.

1999

  • January 20: The Happy99 worm first appeared. It invisibly attaches itself to emails, displays fireworks to hide the changes being made, and wishes the user a happy New Year. It modifies system files related to Outlook Express and Internet Explorer (IE) on Windows 95 and Windows 98.
  • December 30: The Kak worm is a Javascript computer worm that spread itself by exploiting a bug in Outlook Express.[19]

2000–2009

2000

  • May: The ILOVEYOU worm, also known as VBS/Loveletter and Love Bug worm, is a computer worm purportedly created by a Filipino computer science student. Written in VBScript, it infected millions of Windows computers worldwide within a few hours of its release. It is considered to be one of the most damaging worms ever.

2001

  • February 11: The Anna Kournikova virus hits e-mail servers hard by sending e-mail to contacts in the Microsoft Outlook addressbook.[20] Its creator, Dutchman Jan de Wit, was sentenced to 150 hours of community service.[21]
  • July: The Sircam worm is released, spreading through Microsoft systems via e-mail and unprotected network shares.
  • August 4: A complete re-write of the Code Red worm, Code Red II begins aggressively spreading onto Microsoft systems, primarily in China.
  • September 18: The Nimda worm is discovered and spreads through a variety of means including vulnerabilities in Microsoft Windows and backdoors left by Code Red II and Sadmind worm.
  • October 26: The Klez worm is first identified. It exploits a vulnerability in Microsoft Internet Explorer and Microsoft Outlook and Outlook Express.

2002

  • February 11: The Simile virus is a metamorphic computer virus written in assembly.[22]
  • Beast is a Windows based backdoor trojan horse, more commonly known as a RAT (Remote Administration Tool). It is capable of infecting almost all versions of Windows. Written in Delphi and released first by its author Tataye in 2002, its most current version was released October 3, 2004
  • March 7: Mylife is a computer worm that spread itself by sending malicious emails to all the contacts in Microsoft Outlook.[23]
  • August 30: Optix Pro is a configurable remote access tool or trojan, similar to SubSeven or BO2K.[24]

2003

  • January 24: The SQL slammer worm, aka Sapphire worm, Helkern and other names, attacks vulnerabilities in Microsoft SQL Server and MSDE becomes the fastest spreading worm of all time (measured by doubling time at the peak rate of growth),[25] crashing the Internet within 15 minutes of release.[26]
  • April 2: Graybird is a trojan horse also known as Backdoor.Graybird.[27]
  • June 13: ProRat is a Turkish-made Microsoft Windows based backdoor trojan horse, more commonly known as a RAT (Remote Administration Tool).[28]
  • August 12: The Blaster worm, aka the Lovesan worm, rapidly spreads by exploiting a vulnerability in system services present on Windows computers.
  • August 18: The Welchia (Nachi) worm is discovered. The worm tries to remove the blaster worm and patch Windows.
  • August 19: The Sobig worm (technically the Sobig.F worm) spreads rapidly through Microsoft systems via mail and network shares.
  • September 18: Swen is a computer worm written in C++.[29]
  • October 24: The Sober worm is first seen on Microsoft systems and maintains its presence until 2005 with many new variants. The simultaneous attacks on network weakpoints by the Blaster and Sobig worms cause massive damage.
  • November 10: Agobot is a computer worm that can spread itself by exploiting vulnerabilities on Microsoft Windows. Some of the vulnerabilities are MS03-026 and MS05-039.[30]
  • November 20: Bolgimo is a computer worm that spread itself by exploiting a buffer overflow vulnerability at Microsoft Windows DCOM RPC Interface.[31]

2004

  • January 18: Bagle is a mass-mailing worm affecting all versions of Microsoft Windows. There were 2 variants of Bagle worm, Bagle.A and Bagle.B. Bagle.B was discovered on February 17, 2004.
  • January 23: The L10n worm (usually pronounced "lion") was a Linux worm that spread by exploiting a buffer overflow in the BIND DNS server. It was based on an earlier worm known as the Ramen worm (commonly, albeit incorrectly referred to as the Ramen Virus) which was written to target systems running versions 6.2 and 7.0 of the Red Hat Linux distribution.
  • Late January: The MyDoom worm emerges, and currently holds the record for the fastest-spreading mass mailer worm.
  • February 16: The Netsky worm is discovered. The worm spreads by email and by copying itself to folders on the local hard drive as well as on mapped network drives if available. Many variants of the Netsky worm appeared.
  • March 19: The Witty worm is a record-breaking worm in many regards. It exploited holes in several Internet Security Systems (ISS) products. It was the fastest disclosure to worm, it was the first internet worm to carry a destructive payload and it spread rapidly using a pre-populated list of ground-zero hosts.
  • May 1: The Sasser worm emerges by exploiting a vulnerability in the Microsoft Windows LSASS service and causes problems in networks, while removing MyDoom and Bagle variants, even interrupting business.
  • June 15: Caribe or Cabir is a computer worm that is designed to infect mobile phones that run Symbian OS. It is the first computer worm that can infect mobile phones. It spread itself through Bluetooth. More information can be found on F-Secure[32] and Symantec.[33]
  • August 20: Vundo, or the Vundo Trojan (also known as Virtumonde or Virtumondo and sometimes referred to as MS Juan) is a trojan known to cause popups and advertising for rogue antispyware programs, and sporadically other misbehaviour including performance degradation and denial of service with some websites including Google and Facebook.[35]
  • October 12: Bifrost, also known as Bifrose, is a backdoor trojan which can infect Windows 95 through Vista. Bifrost uses the typical server, server builder, and client backdoor program configuration to allow a remote attack.[36]
  • December: Santy, the first known "webworm" is launched. It exploited a vulnerability in phpBB and used Google in order to find new targets. It infected around 40000 sites before Google filtered the search query used by the worm, preventing it from spreading.

2005

  • August 16: Zotob (computer worm) is a worm that spread itself by exploiting Microsoft Windows Plug and Play Buffer Overflow (MS05-039).[37]
  • October 13: The Samy XSS worm becomes the fastest spreading virus by some definitions as of 2006[update].
  • Late 2005: The Zlob Trojan, is a trojan horse which masquerades as a required video codec in the form of the Microsoft Windows ActiveX component. It was first detected in late 2005.[38]
  • Bandook or Bandook Rat (Bandook Remote Administration Tool) is a backdoor trojan horse that infects the Windows family. It uses a server creator, a client and a server to take control over the remote computer. It uses process hijacking / kernel patching to bypass the firewall, and let the server component hijack processes and gain rights for accessing the Internet.

2006

  • January 20: The Nyxem worm was discovered. It spread by mass-mailing. Its payload, which activates on the third of every month, starting on February 3, attempts to disable security-related and file sharing software, and destroy files of certain types, such as Microsoft Office files.
  • February 16: discovery of the first-ever malware for Mac OS X, a low-threat trojan-horse known as OSX/Leap-A or OSX/Oompa-A, is announced.
  • Late March: Brontok variant N was found in late March.[39] Brontok was a mass-email worm and the origin for the worm was from Indonesia.
  • Late September: Stration or Warezov worm first discovered.

2007

  • January 17: Storm Worm identified as a fast spreading email spamming threat to Microsoft systems. It begins gathering infected computers into the Storm botnet. By around June 30 it had infected 1.7 million computers, and it had compromised between 1 and 10 million computers by September.[40] Thought to have originated from Russia, it disguises itself as a news email containing a film about bogus news stories asking you to download the attachment which it claims is a film.
  • July: Zeus is a trojan that targets Microsoft Windows to steal banking information by keystroke logging.

2008

  • February 17: Mocmex is a trojan, which was found in a digital photo frame in February 2008. It was the first serious computer virus on a digital photo frame. The virus was traced back to a group in China.[41]
  • March 3: Torpig, also known as Sinowal and Mebroot, is a Trojan horse that affects Windows, turning off anti-virus applications. It allows others to access the computer, modifies data, steals confidential information (such as user passwords and other sensitive data) and installs more malware on the victim's computer.[42]
  • May 6: Rustock.C, a hitherto-rumoured spambot-type malware with advanced rootkit capabilities, was announced to have been detected on Microsoft systems and analyzed, having been in the wild and undetected since October 2007 at the very least.[43]
  • July 6: Bohmini.A is a configurable remote access tool or trojan that exploits security flaws in Adobe Flash 9.0.115 with Internet Explorer 7.0 and Firefox 2.0 under Windows XP SP2.[44]
  • November 21: Computer worm Conficker infects anywhere from 9 to 15 million Microsoft server systems running everything from Windows 2000 to the Windows 7 Beta. The French Navy,[46] UK Ministry of Defence (including Royal Navy warships and submarines),[47] Sheffield Hospital network,[48] German Bundeswehr[49] and Norwegian Police were all affected. Microsoft sets a bounty of $250,000 USD for information leading to the capture of the worm's author(s).[50] Five main variants of the Conficker worm are known and have been dubbed Conficker A, B, C, D and E. They were discovered 21 November 2008, 29 December 2008, 20 February 2009, 4 March 2009 and 7 April 2009, respectively. On December 16, 2008, Microsoft releases KB958644 [51] patching the server service vulnerability responsible for the spread of Conficker.

2009

  • July 15: Symantec discovered Daprosy Worm. Said trojan worm is intended to steal online-game passwords in internet cafes. It could, in fact, intercept all keystrokes and send them to its author which makes it particularly a very dangerous worm to infect B2B (business-to-business) systems.

2010 and later

2010

  • January: A botnet called Waledac sent spam emails. In February 2010, an international group of security researchers and Microsoft took Waledac down.[52]
  • February 18: Microsoft announced that a BSoD problem on some Windows machines which was triggered by a batch of Patch Tuesday updates was caused by the Alureon trojan.[53]
  • June 17: Stuxnet, a Windows trojan, was detected.[54] It is the first worm to attack SCADA systems.[55] There are suggestions that it was designed to target Iranian nuclear facilities.[56] It uses a valid certificate from Realtek.[57]
  • September 9: The virus, called "here you have" or "VBMania", is a simple trojan horse that arrives in the inbox with the odd-but-suggestive subject line "here you have". The body reads "This is The Document I told you about, you can find it Here" or "This is The Free Download Sex Movies, you can find it Here".
  • September 15: The virus called Kenzero is a virus that spreads online from Peer to peer (P2P) sites taking browsing history.[58]

2011

  • Anti-Spyware 2011, a trojan horse which attacks Windows 9x, 2000, XP, Vista, and Windows 7, posing as an anti-spyware program. It actually disables security-related process of anti-virus programs, while also blocking access to the Internet which prevents updates.[61]
  • Summer 2011: The Morto worm attempts to propagate itself to additional computers via the Microsoft Windows Remote Desktop Protocol (RDP). Morto spreads by forcing infected systems to scan for Windows servers allowing RDP login. Once Morto finds an RDP-accessible system, it attempts to log in to a domain or local system account named 'Administrator' using a number of common passwords.[62] A detailed overview of how the worm works—along with the password dictionary Morto uses—was done by Imperva.[63]
  • July 13: the Zeroaccess Rootkit or Max++ was discovered.
  • September 1: Duqu is a worm thought to be related to the Stuxnet worm. The Laboratory of Cryptography and System Security (CrySyS Lab)[64] of the Budapest University of Technology and Economics in Hungary discovered the threat, analysed the malware, and wrote a 60-page report naming the threat Duqu.[65][66] Duqu gets its name from the prefix "~DQ" it gives to the names of files it creates.[67]

2012

  • May: Flame also known as Flamer, sKyWIper, and Skywiper is modular computer malware discovered in 2012 that attacks computers running Microsoft Windows. The program is being used for targeted cyber espionage in Middle Eastern countries. Its discovery was announced on 28 May 2012 by MAHER Center of Iranian National Computer Emergency Response Team (CERT), Kaspersky Lab and CrySyS Lab of the Budapest University of Technology and Economics. CrySyS stated in their report that "sKyWIper is certainly the most sophisticated malware we encountered during our practice; arguably, it is the most complex malware ever found".[68]
  • August 16: Shamoon is a computer virus designed to target computers running Microsoft Windows in the energy sector. Symantec, Kaspersky Lab, and Seculert announced its discovery on August 16, 2012.
  • September 20: NGRBot is a worm that uses the IRC network for file transfer, sending and receiving commands between zombie network machines and the attacker’s IRC server, and monitoring and controlling network connectivity and intercept. It employs a user-mode rootkit technique to hide and steal its victim’s information. This family of bot is also designed to infect HTML pages with iframes, causing redirections, blocking victims from getting updates from security/antimalware products, and killing those services. The bot is designed to connect via a predefined IRC channel and communicate with a remote botnet.

See also

  • Helpful worm
  • Multipartite virus
  • Timeline of computer security hacker history

References

  1. ^ von Neumann, John (1966). In Arthur W. Burks. Theory of self-reproducing automata. University of Illinois Press. Retrieved June 12, 2010. 
  2. ^ Chen, Thomas; Robert, Jean-Marc (2004). "The Evolution of Viruses and Worms". http://vx.netlux.org/lib/atc01.html. Retrieved 2009-02-16.
  3. ^ Russell, Deborah; Gangemi, G T (1991). Computer Security Basics. O'Reilly. p. 86. ISBN 0-937175-71-4. 
  4. ^ "The very first viruses: Creeper, Wabbit and Brain", Daniel Snyder, InfoCarnivore, May 30, 2010
  5. ^ "ANIMAL Source Code". Fourmilab.ch. 1996-08-13. http://www.fourmilab.ch/documents/uni vac/animalsrc.html. Retrieved 2012-03-29.
  6. ^ "The Animal Episode". Fourmilab.ch. http://www.fourmilab.ch/documents/uni vac/animal.html. Retrieved 2012-03-29.
  7. ^ "Jurgen Kraus 'Selbstreproduktion bei programmen' (VX heavens)". Vx.netlux.org. http://vx.netlux.org/lib/mjk00.html. Retrieved 2010-07-10.[dead link]
  8. ^ Selbstreproduktion bei Programmen 1980 von der Idee zum virus (German) (Self-reproduction of programs from concept to virus), Jürgen Kraus, Dortmunder Alumnitag 2007.
  9. ^ "Fred Cohen 1984 "Computer Viruses – Theory and Experiments"". Eecs.umich.edu. 1983-11-03. http://www.eecs.umich.edu/%7Eaprakash /eecs588/handouts/cohen-viruses.html. Retrieved 2012-03-29.
  10. ^ Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763.
  11. ^ "Virdem", Virus Information, Wikia, retrieved 18 March 2013
  12. ^ The Art of Computer Virus Research and Defense, Peter Szor, Symantec Press / Addison-Wesley Professional, 2005, ISBN: 978-0-321-30454-4
  13. ^ "Kaspersky Lab viruslist". Viruslist.com. http://www.viruslist.com/en/viruses/e ncyclopedia?chapter=153311150. Retrieved 2012-03-29.
  14. ^ "Virus.DOS.Chameleon.1260 - Securelist". Viruslist.com. http://www.viruslist.com/en/viruses/e ncyclopedia?virusid=2008. Retrieved 2010-07-10.
  15. ^ "V2PX". Vil.nai.com. http://vil.nai.com/vil/content/v_9807 4.htm. Retrieved 2010-07-10.
  16. ^ "What we detect - Securelist". Viruslist.com. http://www.viruslist.com/en/viruses/e ncyclopedia?chapter=153311162. Retrieved 2010-07-10.
  17. ^ "Onehalf - VirusInfo". Virus.wikia.com. http://virus.wikia.com/wiki/Onehalf. Retrieved 2012-03-29.
  18. ^ "Glossary - Securelist". Viruslist.com. http://www.viruslist.com/en/glossary? glossid=189267795. Retrieved 2010-07-10.
  19. ^ "Wscript.KakWorm". Symantec. http://www.symantec.com/security_resp onse/writeup.jsp?docid=2000-121908-39 51-99. Retrieved 2012-03-29.
  20. ^ "Kournikova computer virus hits hard". BBC News. February 13, 2001. Retrieved April 9, 2010. 
  21. ^ Evers, Joris (May 3, 2002). "Kournikova virus maker appeals sentence". http://www.computerworld.com/s/articl e/70752/Kournikova_virus_maker_appeal s_sentence_. Retrieved 20 November 2010.
  22. ^ "MetaPHOR - VirusInfo". Virus.wikia.com. http://virus.wikia.com/wiki/MetaPHOR. Retrieved 2012-03-29.
  23. ^ "MyLife Worm". Antivirus.about.com. 2002-03-07. http://antivirus.about.com/library/we ekly/aa030802a.htm. Retrieved 2012-03-29.
  24. ^ Sevcenco, Serghei (August 30, 2002). "Security Updates: Backdoor.OptixPro.12". Symantec. http://securityresponse1.symantec.com /sarc/sarc.nsf/html/backdoor.optixpro .12.html/. Retrieved 2009-03-01.
  25. ^ "The Spread of the Sapphire/Slammer Worm". http://www.caida.org/publications/pap ers/2003/sapphire/sapphire.html. Retrieved 2012-12-14.
  26. ^ "Slammed!". July, 2003. http://www.wired.com/wired/archive/11 .07/slammer.html. Retrieved 2012-12-14.
  27. ^ Sevcenco, Serghei (February 10, 2006). "Symantec Security Response: Backdoor.Graybird". Symantec. http://securityresponse1.symantec.com /sarc/sarc.nsf/html/backdoor.graybird .html. Retrieved 2009-03-01.
  28. ^ "Backdoor.Prorat". Symantec. February 13, 2007. http://www.symantec.com/security_resp onse/writeup.jsp?docid=2003-061315-42 16-99. Retrieved 2009-03-01.
  29. ^ "Threat Description: Worm:W32/Swen". F-secure.com. http://www.f-secure.com/v-descs/swen. shtml. Retrieved 2012-03-29.
  30. ^ "Backdoor.Win32.Agobot.gen". Securelist. http://www.securelist.com/en/descript ions/old61021. Retrieved 2012-03-29.
  31. ^ "W32.Bolgi.Worm". Symantec. http://www.symantec.com/security_resp onse/writeup.jsp?docid=2003-112019-24 25-99. Retrieved 2012-03-29.
  32. ^ "Threat Description:Bluetooth-Worm:SymbOS/Cab ir". F-secure.com. http://www.f-secure.com/v-descs/cabir .shtml. Retrieved 2012-03-29.
  33. ^ "SymbOS.Cabir". Symantec. http://www.symantec.com/security_resp onse/writeup.jsp?docid=2004-061419-44 12-99. Retrieved 2012-03-29.
  34. ^ "Spyware Detail Nuclear RAT 1.0b1". Computer Associates. August 16, 2004. http://www.ca.com/securityadvisor/pes t/pest.aspx?id=453078396. Retrieved 2009-03-01.
  35. ^ "Vundo". McAfee. http://vil.nai.com/vil/content/v_1276 90.htm. Retrieved 2009-03-01.
  36. ^ "Backdoor.Bifrose". Symantec, Inc.. October 12, 2004. http://www.symantec.com/security_resp onse/writeup.jsp?docid=2004-101214-53 58-99. Retrieved 2009-02-28.
  37. ^ "W32.Zotob.E". Symantec. http://www.symantec.com/security_resp onse/writeup.jsp?docid=2005-081615-44 43-99. Retrieved 2012-03-29.
  38. ^ "The ZLOB Show: Trojan Poses as Fake Video Codec, Loads More Threats". Trend Micro. http://www.trendmicro.com/vinfo/secad visories/default6.asp?VNAME=The+ZLOB+ Show%3A+Trojan+poses+as+fake+video+co dec%2C+loads+more+threats. Retrieved 2009-02-28.
  39. ^ "Threat Description: Email-Worm:W32/Brontok.N". F-secure.com. http://www.f-secure.com/v-descs/bront ok_n.shtml. Retrieved 2012-03-29.
  40. ^ Peter Gutmann (31 August 2007). "World's most powerful supercomputer goes online". [[Full Disclosure (mailing list)|]]. http://seclists.org/fulldisclosure/20 07/Aug/0520.html. Retrieved 2007-11-04.
  41. ^ Gage, Deborah (February 17, 2005). "Chinese PC virus may have hidden agenda". SeatlePI. http://www.seattlepi.com/business/351 670_picframevirus18.html. Retrieved 2009-03-01.
  42. ^ Kimmo (March 3, 2008). "MBR Rootkit, A New Breed of". F-Secure. http://www.f-secure.com/weblog/archiv es/00001393.html. Retrieved 2009-03-01.
  43. ^ "Win32.Ntldrbot (aka Rustock)". Dr. Web Ltd.. http://www.pr.com/press-release/84130. Retrieved 2009-03-01.
  44. ^ "Virus Total". virustotal.com. July 8, 2008. http://www.virustotal.com/analisis/a5 d8b3ba9226285dd14619fd8faf12a7. Retrieved 2009-03-01.
  45. ^ "Koobface malware makes a comeback". cnet.com. April 9, 2010. http://news.cnet.com/8301-1009_3-2000 2112-83.html?. Retrieved 2009-04-13.
  46. ^ Willsher, Kim (2009-02-07). French fighter planes grounded by computer virus. London: The Daily Telegraph. Retrieved 2009-04-01. 
  47. ^ Williams, Chris (2009-01-20). MoD networks still malware-plagued after two weeks. The Register. Retrieved 2009-01-20. 
  48. ^ Williams, Chris (2009-01-20). Conficker seizes city's hospital network. The Register. Retrieved 2009-01-20. 
  49. ^ Conficker-Wurm infiziert hunderte Bundeswehr-Rechner (in German). PC Professionell. 2009-02-16. Retrieved 2009-04-01. 
  50. ^ Neild, Barry (2009-02-13). "$250K Microsoft bounty to catch worm creator". CNN. Retrieved 2009-03-29. 
  51. ^ "MS08-067: Vulnerability in Server service could allow remote code execution". Microsoft Corporation. http://support.microsoft.com/kb/95864 4.
  52. ^ "Waledac Takedown Successful". honeyblog.org. February 25, 2010. http://honeyblog.org/archives/52-Wale dac-Takedown-Successful.html. Retrieved 16 November 2012.
  53. ^ "Alureon trojan caused Windows 7 BSoD". microsoft.com. February 18, 2010. http://www.microsoft.com/security/por tal/Threat/Encyclopedia/Entry.aspx?Na me=Win32%2fAlureon. Retrieved 2010-02-18.
  54. ^ "VirusBlokAda News". Anti-virus.by. http://anti-virus.by/en/tempo.shtml. Retrieved 2012-03-29.
  55. ^ Gregg Keizer (16 September 2010). "Is Stuxnet the 'best' malware ever?". Infoworld. http://www.infoworld.com/print/137598. Retrieved 16 September 2010.
  56. ^ Stuxnet virus: worm 'could be aimed at high-profile Iranian targets’, Telegraph, 23 Sep 2010
  57. ^ "Possible New Rootkit Has Drivers Signed by Realtek". Kaspersky Labs. 15 July 2010. http://threatpost.com/en_us/blogs/pos sible-new-rootkit-has-drivers-signed- realtek-071510.
  58. ^ Harvison, Josh (September 27, 2010). "Blackmail virus infects computers, holds information ransom". kait8.com. http://www.kait8.com/Global/story.asp ?S=13220447. Retrieved 20 November 2010.
  59. ^ "Bastard child of SpyEye/ZeuS merger appears online". The Register. 2011 [last update]. Retrieved April 11, 2011. "Bastard child of SpyEye/ZeuS merger appears online" 
  60. ^ "SpyEye mobile banking Trojan uses same tactics as ZeuS". The Register. 2011 [last update]. http://www.theregister.co.uk/2011/04/ 05/spyeye_mobile_trojan/. Retrieved April 11, 2011. "SpyEye mobile banking Trojan uses same tactics as ZeuS"
  61. ^ "XP AntiSpyware 2011 - Virus Solution and Removal". Precisesecurity.com. http://www.precisesecurity.com/rogue/ xp-anti-spyware-2011/. Retrieved 2012-03-29.
  62. ^ "Morto Worm Spreads to Weak Systems". blogs.appriver.com. 2011 [last update]. http://blogs.appriver.com/blog/digita l-degenerate-2/morto-worm-spreads-to- weak-systems.
  63. ^ "Morto Post Mortem: Dissecting a Worm". blog.imperva.com. 2011 [last update]. http://blog.imperva.com/2011/09/morto -post-mortem-a-worm-deep-dive.html.
  64. ^ "Laboratory of Cryptography and System Security (CrySyS)". http://www.crysys.hu/. Retrieved 4 November 2011.
  65. ^ "Duqu: A Stuxnet-like malware found in the wild, technical report". Laboratory of Cryptography of Systems Security (CrySyS). 14 October 2011. http://www.crysys.hu/publications/fil es/bencsathPBF11duqu.pdf.
  66. ^ "Statement on Duqu's initial analysis". Laboratory of Cryptography of Systems Security (CrySyS). 21 October 2011. http://www.crysys.hu/in-the-press.htm l. Retrieved 25 October 2011.
  67. ^ "W32.Duqu – The precursor to the next Stuxnet (Version 1.4)". Symantec. 23 November 2011. http://www.symantec.com/content/en/us /enterprise/media/security_response/w hitepapers/w32_duqu_the_precursor_to_ the_next_stuxnet.pdf. Retrieved 30 December 2011.
  68. ^ "sKyWIper: A Complex Malware for Targeted Attacks". Budapest University of Technology and Economics. 28 May 2012. Archived from the original on 30 May 2012. http://www.crysys.hu/skywiper/skywipe r.pdf. Retrieved 29 May 2012.

External links

(Sebelumnya) Timeline of artificial intelligenceTimeline of operating systems (Berikutnya)