{"id":25690,"date":"2022-11-02T18:26:33","date_gmt":"2022-11-02T18:26:33","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=25690"},"modified":"2023-03-29T17:07:50","modified_gmt":"2023-03-29T17:07:50","slug":"computer-viruses-and-malware-history","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/","title":{"rendered":"The History of Computer Viruses &#038; Malware"},"content":{"rendered":"\r\n<p>If you\u2019ve used a computer for more than 5 minutes, you probably know a thing or two about computer viruses and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware<\/a>. On the modern Internet, malware is a near-constant presence. Whether it\u2019s <a href=\"https:\/\/www.esecurityplanet.com\/threats\/hacker-compromises-fbi-server-to-send-fake-emails\/\" target=\"_blank\" rel=\"noreferrer noopener\">infected emails<\/a> stealing employee access credentials or the plague of <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">r<\/a><a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">a<\/a><a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">nsomware<\/a> that has menaced the business world in recent years, there are a number of ways malware can disrupt your organization.<\/p>\r\n\r\n\r\n\r\n<p>Though often conflated with one another, malware and computer viruses aren\u2019t necessarily the same thing. While all computer viruses are malware, not all malware are computer viruses. The key difference between computer viruses and other types of malware is that computer viruses function, as the name implies, similar to the way biological viruses function. They begin by attaching themselves to programs or files on a computer then spreading to other computers when those infected programs or files are accessed. Computer viruses can also self-replicate to attach themselves to even more programs and files. This isn\u2019t necessarily true of other types of malware. Ransomware, for example, usually doesn\u2019t self-replicate.<\/p>\r\n\r\n\r\n\r\n<p>It\u2019s important to learn as much as you can about computer viruses and malware, now more than ever. According to a recent Statista report, there have been <a href=\"https:\/\/www.statista.com\/statistics\/873097\/malware-attacks-per-year-worldwide\/\" target=\"_blank\" rel=\"noreferrer noopener\">2.8 billion malware attacks<\/a> worldwide in just the first half of 2022. A 2020 study of <a href=\"https:\/\/www.esecurityplanet.com\/products\/metasploit-framework-tutorial\/\" target=\"_blank\" rel=\"noreferrer noopener\">pentesting<\/a> projects from Positive Technologies revealed that external attackers could <a href=\"https:\/\/www.ptsecurity.com\/ww-en\/analytics\/external-pentests-results-2020\/?sphrase_id=128526\" target=\"_blank\" rel=\"noreferrer noopener\">breach 93% of company networks<\/a>, with 71% being vulnerable even to novice-level hackers.<\/p>\r\n\r\n\r\n\r\n<p>Even as we focus on current cybersecurity <a href=\"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/\" target=\"_blank\" rel=\"noreferrer noopener\">threats<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/\" target=\"_blank\" rel=\"noreferrer noopener\">protections<\/a>, it can be just as important to take a look at the history of these malicious pieces of software and how their beginnings inform the way they\u2019re used and circulated today. The history of computer viruses and malware goes almost as far back as the history of the field of computer science itself.<\/p>\r\n\r\n\r\n\r\n<p><b>Looking to Protect Yourself Against Malware? Read <\/b><a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\"><b>Top Endpoint Detection &amp; Response (EDR) Solutions in 2022<\/b><\/a><\/p>\r\n\r\n\r\n\r\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 ez-toc-wrap-left counter-flat ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-66d708404ae84\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-66d708404ae84\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/#From-Theory-to-Reality-1948-1971\" title=\"From Theory to Reality: 1948-1971\">From Theory to Reality: 1948-1971<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/#Viruses-Get-Their-Name-1974-1986\" title=\"Viruses Get Their Name: 1974-1986\">Viruses Get Their Name: 1974-1986<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/#Worms-and-the-Dawn-of-the-Internet-Age-1987-2000\" title=\"Worms and the Dawn of the Internet Age: 1987-2000\">Worms and the Dawn of the Internet Age: 1987-2000<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/#Going-Mobile-and-Going-Global-2001-2010\" title=\"Going Mobile and Going Global: 2001-2010\">Going Mobile and Going Global: 2001-2010<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/#The-Rise-of-Ransomware-2011-2022\" title=\"The Rise of Ransomware: 2011-2022\">The Rise of Ransomware: 2011-2022<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/#The-Impact-of-Computer-Viruses-and-Malware-on-Cybersecurity\" title=\"The Impact of Computer Viruses and Malware on Cybersecurity\">The Impact of Computer Viruses and Malware on Cybersecurity<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"From-Theory-to-Reality-1948-1971\"><\/span>From Theory to Reality: 1948-1971<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p>Though they had yet to be named, computer viruses were first conceptualized by Hungarian mathematician John von Neumann, who designed a self-replicating computer program that some consider to be the precursor to computer viruses, even if it was never developed or deployed in the way computer viruses eventually would be. Though this work began in the 1940s, it, along with his other work in the field of self-replication, was eventually compiled and distributed via the 1966 paper <a href=\"https:\/\/history-computer.com\/Library\/VonNeumann1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cTheory of Self-Reproducing Automata.\u201d<\/a><\/p>\r\n\r\n\r\n\r\n<p>Though von Neumann\u2019s self-replicating program was more or less a thought experiment, computer programmer Bob Thomas developed the Creeper program in 1971, which is often cited as the first computer virus. Named after a character from \u201cScooby-Doo,\u201d the Creeper was originally intended as a security test for the U.S. Department of Defense\u2019s Advanced Research Projects Agency Network (ARPANET), the precursor of the modern Internet we know, love, and sometimes hate.<\/p>\r\n\r\n\r\n\r\n<p>As a security test, the Creeper\u2019s effects on infected machines were minimal. It would simply display a message on the computer\u2019s screen: &#8220;I&#8217;M THE CREEPER. CATCH ME IF YOU CAN!&#8221; A polite little virus, the Creeper would also try to remove itself from its host whenever it would infect a new hard drive.<\/p>\r\n\r\n\r\n\r\n<p>Though polite, the Creeper was still an annoyance to some, and in 1971, Ray Tomlinson developed the first <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/antivirus-vs-epp-vs-edr\/\" target=\"_blank\" rel=\"noreferrer noopener\">antivirus software<\/a>, called Reaper. The Reaper would glide across ARPANET, scanning for and removing any instances of the Creeper it found there.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Viruses-Get-Their-Name-1974-1986\"><\/span>Viruses Get Their Name: 1974-1986<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p>While the Creeper was a relatively benign program, 1974\u2019s Rabbit Virus was one of the first computer viruses developed with malicious intent. Named for how fast it could duplicate itself, the Rabbit Virus would flood infected computers with these copies, slowing down and even crashing machines with relative ease.<\/p>\r\n\r\n\r\n\r\n<p>1975 saw the creation of a precursor to modern trojan malware. The <a href=\"https:\/\/www.fourmilab.ch\/documents\/univac\/animal.html\" target=\"_blank\" rel=\"noreferrer noopener\">ANIMAL program<\/a>, wherein the computer would attempt to guess what animal a human is thinking of via a game similar to Twenty Questions, was popular amongst computer users at the time. John Walker\u2019s version of the program contained a hidden program, called PERVADE, which would search computer directories, find directories without copies of ANIMAL, and distribute copies of ANIMAL into those directories. Like the Creeper, however, this program was relatively benign and took steps to not delete important system files while copying itself everywhere.<\/p>\r\n\r\n\r\n\r\n<p>University of Southern California graduate student Fred Cohen designed an unnamed piece of malware which could take over a computer\u2019s system operations. He also was the person who first <a href=\"https:\/\/web.eecs.umich.edu\/~aprakash\/eecs588\/handouts\/cohen-viruses.html\" target=\"_blank\" rel=\"noreferrer noopener\">defined the term \u201ccomputer virus.\u201d<\/a> Cohen went on to become a pioneer of computer virus defense techniques.<\/p>\r\n\r\n\r\n\r\n<p>Cohen also believed in the idea of \u201cpositive viruses,\u201d beneficial programs which could spread like a computer virus. Cohen designed the compression virus, a virus designed to not damage or delete infected files but instead make them smaller.<\/p>\r\n\r\n\r\n\r\n<p>In 1986, the first PC computer virus, Brain, was released into the wild. Spread via infected floppy disks, Brain would replace the boot sector of the floppy disk with a copy of the virus. Created by the brothers Amjad Farooq Alvi and Basit Farooq Alvi, the virus was meant to track pirated copies of certain disks. When booted up, it would display a message that varied from copy to copy but usually began with the phrase \u201cWelcome to the Dungeon,\u201d a reference to an early programming forum. The brothers\u2019 names, addresses, and phone numbers were also listed with request that the victim contact them for virus removal. Like many early computer viruses, the Brain was relatively benign and wasn\u2019t designed to be much more than a nuisance.<\/p>\r\n\r\n\r\n\r\n<p><b>Want to Learn More About Malware? Check Out <\/b><a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-you-get-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\"><b>8 Ways Malware Creeps Onto Your Device<\/b><\/a><\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Worms-and-the-Dawn-of-the-Internet-Age-1987-2000\"><\/span>Worms and the Dawn of the Internet Age: 1987-2000<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p>As the Internet began entering public use, the first computer viruses that could be spread via the Internet followed soon after. One of the most popular early instances of computer viruses is the Morris Worm. Launched on November 2, 1988 and named for its creator, Robert Morris, the Morris Worm was also not intentionally designed to damage infected machines. Instead, it was meant to point out weaknesses present in networks of the time.<\/p>\r\n\r\n\r\n\r\n<p>However, a coding error resulted in the worm replicating itself regardless of a computer\u2019s infection status, leading to computers being infected with multiple copies of the worm and eventually resulting in the infected machine crashing. Robert Morris ended up becoming the first person convicted of a felony in the U.S. under the 1986 Computer Fraud and Abuse Act.<\/p>\r\n\r\n\r\n\r\n<p>As malicious viruses became more the norm, countermeasures were being developed to mitigate the damage these viruses caused. One of the first pieces of <a href=\"https:\/\/www.esecurityplanet.com\/products\/antivirus-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">antivirus software<\/a>, McAfee\u2019s VirusScan, was released in 1987. It would soon be followed by other antivirus pioneers, such as ESET\u2019s NOD program, G Data\u2019s Anti-Virus Kit, H+BEDV\u2019s Antivir, and Avast Antivirus.<\/p>\r\n\r\n\r\n\r\n<p>1992\u2019s Michelangelo virus was one of the first computer viruses to garner mainstream attention, as some vendors inadvertently sold hardware and software infected with the virus.<\/p>\r\n\r\n\r\n\r\n<p>As the Internet grew in popularity, new vectors of infection began popping up. From chain emails to suspicious websites, modern malware techniques began developing as the world approached the 21st century.<\/p>\r\n\r\n\r\n\r\n<p>Macro viruses \u2014 viruses which could infect documents created via programs like Microsoft Word \u2014 rose in popularity in the mid-to-late 1990s. One of the most prominent was 1999\u2019s Melissa. Spread via email, the virus would use the subject line \u201cImportant Message From [infected user].\u201d Upon opening the email, victims would see the message \u201cHere&#8217;s that document you asked for. Don&#8217;t show anyone else ;)\u201d along with a Word file titled \u201clist.doc.\u201d The document contained a list of pornographic sites, along with passwords for access to said sites and would then spread itself and its NSFW content by emailing the first 50 people in the victim\u2019s contact list.<\/p>\r\n\r\n\r\n\r\n<p><a href=\"https:\/\/www.esecurityplanet.com\/threats\/social-engineering-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Social engineering attacks<\/a> soon found use in the digital space. One of the first instances was the Love Letter virus of 2000. Though it followed similar patterns to macro viruses like Melissa, Love Letter utilized an infected Visual Basic Script (VBS) file, not a Word file. With a subject line reading \u201cI Love You,\u201d Love Letter would entice victims to click on its VBS file, releasing the virus onto their computer. Once inside a computer, Love Letter would replace and overwrite existing files on the machine with copies of itself.<\/p>\r\n\r\n\r\n\r\n<p><b>Read More: <\/b><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-secure-email-gateways\/\" target=\"_blank\" rel=\"noreferrer noopener\"><b>Top Secure Email Gateway Solutions for 2022<\/b><\/a><\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Going-Mobile-and-Going-Global-2001-2010\"><\/span>Going Mobile and Going Global: 2001-2010<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p>As the Internet and computers became integral to society\u2019s day-to-day existence, computer viruses and malware exploded in both popularity and potential disruptiveness.<\/p>\r\n\r\n\r\n\r\n<p>In July 2001, the Code Red Worm attempted to subject the entire Internet to a <a href=\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/\" target=\"_blank\" rel=\"noreferrer noopener\">distributed denial of service (DDoS) attack<\/a>. Named for the flavor of Mountain Dew its discoverers were drinking at the time, Code Red would disfigure infected websites with text reading \u201cHELLO! Welcome to http:\/\/www.worm.com! Hacked By Chinese!\u201d<\/p>\r\n\r\n\r\n\r\n<p>Due to the virus\u2019s name and the above text, many at the time believed the source of the malware to come from China. However, despite claims from U.S. officials at the time that the virus had been traced to China, no evidence has come to light linking Code Red to the nation. In fact, China itself would fall prey to the second iteration of Code Red in August 2001.<\/p>\r\n\r\n\r\n\r\n<p>At its peak, Code Red had <a href=\"https:\/\/www.caida.org\/archive\/code-red\/\" target=\"_blank\" rel=\"noreferrer noopener\">infected over 359,000 computers<\/a>, according to analysis from the Center for Applied Internet Data Analysis (CAIDA). Eventually, the infected computers were all directed to attempt a DDoS specifically on whitehouse.gov, though the White House managed to sidestep the assault.<\/p>\r\n\r\n\r\n\r\n<p>In 2003, one of the first pieces of malware designed to make money was discovered. Fizzer was a worm spread via email attachments that, once it found its way onto a machine could perform a number of malicious tasks. It could install a keylogging program, allowing the hacker to gain access to sensitive information like bank account details, passwords, and physical addresses as long as the victim typed that information into their computer at any point. It also would actively shut down antivirus processes to evade detection and removal. Finally, it could even act as a backdoor through which hackers could gain remote access to the infected machine\u2019s resources.<\/p>\r\n\r\n\r\n\r\n<p>2004 saw the first worm designed to infect cell phones in Cabir. Once it infects a phone, text reading \u201cCaribe\u201d would be displayed whenever the phone was turned on or used. It would then attempt to spread via wireless Bluetooth signals. Phones looking to evade infection by Cabir could do so by turning Bluetooth off or going into invisible mode.<\/p>\r\n\r\n\r\n\r\n<p><a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-you-get-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Stuxnet<\/a>, discovered in 2010, was the first documented attempt by sovereign nations to use malware to attack other sovereign nations. Stuxnet was designed to disrupt Iran\u2019s nuclear facilities, in an apparent attempt to slow the country\u2019s progress on developing an atomic bomb. This attack successfully delayed Iran\u2019s efforts, managing to destroy 1,000 of the 6,000 centrifuges the nation was using to enrich uranium, but it neither stopped nor slowed Iran\u2019s build-up of low-enriched uranium.<\/p>\r\n\r\n\r\n\r\n<p>Though both governments have formally denied responsibility for the attack, Stuxnet is today commonly known to be the work of a joint effort between Israel and the United States, as reported by both <a href=\"https:\/\/www.nytimes.com\/2012\/06\/01\/world\/middleeast\/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=2&amp;_r=1&amp;seid=auto&amp;smid=tw-nytimespolitics&amp;pagewanted=all\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cThe New York Times\u201d<\/a> and <a href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/stuxnet-was-work-of-us-and-israeli-experts-officials-say\/2012\/06\/01\/gJQAlnEy6U_story.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cThe Washington Post,\u201d<\/a> among others.<\/p>\r\n\r\n\r\n\r\n<p><b>Looking to Learn More About How to Defend Yourself Against Malware? Read <\/b><a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\" target=\"_blank\" rel=\"noreferrer noopener\"><b>How to Prevent Different Types of Malware<\/b><\/a><\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The-Rise-of-Ransomware-2011-2022\"><\/span>The Rise of Ransomware: 2011-2022<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p>The 2010s and early 2020s have been marked by an increased prevalence in ransomware attacks. Though around for decades, with the first documented instance being 1989\u2019s AIDS\u00a0 Trojan, ransomware has really blossomed on the modern Internet. The advent of untraceable digital payment methods like cryptocurrency was a boon to hackers looking to extort as much money as they could from their targets without being caught.<\/p>\r\n\r\n\r\n\r\n<p>The CryptoLocker Trojan, launched in 2013, was one of the first major instances of ransomware being used on a large scale, hitting about 250,000 victims and extorting around $27 million in Bitcoin.<\/p>\r\n\r\n\r\n\r\n<p>Though CryptoLocker was eventually isolated and neutralized by cybersecurity experts, it served as an effective proof-of-concept for ransomware as a business model. Copycat ransomware like <a href=\"https:\/\/www.esecurityplanet.com\/threats\/common-types-of-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">TorrentLocker and CryptoWall<\/a> starting springing up. CryptoWall in particular was enough of a menace for the FBI\u2019s Internet Crime Complaint Center (IC3) to issue <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/Y2015\/PSA150623.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">an alert<\/a> warning citizens about the malware.<\/p>\r\n\r\n\r\n\r\n<p>2015 saw a ransomware group known as Armada Collective hit three Greek banks with DDoS attacks, demanding a ransom paid in Bitcoin from the banks to cease fire. The group also claimed responsibility for a DDoS attack on Swiss email provider ProtonMail. However, DDoS attacks on ProtonMail continued even after the ransom was paid. Armada Collective were not so lucky with the Greek banks, who bolstered their cybersecurity measures and managed to continue operating without much disruption.<\/p>\r\n\r\n\r\n\r\n<p>In March 2016, the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">Petya<\/a> family of ransomware was first discovered. Unlike its predecessors, who would only encrypt files, Petya would replace the computer\u2019s master boot record with a ransom note, effectively rendering the computer unusable until a ransom was paid. It later evolved to also include file encryption. 2017 saw a pirated version of Petya, called \u201c<a href=\"https:\/\/www.esecurityplanet.com\/networks\/notpetya-cyber-attacks-point-to-a-need-for-comprehensive-risk-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">NotPetya<\/a>,\u201d hit multiple European countries in a major cyber attack, most notably Ukraine and Germany.<\/p>\r\n\r\n\r\n\r\n<p>Petya was initially developed by a group called Janus Cybercrime Solutions as part of its <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware-as-a-service (RaaS) platform<\/a>. Essentially, cyber criminals could pay Janus to use Petya on their targets, with Janus providing a number of additional services to ensure the attack was a success. In exchange, Janus took a cut of the paid ransom. RaaS quickly became a major force in the world of cybercrime thanks to both Petya and other major ransomware like LeakerLocker and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/wannacry-ransomware-hits-us-critical-infrastructure\/\" target=\"_blank\" rel=\"noreferrer noopener\">WannaCry<\/a>.<\/p>\r\n\r\n\r\n\r\n<p>WannaCry is especially notable for both its 2017 attack on users worldwide and its method of propagation. The attack was massive, hitting over 230,000 computers in more than 150 countries in the first day. NHS hospitals in the United Kingdom were among the largest organizations hit by WannaCry. The UK branch of automobile company Nissan was another notable victim.<\/p>\r\n\r\n\r\n\r\n<p>The way it spread was not through more traditional ransomware vectors like email phishing but instead through EternalBlue, a Windows exploit initially developed by the U.S. National Security Agency (NSA) and subsequently stolen and leaked by hacker group The Shadow Brokers.<\/p>\r\n\r\n\r\n\r\n<p>GandCrab burst onto the scene in 2018. Though not impressive alone, GandCrab was soon integrated with an info-stealing Trojan named \u201cVidar,\u201d after the Scandinavian god of vengeance. Thanks to Vidar, GandCrab provided a potent combination of both stealing and locking down victims\u2019 files and rapidly became the most-used RaaS on the market in 2018 and 2019.<\/p>\r\n\r\n\r\n\r\n<p>A partner of GandCrab, known as \u201cTeam Snatch,\u201d helped popularize the practice of publicly leaking victim data to further pressure targets to pay the ransom. This was likely an effort to better extort companies who might sufficiently back up their data to the point where deletion isn\u2019t much of a threat.<\/p>\r\n\r\n\r\n\r\n<p>One of the first major public ransomware data leaks occurred in November 2019 when ransomware group Maze leaked 700mb of stolen data from American security and janitorial services provider Allied Universal.<\/p>\r\n\r\n\r\n\r\n<p>Public leaks like Allied Universal\u2019s and major attacks like 2021\u2019s <a href=\"https:\/\/www.esecurityplanet.com\/trends\/colonial-pipeline-ransomware-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">Colonial Pipeline Attack<\/a> have led to ransomware\u2019s increased prominence and visibility in the public eye. The Colonial Pipeline Attack is also notable for potentially being one of the first known instances of an infection vector coming from a compromised employee password found on the dark web and not an external attack on a company\u2019s systems.<\/p>\r\n\r\n\r\n\r\n<p>Today, ransomware continues to plague businesses and individuals at all levels of society, provided that level includes regular Internet access. IC3\u2019s 2021 Internet Crime Report found that ransomware inflicted more than <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2021_IC3Report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">$49.2 million in losses<\/a> in the United States alone, and that\u2019s just the instances of ransomware attacks that were reported to the FBI.<\/p>\r\n\r\n\r\n\r\n<p>The FBI isn\u2019t the only one with worrying statistics on ransomware. IBM\u2019s <a href=\"https:\/\/www.ibm.com\/downloads\/cas\/ADLMYLAZ\" target=\"_blank\" rel=\"noreferrer noopener\">2022 Security X-Force Threat Intelligence Index<\/a> found that ransomware was the most common type of malware attack the company remediated in 2021, comprising 21% of the total. Around 37% of those attacks could be traced to a specific strain of ransomware known as both \u201c<a href=\"https:\/\/www.esecurityplanet.com\/threats\/revil-ransomware-group-returns\/\" target=\"_blank\" rel=\"noreferrer noopener\">REvil<\/a>\u201d and \u201cSodinokibi.\u201d<\/p>\r\n\r\n\r\n\r\n<p>Second place in IBM\u2019s index belonged to a ransomware strain called \u201cRyuk,\u201d which made up nearly 20% of attacks by itself. The name \u201cRyuk\u201d could come from either a romanization of the number 6 in Korean, a romanization of a North Korean surname, a village in Azerbaijan, or a character from popular Japanese media franchise \u201cDeath Note.\u201d<\/p>\r\n\r\n\r\n\r\n<p>Ryuk and REvil are especially notable for how long they have stayed in operation, having first appeared in April 2019 and August 2018, respectively. IBM\u2019s report notes that ransomware operations usually have a lifespan of about 17 months. REvil shut down in October 2021 after 31 months. In January 2022, Russia\u2019s Federal Security Service announced that the group behind REvil had <a href=\"https:\/\/www.bbc.com\/news\/technology-59998925\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cceased to exist\u201d<\/a> and that its information infrastructure had been \u201cneutralised.\u201d<\/p>\r\n\r\n\r\n\r\n<p><b>Read More: <\/b><a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\" target=\"_blank\" rel=\"noreferrer noopener\"><b>Best Cybersecurity Awareness Training for Employees in 2022<\/b><\/a><\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The-Impact-of-Computer-Viruses-and-Malware-on-Cybersecurity\"><\/span>The Impact of Computer Viruses and Malware on Cybersecurity<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p>The cybersecurity field as it is probably would not exist without the threat of computer viruses and malware. There would still be a need for cybersecurity, of course. Data leaks, compromised access credentials, theft, and damage to hardware and software are all threats that would still exist if malware weren\u2019t an issue.<\/p>\r\n\r\n\r\n\r\n<p>However, the spectacle of and fear generated by major malware attacks like the Code Red Worm or the Colonial Pipeline Attack have undoubtedly helped to propel cybersecurity into becoming <a href=\"https:\/\/www.mordorintelligence.com\/industry-reports\/cyber-security-market\" target=\"_blank\" rel=\"noreferrer noopener\">the over $150 billion industry<\/a> it was valued as in 2021. The vast array of frameworks, tools, and solutions like <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">zero-trust<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">SIEM<\/a>, and <a href=\"https:\/\/www.esecurityplanet.com\/products\/intrusion-detection-and-prevention-systems\/\" target=\"_blank\" rel=\"noreferrer noopener\">IDPS<\/a> would likely not exist in the forms they do now, with the price tags they do now, without the relevant threat of hackers and malware.<\/p>\r\n\r\n\r\n\r\n<p>The ongoing development of cybersecurity technology by both businesses and governments alike is maintained with a healthy dose of fear toward the ongoing development of malware technology by both criminal groups and governments alike. As the Internet itself has helped shape our modern world, the evolving threat of computer viruses and malware have helped shape modern cybersecurity.<\/p>\r\n\r\n\r\n\r\n<p><b>Computer Viruses Are Dangerous, But You Can Fight Back. Take a Look at the <\/b><a href=\"https:\/\/www.esecurityplanet.com\/products\/antivirus-software\/\" target=\"_blank\" rel=\"noreferrer noopener\"><b>4 Best Antivirus Software of 2022<\/b><\/a><\/p>\r\n\n\n<div id=\"ta-campaign-widget-66d7084047d82-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d7084047d82\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d7084047d82\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d7084047d82\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d7084047d82\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d7084047d82\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d7084047d82\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019ve used a computer for more than 5 minutes, you probably know a thing or two about computer viruses and malware. On the modern Internet, malware is a near-constant presence. Whether it\u2019s infected emails stealing employee access credentials or the plague of ransomware that has menaced the business world in recent years, there are [&hellip;]<\/p>\n","protected":false},"author":305,"featured_media":25691,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[31964,3790,1146,2478],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[403,404,379],"class_list":["post-25690","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-computer-virus","tag-cybersecurity","tag-malware","tag-ransomware","b2b_audience-awareness-and-consideration","b2b_product-cyber-terrorists-and-cyber-crime","b2b_product-hackers","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>History of Computer Viruses &amp; Malware | What Was Their Impact?<\/title>\n<meta name=\"description\" content=\"Computer viruses and malware have been around since the early 1970&#039;s. Explore the full history of viruses from then to now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"History of Computer Viruses &amp; Malware | What Was Their Impact?\" \/>\n<meta property=\"og:description\" content=\"Computer viruses and malware have been around since the early 1970&#039;s. Explore the full history of viruses from then to now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-02T18:26:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-29T17:07:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/pexels-pixabay-207580.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"1400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zephin Livingston\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zephin Livingston\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/\"},\"author\":{\"name\":\"Zephin Livingston\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/c520ead1fedb2794b5fccfeb93b4c97f\"},\"headline\":\"The History of Computer Viruses &#038; Malware\",\"datePublished\":\"2022-11-02T18:26:33+00:00\",\"dateModified\":\"2023-03-29T17:07:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/\"},\"wordCount\":3054,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/pexels-pixabay-207580.jpg\",\"keywords\":[\"computer virus\",\"cybersecurity\",\"malware\",\"ransomware\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/\",\"name\":\"History of Computer Viruses & Malware | What Was Their Impact?\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/pexels-pixabay-207580.jpg\",\"datePublished\":\"2022-11-02T18:26:33+00:00\",\"dateModified\":\"2023-03-29T17:07:50+00:00\",\"description\":\"Computer viruses and malware have been around since the early 1970's. Explore the full history of viruses from then to now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/pexels-pixabay-207580.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/pexels-pixabay-207580.jpg\",\"width\":1400,\"height\":1400,\"caption\":\"computer codes\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The History of Computer Viruses &#038; Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/c520ead1fedb2794b5fccfeb93b4c97f\",\"name\":\"Zephin Livingston\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-28465_HH-73858175_Zephin_Livingston_20220826_1407190_editor_faharia-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-28465_HH-73858175_Zephin_Livingston_20220826_1407190_editor_faharia-150x150.jpg\",\"caption\":\"Zephin Livingston\"},\"description\":\"Zephin Livingston is a content writer for eSecurityPlanet with years of experience in multiple fields including cybersecurity, tech, cultural criticism, and media literacy. They're currently based out of Seattle.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/zephin-livingston\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"History of Computer Viruses & Malware | What Was Their Impact?","description":"Computer viruses and malware have been around since the early 1970's. Explore the full history of viruses from then to now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/","og_locale":"en_US","og_type":"article","og_title":"History of Computer Viruses & Malware | What Was Their Impact?","og_description":"Computer viruses and malware have been around since the early 1970's. Explore the full history of viruses from then to now.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/","og_site_name":"eSecurity Planet","article_published_time":"2022-11-02T18:26:33+00:00","article_modified_time":"2023-03-29T17:07:50+00:00","og_image":[{"width":1400,"height":1400,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/pexels-pixabay-207580.jpg","type":"image\/jpeg"}],"author":"Zephin Livingston","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Zephin Livingston","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/"},"author":{"name":"Zephin Livingston","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/c520ead1fedb2794b5fccfeb93b4c97f"},"headline":"The History of Computer Viruses &#038; Malware","datePublished":"2022-11-02T18:26:33+00:00","dateModified":"2023-03-29T17:07:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/"},"wordCount":3054,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/pexels-pixabay-207580.jpg","keywords":["computer virus","cybersecurity","malware","ransomware"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/","url":"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/","name":"History of Computer Viruses & Malware | What Was Their Impact?","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/pexels-pixabay-207580.jpg","datePublished":"2022-11-02T18:26:33+00:00","dateModified":"2023-03-29T17:07:50+00:00","description":"Computer viruses and malware have been around since the early 1970's. Explore the full history of viruses from then to now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/pexels-pixabay-207580.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/pexels-pixabay-207580.jpg","width":1400,"height":1400,"caption":"computer codes"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/computer-viruses-and-malware-history\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"The History of Computer Viruses &#038; Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/c520ead1fedb2794b5fccfeb93b4c97f","name":"Zephin Livingston","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-28465_HH-73858175_Zephin_Livingston_20220826_1407190_editor_faharia-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-28465_HH-73858175_Zephin_Livingston_20220826_1407190_editor_faharia-150x150.jpg","caption":"Zephin Livingston"},"description":"Zephin Livingston is a content writer for eSecurityPlanet with years of experience in multiple fields including cybersecurity, tech, cultural criticism, and media literacy. They're currently based out of Seattle.","url":"https:\/\/www.esecurityplanet.com\/author\/zephin-livingston\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25690"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/305"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=25690"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25690\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/25691"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=25690"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=25690"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=25690"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=25690"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=25690"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=25690"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}