
As you’re probably aware, malware, short for malicious software, is an umbrella term for any program or code that can invade, damage, or disable computer systems, from PCs to mobile devices. Brain was one of the earliest examples of malware. Released in 1986, the PC computer virus was designed by brothers Amjad Farooq Alvi and Basit Farooq Alvi as copy protection for their software. However, it quickly went out of control, spreading from Pakistan to Europe and North America.
While Brain was a significant part of malware history, it wasn’t particularly threatening. Over the next few decades, the world saw far more dangerous malware. Here is a brief list of some infamous ones.
1. TrickBot
Many computer users wonder if TrickBot is a virus or malware, or if TrickBot is still active in the computing world. For starters, TrickBot isn’t a virus. A virus is a malware that corrupts systems and is relatively low on the threat scale these days. TrickBot is actually an evolving Banker Trojan, and it’s quite active today and pretty vicious.
Like any Trojan, TrickBot uses deception to infect systems. It can steal banking information, usernames and passwords, personally identifiable information (PII), cryptocurrency, documents, and media files. TrickBot’s worm module makes it more dangerous, allowing it to self-propagate via Server Message Block (SMB) shares. TrickBot also drops other malware such as Ryuk ransomware.
TrickBot is very similar to another dangerous banking Trojan called Emotet. However, TrickBot has overtaken Emotet as the top threat against businesses. Some cybercriminals even combine TrickBot and Emotet in their attacks.
2. DarkSide Ransomware
Over the years, many ransomware strains have hurt organizations like schools, hospitals, and businesses by locking files and computers and holding them for money. The WannaCry ransomware cryptoworm was incredibly prolific, rapidly spreading to over 200,000 computers in 150 computers, causing billions in damage. Meanwhile, Ryuk ransomware has hit multiple technology and manufacturing industries, extorting hundreds of millions of dollars.
DarkSide ransomware is a more recent example of the destructive malware. The human-operated ransomware encrypts local disks and network shares, terminates processes, deletes shadow copies, and uninstalls services. When DarkSide ransomware hit Colonial Pipeline — chaos ensued. Consumers lined up at gas stations amid fuel shortages, and prices shot up.
3. Stuxnet
Developed by Israel and the United States, Stuxnet is a sophisticated computer worm. It quietly damaged some of Iran’s nuclear program in 2010 by manipulating the speeds of the fast-spinning centrifuges that enrich uranium. And it breached systems by exploiting zero-day vulnerabilities in programmable logic controller (PLC) systems. The cyberweapon also has a rootkit component that helps it evade detection.
4. Pegasus
Pegasus is a highly complex spyware that was developed by Israel and sold to other countries. The malware can steal pictures, videos, recordings, location records, emails, text messages, call logs, login credentials, and more. Users of Pegasus spied on politicians, activists, and journalists. And according to an English High Court, one Dubai ruler even hacked his ex-wife’s phone with the spyware.
As you can imagine, more sophisticated malware can take years to develop. But for authors of such malicious software, the wait is worth it.
Leave a Reply