Trojan targeting the Microsoft Windows operating system. The virus is capable of infecting files on computers running Microsoft Windows and DOS on the x86 processor and MacOS, whether they are on a Motorola or PowerPC processor. It does not infect any Macintosh systems beyond OS6.Īctivates on April 26, in which it destroys partition tables, and tries to overwrite the BIOS.įamous for being the first worm to spread via MMS and Bluetooth.Īn experimental self-replicating program which gained access via the ARPANET and copied itself to the remote system.įirst multi-processor virus. It was one of the most feared Amiga viruses until the infamous Lamer Exterminator.Ĭdef arrives on a system from an infected Desktop file on removable media. Polymorphic virus which infects systems by inserting fragments of its code randomly into executable files.Ĭonsidered to be the first computer virus for the PC The first Mac OS virus not to create additional resources instead, it patches existing CODE resources.ĭue to a bug in the virus code, the virus fails to erase CMOS information as intended.ĪRCV-n is a term for a large family of viruses written by the ARCV group. Overwrites random information on disk causing damage over time.Ī Dutch court stated that US$166,000 in damages was caused by the worm. COM files, specifically COMMAND.COM.ĪGI-Plan is notable for reappearing in South Africa in what appeared to be an intentional re-release.ĪIDS is the first virus known to exploit the DOS "corresponding file" vulnerability.įiles infected by Alabama increase in size by 1,560 bytes. Upon executing infected EXE, this infects another EXE in current directory by making a hidden COM file with same base name.ĪBC causes keystrokes on the compromised machine to be repeated. Disk directory listing will not be altered. Disk directory listing will be set to the system date and time when infection occurred.Īcid.670, Acid.670a, Avatar.Acid.670, Keeper.Acid.670 The first known MS-DOS-file-infector to use stealth The sizes are vastly different: in-the-wild lists contain a hundred viruses but full lists contain tens of thousands.Ĭomparison of viruses and related programs Virusįirst virus family to use polymorphic encryption In terms of scope, there are two major variants: the list of "in-the-wild" viruses, which list viruses in active circulation, and lists of all known viruses, which also contain viruses believed not to be in active circulation (also called "zoo viruses"). Again, depending on how quickly this happens, the old name may persist. For example, the second variation of the Sobig worm was initially called "Palyh" but later renamed "Sobig.b". By the time the virus is identified, many names denote the same virus.Īnother source of ambiguity in names is that sometimes a virus initially identified as a completely new virus is found to be a variation of an earlier known virus, in which cases, it is often renamed. As the developers of anti-virus software compete partly based on how quickly they react to the new threat, they usually study and name the viruses independently. Along the way, a name is attached to the virus. When a new virus appears, the rush begins to identify and understand it as well as develop appropriate counter-measures to stop its propagation. To aid the fight against computer viruses and other types of malicious software, many security advisory organizations and developers of anti-virus software compile and publish lists of viruses. The compilation of a unified list of computer viruses is made difficult because of naming. ( Learn how and when to remove this template message)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |