CINXE.COM
Timeline of computer viruses and worms - Wikipedia
<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Timeline of computer viruses and worms - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"1843a2b3-f82b-4437-93c7-def4b98239f7","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Timeline_of_computer_viruses_and_worms","wgTitle":"Timeline of computer viruses and worms","wgCurRevisionId":1257293623,"wgRevisionId":1257293623,"wgArticleId":174761,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["CS1 maint: location","CS1 German-language sources (de)","Pages containing links to subscription-only content","Webarchive template wayback links","Articles with short description","Short description matches Wikidata","Articles needing cleanup from November 2015","All pages needing cleanup","Cleanup tagged articles with a reason field from November 2015","Wikipedia pages needing cleanup from November 2015", "Wikipedia articles needing clarification from May 2017","All articles with failed verification","Articles with failed verification from May 2017","Articles with failed verification from December 2013","All articles with unsourced statements","Articles with unsourced statements from April 2019","Articles with unsourced statements from August 2020","Computing timelines","Malware","Trojan horses"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Timeline_of_computer_viruses_and_worms","wgRelevantArticleId":174761,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"}, "wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":70000,"wgRelatedArticlesCompat":[],"wgCentralAuthMobileDomain":false,"wgEditSubmitButtonLabelPublish":true,"wgULSPosition":"interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q1292360","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","skins.vector.search.codex.styles":"ready", "skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready","ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"};RLPAGEMODULES=["ext.cite.ux-enhancements","mediawiki.page.media","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.growthExperiments.SuggestedEditSession", "wikibase.sidebar.tracking"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&modules=ext.cite.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&only=styles&skin=vector-2022"> <script async="" src="/w/load.php?lang=en&modules=startup&only=scripts&raw=1&skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&modules=site.styles&only=styles&skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.4"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/e/ec/Virus_Blaster.jpg"> <meta property="og:image:width" content="1200"> <meta property="og:image:height" content="717"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/e/ec/Virus_Blaster.jpg"> <meta property="og:image:width" content="800"> <meta property="og:image:height" content="478"> <meta property="og:image:width" content="640"> <meta property="og:image:height" content="382"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="Timeline of computer viruses and worms - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/Timeline_of_computer_viruses_and_worms"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Timeline_of_computer_viruses_and_worms"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="//login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Timeline_of_computer_viruses_and_worms rootpage-Timeline_of_computer_viruses_and_worms skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page's font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&returnto=Timeline+of+computer+viruses+and+worms" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&returnto=Timeline+of+computer+viruses+and+worms" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&returnto=Timeline+of+computer+viruses+and+worms" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&returnto=Timeline+of+computer+viruses+and+worms" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-1960s" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#1960s"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>1960s</span> </div> </a> <ul id="toc-1960s-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1970s" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#1970s"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>1970s</span> </div> </a> <button aria-controls="toc-1970s-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle 1970s subsection</span> </button> <ul id="toc-1970s-sublist" class="vector-toc-list"> <li id="toc-1970" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1970"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.1</span> <span>1970</span> </div> </a> <ul id="toc-1970-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1971" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1971"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.2</span> <span>1971</span> </div> </a> <ul id="toc-1971-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1972" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1972"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.3</span> <span>1972</span> </div> </a> <ul id="toc-1972-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1973" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1973"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.4</span> <span>1973</span> </div> </a> <ul id="toc-1973-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1974" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1974"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.5</span> <span>1974</span> </div> </a> <ul id="toc-1974-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1975" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1975"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.6</span> <span>1975</span> </div> </a> <ul id="toc-1975-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1977" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1977"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.7</span> <span>1977</span> </div> </a> <ul id="toc-1977-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-1980s" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#1980s"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>1980s</span> </div> </a> <button aria-controls="toc-1980s-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle 1980s subsection</span> </button> <ul id="toc-1980s-sublist" class="vector-toc-list"> <li id="toc-1982" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1982"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1</span> <span>1982</span> </div> </a> <ul id="toc-1982-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1983" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1983"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.2</span> <span>1983</span> </div> </a> <ul id="toc-1983-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1984" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1984"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.3</span> <span>1984</span> </div> </a> <ul id="toc-1984-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1986" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1986"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.4</span> <span>1986</span> </div> </a> <ul id="toc-1986-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1987" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1987"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.5</span> <span>1987</span> </div> </a> <ul id="toc-1987-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1988" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1988"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.6</span> <span>1988</span> </div> </a> <ul id="toc-1988-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1989" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1989"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.7</span> <span>1989</span> </div> </a> <ul id="toc-1989-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-1990s" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#1990s"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>1990s</span> </div> </a> <button aria-controls="toc-1990s-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle 1990s subsection</span> </button> <ul id="toc-1990s-sublist" class="vector-toc-list"> <li id="toc-1990" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1990"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1</span> <span>1990</span> </div> </a> <ul id="toc-1990-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1991" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1991"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.2</span> <span>1991</span> </div> </a> <ul id="toc-1991-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1992" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1992"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.3</span> <span>1992</span> </div> </a> <ul id="toc-1992-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1993" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1993"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.4</span> <span>1993</span> </div> </a> <ul id="toc-1993-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1994" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1994"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.5</span> <span>1994</span> </div> </a> <ul id="toc-1994-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1995" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1995"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.6</span> <span>1995</span> </div> </a> <ul id="toc-1995-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1996" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1996"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.7</span> <span>1996</span> </div> </a> <ul id="toc-1996-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1997" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1997"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.8</span> <span>1997</span> </div> </a> <ul id="toc-1997-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1998" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1998"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.9</span> <span>1998</span> </div> </a> <ul id="toc-1998-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-1999" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#1999"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.10</span> <span>1999</span> </div> </a> <ul id="toc-1999-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-2000s" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#2000s"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>2000s</span> </div> </a> <button aria-controls="toc-2000s-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle 2000s subsection</span> </button> <ul id="toc-2000s-sublist" class="vector-toc-list"> <li id="toc-2000" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2000"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.1</span> <span>2000</span> </div> </a> <ul id="toc-2000-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-2001" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2001"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.2</span> <span>2001</span> </div> </a> <ul id="toc-2001-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-2002" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2002"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.3</span> <span>2002</span> </div> </a> <ul id="toc-2002-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-2003" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2003"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.4</span> <span>2003</span> </div> </a> <ul id="toc-2003-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-2004" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2004"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.5</span> <span>2004</span> </div> </a> <ul id="toc-2004-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-2005" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2005"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.6</span> <span>2005</span> </div> </a> <ul id="toc-2005-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-2006" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2006"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.7</span> <span>2006</span> </div> </a> <ul id="toc-2006-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-2007" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2007"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.8</span> <span>2007</span> </div> </a> <ul id="toc-2007-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-2008" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2008"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.9</span> <span>2008</span> </div> </a> <ul id="toc-2008-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-2009" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2009"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.10</span> <span>2009</span> </div> </a> <ul id="toc-2009-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-2010s" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#2010s"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>2010s</span> </div> </a> <button aria-controls="toc-2010s-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle 2010s subsection</span> </button> <ul id="toc-2010s-sublist" class="vector-toc-list"> <li id="toc-2010" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2010"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.1</span> <span>2010</span> </div> </a> <ul id="toc-2010-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-2011" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2011"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.2</span> <span>2011</span> </div> </a> <ul id="toc-2011-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-2012" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2012"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.3</span> <span>2012</span> </div> </a> <ul id="toc-2012-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-2013" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2013"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.4</span> <span>2013</span> </div> </a> <ul id="toc-2013-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-2014" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2014"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.5</span> <span>2014</span> </div> </a> <ul id="toc-2014-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-2015" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2015"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.6</span> <span>2015</span> </div> </a> <ul id="toc-2015-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-2016" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2016"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.7</span> <span>2016</span> </div> </a> <ul id="toc-2016-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-2017" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2017"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.8</span> <span>2017</span> </div> </a> <ul id="toc-2017-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-2018" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2018"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.9</span> <span>2018</span> </div> </a> <ul id="toc-2018-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-2019" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2019"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.10</span> <span>2019</span> </div> </a> <ul id="toc-2019-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-2020s" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#2020s"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>2020s</span> </div> </a> <button aria-controls="toc-2020s-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle 2020s subsection</span> </button> <ul id="toc-2020s-sublist" class="vector-toc-list"> <li id="toc-2024" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2024"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.1</span> <span>2024</span> </div> </a> <ul id="toc-2024-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">9</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-External_links" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#External_links"> <div class="vector-toc-text"> <span class="vector-toc-numb">10</span> <span>External links</span> </div> </a> <ul id="toc-External_links-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Timeline of computer viruses and worms</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 10 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-10" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">10 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D8%AE%D8%B7_%D8%B2%D9%85%D9%86%D9%8A_%D9%84%D9%81%D9%8A%D8%B1%D9%88%D8%B3%D8%A7%D8%AA_%D9%88%D8%AF%D9%8A%D8%AF%D8%A7%D9%86_%D8%A7%D9%84%D8%AD%D8%A7%D8%B3%D9%88%D8%A8" title="خط زمني لفيروسات وديدان الحاسوب – Arabic" lang="ar" hreflang="ar" data-title="خط زمني لفيروسات وديدان الحاسوب" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D8%AC%D8%AF%D9%88%D9%84_%D8%B2%D9%85%D8%A7%D9%86%DB%8C_%D9%88%DB%8C%D8%B1%D9%88%D8%B3%E2%80%8C%D9%87%D8%A7_%D9%88_%DA%A9%D8%B1%D9%85%E2%80%8C%D9%87%D8%A7%DB%8C_%D8%B1%D8%A7%DB%8C%D8%A7%D9%86%D9%87%E2%80%8C%D8%A7%DB%8C" title="جدول زمانی ویروسها و کرمهای رایانهای – Persian" lang="fa" hreflang="fa" data-title="جدول زمانی ویروسها و کرمهای رایانهای" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-lmo mw-list-item"><a href="https://lmo.wikipedia.org/wiki/Cronologia_di_malware" title="Cronologia di malware – Lombard" lang="lmo" hreflang="lmo" data-title="Cronologia di malware" data-language-autonym="Lombard" data-language-local-name="Lombard" class="interlanguage-link-target"><span>Lombard</span></a></li><li class="interlanguage-link interwiki-ms mw-list-item"><a href="https://ms.wikipedia.org/wiki/Garis_masa_virus_komputer_dan_cecacing_yang_terkenal" title="Garis masa virus komputer dan cecacing yang terkenal – Malay" lang="ms" hreflang="ms" data-title="Garis masa virus komputer dan cecacing yang terkenal" data-language-autonym="Bahasa Melayu" data-language-local-name="Malay" class="interlanguage-link-target"><span>Bahasa Melayu</span></a></li><li class="interlanguage-link interwiki-ja mw-list-item"><a href="https://ja.wikipedia.org/wiki/%E3%82%B3%E3%83%B3%E3%83%94%E3%83%A5%E3%83%BC%E3%82%BF%E3%82%A6%E3%82%A4%E3%83%AB%E3%82%B9%E3%81%A8%E3%83%AF%E3%83%BC%E3%83%A0%E3%81%AE%E5%B9%B4%E8%A1%A8" title="コンピュータウイルスとワームの年表 – Japanese" lang="ja" hreflang="ja" data-title="コンピュータウイルスとワームの年表" data-language-autonym="日本語" data-language-local-name="Japanese" class="interlanguage-link-target"><span>日本語</span></a></li><li class="interlanguage-link interwiki-ru badge-Q70894304 mw-list-item" title=""><a href="https://ru.wikipedia.org/wiki/%D0%A5%D1%80%D0%BE%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D1%8F_%D0%BA%D0%BE%D0%BC%D0%BF%D1%8C%D1%8E%D1%82%D0%B5%D1%80%D0%BD%D1%8B%D1%85_%D0%B2%D0%B8%D1%80%D1%83%D1%81%D0%BE%D0%B2_%D0%B8_%D1%87%D0%B5%D1%80%D0%B2%D0%B5%D0%B9" title="Хронология компьютерных вирусов и червей – Russian" lang="ru" hreflang="ru" data-title="Хронология компьютерных вирусов и червей" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-sh mw-list-item"><a href="https://sh.wikipedia.org/wiki/Vremenski_slijed_ra%C4%8Dunalnih_virusa_i_crva" title="Vremenski slijed računalnih virusa i crva – Serbo-Croatian" lang="sh" hreflang="sh" data-title="Vremenski slijed računalnih virusa i crva" data-language-autonym="Srpskohrvatski / српскохрватски" data-language-local-name="Serbo-Croatian" class="interlanguage-link-target"><span>Srpskohrvatski / српскохрватски</span></a></li><li class="interlanguage-link interwiki-fi mw-list-item"><a href="https://fi.wikipedia.org/wiki/Aikajana_merkitt%C3%A4vist%C3%A4_tietokoneviruksista_ja_madoista" title="Aikajana merkittävistä tietokoneviruksista ja madoista – Finnish" lang="fi" hreflang="fi" data-title="Aikajana merkittävistä tietokoneviruksista ja madoista" data-language-autonym="Suomi" data-language-local-name="Finnish" class="interlanguage-link-target"><span>Suomi</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/%D0%A5%D1%80%D0%BE%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D1%96%D1%8F_%D0%BA%D0%BE%D0%BC%D0%BF%27%D1%8E%D1%82%D0%B5%D1%80%D0%BD%D0%B8%D1%85_%D0%B2%D1%96%D1%80%D1%83%D1%81%D1%96%D0%B2_%D1%82%D0%B0_%D1%85%D1%80%D0%BE%D0%B1%D0%B0%D0%BA%D1%96%D0%B2" title="Хронологія комп'ютерних вірусів та хробаків – Ukrainian" lang="uk" hreflang="uk" data-title="Хронологія комп'ютерних вірусів та хробаків" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/%E7%9F%A5%E5%90%8D%E7%97%85%E6%AF%92%E5%8F%8A%E8%A0%95%E8%9F%B2%E7%9A%84%E6%AD%B7%E5%8F%B2%E5%B9%B4%E8%A1%A8" title="知名病毒及蠕蟲的歷史年表 – Chinese" lang="zh" hreflang="zh" data-title="知名病毒及蠕蟲的歷史年表" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q1292360#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Timeline_of_computer_viruses_and_worms" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:Timeline_of_computer_viruses_and_worms" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Timeline_of_computer_viruses_and_worms"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/Timeline_of_computer_viruses_and_worms"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/Timeline_of_computer_viruses_and_worms" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/Timeline_of_computer_viruses_and_worms" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages" title="A list of all special pages [q]" accesskey="q"><span>Special pages</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&oldid=1257293623" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&page=Timeline_of_computer_viruses_and_worms&id=1257293623&wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FTimeline_of_computer_viruses_and_worms"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FTimeline_of_computer_viruses_and_worms"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&page=Timeline_of_computer_viruses_and_worms&action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q1292360" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">Computer malware timeline</div> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">Not to be confused with <a href="/wiki/List_of_computer_worms" title="List of computer worms">List of computer worms</a>.</div> <style data-mw-deduplicate="TemplateStyles:r1251242444">.mw-parser-output .ambox{border:1px solid #a2a9b1;border-left:10px solid #36c;background-color:#fbfbfb;box-sizing:border-box}.mw-parser-output .ambox+link+.ambox,.mw-parser-output .ambox+link+style+.ambox,.mw-parser-output .ambox+link+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+style+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+link+.ambox{margin-top:-1px}html body.mediawiki .mw-parser-output .ambox.mbox-small-left{margin:4px 1em 4px 0;overflow:hidden;width:238px;border-collapse:collapse;font-size:88%;line-height:1.25em}.mw-parser-output .ambox-speedy{border-left:10px solid #b32424;background-color:#fee7e6}.mw-parser-output .ambox-delete{border-left:10px solid #b32424}.mw-parser-output .ambox-content{border-left:10px solid #f28500}.mw-parser-output .ambox-style{border-left:10px solid #fc3}.mw-parser-output .ambox-move{border-left:10px solid #9932cc}.mw-parser-output .ambox-protection{border-left:10px solid #a2a9b1}.mw-parser-output .ambox .mbox-text{border:none;padding:0.25em 0.5em;width:100%}.mw-parser-output .ambox .mbox-image{border:none;padding:2px 0 2px 0.5em;text-align:center}.mw-parser-output .ambox .mbox-imageright{border:none;padding:2px 0.5em 2px 0;text-align:center}.mw-parser-output .ambox .mbox-empty-cell{border:none;padding:0;width:1px}.mw-parser-output .ambox .mbox-image-div{width:52px}@media(min-width:720px){.mw-parser-output .ambox{margin:0 10%}}@media print{body.ns-0 .mw-parser-output .ambox{display:none!important}}</style><table class="box-Cleanup plainlinks metadata ambox ambox-style ambox-Cleanup" role="presentation"><tbody><tr><td class="mbox-image"><div class="mbox-image-div"><span typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/f/f2/Edit-clear.svg/40px-Edit-clear.svg.png" decoding="async" width="40" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/f/f2/Edit-clear.svg/60px-Edit-clear.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/f/f2/Edit-clear.svg/80px-Edit-clear.svg.png 2x" data-file-width="48" data-file-height="48" /></span></span></div></td><td class="mbox-text"><div class="mbox-text-span">This article may <b>require <a href="/wiki/Wikipedia:Cleanup" title="Wikipedia:Cleanup">cleanup</a></b> to meet Wikipedia's <a href="/wiki/Wikipedia:Manual_of_Style" title="Wikipedia:Manual of Style">quality standards</a>. The specific problem is: <b>includes many viruses of unclear noteworthiness.</b><span class="hide-when-compact"> Please help <a href="/wiki/Special:EditPage/Timeline_of_computer_viruses_and_worms" title="Special:EditPage/Timeline of computer viruses and worms">improve this article</a> if you can.</span> <span class="date-container"><i>(<span class="date">November 2015</span>)</i></span><span class="hide-when-compact"><i> (<small><a href="/wiki/Help:Maintenance_template_removal" title="Help:Maintenance template removal">Learn how and when to remove this message</a></small>)</i></span></div></td></tr></tbody></table> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Virus_Blaster.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/e/ec/Virus_Blaster.jpg/220px-Virus_Blaster.jpg" decoding="async" width="220" height="131" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/e/ec/Virus_Blaster.jpg/330px-Virus_Blaster.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/e/ec/Virus_Blaster.jpg 2x" data-file-width="420" data-file-height="251" /></a><figcaption><a href="/wiki/Hex_dump" title="Hex dump">Hex dump</a> of the <a href="/wiki/Blaster_(computer_worm)" title="Blaster (computer worm)">Blaster worm</a>, showing a message left for <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a> co-founder <a href="/wiki/Bill_Gates" title="Bill Gates">Bill Gates</a> by the worm's programmer</figcaption></figure> <p>This <b>timeline of computer viruses and worms</b> presents a chronological timeline of noteworthy <a href="/wiki/Computer_virus" title="Computer virus">computer viruses</a>, <a href="/wiki/Computer_worm" title="Computer worm">computer worms</a>, <a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">Trojan horses</a>, similar <a href="/wiki/Malware" title="Malware">malware</a>, related research and events. </p> <style data-mw-deduplicate="TemplateStyles:r886046785">.mw-parser-output .toclimit-2 .toclevel-1 ul,.mw-parser-output .toclimit-3 .toclevel-2 ul,.mw-parser-output .toclimit-4 .toclevel-3 ul,.mw-parser-output .toclimit-5 .toclevel-4 ul,.mw-parser-output .toclimit-6 .toclevel-5 ul,.mw-parser-output .toclimit-7 .toclevel-6 ul{display:none}</style><div class="toclimit-2"><meta property="mw:PageProp/toc" /></div> <div class="mw-heading mw-heading2"><h2 id="1960s">1960s</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=1" title="Edit section: 1960s"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/John_von_Neumann" title="John von Neumann">John von Neumann</a>'s article on the "Theory of self-reproducing automata" is published in 1966.<sup id="cite_ref-1" class="reference"><a href="#cite_note-1"><span class="cite-bracket">[</span>1<span class="cite-bracket">]</span></a></sup> The article is based on lectures given by von Neumann at the <a href="/wiki/University_of_Illinois" class="mw-redirect" title="University of Illinois">University of Illinois</a> about the "Theory and Organization of Complicated Automata" in 1949.</li></ul> <div class="mw-heading mw-heading2"><h2 id="1970s">1970s</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=2" title="Edit section: 1970s"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="1970">1970</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=3" title="Edit section: 1970"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>The first story written about a computer virus, <i>The Scarred Man</i> by <a href="/wiki/Gregory_Benford" title="Gregory Benford">Gregory Benford</a>, was published in the May 1970 issue of <i><a href="/wiki/Venture_Science_Fiction" title="Venture Science Fiction">Venture Science Fiction</a></i>.<sup id="cite_ref-2" class="reference"><a href="#cite_note-2"><span class="cite-bracket">[</span>2<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="1971">1971</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=4" title="Edit section: 1971"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>The <a href="/wiki/Creeper_(program)" class="mw-redirect" title="Creeper (program)">Creeper system</a>, an experimental self-replicating program, is written by Bob Thomas at <a href="/wiki/BBN_Technologies" class="mw-redirect" title="BBN Technologies">BBN Technologies</a> to test John von Neumann's theory.<sup id="cite_ref-3" class="reference"><a href="#cite_note-3"><span class="cite-bracket">[</span>3<span class="cite-bracket">]</span></a></sup> Creeper infected DEC <a href="/wiki/PDP-10" title="PDP-10">PDP-10</a> computers running the <a href="/wiki/TENEX_(operating_system)" title="TENEX (operating system)">TENEX operating system</a>. Creeper gained access via the <a href="/wiki/ARPANET" title="ARPANET">ARPANET</a> and copied itself to the remote system where the message "I'm the creeper, catch me if you can!" was displayed. The <a href="/wiki/Reaper_(program)" class="mw-redirect" title="Reaper (program)">Reaper</a> program was later created to delete Creeper.<sup id="cite_ref-4" class="reference"><a href="#cite_note-4"><span class="cite-bracket">[</span>4<span class="cite-bracket">]</span></a></sup></li> <li>At the <a href="/wiki/University_of_Illinois_Urbana-Champaign" title="University of Illinois Urbana-Champaign">University of Illinois at Urbana-Champaign</a>, a graduate student named <a href="/wiki/Alan_M._Davis" title="Alan M. Davis">Alan Davis</a> (working for <a href="/wiki/Donald_B._Gillies" title="Donald B. Gillies">Prof. Donald Gillies</a>) created a process on a <a href="/wiki/PDP-11" title="PDP-11">PDP-11</a> that (a) checked to see if an identical copy of itself was currently running as an active process, and if not, created a copy of itself and started it running; (b) checked to see if any disk space (which all users shared) was available, and if so, created a file the size of that space; and (c) looped back to step (a). As a result, the process stole all available disk space. When users tried to save files, the operating system advised them that the disk was full and that they needed to delete some existing files. Of course, if they did delete a file, this process would immediately snatch up the available space. When users called in a system administrator (A. Ian Stocks) to fix the problem, he examined the active processes, discovered the offending process, and deleted it. Of course, before he left the room, the still existing process would create another copy of itself, and the problem would not go away. The only way to make the computer work again was to reboot.<sup id="cite_ref-5" class="reference"><a href="#cite_note-5"><span class="cite-bracket">[</span>5<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="1972">1972</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=5" title="Edit section: 1972"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>The science fiction novel, <i><a href="/wiki/When_HARLIE_Was_One" title="When HARLIE Was One">When HARLIE Was One</a></i>, by <a href="/wiki/David_Gerrold" title="David Gerrold">David Gerrold</a>, contains one of the first fictional representations of a <a href="/wiki/Computer_virus" title="Computer virus">computer virus</a>, as well as one of the first uses of the word "virus" to denote a program that infects a computer.</li></ul> <div class="mw-heading mw-heading3"><h3 id="1973">1973</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=6" title="Edit section: 1973"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>In fiction, the 1973 <a href="/wiki/Michael_Crichton" title="Michael Crichton">Michael Crichton</a> movie <i><a href="/wiki/Westworld_(film)" title="Westworld (film)">Westworld</a></i> made an early mention of the concept of a computer virus, being a central plot theme that causes androids to run amok.<sup id="cite_ref-6" class="reference"><a href="#cite_note-6"><span class="cite-bracket">[</span>6<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Alan_Oppenheimer" title="Alan Oppenheimer">Alan Oppenheimer</a>'s character summarizes the problem by stating that "...there's a clear pattern here which suggests an analogy to an infectious disease process, spreading from one...area to the next." To which the replies are stated: "Perhaps there are superficial similarities to disease" and, "I must confess I find it difficult to believe in a disease of machinery."<sup id="cite_ref-7" class="reference"><a href="#cite_note-7"><span class="cite-bracket">[</span>7<span class="cite-bracket">]</span></a></sup> (Crichton's earlier work, the 1969 novel <i><a href="/wiki/The_Andromeda_Strain" title="The Andromeda Strain">The Andromeda Strain</a></i> and <a href="/wiki/The_Andromeda_Strain_(film)" title="The Andromeda Strain (film)">1971 film</a> were about an extraterrestrial biological virus-like disease that threatened the human race.)</li></ul> <div class="mw-heading mw-heading3"><h3 id="1974">1974</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=7" title="Edit section: 1974"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>The <a href="/wiki/Rabbit_program" class="mw-redirect" title="Rabbit program">Rabbit</a> (or Wabbit) virus, more a <a href="/wiki/Fork_bomb" title="Fork bomb">fork bomb</a> than a virus, is written. The Rabbit virus makes multiple copies of itself on a single computer (and was named "<a href="/wiki/Rabbit" title="Rabbit">rabbit</a>" for the speed at which it did so) until it clogs the system, reducing system performance, before finally reaching a threshold and crashing the computer.<sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">[</span>8<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="1975">1975</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=8" title="Edit section: 1975"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>April: ANIMAL is written by <a href="/wiki/John_Walker_(programmer)" title="John Walker (programmer)">John Walker</a> for the <a href="/wiki/UNIVAC_1100/2200_series" title="UNIVAC 1100/2200 series">UNIVAC 1108</a>.<sup id="cite_ref-http://www.fourmilab.ch/documents/univac/animalsrc.html_9-0" class="reference"><a href="#cite_note-http://www.fourmilab.ch/documents/univac/animalsrc.html-9"><span class="cite-bracket">[</span>9<span class="cite-bracket">]</span></a></sup> ANIMAL asked several questions of the user in an attempt to guess the type of animal the user was thinking of, while the related program PERVADE would create a copy of itself and ANIMAL in every directory to which the current user had access. It spread across the multi-user UNIVACs when users with overlapping permissions discovered the game, and to other computers when tapes were shared. The program was carefully written to avoid damaging existing file or directory structures, and to avoid copying itself if permissions did not exist or if harm would result. Its spread was halted by an OS upgrade that changed the format of the file status tables PERVADE used. Though non-malicious, "Pervading Animal" represents the first <a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">Trojan</a> "in the wild".<sup id="cite_ref-http://www.fourmilab.ch/documents/univac/animal.html_10-0" class="reference"><a href="#cite_note-http://www.fourmilab.ch/documents/univac/animal.html-10"><span class="cite-bracket">[</span>10<span class="cite-bracket">]</span></a></sup></li> <li>The novel <i><a href="/wiki/The_Shockwave_Rider" title="The Shockwave Rider">The Shockwave Rider</a></i> by <a href="/wiki/John_Brunner_(novelist)" class="mw-redirect" title="John Brunner (novelist)">John Brunner</a> is published, coining the word "<a href="/wiki/Computer_worm" title="Computer worm">worm</a>" to describe a program that propagates itself through a <a href="/wiki/Computer_network" title="Computer network">computer network</a>.<sup id="cite_ref-ClassicSci-FiReviews_11-0" class="reference"><a href="#cite_note-ClassicSci-FiReviews-11"><span class="cite-bracket">[</span>11<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="1977">1977</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=9" title="Edit section: 1977"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><i><a href="/wiki/The_Adolescence_of_P-1" title="The Adolescence of P-1">The Adolescence of P-1</a></i> novel,<sup id="cite_ref-12" class="reference"><a href="#cite_note-12"><span class="cite-bracket">[</span>12<span class="cite-bracket">]</span></a></sup> describes a worm program that propagates through modem-based networks, eventually developing its own strategy-developing AI, which deals with cross-hardware and cross-os issues, eventually infecting hardware manufactures and defense organizations.</li></ul> <div class="mw-heading mw-heading2"><h2 id="1980s">1980s</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=10" title="Edit section: 1980s"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="1982">1982</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=11" title="Edit section: 1982"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>A program called <a href="/wiki/Elk_Cloner" title="Elk Cloner">Elk Cloner</a>, written for <a href="/wiki/Apple_II" title="Apple II">Apple II</a> systems, was created by high school student <a href="/wiki/Rich_Skrenta" title="Rich Skrenta">Richard Skrenta</a>, originally as a prank. The Apple II was particularly vulnerable due to the storage of its operating system<sup class="noprint Inline-Template" style="margin-left:0.1em; white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Please_clarify" title="Wikipedia:Please clarify"><span title="This may be misleading. An OS or _D_OS was not needed for the computer itself (unlike with modern computers), but to maintain the file system. (May 2017)">clarification needed</span></a></i>]</sup> on a <a href="/wiki/Floppy_disk" title="Floppy disk">floppy disk</a>. Elk Cloner's design combined with public ignorance<sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Verifiability" title="Wikipedia:Verifiability"><span title="' lack of knowledge' like in the virus's article would be more neutral (May 2017)">failed verification</span></a></i>]</sup> about what <a href="/wiki/Malware" title="Malware">malware</a> was and how to protect against it led to Elk Cloner being responsible for the first large-scale<sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Verifiability" title="Wikipedia:Verifiability"><span title="The material near this tag failed verification of its source citation(s). (May 2017)">failed verification</span></a></i>]</sup> computer virus outbreak in history.<sup id="cite_ref-13" class="reference"><a href="#cite_note-13"><span class="cite-bracket">[</span>13<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="1983">1983</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=12" title="Edit section: 1983"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>November: The term "virus" is re-coined by <a href="/wiki/Fred_Cohen" title="Fred Cohen">Frederick B. Cohen</a> in describing self-replicating computer programs. In 1984 Cohen uses the phrase "computer virus" (suggested by his teacher <a href="/wiki/Leonard_Adleman" title="Leonard Adleman">Leonard Adleman</a>) to describe the operation of such programs in terms of "infection". He defines a "virus" as "a program that can 'infect' other programs by modifying them to include a possibly evolved copy of itself." Cohen demonstrates a virus-like program on a <a href="/wiki/VAX" title="VAX">VAX11/750</a> system at <a href="/wiki/Lehigh_University" title="Lehigh University">Lehigh University</a>. The program could install itself in, or infect, other system objects.<sup id="cite_ref-14" class="reference"><a href="#cite_note-14"><span class="cite-bracket">[</span>14<span class="cite-bracket">]</span></a></sup><sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Verifiability" title="Wikipedia:Verifiability"><span title="The material near this tag failed verification of its source citation(s). (December 2013)">failed verification</span></a></i>]</sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="1984">1984</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=13" title="Edit section: 1984"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>August: <a href="/wiki/Ken_Thompson" title="Ken Thompson">Ken Thompson</a> publishes his seminal paper, "<a href="/wiki/Reflections_on_Trusting_Trust" class="mw-redirect" title="Reflections on Trusting Trust">Reflections on Trusting Trust</a>", in which he describes how he modified a <a href="/wiki/C_(programming_language)" title="C (programming language)">C</a> <a href="/wiki/Compiler" title="Compiler">compiler</a> so that when used to compile a specific version of the <a href="/wiki/Unix" title="Unix">Unix</a> operating system, it inserts a <a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">backdoor</a> into the <a href="/wiki/Login" title="Login">login</a> command, and when used to compile a new copy of itself, it inserts the backdoor insertion code, even if neither the backdoor nor the backdoor insertion code is present in the <a href="/wiki/Source_code" title="Source code">source code</a> of this new copy.<sup id="cite_ref-15" class="reference"><a href="#cite_note-15"><span class="cite-bracket">[</span>15<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="1986">1986</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=14" title="Edit section: 1986"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>January: The <a href="/wiki/Brain_(computer_virus)" title="Brain (computer virus)">Brain</a> <a href="/wiki/Boot_sector" title="Boot sector">boot sector</a> virus is released. Brain is considered the first <a href="/wiki/IBM_PC_compatible" class="mw-redirect" title="IBM PC compatible">IBM PC compatible</a> virus, and the program responsible for the first IBM PC compatible virus epidemic. The virus is also known as Lahore, Pakistani, Pakistani Brain, and Pakistani flu as it was created in <a href="/wiki/Lahore" title="Lahore">Lahore</a>, Pakistan, by 19-year-old Pakistani programmer Basit Farooq Alvi and his brother, Amjad Farooq Alvi.<sup id="cite_ref-theregisterJanuary2006_16-0" class="reference"><a href="#cite_note-theregisterJanuary2006-16"><span class="cite-bracket">[</span>16<span class="cite-bracket">]</span></a></sup></li> <li>December: Ralf Burger presented the <a href="/wiki/Virdem" title="Virdem">Virdem</a> model of programs at a meeting of the underground <a href="/wiki/Chaos_Computer_Club" title="Chaos Computer Club">Chaos Computer Club</a> in Germany. The <a href="/wiki/Virdem" title="Virdem">Virdem</a> model represented the first programs that could replicate themselves via addition of their code to executable DOS files in COM format.<sup id="cite_ref-TAOCVRAD-Szor_17-0" class="reference"><a href="#cite_note-TAOCVRAD-Szor-17"><span class="cite-bracket">[</span>17<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="1987">1987</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=15" title="Edit section: 1987"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>Appearance of the Vienna virus, which was subsequently neutralized – the first time this had happened on the <a href="/wiki/IBM" title="IBM">IBM</a> platform.<sup id="cite_ref-wentworth_18-0" class="reference"><a href="#cite_note-wentworth-18"><span class="cite-bracket">[</span>18<span class="cite-bracket">]</span></a></sup></li> <li>Appearance of Lehigh virus (discovered at its <a href="/wiki/Lehigh_University" title="Lehigh University">namesake university</a>),<sup id="cite_ref-wentworth_18-1" class="reference"><a href="#cite_note-wentworth-18"><span class="cite-bracket">[</span>18<span class="cite-bracket">]</span></a></sup> boot sector viruses such as Yale from the US, <a href="/wiki/Stoned_(computer_virus)" title="Stoned (computer virus)">Stoned</a> from New Zealand, <a href="/wiki/Ping-Pong_virus" title="Ping-Pong virus">Ping Pong</a> from Italy, and appearance of the first self-encrypting file virus, <a href="/wiki/Cascade_(computer_virus)" title="Cascade (computer virus)">Cascade</a>. Lehigh was stopped on campus before it spread to the "wild" (to computers beyond the university), and as a result, has never been found elsewhere. A subsequent infection of Cascade in the offices of IBM Belgium led to IBM responding with its own antivirus product development. Prior to this, antivirus solutions developed at IBM were intended for staff use only.</li> <li>October: The <a href="/wiki/Jerusalem_(computer_virus)" title="Jerusalem (computer virus)">Jerusalem virus</a>, part of the (at that time unknown) Suriv family, is detected in the city of <a href="/wiki/Jerusalem" title="Jerusalem">Jerusalem</a>. The virus destroys all executable files on infected machines upon every occurrence of Friday the 13th (except Friday 13 November 1987 making its first trigger date May 13, 1988). Jerusalem caused a worldwide epidemic in 1988.<sup id="cite_ref-wentworth_18-2" class="reference"><a href="#cite_note-wentworth-18"><span class="cite-bracket">[</span>18<span class="cite-bracket">]</span></a></sup></li> <li>November: The <a href="/wiki/SCA_(computer_virus)" title="SCA (computer virus)">SCA virus</a>, a boot sector virus for <a href="/wiki/Amiga" title="Amiga">Amiga</a> computers, appears. It immediately creates a pandemic virus-writer storm. A short time later, <a href="/wiki/Swiss_Cracking_Association" class="mw-redirect" title="Swiss Cracking Association">SCA</a> releases another, considerably more destructive virus, the <a href="/wiki/Byte_Bandit" title="Byte Bandit">Byte Bandit</a>.</li> <li>December: <a href="/wiki/Christmas_Tree_EXEC" title="Christmas Tree EXEC">Christmas Tree EXEC</a> was the first widely disruptive replicating network program, which paralyzed several international computer networks in December 1987. It was written in <a href="/wiki/Rexx" title="Rexx">Rexx</a> on the <a href="/wiki/VM_(operating_system)" title="VM (operating system)">VM/CMS</a> operating system and originated in <a href="/wiki/West_Germany" title="West Germany">West Germany</a>. It re-emerged in 1990.</li></ul> <div class="mw-heading mw-heading3"><h3 id="1988">1988</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=16" title="Edit section: 1988"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>March 1: The <a href="/wiki/Ping-Pong_virus" title="Ping-Pong virus">Ping-Pong virus</a> (also called Boot, Bouncing Ball, Bouncing Dot, Italian, Italian-A or VeraCruz), an MS-DOS boot sector virus, is discovered at the <a href="/wiki/University_of_Turin" title="University of Turin">University of Turin</a> in Italy.</li> <li>June: The <a href="/wiki/Festering_Hate" title="Festering Hate">CyberAIDS and Festering Hate</a> <a href="/wiki/Apple_ProDOS" title="Apple ProDOS">Apple ProDOS</a> viruses spreads from underground pirate BBS systems and starts infecting mainstream networks. Festering Hate was the last iteration of the CyberAIDS series extending back to 1985 and 1986. Unlike the few Apple viruses that had come before which were essentially annoying, but did no damage, the Festering Hate series of viruses was extremely destructive, spreading to all system files it could find on the host computer (hard drive, floppy, and system memory) and then destroying everything when it could no longer find any uninfected files.</li> <li>November 2: The <a href="/wiki/Morris_worm" title="Morris worm">Morris worm</a>, created by <a href="/wiki/Robert_Tappan_Morris" title="Robert Tappan Morris">Robert Tappan Morris</a>, infects <a href="/wiki/Digital_Equipment_Corporation" title="Digital Equipment Corporation">DEC</a> <a href="/wiki/VAX" title="VAX">VAX</a> and <a href="/wiki/Sun_Microsystems" title="Sun Microsystems">Sun</a> machines running <a href="/wiki/Berkeley_Software_Distribution" title="Berkeley Software Distribution">BSD UNIX</a> that are connected to the <a href="/wiki/Internet" title="Internet">Internet</a>, and becomes the first worm to spread extensively "in the wild", and one of the first well-known programs exploiting <a href="/wiki/Buffer_overflow" title="Buffer overflow">buffer overrun</a> vulnerabilities.</li> <li>December: The <a href="/wiki/Father_Christmas_(computer_worm)" title="Father Christmas (computer worm)">Father Christmas worm</a> attacks <a href="/wiki/Digital_Equipment_Corporation" title="Digital Equipment Corporation">DEC</a> <a href="/wiki/VAX" title="VAX">VAX</a> machines running <a href="/wiki/OpenVMS" title="OpenVMS">VMS</a> that are connected to the <a href="/wiki/DECnet#The_DECnet_Internet" title="DECnet">DECnet Internet</a> (an international scientific research network using <a href="/wiki/DECnet" title="DECnet">DECnet</a> protocols), affecting <a href="/wiki/NASA" title="NASA">NASA</a> and other research centers. Its purpose was to deliver a Christmas greeting to all affected users.</li></ul> <div class="mw-heading mw-heading3"><h3 id="1989">1989</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=17" title="Edit section: 1989"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>October: <a href="/wiki/Ghostball" class="mw-redirect" title="Ghostball">Ghostball</a>, the first multipartite virus, is discovered by <a href="/wiki/Fri%C3%B0rik_Sk%C3%BAlason" class="mw-redirect" title="Friðrik Skúlason">Friðrik Skúlason</a>. It infects both executable .COM files and boot sectors on MS-DOS systems.</li> <li>December: Several thousand floppy disks containing the <a href="/wiki/AIDS_(Trojan_horse)" title="AIDS (Trojan horse)">AIDS Trojan</a>, the first known <a href="/wiki/Ransomware" title="Ransomware">ransomware</a>, are mailed to subscribers of PC Business World magazine and a WHO AIDS conference mailing list. This DOS Trojan lies dormant for 90 boot cycles, then encrypts all filenames on the system, displaying a notice asking for $189 to be sent to a post office box in Panama in order to receive a decryption program.</li></ul> <div class="mw-heading mw-heading2"><h2 id="1990s">1990s</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=18" title="Edit section: 1990s"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="1990">1990</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=19" title="Edit section: 1990"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>Mark Washburn, working on an analysis of the Vienna and Cascade viruses with Ralf Burger, develops the first family of <a href="/wiki/Polymorphic_code" title="Polymorphic code">polymorphic viruses</a>, the Chameleon family. Chameleon series debuted with the release of <a href="/wiki/1260_(computer_virus)" title="1260 (computer virus)">1260</a>.<sup id="cite_ref-19" class="reference"><a href="#cite_note-19"><span class="cite-bracket">[</span>19<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-20" class="reference"><a href="#cite_note-20"><span class="cite-bracket">[</span>20<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-21" class="reference"><a href="#cite_note-21"><span class="cite-bracket">[</span>21<span class="cite-bracket">]</span></a></sup></li> <li>June: The <a href="/wiki/Form_(computer_virus)" title="Form (computer virus)">Form</a> computer virus is isolated in Switzerland. It would remain in the wild for almost 20 years and reappear afterward; during the 1990s it tended to be the most common virus in the wild with 20 to more than 50 percent of reported infections.</li></ul> <div class="mw-heading mw-heading3"><h3 id="1991">1991</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=20" title="Edit section: 1991"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>Mattel releases a toyline called "Computer Warriors," bringing computer viruses into mainstream media. The villain, Megahert, is a sentient computer virus.</li></ul> <div class="mw-heading mw-heading3"><h3 id="1992">1992</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=21" title="Edit section: 1992"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>March: The <a href="/wiki/Michelangelo_(computer_virus)" title="Michelangelo (computer virus)">Michelangelo virus</a> was expected to create a digital apocalypse on March 6, with millions of computers having their information wiped, according to mass media hysteria surrounding the virus. Later assessments of the damage showed the aftermath to be minimal. <a href="/wiki/John_McAfee" title="John McAfee">John McAfee</a> had been quoted by the media as saying that five million computers would be affected. He later said that pressed by the interviewer to come up with a number, he had estimated a range from five thousand to five million, but the media naturally went with just the higher number.</li> <li>October: <a href="/wiki/Milton-Bradley" class="mw-redirect" title="Milton-Bradley">Milton-Bradley</a> releases <i><a href="/wiki/Omega_Virus" class="mw-redirect" title="Omega Virus">Omega Virus</a></i>, a board game containing one of the first examples of a sentient computer virus in mainstream media.</li></ul> <div class="mw-heading mw-heading3"><h3 id="1993">1993</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=22" title="Edit section: 1993"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>"Leandro" or "Leandro & Kelly"<sup id="cite_ref-22" class="reference"><a href="#cite_note-22"><span class="cite-bracket">[</span>22<span class="cite-bracket">]</span></a></sup> and "Freddy Krueger"<sup id="cite_ref-23" class="reference"><a href="#cite_note-23"><span class="cite-bracket">[</span>23<span class="cite-bracket">]</span></a></sup> spread quickly due to popularity of <a href="/wiki/Bulletin_board_system" title="Bulletin board system">BBS</a> and <a href="/wiki/Shareware" title="Shareware">shareware</a> distribution.</li></ul> <div class="mw-heading mw-heading3"><h3 id="1994">1994</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=23" title="Edit section: 1994"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>April: <a href="/wiki/OneHalf_(computer_virus)" class="mw-redirect" title="OneHalf (computer virus)">OneHalf</a> is a DOS-based polymorphic computer virus.</li> <li>September: <i><a href="/wiki/ReBoot" title="ReBoot">ReBoot</a></i> first airs, containing another memorable fictional, sentient computer virus, Megabyte.</li></ul> <div class="mw-heading mw-heading3"><h3 id="1995">1995</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=24" title="Edit section: 1995"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>The first <a href="/wiki/Macro_virus" title="Macro virus">Macro virus</a>, called "Concept", is created. It attacked Microsoft Word documents.<sup id="cite_ref-24" class="reference"><a href="#cite_note-24"><span class="cite-bracket">[</span>24<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="1996">1996</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=25" title="Edit section: 1996"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>"Ply" – DOS 16-bit based complicated polymorphic virus appeared with a built-in permutation engine.</li> <li><a href="/wiki/Bizatch" class="mw-redirect" title="Bizatch">Boza</a>, the first virus designed specifically for Windows 95 files arrives.</li> <li>Laroux, the first Excel macro virus appears.</li> <li><a href="/wiki/Staog" title="Staog">Staog</a>, the first <a href="/wiki/Linux" title="Linux">Linux</a> virus attacks Linux machines</li></ul> <div class="mw-heading mw-heading3"><h3 id="1997">1997</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=26" title="Edit section: 1997"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/Esperanto_(computer_virus)" title="Esperanto (computer virus)">Esperanto</a>, the first cross-platform virus, appears.</li></ul> <div class="mw-heading mw-heading3"><h3 id="1998">1998</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=27" title="Edit section: 1998"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>June 2: The first version of the <a href="/wiki/CIH_(computer_virus)" title="CIH (computer virus)">CIH virus</a> appears. It is the first known virus able to erase flash ROM BIOS content.</li></ul> <div class="mw-heading mw-heading3"><h3 id="1999">1999</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=28" title="Edit section: 1999"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>January 20: The <a href="/wiki/Happy99" title="Happy99">Happy99</a> worm first appeared. It invisibly attaches itself to emails, displays fireworks to hide the changes being made, and wishes the user a happy <a href="/wiki/New_Year" title="New Year">New Year</a>. It modifies system files related to <a href="/wiki/Outlook_Express" title="Outlook Express">Outlook Express</a> and <a href="/wiki/Internet_Explorer" title="Internet Explorer">Internet Explorer</a> (IE) on <a href="/wiki/Windows_95" title="Windows 95">Windows 95</a> and <a href="/wiki/Windows_98" title="Windows 98">Windows 98</a>.</li> <li>February : The <a href="/wiki/Sub7" title="Sub7">Sub7</a> is released targeting the Windows 9x and on the Windows NT family of operating systems.</li> <li>March 26: The <a href="/wiki/Melissa_(computer_virus)" title="Melissa (computer virus)">Melissa worm</a> was released, targeting <a href="/wiki/Microsoft_Office_Word" class="mw-redirect" title="Microsoft Office Word">Microsoft Word</a> and <a href="/wiki/Microsoft_Office_Outlook" class="mw-redirect" title="Microsoft Office Outlook">Outlook</a>-based systems, and creating considerable network traffic.</li> <li>June 6: The <a href="/wiki/ExploreZip" title="ExploreZip">ExploreZip</a> worm, which destroys <a href="/wiki/Microsoft_Office" title="Microsoft Office">Microsoft Office</a> documents, was first detected.</li> <li>September: the <a href="/wiki/CTX_(computer_virus)" title="CTX (computer virus)">CTX</a> virus is isolated</li> <li>December 30: The <a href="/wiki/Kak_worm" title="Kak worm">Kak worm</a> is a <a href="/wiki/JavaScript" title="JavaScript">JavaScript</a> computer worm that spread itself by exploiting a bug in Outlook Express.<sup id="cite_ref-25" class="reference"><a href="#cite_note-25"><span class="cite-bracket">[</span>25<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading2"><h2 id="2000s">2000s</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=29" title="Edit section: 2000s"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="2000">2000</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=30" title="Edit section: 2000"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>May 5: The <a href="/wiki/ILOVEYOU" title="ILOVEYOU">ILOVEYOU</a> worm (also known as the Love Letter, VBS, or Love Bug worm), a computer worm written in VBScript and using <a href="/wiki/Social_engineering_(security)" title="Social engineering (security)">social engineering</a> techniques, infected millions of Windows computers worldwide within a few hours of its release.</li> <li>June 28: The <a href="/wiki/Pikachu_virus" title="Pikachu virus">Pikachu virus</a> is believed to be the first computer virus geared at children. It contains the character "<a href="/wiki/Pikachu" title="Pikachu">Pikachu</a>" from the <a href="/wiki/Pok%C3%A9mon" title="Pokémon">Pokémon</a> series. The operating systems affected by this worm are <a href="/wiki/Windows_95" title="Windows 95">Windows 95</a>, <a href="/wiki/Windows_98" title="Windows 98">Windows 98</a>, and Windows ME.</li></ul> <div class="mw-heading mw-heading3"><h3 id="2001">2001</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=31" title="Edit section: 2001"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>February 11: The <a href="/wiki/Anna_Kournikova_(computer_virus)" title="Anna Kournikova (computer virus)">Anna Kournikova virus</a> hits e-mail servers hard by sending e-mail to contacts in the <a href="/wiki/Microsoft_Outlook" title="Microsoft Outlook">Microsoft Outlook</a> addressbook.<sup id="cite_ref-26" class="reference"><a href="#cite_note-26"><span class="cite-bracket">[</span>26<span class="cite-bracket">]</span></a></sup> Its creator, Jan de Wit, was sentenced to 150 hours of community service.<sup id="cite_ref-27" class="reference"><a href="#cite_note-27"><span class="cite-bracket">[</span>27<span class="cite-bracket">]</span></a></sup></li> <li>March 13: Magistr, also called Disembowler, is discovered. It is a complex email worm for Windows systems with multiple payloads that trigger months apart from each other. It targets members of the Law profession by searching the files on a user's computer for various keywords relating to court proceedings, activating if such are found.<sup id="cite_ref-28" class="reference"><a href="#cite_note-28"><span class="cite-bracket">[</span>28<span class="cite-bracket">]</span></a></sup></li> <li>May 8: The <a href="/wiki/Sadmind_worm" class="mw-redirect" title="Sadmind worm">Sadmind worm</a> spreads by exploiting holes in both <a href="/wiki/Sun_Microsystems" title="Sun Microsystems">Sun</a> <a href="/wiki/Solaris_(operating_system)" class="mw-redirect" title="Solaris (operating system)">Solaris</a> and <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a> <a href="/wiki/Internet_Information_Services" title="Internet Information Services">IIS</a>.</li> <li>July: The <a href="/wiki/Sircam" title="Sircam">Sircam</a> worm is released, spreading through Microsoft systems via e-mail and unprotected <a href="/wiki/Network_share" class="mw-redirect" title="Network share">network shares</a>.</li> <li>July 13: The <a href="/wiki/Code_Red_(computer_worm)" title="Code Red (computer worm)">Code Red worm</a> attacking the Index Server ISAPI Extension in Microsoft <a href="/wiki/Internet_Information_Services" title="Internet Information Services">Internet Information Services</a> is released.</li> <li>August 4: A complete re-write of the <a href="/wiki/Code_Red_worm" class="mw-redirect" title="Code Red worm">Code Red worm</a>, <a href="/wiki/Code_Red_II" title="Code Red II">Code Red II</a> begins aggressively spreading onto Microsoft systems, primarily in China.</li> <li>September 18: The <a href="/wiki/Nimda" title="Nimda">Nimda</a> worm is discovered and spreads through a variety of means including vulnerabilities in Microsoft Windows and backdoors left by <a href="/wiki/Code_Red_II" title="Code Red II">Code Red II</a> and <a href="/wiki/Sadmind_worm" class="mw-redirect" title="Sadmind worm">Sadmind worm</a>.</li> <li>October 26: The <a href="/wiki/Klez" title="Klez">Klez</a> worm is first identified. It exploits a vulnerability in Microsoft Internet Explorer and Microsoft Outlook and Outlook Express.</li></ul> <div class="mw-heading mw-heading3"><h3 id="2002">2002</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=32" title="Edit section: 2002"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>February 11: The <a href="/wiki/Simile_(computer_virus)" title="Simile (computer virus)">Simile virus</a> is a <a href="/wiki/Metamorphic_code" title="Metamorphic code">metamorphic</a> computer virus written in assembly.</li> <li><a href="/wiki/Beast_(trojan_horse)" class="mw-redirect" title="Beast (trojan horse)">Beast</a> is a Windows-based backdoor Trojan horse, more commonly known as a RAT (<a href="/wiki/Remote_administration_tool" class="mw-redirect" title="Remote administration tool">Remote Administration Tool</a>). It is capable of infecting almost all versions of Windows. Written in <a href="/wiki/Delphi_(programming_language)" class="mw-redirect" title="Delphi (programming language)">Delphi</a> and released first by its author Tataye in 2002, its most current version was released on October 3, 2004.</li> <li>March 7: <a href="/wiki/Mylife_(computer_worm)" title="Mylife (computer worm)">Mylife</a> is a computer worm that spread itself by sending malicious emails to all the contacts in Microsoft Outlook.<sup id="cite_ref-29" class="reference"><a href="#cite_note-29"><span class="cite-bracket">[</span>29<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="2003">2003</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=33" title="Edit section: 2003"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>January 24: The <a href="/wiki/SQL_Slammer" title="SQL Slammer">SQL Slammer</a> worm, aka <i>Sapphire worm</i>, <i>Helkern</i> and other names, attacks vulnerabilities in <a href="/wiki/Microsoft_SQL_Server" title="Microsoft SQL Server">Microsoft SQL Server</a> and <a href="/wiki/MSDE" title="MSDE">MSDE</a> becomes the fastest spreading worm of all time (measured by doubling time at the peak rate of growth),<sup id="cite_ref-slammer_30-0" class="reference"><a href="#cite_note-slammer-30"><span class="cite-bracket">[</span>30<span class="cite-bracket">]</span></a></sup> causing massive Internet access disruptions worldwide just fifteen minutes after infecting its first victim.<sup id="cite_ref-wired_31-0" class="reference"><a href="#cite_note-wired-31"><span class="cite-bracket">[</span>31<span class="cite-bracket">]</span></a></sup></li> <li>April 2: <a href="/wiki/Graybird" title="Graybird">Graybird</a> is a trojan horse also known as Backdoor.Graybird.<sup id="cite_ref-symantec-graybird_32-0" class="reference"><a href="#cite_note-symantec-graybird-32"><span class="cite-bracket">[</span>32<span class="cite-bracket">]</span></a></sup></li> <li>June 13: ProRat is a Turkish-made Microsoft Windows based backdoor trojan horse, more commonly known as a RAT (Remote Administration Tool).<sup id="cite_ref-prorat_33-0" class="reference"><a href="#cite_note-prorat-33"><span class="cite-bracket">[</span>33<span class="cite-bracket">]</span></a></sup></li> <li>August 12: The <a href="/wiki/Blaster_(computer_worm)" title="Blaster (computer worm)">Blaster worm</a>, aka the <i>Lovesan</i> worm, rapidly spreads by exploiting a vulnerability in system services present on Windows computers.</li> <li>August 18: The <a href="/wiki/Welchia" title="Welchia">Welchia</a> (Nachi) worm is discovered. The worm tries to remove the <a href="/wiki/Blaster_(computer_worm)" title="Blaster (computer worm)">Blaster worm</a> and patch Windows.</li> <li>August 19: The <a href="/wiki/Sobig" title="Sobig">Sobig</a> worm (technically the <a href="/wiki/Sobig.F_worm" class="mw-redirect" title="Sobig.F worm">Sobig.F worm</a>) spreads rapidly through Microsoft systems via mail and network shares.</li> <li>September 18: <a href="/wiki/Swen_(computer_worm)" title="Swen (computer worm)">Swen</a> is a computer worm written in <a href="/wiki/C%2B%2B" title="C++">C++</a>.<sup id="cite_ref-34" class="reference"><a href="#cite_note-34"><span class="cite-bracket">[</span>34<span class="cite-bracket">]</span></a></sup></li> <li>October 24: The <a href="/wiki/Sober_worm" class="mw-redirect" title="Sober worm">Sober worm</a> is first seen on Microsoft systems and maintains its presence until 2005 with many new variants. The simultaneous attacks on network weak points by the Blaster and Sobig worms cause massive damage.</li> <li>November 10: <a href="/wiki/Agobot" title="Agobot">Agobot</a> is a computer worm that can spread itself by exploiting vulnerabilities on Microsoft Windows. Some of the vulnerabilities are MS03-026 and MS05-039.<sup id="cite_ref-35" class="reference"><a href="#cite_note-35"><span class="cite-bracket">[</span>35<span class="cite-bracket">]</span></a></sup></li> <li>November 20: Bolgimo is a computer worm that spread itself by exploiting a buffer overflow vulnerability at Microsoft Windows DCOM RPC Interface.<sup id="cite_ref-36" class="reference"><a href="#cite_note-36"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="2004">2004</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=34" title="Edit section: 2004"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>January 18: <a href="/wiki/Bagle_(computer_worm)" title="Bagle (computer worm)">Bagle</a> is a mass-mailing worm affecting all versions of Microsoft Windows. There were two variants of Bagle worm, Bagle.A and Bagle.B. Bagle.B was discovered on February 17, 2004.</li> <li>January 26: The <a href="/wiki/MyDoom" class="mw-redirect" title="MyDoom">MyDoom</a> worm emerges, and currently holds the record for the fastest-spreading mass mailer worm. The worm was most notable for performing a <a href="/wiki/Distributed_denial-of-service" class="mw-redirect" title="Distributed denial-of-service">distributed denial-of-service</a> (DDoS) attack on www.sco.com, which belonged to <a href="/wiki/The_SCO_Group" class="mw-redirect" title="The SCO Group">The SCO Group</a>.</li> <li>February 16: The <a href="/wiki/Netsky_(computer_worm)" title="Netsky (computer worm)">Netsky</a> worm is discovered. The worm spreads by email and by copying itself to folders on the local hard drive as well as on mapped network drives if available. Many variants of the Netsky worm appeared.</li> <li>March 19: The <a href="/wiki/Witty_worm" class="mw-redirect" title="Witty worm">Witty worm</a> is a record-breaking worm in many regards. It exploited holes in several <a href="/wiki/Internet_Security_Systems" title="Internet Security Systems">Internet Security Systems</a> (ISS) products. It was the fastest computer issue to be categorized as a worm, and it was the first internet worm to carry a destructive payload<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="seems contradicted by other entries in this article (April 2019)">citation needed</span></a></i>]</sup>. It spread rapidly using a pre-populated list of ground-zero hosts.</li> <li>May 1: The <a href="/wiki/Sasser_worm" class="mw-redirect" title="Sasser worm">Sasser worm</a> emerges by exploiting a vulnerability in the Microsoft Windows <a href="/wiki/Local_Security_Authority_Subsystem_Service" title="Local Security Authority Subsystem Service">LSASS</a> service and causes problems in networks, while removing <a href="/wiki/MyDoom" class="mw-redirect" title="MyDoom">MyDoom</a> and <a href="/wiki/Bagle_(computer_worm)" title="Bagle (computer worm)">Bagle</a> variants, even interrupting business.</li> <li>June 15: <a href="/wiki/Caribe_(computer_worm)" class="mw-redirect" title="Caribe (computer worm)">Caribe</a> or Cabir is a computer worm that is designed to infect mobile phones that run <a href="/wiki/Symbian_OS" class="mw-redirect" title="Symbian OS">Symbian OS</a>. It is the first computer worm that can infect mobile phones. It spread itself through <a href="/wiki/Bluetooth" title="Bluetooth">Bluetooth</a>. More information can be found on <a href="/wiki/F-Secure" title="F-Secure">F-Secure</a><sup id="cite_ref-37" class="reference"><a href="#cite_note-37"><span class="cite-bracket">[</span>37<span class="cite-bracket">]</span></a></sup> and <a href="/wiki/NortonLifeLock" class="mw-redirect" title="NortonLifeLock">Symantec</a>.<sup id="cite_ref-38" class="reference"><a href="#cite_note-38"><span class="cite-bracket">[</span>38<span class="cite-bracket">]</span></a></sup></li> <li>August 16: Nuclear RAT (short for Nuclear Remote Administration Tool) is a backdoor <a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">trojan</a> that infects <a href="/wiki/Windows_NT" title="Windows NT">Windows NT</a> family systems (<a href="/wiki/Windows_2000" title="Windows 2000">Windows 2000</a>, <a href="/wiki/Windows_XP" title="Windows XP">Windows XP</a>, <a href="/wiki/Windows_2003" class="mw-redirect" title="Windows 2003">Windows 2003</a>).<sup id="cite_ref-nuclear-rat_39-0" class="reference"><a href="#cite_note-nuclear-rat-39"><span class="cite-bracket">[</span>39<span class="cite-bracket">]</span></a></sup></li> <li>August 20: <a href="/wiki/Vundo" title="Vundo">Vundo</a>, or the Vundo Trojan (also known as Virtumonde or Virtumondo and sometimes referred to as MS Juan) is a trojan known to cause popups and advertising for rogue antispyware programs, and sporadically other misbehavior including performance degradation and denial of service with some websites including <a href="/wiki/Google" title="Google">Google</a> and <a href="/wiki/Facebook" title="Facebook">Facebook</a>.<sup id="cite_ref-vundo_40-0" class="reference"><a href="#cite_note-vundo-40"><span class="cite-bracket">[</span>40<span class="cite-bracket">]</span></a></sup></li> <li>October 12: <a href="/wiki/Bifrost_(trojan_horse)" class="mw-redirect" title="Bifrost (trojan horse)">Bifrost</a>, also known as Bifrose, is a backdoor trojan which can infect <a href="/wiki/Windows_95" title="Windows 95">Windows 95</a> through <a href="/wiki/Windows_Vista" title="Windows Vista">Vista</a>. Bifrost uses the typical server, server builder, and client backdoor program configuration to allow a remote attack.<sup id="cite_ref-bifrost_41-0" class="reference"><a href="#cite_note-bifrost-41"><span class="cite-bracket">[</span>41<span class="cite-bracket">]</span></a></sup></li> <li>December: <a href="/wiki/Santy" title="Santy">Santy</a>, the first known "webworm" is launched. It exploited a vulnerability in <a href="/wiki/PhpBB" title="PhpBB">phpBB</a> and used <a href="/wiki/Google" title="Google">Google</a> to find new targets. It infected around 40000 sites before Google filtered the search query used by the worm, preventing it from spreading.</li></ul> <div class="mw-heading mw-heading3"><h3 id="2005">2005</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=35" title="Edit section: 2005"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>August 2005: Zotob is a computer worm which exploits security vulnerabilities in Microsoft operating systems like Windows 2000, including the MS05-039 plug-and-play vulnerability. This worm has been known to spread on Microsoft-ds or TCP port 445.</li> <li>October 2005: The <a href="/wiki/Sony_BMG_copy_protection_rootkit_scandal" title="Sony BMG copy protection rootkit scandal">copy protection rootkit</a> deliberately and surreptitiously included on music CDs sold by <a href="/wiki/Sony_BMG" title="Sony BMG">Sony BMG</a> is exposed. The rootkit creates vulnerabilities on affected computers, making them susceptible to infection by worms and viruses.</li> <li>Late 2005: The <a href="/wiki/Zlob_trojan" title="Zlob trojan">Zlob Trojan</a>, is a Trojan horse program that masquerades as a required video codec in the form of the Microsoft Windows ActiveX component. It was first detected in late 2005.<sup id="cite_ref-zlob_42-0" class="reference"><a href="#cite_note-zlob-42"><span class="cite-bracket">[</span>42<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="2006">2006</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=36" title="Edit section: 2006"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>January 20: The <a href="/wiki/Nyxem" class="mw-redirect" title="Nyxem">Nyxem</a> worm was discovered. It spread by mass-mailing. Its payload, which activates on the third of every month, starting on February 3, attempts to disable security-related and file-sharing software, and destroy files of certain types, such as Microsoft Office files.</li> <li>February 16: Discovery of the first-ever malware for Mac OS X, a low-threat trojan-horse known as OSX/<a href="/wiki/Leap_virus" class="mw-redirect" title="Leap virus">Leap</a>-A or OSX/Oompa-A, is announced.</li> <li>Late March: <a href="/wiki/Brontok" title="Brontok">Brontok</a> variant N was found in late March.<sup id="cite_ref-43" class="reference"><a href="#cite_note-43"><span class="cite-bracket">[</span>43<span class="cite-bracket">]</span></a></sup> Brontok was a mass-email worm and the origin for the worm was from Indonesia.</li> <li>June: Starbucks is a virus that infects StarOffice and OpenOffice.</li> <li>Late September: <a href="/wiki/Stration" title="Stration">Stration</a> or Warezov worm first discovered.</li> <li>Development of <a href="/wiki/Stuxnet" title="Stuxnet">Stuxnet</a> is presumed to have been started between 2005 and 2006.</li></ul> <div class="mw-heading mw-heading3"><h3 id="2007">2007</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=37" title="Edit section: 2007"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>January 17: <a href="/wiki/Storm_Worm" title="Storm Worm">Storm Worm</a> identified as a fast-spreading email spamming threat to Microsoft systems. It begins gathering infected computers into the <a href="/wiki/Storm_botnet" title="Storm botnet">Storm botnet</a>. By around June 30, it had infected 1.7 million computers, and it had compromised between 1 and 10 million computers by September.<sup id="cite_ref-44" class="reference"><a href="#cite_note-44"><span class="cite-bracket">[</span>44<span class="cite-bracket">]</span></a></sup> Thought to have originated from Russia, it disguises itself as a news email containing a film about bogus news stories asking the user to download the attachment which it claims is a film.</li> <li>July: <a href="/wiki/Zeus_(malware)" title="Zeus (malware)">Zeus</a> is a trojan that targets Microsoft Windows to steal banking information by keystroke logging.</li></ul> <div class="mw-heading mw-heading3"><h3 id="2008">2008</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=38" title="Edit section: 2008"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>February 17: <a href="/wiki/Mocmex" title="Mocmex">Mocmex</a> is a trojan, which was found in a digital photo frame in February 2008. It was the first serious computer virus on a digital photo frame. The virus was traced back to a group in China.<sup id="cite_ref-mocmex_45-0" class="reference"><a href="#cite_note-mocmex-45"><span class="cite-bracket">[</span>45<span class="cite-bracket">]</span></a></sup></li> <li>March 3: <a href="/wiki/Torpig" title="Torpig">Torpig</a>, also known as Sinowal and Mebroot, is a Trojan horse that affects Windows, turning off anti-virus applications. It allows others to access the computer, modifies data, steals confidential information (such as user passwords and other sensitive data) and installs more malware on the victim's computer.<sup id="cite_ref-torpig_46-0" class="reference"><a href="#cite_note-torpig-46"><span class="cite-bracket">[</span>46<span class="cite-bracket">]</span></a></sup></li> <li>May 6: Rustock.C, a hitherto-rumored spambot-type malware with advanced rootkit capabilities, was announced to have been detected on Microsoft systems and analyzed, having been in the wild and undetected since October 2007 at the very least.<sup id="cite_ref-prcom_47-0" class="reference"><a href="#cite_note-prcom-47"><span class="cite-bracket">[</span>47<span class="cite-bracket">]</span></a></sup></li> <li>July 6: Bohmini.A is a configurable remote access tool or trojan that exploits security flaws in Adobe Flash 9.0.115 with Internet Explorer 7.0 and Firefox 2.0 under Windows XP SP2.<sup id="cite_ref-virustotal-bohmini_48-0" class="reference"><a href="#cite_note-virustotal-bohmini-48"><span class="cite-bracket">[</span>48<span class="cite-bracket">]</span></a></sup></li> <li>July 31: The <a href="/wiki/Koobface" title="Koobface">Koobface</a> computer worm targets users of <a href="/wiki/Facebook" title="Facebook">Facebook</a> and <a href="/wiki/Myspace" title="Myspace">Myspace</a>. New variants constantly appear.<sup id="cite_ref-CNet_49-0" class="reference"><a href="#cite_note-CNet-49"><span class="cite-bracket">[</span>49<span class="cite-bracket">]</span></a></sup></li> <li>November 21: Computer worm <a href="/wiki/Conficker" title="Conficker">Conficker</a> infects anywhere from 9 to 15 million Microsoft server systems running everything from <a href="/wiki/Windows_2000" title="Windows 2000">Windows 2000</a> to the <a href="/wiki/Windows_7" title="Windows 7">Windows 7</a> Beta. The French Navy,<sup id="cite_ref-50" class="reference"><a href="#cite_note-50"><span class="cite-bracket">[</span>50<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Ministry_of_Defence_(United_Kingdom)" title="Ministry of Defence (United Kingdom)">UK Ministry of Defence</a> (including Royal Navy warships and submarines),<sup id="cite_ref-51" class="reference"><a href="#cite_note-51"><span class="cite-bracket">[</span>51<span class="cite-bracket">]</span></a></sup> Sheffield Hospital network,<sup id="cite_ref-52" class="reference"><a href="#cite_note-52"><span class="cite-bracket">[</span>52<span class="cite-bracket">]</span></a></sup> German <a href="/wiki/Bundeswehr" title="Bundeswehr">Bundeswehr</a><sup id="cite_ref-53" class="reference"><a href="#cite_note-53"><span class="cite-bracket">[</span>53<span class="cite-bracket">]</span></a></sup> and Norwegian Police were all affected. <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a> sets a bounty of US$250,000 for information leading to the capture of the worm's author(s).<sup id="cite_ref-54" class="reference"><a href="#cite_note-54"><span class="cite-bracket">[</span>54<span class="cite-bracket">]</span></a></sup> Five main variants of the Conficker worm are known and have been dubbed Conficker A, B, C, D and E. They were discovered 21 November 2008, 29 December 2008, 20 February 2009, 4 March 2009 and 7 April 2009, respectively. On December 16, 2008, Microsoft releases KB958644<sup id="cite_ref-55" class="reference"><a href="#cite_note-55"><span class="cite-bracket">[</span>55<span class="cite-bracket">]</span></a></sup> patching the server service vulnerability responsible for the spread of Conficker.</li></ul> <div class="mw-heading mw-heading3"><h3 id="2009">2009</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=39" title="Edit section: 2009"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>July 4: The <a href="/wiki/July_2009_cyber_attacks" class="mw-redirect" title="July 2009 cyber attacks">July 2009 cyber attacks</a> occur and the emergence of the W32.Dozer attack the <a href="/wiki/United_States" title="United States">United States</a> and <a href="/wiki/South_Korea" title="South Korea">South Korea</a>.</li> <li>July 15: Symantec discovered <a href="/wiki/Daprosy_Worm" title="Daprosy Worm">Daprosy Worm</a>, a trojan worm is intended to steal online-game passwords in internet cafes. It could intercept all keystrokes and send them to its author, making it potentially a very dangerous worm to infect <a href="/wiki/Business-to-business" title="Business-to-business">B2B</a> (business-to-business) systems.</li> <li>August 24: Source code for <a href="/wiki/MiniPanzer_and_MegaPanzer" title="MiniPanzer and MegaPanzer">MegaPanzer</a> is released by its author under GPLv3.<sup id="cite_ref-56" class="reference"><a href="#cite_note-56"><span class="cite-bracket">[</span>56<span class="cite-bracket">]</span></a></sup> and appears to have been apparently detected in the wild.<sup id="cite_ref-57" class="reference"><a href="#cite_note-57"><span class="cite-bracket">[</span>57<span class="cite-bracket">]</span></a></sup></li> <li>November 27: The virus <a href="/wiki/Kenzero" title="Kenzero">Kenzero</a> is a virus that spreads online from <a href="/wiki/Peer-to-peer" title="Peer-to-peer">peer-to-peer</a> networks (P2P) taking browsing history.<sup id="cite_ref-58" class="reference"><a href="#cite_note-58"><span class="cite-bracket">[</span>58<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading2"><h2 id="2010s">2010s</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=40" title="Edit section: 2010s"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="2010">2010</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=41" title="Edit section: 2010"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>January: The <a href="/wiki/Waledac_botnet" title="Waledac botnet">Waledac botnet</a> sent spam emails. In February 2010, an international group of security researchers and Microsoft took Waledac down.<sup id="cite_ref-59" class="reference"><a href="#cite_note-59"><span class="cite-bracket">[</span>59<span class="cite-bracket">]</span></a></sup></li> <li>January: The <a href="/wiki/Psyb0t" title="Psyb0t">Psyb0t</a> worm is discovered. It is thought to be unique in that it can infect routers and high-speed modems.<sup id="cite_ref-60" class="reference"><a href="#cite_note-60"><span class="cite-bracket">[</span>60<span class="cite-bracket">]</span></a></sup></li> <li>February 18: <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a> announced that a <a href="/wiki/Blue_Screen_of_Death" class="mw-redirect" title="Blue Screen of Death">BSoD</a> problem on some Windows machines which was triggered by a batch of <a href="/wiki/Patch_Tuesday" title="Patch Tuesday">Patch Tuesday</a> updates was caused by the <a href="/wiki/Alureon" title="Alureon">Alureon</a> Trojan.<sup id="cite_ref-61" class="reference"><a href="#cite_note-61"><span class="cite-bracket">[</span>61<span class="cite-bracket">]</span></a></sup></li> <li>June 17: <a href="/wiki/Stuxnet" title="Stuxnet">Stuxnet</a>, a Windows Trojan, was detected.<sup id="cite_ref-62" class="reference"><a href="#cite_note-62"><span class="cite-bracket">[</span>62<span class="cite-bracket">]</span></a></sup> It is the first worm to attack <a href="/wiki/SCADA" title="SCADA">SCADA</a> systems.<sup id="cite_ref-Keizer1_63-0" class="reference"><a href="#cite_note-Keizer1-63"><span class="cite-bracket">[</span>63<span class="cite-bracket">]</span></a></sup> There are suggestions that it was designed to target Iranian nuclear facilities.<sup id="cite_ref-64" class="reference"><a href="#cite_note-64"><span class="cite-bracket">[</span>64<span class="cite-bracket">]</span></a></sup> It uses a valid certificate from <a href="/wiki/Realtek" title="Realtek">Realtek</a>.<sup id="cite_ref-65" class="reference"><a href="#cite_note-65"><span class="cite-bracket">[</span>65<span class="cite-bracket">]</span></a></sup></li> <li>September 9: The virus, called "<a href="/wiki/Here_you_have" title="Here you have">here you have</a>" or "VBMania", is a simple Trojan horse that arrives in the inbox with the odd-but-suggestive subject line "here you have". The body reads "This is The Document I told you about, you can find it Here" or "This is The Free Download Sex Movies, you can find it Here".</li></ul> <div class="mw-heading mw-heading3"><h3 id="2011">2011</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=42" title="Edit section: 2011"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/SpyEye" title="SpyEye">SpyEye</a> and <a href="/wiki/Zeus_(Trojan_horse)" class="mw-redirect" title="Zeus (Trojan horse)">Zeus</a> merged code is seen.<sup id="cite_ref-66" class="reference"><a href="#cite_note-66"><span class="cite-bracket">[</span>66<span class="cite-bracket">]</span></a></sup> New variants attack <a href="/wiki/Mobile_banking" title="Mobile banking">mobile phone banking</a> information.<sup id="cite_ref-67" class="reference"><a href="#cite_note-67"><span class="cite-bracket">[</span>67<span class="cite-bracket">]</span></a></sup></li> <li>Anti-Spyware 2011, a Trojan horse that attacks Windows 9x, 2000, XP, Vista, and Windows 7, posing as an anti-spyware program. It disables security-related processes of anti-virus programs, while also blocking access to the Internet, which prevents updates.<sup id="cite_ref-68" class="reference"><a href="#cite_note-68"><span class="cite-bracket">[</span>68<span class="cite-bracket">]</span></a></sup></li> <li>Summer 2011: The Morto worm attempts to propagate itself to additional computers via the Microsoft Windows <a href="/wiki/Remote_Desktop_Protocol" title="Remote Desktop Protocol">Remote Desktop Protocol</a> (RDP). Morto spreads by forcing infected systems to scan for Windows servers allowing RDP login. Once Morto finds an RDP-accessible system, it attempts to log into a domain or local system account named 'Administrator' using several common passwords.<sup id="cite_ref-morto_69-0" class="reference"><a href="#cite_note-morto-69"><span class="cite-bracket">[</span>69<span class="cite-bracket">]</span></a></sup> A detailed overview of how the worm works – along with the password dictionary Morto uses – was done by <a href="/wiki/Imperva" title="Imperva">Imperva</a>.<sup id="cite_ref-imperva_70-0" class="reference"><a href="#cite_note-imperva-70"><span class="cite-bracket">[</span>70<span class="cite-bracket">]</span></a></sup></li> <li>July 13: the <a href="/wiki/ZeroAccess" class="mw-redirect" title="ZeroAccess">ZeroAccess</a> rootkit (also known as Sirefef or max++) was discovered.</li> <li>September 1: <a href="/wiki/Duqu" title="Duqu">Duqu</a> is a worm thought to be related to the <a href="/wiki/Stuxnet" title="Stuxnet">Stuxnet</a> worm. The Laboratory of Cryptography and System Security (<a href="/wiki/CrySyS_Lab" title="CrySyS Lab">CrySyS Lab</a>)<sup id="cite_ref-71" class="reference"><a href="#cite_note-71"><span class="cite-bracket">[</span>71<span class="cite-bracket">]</span></a></sup> of the <a href="/wiki/Budapest_University_of_Technology_and_Economics" title="Budapest University of Technology and Economics">Budapest University of Technology and Economics</a> in <a href="/wiki/Hungary" title="Hungary">Hungary</a> discovered the threat, analysed the malware, and wrote a 60-page report naming the threat Duqu.<sup id="cite_ref-72" class="reference"><a href="#cite_note-72"><span class="cite-bracket">[</span>72<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-73" class="reference"><a href="#cite_note-73"><span class="cite-bracket">[</span>73<span class="cite-bracket">]</span></a></sup> Duqu gets its name from the prefix "~DQ" it gives to the names of files it creates.<sup id="cite_ref-syamantecduqu_74-0" class="reference"><a href="#cite_note-syamantecduqu-74"><span class="cite-bracket">[</span>74<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="2012">2012</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=43" title="Edit section: 2012"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>May: <a href="/wiki/Flame_(malware)" title="Flame (malware)">Flame</a> – also known as Flamer, sKyWIper, and Skywiper – a modular computer malware that attacks computers running Microsoft Windows. Used for targeted <a href="/wiki/Cyber_espionage" class="mw-redirect" title="Cyber espionage">cyber espionage</a> in Middle Eastern countries. Its discovery was announced on 28 May 2012 by MAHER Center of Iranian National Computer Emergency Response Team (CERT), Kaspersky Lab and CrySyS Lab of the Budapest University of Technology and Economics. CrySyS stated in their report that "sKyWIper is certainly the most sophisticated malware we encountered during our practice; arguably, it is the most complex malware ever found".<sup id="cite_ref-:0_75-0" class="reference"><a href="#cite_note-:0-75"><span class="cite-bracket">[</span>75<span class="cite-bracket">]</span></a></sup></li> <li>August 16: <a href="/wiki/Shamoon" title="Shamoon">Shamoon</a> is a computer virus designed to target computers running Microsoft Windows in the energy sector. Symantec, Kaspersky Lab, and Seculert announced its discovery on August 16, 2012.</li> <li>September 20: NGRBot is a worm that uses the IRC network for file transfer, sending and receiving commands between zombie network machines and the attacker's IRC server, and monitoring and controlling network connectivity and intercept. It employs a user-mode rootkit technique to hide and steal its victim's information. This family of bot is also designed to infect HTML pages with inline frames (<a href="/wiki/HTML_element#Frames" title="HTML element">iframes</a>), causing redirections, blocking victims from getting updates from security/antimalware products, and killing those services. The bot is designed to connect via a predefined IRC channel and communicate with a remote botnet.<sup id="cite_ref-:1_76-0" class="reference"><a href="#cite_note-:1-76"><span class="cite-bracket">[</span>76<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-:2_77-0" class="reference"><a href="#cite_note-:2-77"><span class="cite-bracket">[</span>77<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="2013">2013</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=44" title="Edit section: 2013"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>September: The <a href="/wiki/CryptoLocker" title="CryptoLocker">CryptoLocker</a> Trojan horse is discovered. CryptoLocker encrypts the files on a user's hard drive, then prompts them to pay a ransom to the developer to receive the decryption key. In the following months, several copycat ransomware Trojans were also discovered.</li> <li>December: The <a href="/wiki/Gameover_ZeuS" title="Gameover ZeuS">Gameover ZeuS</a> Trojan is discovered. This type of virus steals one's login details on popular Web sites that involve monetary transactions. It works by detecting a login page, then proceeds to inject malicious code into the page, <a href="/wiki/Keystroke_logging" title="Keystroke logging">keystroke logging</a> the computer user's details.</li> <li>December: <a href="/wiki/Linux.Darlloz" title="Linux.Darlloz">Linux.Darlloz</a> targets the <a href="/wiki/Internet_of_things" title="Internet of things">Internet of things</a> and infects <a href="/wiki/Router_(computing)" title="Router (computing)">routers</a>, <a href="/wiki/Security_camera" class="mw-redirect" title="Security camera">security cameras</a>, <a href="/wiki/Set-top_box" title="Set-top box">set-top boxes</a> by exploiting a <a href="/wiki/PHP" title="PHP">PHP</a> vulnerability.<sup id="cite_ref-:3_78-0" class="reference"><a href="#cite_note-:3-78"><span class="cite-bracket">[</span>78<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-:4_79-0" class="reference"><a href="#cite_note-:4-79"><span class="cite-bracket">[</span>79<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="2014">2014</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=45" title="Edit section: 2014"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>November: The <a href="/wiki/Regin_(malware)" title="Regin (malware)">Regin</a> Trojan horse is discovered. Regin is a <a href="/wiki/Dropper_(malware)" title="Dropper (malware)">dropper</a>, primarily spread via spoofed Web pages. Once installed, it quietly downloads additional malware, making it difficult for signature-based anti-virus programs to detect. It is believed to have been created by the United States and United Kingdom as a tool for espionage and mass surveillance.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (August 2020)">citation needed</span></a></i>]</sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="2015">2015</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=46" title="Edit section: 2015"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>The <a href="/wiki/BASHLITE" title="BASHLITE">BASHLITE</a> malware is leaked leading to a massive spike in DDoS attacks.<sup id="cite_ref-Level3_80-0" class="reference"><a href="#cite_note-Level3-80"><span class="cite-bracket">[</span>80<span class="cite-bracket">]</span></a></sup></li> <li><a href="/wiki/Linux.Wifatch" title="Linux.Wifatch">Linux.Wifatch</a> is revealed to the general public. It is found to attempt to secure devices from other more malicious malware.<sup id="cite_ref-symantec1_81-0" class="reference"><a href="#cite_note-symantec1-81"><span class="cite-bracket">[</span>81<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-:5_82-0" class="reference"><a href="#cite_note-:5-82"><span class="cite-bracket">[</span>82<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-:6_83-0" class="reference"><a href="#cite_note-:6-83"><span class="cite-bracket">[</span>83<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="2016">2016</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=47" title="Edit section: 2016"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>January: A trojan named "<a href="/wiki/MEMZ_trojan" class="mw-redirect" title="MEMZ trojan">MEMZ</a>" is created. The creator, Leurak, explained that the trojan was intended merely as a joke.<sup id="cite_ref-memz_1_84-0" class="reference"><a href="#cite_note-memz_1-84"><span class="cite-bracket">[</span>84<span class="cite-bracket">]</span></a></sup> The trojan alerts the user to the fact that it is a trojan and warns them that if they proceed, the computer may no longer be usable. It contains complex payloads that corrupt the system, displaying <a href="/wiki/Visual_artifact" title="Visual artifact">artifacts</a> on the screen as it runs. Once run, the application cannot be closed without causing further damage to the computer, which will stop functioning properly regardless. When the computer is restarted, in place of the <a href="/wiki/Bootsplash" title="Bootsplash">bootsplash</a> is a message that reads "Your computer has been trashed by the MEMZ Trojan. Now enjoy the Nyan cat...", which follows with an animation of the <a href="/wiki/Nyan_Cat" title="Nyan Cat">Nyan Cat</a>.<sup id="cite_ref-memz_2_85-0" class="reference"><a href="#cite_note-memz_2-85"><span class="cite-bracket">[</span>85<span class="cite-bracket">]</span></a></sup></li> <li>February: Ransomware <a href="/wiki/Locky" title="Locky">Locky</a> with its over 60 derivatives spread throughout Europe and infected several million computers. At the height of the spread over five thousand computers per hour were infected in Germany alone.<sup id="cite_ref-:7_86-0" class="reference"><a href="#cite_note-:7-86"><span class="cite-bracket">[</span>86<span class="cite-bracket">]</span></a></sup> Although <a href="/wiki/Ransomware" title="Ransomware">ransomware</a> was not a new thing at the time, insufficient cyber security as well as a lack of standards in IT was responsible for the high number of infections.<sup id="cite_ref-:8_87-0" class="reference"><a href="#cite_note-:8-87"><span class="cite-bracket">[</span>87<span class="cite-bracket">]</span></a></sup> Unfortunately, even up to date antivirus and internet security software was unable to protect systems from early versions of Locky.<sup id="cite_ref-:9_88-0" class="reference"><a href="#cite_note-:9-88"><span class="cite-bracket">[</span>88<span class="cite-bracket">]</span></a></sup></li> <li>February: <a href="/wiki/Tiny_Banker_Trojan" title="Tiny Banker Trojan">Tiny Banker Trojan</a> (Tinba) makes headlines.<sup id="cite_ref-:10_89-0" class="reference"><a href="#cite_note-:10-89"><span class="cite-bracket">[</span>89<span class="cite-bracket">]</span></a></sup> Since its discovery, it has been found to have infected more than two dozen major banking institutions in the United States, including TD Bank, Chase, HSBC, Wells Fargo, PNC and Bank of America.<sup id="cite_ref-:11_90-0" class="reference"><a href="#cite_note-:11-90"><span class="cite-bracket">[</span>90<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-:12_91-0" class="reference"><a href="#cite_note-:12-91"><span class="cite-bracket">[</span>91<span class="cite-bracket">]</span></a></sup> Tiny Banker Trojan uses HTTP injection to force the user's computer to believe that it is on the bank's website. This spoof page will look and function just as the real one. The user then enters their information to log on, at which point Tinba can launch the bank webpage's "incorrect login information" return, and redirect the user to the real website. This is to trick the user into thinking they had entered the wrong information and proceed as normal, although now Tinba has captured the credentials and sent them to its host.<sup id="cite_ref-:13_92-0" class="reference"><a href="#cite_note-:13-92"><span class="cite-bracket">[</span>92<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-:14_93-0" class="reference"><a href="#cite_note-:14-93"><span class="cite-bracket">[</span>93<span class="cite-bracket">]</span></a></sup></li> <li>August: Journalists and researchers report the discovery of <a href="/wiki/Spyware" title="Spyware">spyware</a>, called <a href="/wiki/Pegasus_(spyware)" title="Pegasus (spyware)">Pegasus</a>, developed and distributed by a private company which can and has been used to infect <a href="/wiki/IOS" title="IOS">iOS</a> and <a href="/wiki/Android_(operating_system)" title="Android (operating system)">Android</a> <a href="/wiki/Smartphone" title="Smartphone">smartphones</a> often – based on <a href="/wiki/Zero-day_(computing)" class="mw-redirect" title="Zero-day (computing)">0-day exploits</a> – without the need for any user-interaction or significant clues to the user and <a href="/wiki/Mobile_security" title="Mobile security">then be used</a> to exfiltrate data, track user locations, capture film through its camera, and activate the microphone at any time. <a href="/wiki/Pegasus_Project_(investigation)" title="Pegasus Project (investigation)">The investigation</a> suggests it was used on many targets worldwide and revealed its use for e.g. governments' espionage on journalists, opposition politicians, activists, business people and others.<sup id="cite_ref-94" class="reference"><a href="#cite_note-94"><span class="cite-bracket">[</span>94<span class="cite-bracket">]</span></a></sup></li> <li>September: <a href="/wiki/Mirai_(malware)" title="Mirai (malware)">Mirai</a> creates headlines by launching some of the most powerful and disruptive DDoS attacks seen to date by infecting the <a href="/wiki/Internet_of_Things" class="mw-redirect" title="Internet of Things">Internet of Things</a>. Mirai ends up being used in the DDoS attack on 20 September 2016 on the <a href="/wiki/Krebs_on_Security" class="mw-redirect" title="Krebs on Security">Krebs on Security</a> site which reached 620 Gbit/s.<sup id="cite_ref-:15_95-0" class="reference"><a href="#cite_note-:15-95"><span class="cite-bracket">[</span>95<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Ars_Technica" title="Ars Technica">Ars Technica</a> also reported a 1 Tbit/s attack on French web host <a href="/wiki/OVH" class="mw-redirect" title="OVH">OVH</a>.<sup id="cite_ref-securityintelligence_96-0" class="reference"><a href="#cite_note-securityintelligence-96"><span class="cite-bracket">[</span>96<span class="cite-bracket">]</span></a></sup> On 21 October 2016 multiple major DDoS attacks in <a href="/wiki/DNS" class="mw-redirect" title="DNS">DNS</a> services of DNS service provider <a href="/wiki/Dyn_(company)" title="Dyn (company)">Dyn</a> occurred using Mirai malware installed on a large number of <a href="/wiki/Internet_of_things" title="Internet of things">IoT devices</a>, resulting in the inaccessibility of several high-profile websites such as <a href="/wiki/GitHub" title="GitHub">GitHub</a>, <a href="/wiki/Twitter" title="Twitter">Twitter</a>, <a href="/wiki/Reddit" title="Reddit">Reddit</a>, <a href="/wiki/Netflix" title="Netflix">Netflix</a>, <a href="/wiki/Airbnb" title="Airbnb">Airbnb</a> and many others.<sup id="cite_ref-:16_97-0" class="reference"><a href="#cite_note-:16-97"><span class="cite-bracket">[</span>97<span class="cite-bracket">]</span></a></sup> The attribution of the attack to the Mirai botnet was originally reported by BackConnect Inc., a security firm.<sup id="cite_ref-:17_98-0" class="reference"><a href="#cite_note-:17-98"><span class="cite-bracket">[</span>98<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="2017">2017</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=48" title="Edit section: 2017"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>May: The <a href="/wiki/WannaCry_ransomware_attack" title="WannaCry ransomware attack">WannaCry ransomware attack</a> spreads globally. Exploits revealed in the <a href="/wiki/NSA" class="mw-redirect" title="NSA">NSA</a> hacking toolkit leak of late 2016 were used to enable the propagation of the malware.<sup id="cite_ref-:18_99-0" class="reference"><a href="#cite_note-:18-99"><span class="cite-bracket">[</span>99<span class="cite-bracket">]</span></a></sup> Shortly after the news of the infections broke online, a UK cybersecurity researcher in collaboration with others found and activated a "kill switch" hidden within the ransomware, effectively halting the initial wave of its global propagation.<sup id="cite_ref-:19_100-0" class="reference"><a href="#cite_note-:19-100"><span class="cite-bracket">[</span>100<span class="cite-bracket">]</span></a></sup> The next day, researchers announced that they had found new variants of the malware without the kill switch.<sup id="cite_ref-:20_101-0" class="reference"><a href="#cite_note-:20-101"><span class="cite-bracket">[</span>101<span class="cite-bracket">]</span></a></sup></li> <li>June: The <a href="/wiki/Petya_(malware_family)" title="Petya (malware family)">Petya</a> attack spreads globally affecting Windows systems. Researchers at Symantec reveal that this ransomware uses the EternalBlue exploit, similar to the one used in the <a href="/wiki/WannaCry_ransomware_attack" title="WannaCry ransomware attack">WannaCry ransomware attack</a>.<sup id="cite_ref-:21_102-0" class="reference"><a href="#cite_note-:21-102"><span class="cite-bracket">[</span>102<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-:22_103-0" class="reference"><a href="#cite_note-:22-103"><span class="cite-bracket">[</span>103<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-:23_104-0" class="reference"><a href="#cite_note-:23-104"><span class="cite-bracket">[</span>104<span class="cite-bracket">]</span></a></sup></li> <li>September: The <a href="/wiki/Xafecopy_Trojan" title="Xafecopy Trojan">Xafecopy Trojan</a> attacks 47 countries, affecting only Android operating systems. Kaspersky Lab identified it as a malware from the Ubsod family, stealing money through click based WAP billing systems.<sup id="cite_ref-:24_105-0" class="reference"><a href="#cite_note-:24-105"><span class="cite-bracket">[</span>105<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-:25_106-0" class="reference"><a href="#cite_note-:25-106"><span class="cite-bracket">[</span>106<span class="cite-bracket">]</span></a></sup></li> <li>September: A new variety of Remote Access Trojan (RAT), Kedi RAT, is distributed in a Spear Phishing Campaign. The attack targeted <a href="/wiki/Citrix" class="mw-redirect" title="Citrix">Citrix</a> users. The Trojan was able to evade usual system scanners. Kedi Trojan had all the characteristics of a common <a href="/wiki/Remote_Access_Trojan" class="mw-redirect" title="Remote Access Trojan">Remote Access Trojan</a> and it could communicate to its Command and Control center via Gmail using common HTML, HTTP protocols.<sup id="cite_ref-:26_107-0" class="reference"><a href="#cite_note-:26-107"><span class="cite-bracket">[</span>107<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-:27_108-0" class="reference"><a href="#cite_note-:27-108"><span class="cite-bracket">[</span>108<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="2018">2018</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=49" title="Edit section: 2018"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>February: Thanatos, a ransomware, becomes the first ransomware program to accept ransom payment in <a href="/wiki/Bitcoin_Cash" title="Bitcoin Cash">Bitcoin Cash</a>.<sup id="cite_ref-:28_109-0" class="reference"><a href="#cite_note-:28-109"><span class="cite-bracket">[</span>109<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="2019">2019</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=50" title="Edit section: 2019"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>November: <a href="/wiki/Titanium_(malware)" title="Titanium (malware)">Titanium</a> is an advanced <a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">backdoor</a> <a href="/wiki/Malware" title="Malware">malware</a>, developed by the <a href="/wiki/PLATINUM_(cybercrime_group)" title="PLATINUM (cybercrime group)">PLATINUM</a> <a href="/wiki/Advanced_persistent_threat" title="Advanced persistent threat">APT</a>.<sup id="cite_ref-KAS-20191108_110-0" class="reference"><a href="#cite_note-KAS-20191108-110"><span class="cite-bracket">[</span>110<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading2"><h2 id="2020s">2020s</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=51" title="Edit section: 2020s"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="2024">2024</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=52" title="Edit section: 2024"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Researchers Nassi, Cohen, and Bitton developed a computer worm called Morris II, targeting generative AI email assistants to steal data and send spam, thereby breaching security protections of systems like <a href="/wiki/ChatGPT" title="ChatGPT">ChatGPT</a> and <a href="/wiki/Gemini_(chatbot)" title="Gemini (chatbot)">Gemini</a>. Conducted in a test environment, this research highlights the security risks of multimodal large language models (LLMs) that now generate text, images, and videos. Generative AI systems, which operate on prompts, can be exploited through weaponized prompts. For instance, hidden text on a webpage could instruct an <a href="/wiki/Large_language_model" title="Large language model">LLM</a> to perform malicious activities, such as phishing for bank details. While generative AI worms like Morris II haven’t been observed in the public, their potential threat is a concern for the tech industry.<sup id="cite_ref-111" class="reference"><a href="#cite_note-111"><span class="cite-bracket">[</span>111<span class="cite-bracket">]</span></a></sup> </p> <ul><li>March 29: <a href="/wiki/XZ_Utils_backdoor" title="XZ Utils backdoor">XZ Utils backdoor</a> is discovered.<sup id="cite_ref-112" class="reference"><a href="#cite_note-112"><span class="cite-bracket">[</span>112<span class="cite-bracket">]</span></a></sup></li> <li>April 1: The Linux's WALLSCAPE Bug is discovered.</li> <li>June 29: Brain Cipher - a variant of LockBit 3.0 Ransomware behind Indonesia's Data Center attacks.</li></ul> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=53" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/Helpful_worm" class="mw-redirect" title="Helpful worm">Helpful worm</a></li> <li><a href="/wiki/History_of_computer_viruses" class="mw-redirect" title="History of computer viruses">History of computer viruses</a></li> <li><a href="/wiki/List_of_security_hacking_incidents" title="List of security hacking incidents">List of security hacking incidents</a></li> <li><a href="/wiki/Timeline_of_computing_2020%E2%80%93present" title="Timeline of computing 2020–present">Timeline of computing 2020–present</a></li></ul> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=54" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist"> <div class="mw-references-wrap mw-references-columns"><ol class="references"> <li id="cite_note-1"><span class="mw-cite-backlink"><b><a href="#cite_ref-1">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite id="CITEREFvon_Neumann1966" class="citation book cs1"><a href="/wiki/John_von_Neumann" title="John von Neumann">von Neumann, John</a> (1966). Arthur W. Burks (ed.). <a rel="nofollow" class="external text" href="http://cba.mit.edu/events/03.11.ASE/docs/VonNeumann.pdf"><i>Theory of self-reproducing automata</i></a> <span class="cs1-format">(PDF)</span>. University of Illinois Press<span class="reference-accessdate">. Retrieved <span class="nowrap">June 12,</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Theory+of+self-reproducing+automata&rft.pub=University+of+Illinois+Press&rft.date=1966&rft.aulast=von+Neumann&rft.aufirst=John&rft_id=http%3A%2F%2Fcba.mit.edu%2Fevents%2F03.11.ASE%2Fdocs%2FVonNeumann.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-2"><span class="mw-cite-backlink"><b><a href="#cite_ref-2">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBenford" class="citation web cs1">Benford, Gregory. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20220930021524/http://www.gregorybenford.com/extra/the-scarred-man-returns/">"The Scarred Man Returns"</a>. <i>Gregory Benford</i>. Archived from <a rel="nofollow" class="external text" href="http://www.gregorybenford.com/extra/the-scarred-man-returns/">the original</a> on 2022-09-30<span class="reference-accessdate">. Retrieved <span class="nowrap">2021-09-12</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Gregory+Benford&rft.atitle=The+Scarred+Man+Returns&rft.aulast=Benford&rft.aufirst=Gregory&rft_id=http%3A%2F%2Fwww.gregorybenford.com%2Fextra%2Fthe-scarred-man-returns%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-3"><span class="mw-cite-backlink"><b><a href="#cite_ref-3">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChenRobert2004" class="citation web cs1">Chen, Thomas; Robert, Jean-Marc (2004). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20090517083356/http://vx.netlux.org/lib/atc01.html">"The Evolution of Viruses and Worms"</a>. Archived from <a rel="nofollow" class="external text" href="http://vx.netlux.org/lib/atc01.html">the original</a> on 2009-05-17<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-02-16</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=The+Evolution+of+Viruses+and+Worms&rft.date=2004&rft.aulast=Chen&rft.aufirst=Thomas&rft.au=Robert%2C+Jean-Marc&rft_id=http%3A%2F%2Fvx.netlux.org%2Flib%2Fatc01.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-4"><span class="mw-cite-backlink"><b><a href="#cite_ref-4">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRussellGangemi1991" class="citation book cs1">Russell, Deborah; Gangemi, G T (1991). <span class="id-lock-registration" title="Free registration required"><a rel="nofollow" class="external text" href="https://archive.org/details/computersecurity00russ"><i>Computer Security Basics</i></a></span>. O'Reilly. p. <a rel="nofollow" class="external text" href="https://archive.org/details/computersecurity00russ/page/86">86</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/0-937175-71-4" title="Special:BookSources/0-937175-71-4"><bdi>0-937175-71-4</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Computer+Security+Basics&rft.pages=86&rft.pub=O%27Reilly&rft.date=1991&rft.isbn=0-937175-71-4&rft.aulast=Russell&rft.aufirst=Deborah&rft.au=Gangemi%2C+G+T&rft_id=https%3A%2F%2Farchive.org%2Fdetails%2Fcomputersecurity00russ&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-5"><span class="mw-cite-backlink"><b><a href="#cite_ref-5">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDavis2006" class="citation journal cs1">Davis, Alan M. (July–August 2006). "First Virus?". <i>IEEE Software</i>. <b>23</b> (4): 8–10. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2FMS.2006.101">10.1109/MS.2006.101</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=IEEE+Software&rft.atitle=First+Virus%3F&rft.volume=23&rft.issue=4&rft.pages=8-10&rft.date=2006-07%2F2006-08&rft_id=info%3Adoi%2F10.1109%2FMS.2006.101&rft.aulast=Davis&rft.aufirst=Alan+M.&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-6"><span class="mw-cite-backlink"><b><a href="#cite_ref-6">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.imdb.com/title/tt0070909/synopsis">"IMDB synopsis of Westworld"</a>. <i>www.imdb.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">November 28,</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.imdb.com&rft.atitle=IMDB+synopsis+of+Westworld&rft_id=https%3A%2F%2Fwww.imdb.com%2Ftitle%2Ftt0070909%2Fsynopsis&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-7">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation audio-visual cs1">Michael Crichton (November 21, 1973). <i>Westworld</i> (movie). 201 S. Kinney Road, Tucson, Arizona, USA: Metro-Goldwyn-Mayer. Event occurs at 32 minutes. <q>And there's a clear pattern here which suggests an analogy to an infectious disease process, spreading from one resort area to the next." ... "Perhaps there are superficial similarities to disease." "I must confess I find it difficult to believe in a disease of machinery.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Westworld&rft.place=201+S.+Kinney+Road%2C+Tucson%2C+Arizona%2C+USA&rft.pub=Metro-Goldwyn-Mayer&rft.date=1973-11-21&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_AV_media" title="Template:Cite AV media">cite AV media</a>}}</code>: CS1 maint: location (<a href="/wiki/Category:CS1_maint:_location" title="Category:CS1 maint: location">link</a>)</span></span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://infocarnivore.com/the-very-first-viruses-creeper-wabbit-and-brain/">"The very first viruses: Creeper, Wabbit and Brain"</a>, Daniel Snyder, InfoCarnivore, May 30, 2010, </span> </li> <li id="cite_note-http://www.fourmilab.ch/documents/univac/animalsrc.html-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-http://www.fourmilab.ch/documents/univac/animalsrc.html_9-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.fourmilab.ch/documents/univac/animalsrc.html">"ANIMAL Source Code"</a>. Fourmilab.ch. 1996-08-13<span class="reference-accessdate">. Retrieved <span class="nowrap">2012-03-29</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=ANIMAL+Source+Code&rft.pub=Fourmilab.ch&rft.date=1996-08-13&rft_id=http%3A%2F%2Fwww.fourmilab.ch%2Fdocuments%2Funivac%2Fanimalsrc.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-http://www.fourmilab.ch/documents/univac/animal.html-10"><span class="mw-cite-backlink"><b><a href="#cite_ref-http://www.fourmilab.ch/documents/univac/animal.html_10-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.fourmilab.ch/documents/univac/animal.html">"The Animal Episode"</a>. Fourmilab.ch<span class="reference-accessdate">. Retrieved <span class="nowrap">2012-03-29</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=The+Animal+Episode&rft.pub=Fourmilab.ch&rft_id=http%3A%2F%2Fwww.fourmilab.ch%2Fdocuments%2Funivac%2Fanimal.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-ClassicSci-FiReviews-11"><span class="mw-cite-backlink"><b><a href="#cite_ref-ClassicSci-FiReviews_11-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCraig_E._Engler1997" class="citation web cs1">Craig E. Engler (1997). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20080703121956/http://www.scifi.com/sfw/issue48/classic.html">"The Shockwave Rider"</a>. <i>Classic Sci-Fi Reviews</i>. Archived from <a rel="nofollow" class="external text" href="http://www.scifi.com/sfw/issue48/classic.html">the original</a> on 2008-07-03<span class="reference-accessdate">. Retrieved <span class="nowrap">2008-07-28</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Classic+Sci-Fi+Reviews&rft.atitle=The+Shockwave+Rider&rft.date=1997&rft.au=Craig+E.+Engler&rft_id=http%3A%2F%2Fwww.scifi.com%2Fsfw%2Fissue48%2Fclassic.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-12">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRyan1977" class="citation book cs1">Ryan, Thomas J. (1977). <i>The Adolescence of P-1</i> (1st ed.). New York: Macmillan. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/0-02-606500-2" title="Special:BookSources/0-02-606500-2"><bdi>0-02-606500-2</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Adolescence+of+P-1&rft.place=New+York&rft.edition=1st&rft.pub=Macmillan&rft.date=1977&rft.isbn=0-02-606500-2&rft.aulast=Ryan&rft.aufirst=Thomas+J.&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span> </span> </li> <li id="cite_note-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-13">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.smh.com.au/articles/2007/09/01/1188671795625.html?page=fullpage#contentSwap2">"First virus hatched as a practical joke"</a>. <i><a href="/wiki/The_Sydney_Morning_Herald" title="The Sydney Morning Herald">The Sydney Morning Herald</a> (AP)</i>. 3 September 2007<span class="reference-accessdate">. Retrieved <span class="nowrap">9 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=The+Sydney+Morning+Herald+%28AP%29&rft.atitle=First+virus+hatched+as+a+practical+joke&rft.date=2007-09-03&rft_id=https%3A%2F%2Fwww.smh.com.au%2Farticles%2F2007%2F09%2F01%2F1188671795625.html%3Fpage%3Dfullpage%23contentSwap2&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-14">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFred_Cohen1983" class="citation web cs1">Fred Cohen (1983-11-03). <a rel="nofollow" class="external text" href="http://www.eecs.umich.edu/%7Eaprakash/eecs588/handouts/cohen-viruses.html">"Computer Viruses – Theory and Experiments"</a>. eecs.umich.edu<span class="reference-accessdate">. Retrieved <span class="nowrap">2012-03-29</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Computer+Viruses+%E2%80%93+Theory+and+Experiments&rft.pub=eecs.umich.edu&rft.date=1983-11-03&rft.au=Fred+Cohen&rft_id=http%3A%2F%2Fwww.eecs.umich.edu%2F%257Eaprakash%2Feecs588%2Fhandouts%2Fcohen-viruses.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-15">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFThompson1984" class="citation journal cs1">Thompson, Ken (August 1984). <a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F358198.358210">"Reflections on Trusting Trust"</a>. <i>Communications of the ACM</i>. <b>27</b> (8): 761–763. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F358198.358210">10.1145/358198.358210</a></span>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:34854438">34854438</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Communications+of+the+ACM&rft.atitle=Reflections+on+Trusting+Trust&rft.volume=27&rft.issue=8&rft.pages=761-763&rft.date=1984-08&rft_id=info%3Adoi%2F10.1145%2F358198.358210&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A34854438%23id-name%3DS2CID&rft.aulast=Thompson&rft.aufirst=Ken&rft_id=https%3A%2F%2Fdoi.org%2F10.1145%252F358198.358210&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-theregisterJanuary2006-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-theregisterJanuary2006_16-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLeyden2006" class="citation web cs1">Leyden, John (January 19, 2006). <a rel="nofollow" class="external text" href="https://www.theregister.co.uk/2006/01/19/pc_virus_at_20/">"PC virus celebrates 20th birthday"</a>. <i><a href="/wiki/The_Register" title="The Register">The Register</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 21,</span> 2011</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=The+Register&rft.atitle=PC+virus+celebrates+20th+birthday&rft.date=2006-01-19&rft.aulast=Leyden&rft.aufirst=John&rft_id=https%3A%2F%2Fwww.theregister.co.uk%2F2006%2F01%2F19%2Fpc_virus_at_20%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-TAOCVRAD-Szor-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-TAOCVRAD-Szor_17-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSzor2005" class="citation book cs1">Szor, Peter (2005). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=XE-ddYF6uhYC&pg=PT204"><i>The Art of Computer Virus Research and Defense</i></a>. <a href="/wiki/Symantec_Press" class="mw-redirect" title="Symantec Press">Symantec Press</a> / <a href="/wiki/Addison-Wesley" title="Addison-Wesley">Addison-Wesley</a> Professional. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-321-30454-4" title="Special:BookSources/978-0-321-30454-4"><bdi>978-0-321-30454-4</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Art+of+Computer+Virus+Research+and+Defense&rft.pub=Symantec+Press+%2F+Addison-Wesley+Professional&rft.date=2005&rft.isbn=978-0-321-30454-4&rft.aulast=Szor&rft.aufirst=Peter&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DXE-ddYF6uhYC%26pg%3DPT204&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-wentworth-18"><span class="mw-cite-backlink">^ <a href="#cite_ref-wentworth_18-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-wentworth_18-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-wentworth_18-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWentworth1996" class="citation web cs1">Wentworth, Rob (July 1996). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20131224165244/http://uanr.com/articles/virus.html">"Computer Virus!"</a> (reprinted from <i>The Digital Viking</i>). Twin Cities PC User Group. Archived from <a rel="nofollow" class="external text" href="http://uanr.com/articles/virus.html">the original</a> on 24 December 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">9 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Computer+Virus%21&rft.pub=Twin+Cities+PC+User+Group&rft.date=1996-07&rft.aulast=Wentworth&rft.aufirst=Rob&rft_id=http%3A%2F%2Fuanr.com%2Farticles%2Fvirus.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-19">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://archive.today/20120919103524/http://www.viruslist.com/en/viruses/encyclopedia?virusid=2008">"Virus.DOS.Chameleon.1260 – Securelist"</a>. Viruslist.com. Archived from <a rel="nofollow" class="external text" href="http://www.viruslist.com/en/viruses/encyclopedia?virusid=2008">the original</a> on 2012-09-19<span class="reference-accessdate">. Retrieved <span class="nowrap">2010-07-10</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Virus.DOS.Chameleon.1260+%E2%80%93+Securelist&rft.pub=Viruslist.com&rft_id=http%3A%2F%2Fwww.viruslist.com%2Fen%2Fviruses%2Fencyclopedia%3Fvirusid%3D2008&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-20">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20090722030020/http://vil.nai.com/vil/content/v_98074.htm">"V2PX"</a>. Vil.nai.com. Archived from <a rel="nofollow" class="external text" href="http://vil.nai.com/vil/content/v_98074.htm">the original</a> on 2009-07-22<span class="reference-accessdate">. Retrieved <span class="nowrap">2010-07-10</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=V2PX&rft.pub=Vil.nai.com&rft_id=http%3A%2F%2Fvil.nai.com%2Fvil%2Fcontent%2Fv_98074.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-21"><span class="mw-cite-backlink"><b><a href="#cite_ref-21">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20090713092458/http://www.viruslist.com/en/viruses/encyclopedia?chapter=153311162">"What we detect – Securelist"</a>. Viruslist.com. Archived from <a rel="nofollow" class="external text" href="http://www.viruslist.com/en/viruses/encyclopedia?chapter=153311162">the original</a> on 2009-07-13<span class="reference-accessdate">. Retrieved <span class="nowrap">2010-07-10</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=What+we+detect+%E2%80%93+Securelist&rft.pub=Viruslist.com&rft_id=http%3A%2F%2Fwww.viruslist.com%2Fen%2Fviruses%2Fencyclopedia%3Fchapter%3D153311162&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-22">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://about-threats.trendmicro.com/us//archive/malware/LEANDRO">"Leandro"</a>, <i>Threat Encyclopedia</i>, Trend Micro, 9 March 2000. Retrieved 9 September 2013.</span> </li> <li id="cite_note-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-23">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://wiw.org/~meta/vsum/view.php?vir=529">"Freddy Virus"</a>, Virus Information Summary List, December 1992. Retrieved 9 September 2013.</span> </li> <li id="cite_note-24"><span class="mw-cite-backlink"><b><a href="#cite_ref-24">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.viruslist.com/en/glossary?glossid=189267795">"Glossary – Securelist"</a>. Viruslist.com<span class="reference-accessdate">. Retrieved <span class="nowrap">2010-07-10</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Glossary+%E2%80%93+Securelist&rft.pub=Viruslist.com&rft_id=http%3A%2F%2Fwww.viruslist.com%2Fen%2Fglossary%3Fglossid%3D189267795&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-25"><span class="mw-cite-backlink"><b><a href="#cite_ref-25">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20060830014222/http://www.symantec.com/security_response/writeup.jsp?docid=2000-121908-3951-99">"Wscript.KakWorm"</a>. Symantec. Archived from <a rel="nofollow" class="external text" href="http://www.symantec.com/security_response/writeup.jsp?docid=2000-121908-3951-99">the original</a> on August 30, 2006<span class="reference-accessdate">. Retrieved <span class="nowrap">2012-03-29</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Wscript.KakWorm&rft.pub=Symantec&rft_id=http%3A%2F%2Fwww.symantec.com%2Fsecurity_response%2Fwriteup.jsp%3Fdocid%3D2000-121908-3951-99&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-26">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="http://news.bbc.co.uk/2/hi/science/nature/1167453.stm">"Kournikova computer virus hits hard"</a>. <i>BBC News</i>. February 13, 2001<span class="reference-accessdate">. Retrieved <span class="nowrap">April 9,</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=BBC+News&rft.atitle=Kournikova+computer+virus+hits+hard&rft.date=2001-02-13&rft_id=http%3A%2F%2Fnews.bbc.co.uk%2F2%2Fhi%2Fscience%2Fnature%2F1167453.stm&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-27">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEvers2002" class="citation web cs1">Evers, Joris (May 3, 2002). <a rel="nofollow" class="external text" href="http://www.computerworld.com/s/article/70752/Kournikova_virus_maker_appeals_sentence_">"Kournikova virus maker appeals sentence"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">20 November</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Kournikova+virus+maker+appeals+sentence&rft.date=2002-05-03&rft.aulast=Evers&rft.aufirst=Joris&rft_id=http%3A%2F%2Fwww.computerworld.com%2Fs%2Farticle%2F70752%2FKournikova_virus_maker_appeals_sentence_&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-28">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://virus.wikidot.com/magistr">"Magistr - the Virus Encyclopedia"</a>. <i>The Virus Encyclopedia</i><span class="reference-accessdate">. Retrieved <span class="nowrap">21 October</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=The+Virus+Encyclopedia&rft.atitle=Magistr+-+the+Virus+Encyclopedia&rft_id=http%3A%2F%2Fvirus.wikidot.com%2Fmagistr&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-29">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://antivirus.about.com/library/weekly/aa030802a.htm">"MyLife Worm"</a>. Antivirus.about.com. 2002-03-07<span class="reference-accessdate">. Retrieved <span class="nowrap">2012-03-29</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=MyLife+Worm&rft.pub=Antivirus.about.com&rft.date=2002-03-07&rft_id=http%3A%2F%2Fantivirus.about.com%2Flibrary%2Fweekly%2Faa030802a.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-slammer-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-slammer_30-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.caida.org/publications/papers/2003/sapphire/sapphire.html">"The Spread of the Sapphire/Slammer Worm"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">2012-12-14</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=The+Spread+of+the+Sapphire%2FSlammer+Worm&rft_id=http%3A%2F%2Fwww.caida.org%2Fpublications%2Fpapers%2F2003%2Fsapphire%2Fsapphire.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-wired-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-wired_31-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation magazine cs1"><a rel="nofollow" class="external text" href="https://www.wired.com/wired/archive/11.07/slammer.html">"Slammed!"</a>. <i>Wired</i>. July 2003<span class="reference-accessdate">. Retrieved <span class="nowrap">2012-12-14</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Wired&rft.atitle=Slammed%21&rft.date=2003-07&rft_id=https%3A%2F%2Fwww.wired.com%2Fwired%2Farchive%2F11.07%2Fslammer.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-symantec-graybird-32"><span class="mw-cite-backlink"><b><a href="#cite_ref-symantec-graybird_32-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSevcenco2006" class="citation web cs1">Sevcenco, Serghei (February 10, 2006). <a rel="nofollow" class="external text" href="https://archive.today/20031211194335/http://securityresponse1.symantec.com/sarc/sarc.nsf/html/backdoor.graybird.html">"Symantec Security Response: Backdoor.Graybird"</a>. Symantec. Archived from <a rel="nofollow" class="external text" href="http://securityresponse1.symantec.com/sarc/sarc.nsf/html/backdoor.graybird.html">the original</a> on December 11, 2003<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-01</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Symantec+Security+Response%3A+Backdoor.Graybird&rft.pub=Symantec&rft.date=2006-02-10&rft.aulast=Sevcenco&rft.aufirst=Serghei&rft_id=http%3A%2F%2Fsecurityresponse1.symantec.com%2Fsarc%2Fsarc.nsf%2Fhtml%2Fbackdoor.graybird.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-prorat-33"><span class="mw-cite-backlink"><b><a href="#cite_ref-prorat_33-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20060901033711/http://www.symantec.com/security_response/writeup.jsp?docid=2003-061315-4216-99">"Backdoor.Prorat"</a>. Symantec. February 13, 2007. Archived from <a rel="nofollow" class="external text" href="http://www.symantec.com/security_response/writeup.jsp?docid=2003-061315-4216-99">the original</a> on September 1, 2006<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-01</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Backdoor.Prorat&rft.pub=Symantec&rft.date=2007-02-13&rft_id=http%3A%2F%2Fwww.symantec.com%2Fsecurity_response%2Fwriteup.jsp%3Fdocid%3D2003-061315-4216-99&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-34">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.f-secure.com/v-descs/swen.shtml">"Threat Description: Worm:W32/Swen"</a>. F-secure.com<span class="reference-accessdate">. Retrieved <span class="nowrap">2012-03-29</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Threat+Description%3A+Worm%3AW32%2FSwen&rft.pub=F-secure.com&rft_id=http%3A%2F%2Fwww.f-secure.com%2Fv-descs%2Fswen.shtml&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-35"><span class="mw-cite-backlink"><b><a href="#cite_ref-35">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20120315225141/http://www.securelist.com/en/descriptions/old61021">"Backdoor.Win32.Agobot.gen"</a>. Securelist. Archived from <a rel="nofollow" class="external text" href="http://www.securelist.com/en/descriptions/old61021">the original</a> on 2012-03-15<span class="reference-accessdate">. Retrieved <span class="nowrap">2012-03-29</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Backdoor.Win32.Agobot.gen&rft.pub=Securelist&rft_id=http%3A%2F%2Fwww.securelist.com%2Fen%2Fdescriptions%2Fold61021&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-36"><span class="mw-cite-backlink"><b><a href="#cite_ref-36">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20070107102105/http://www.symantec.com/security_response/writeup.jsp?docid=2003-112019-2425-99">"W32.Bolgi.Worm"</a>. Symantec. Archived from <a rel="nofollow" class="external text" href="http://www.symantec.com/security_response/writeup.jsp?docid=2003-112019-2425-99">the original</a> on January 7, 2007<span class="reference-accessdate">. Retrieved <span class="nowrap">2012-03-29</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=W32.Bolgi.Worm&rft.pub=Symantec&rft_id=http%3A%2F%2Fwww.symantec.com%2Fsecurity_response%2Fwriteup.jsp%3Fdocid%3D2003-112019-2425-99&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-37"><span class="mw-cite-backlink"><b><a href="#cite_ref-37">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.f-secure.com/v-descs/cabir.shtml">"Threat Description:Bluetooth-Worm:SymbOS/Cabir"</a>. F-secure.com<span class="reference-accessdate">. Retrieved <span class="nowrap">2012-03-29</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Threat+Description%3ABluetooth-Worm%3ASymbOS%2FCabir&rft.pub=F-secure.com&rft_id=http%3A%2F%2Fwww.f-secure.com%2Fv-descs%2Fcabir.shtml&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-38"><span class="mw-cite-backlink"><b><a href="#cite_ref-38">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20070102072310/http://www.symantec.com/security_response/writeup.jsp?docid=2004-061419-4412-99">"SymbOS.Cabir"</a>. Symantec. Archived from <a rel="nofollow" class="external text" href="http://www.symantec.com/security_response/writeup.jsp?docid=2004-061419-4412-99">the original</a> on January 2, 2007<span class="reference-accessdate">. Retrieved <span class="nowrap">2012-03-29</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=SymbOS.Cabir&rft.pub=Symantec&rft_id=http%3A%2F%2Fwww.symantec.com%2Fsecurity_response%2Fwriteup.jsp%3Fdocid%3D2004-061419-4412-99&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-nuclear-rat-39"><span class="mw-cite-backlink"><b><a href="#cite_ref-nuclear-rat_39-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20090911091523/http://www.ca.com/securityadvisor/pest/pest.aspx?id=453078396">"Spyware Detail Nuclear RAT 1.0b1"</a>. Computer Associates. August 16, 2004. Archived from <a rel="nofollow" class="external text" href="http://www.ca.com/securityadvisor/pest/pest.aspx?id=453078396">the original</a> on 2009-09-11<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-01</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Spyware+Detail+Nuclear+RAT+1.0b1&rft.pub=Computer+Associates&rft.date=2004-08-16&rft_id=http%3A%2F%2Fwww.ca.com%2Fsecurityadvisor%2Fpest%2Fpest.aspx%3Fid%3D453078396&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-vundo-40"><span class="mw-cite-backlink"><b><a href="#cite_ref-vundo_40-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20090217105948/http://vil.nai.com/vil/content/v_127690.htm">"Vundo"</a>. McAfee. Archived from <a rel="nofollow" class="external text" href="http://vil.nai.com/vil/content/v_127690.htm">the original</a> on 2009-02-17<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-01</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Vundo&rft.pub=McAfee&rft_id=http%3A%2F%2Fvil.nai.com%2Fvil%2Fcontent%2Fv_127690.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-bifrost-41"><span class="mw-cite-backlink"><b><a href="#cite_ref-bifrost_41-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20070107192050/http://www.symantec.com/security_response/writeup.jsp?docid=2004-101214-5358-99">"Backdoor.Bifrose"</a>. Symantec, Inc. October 12, 2004. Archived from <a rel="nofollow" class="external text" href="http://www.symantec.com/security_response/writeup.jsp?docid=2004-101214-5358-99">the original</a> on January 7, 2007<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-02-28</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Backdoor.Bifrose&rft.pub=Symantec%2C+Inc.&rft.date=2004-10-12&rft_id=http%3A%2F%2Fwww.symantec.com%2Fsecurity_response%2Fwriteup.jsp%3Fdocid%3D2004-101214-5358-99&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-zlob-42"><span class="mw-cite-backlink"><b><a href="#cite_ref-zlob_42-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VNAME=The+ZLOB+Show%3A+Trojan+poses+as+fake+video+codec%2C+loads+more+threats">"The ZLOB Show: Trojan Poses as Fake Video Codec, Loads More Threats"</a>. Trend Micro<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-02-28</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=The+ZLOB+Show%3A+Trojan+Poses+as+Fake+Video+Codec%2C+Loads+More+Threats&rft.pub=Trend+Micro&rft_id=http%3A%2F%2Fwww.trendmicro.com%2Fvinfo%2Fsecadvisories%2Fdefault6.asp%3FVNAME%3DThe%2BZLOB%2BShow%253A%2BTrojan%2Bposes%2Bas%2Bfake%2Bvideo%2Bcodec%252C%2Bloads%2Bmore%2Bthreats&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-43"><span class="mw-cite-backlink"><b><a href="#cite_ref-43">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.f-secure.com/v-descs/brontok_n.shtml">"Threat Description: Email-Worm:W32/Brontok.N"</a>. F-secure.com<span class="reference-accessdate">. Retrieved <span class="nowrap">2012-03-29</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Threat+Description%3A+Email-Worm%3AW32%2FBrontok.N&rft.pub=F-secure.com&rft_id=http%3A%2F%2Fwww.f-secure.com%2Fv-descs%2Fbrontok_n.shtml&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-44"><span class="mw-cite-backlink"><b><a href="#cite_ref-44">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPeter_Gutmann2007" class="citation web cs1">Peter Gutmann (31 August 2007). <a rel="nofollow" class="external text" href="http://seclists.org/fulldisclosure/2007/Aug/0520.html">"World's most powerful supercomputer goes online"</a>. <a href="/wiki/Full_Disclosure_(mailing_list)" title="Full Disclosure (mailing list)">Full Disclosure</a><span class="reference-accessdate">. Retrieved <span class="nowrap">2007-11-04</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=World%27s+most+powerful+supercomputer+goes+online&rft.pub=Full+Disclosure&rft.date=2007-08-31&rft.au=Peter+Gutmann&rft_id=http%3A%2F%2Fseclists.org%2Ffulldisclosure%2F2007%2FAug%2F0520.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-mocmex-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-mocmex_45-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGage2005" class="citation news cs1">Gage, Deborah (February 17, 2005). <a rel="nofollow" class="external text" href="http://www.seattlepi.com/business/351670_picframevirus18.html">"Chinese PC virus may have hidden agenda"</a>. <i>Seattle Post-Intelligencer</i>. Seattle PI<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-01</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Seattle+Post-Intelligencer&rft.atitle=Chinese+PC+virus+may+have+hidden+agenda&rft.date=2005-02-17&rft.aulast=Gage&rft.aufirst=Deborah&rft_id=http%3A%2F%2Fwww.seattlepi.com%2Fbusiness%2F351670_picframevirus18.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-torpig-46"><span class="mw-cite-backlink"><b><a href="#cite_ref-torpig_46-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKimmo2008" class="citation web cs1">Kimmo (March 3, 2008). <a rel="nofollow" class="external text" href="http://www.f-secure.com/weblog/archives/00001393.html">"MBR Rootkit, A New Breed of"</a>. F-Secure<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-01</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=MBR+Rootkit%2C+A+New+Breed+of&rft.pub=F-Secure&rft.date=2008-03-03&rft.au=Kimmo&rft_id=http%3A%2F%2Fwww.f-secure.com%2Fweblog%2Farchives%2F00001393.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-prcom-47"><span class="mw-cite-backlink"><b><a href="#cite_ref-prcom_47-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.pr.com/press-release/84130">"Win32.Ntldrbot (aka Rustock)"</a>. Dr. Web Ltd<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-01</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Win32.Ntldrbot+%28aka+Rustock%29&rft.pub=Dr.+Web+Ltd.&rft_id=http%3A%2F%2Fwww.pr.com%2Fpress-release%2F84130&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-virustotal-bohmini-48"><span class="mw-cite-backlink"><b><a href="#cite_ref-virustotal-bohmini_48-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20090401173026/http://www.virustotal.com/analisis/a5d8b3ba9226285dd14619fd8faf12a7">"Virus Total"</a>. virustotal.com. July 8, 2008. Archived from <a rel="nofollow" class="external text" href="http://www.virustotal.com/analisis/a5d8b3ba9226285dd14619fd8faf12a7">the original</a> on 2009-04-01<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-01</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Virus+Total&rft.pub=virustotal.com&rft.date=2008-07-08&rft_id=http%3A%2F%2Fwww.virustotal.com%2Fanalisis%2Fa5d8b3ba9226285dd14619fd8faf12a7&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-CNet-49"><span class="mw-cite-backlink"><b><a href="#cite_ref-CNet_49-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://news.cnet.com/8301-1009_3-20002112-83.html?">"Koobface malware makes a comeback"</a>. cnet.com. April 9, 2010<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-04-13</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Koobface+malware+makes+a+comeback&rft.pub=cnet.com&rft.date=2010-04-09&rft_id=http%3A%2F%2Fnews.cnet.com%2F8301-1009_3-20002112-83.html%3F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-50"><span class="mw-cite-backlink"><b><a href="#cite_ref-50">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWillsher2009" class="citation news cs1">Willsher, Kim (2009-02-07). <a rel="nofollow" class="external text" href="http://telegraph.co.uk/news/worldnews/europe/france/4547649/French-fighter-planes-grounded-by-computer-virus.html">"French fighter planes grounded by computer virus"</a>. <i>The Daily Telegraph</i>. London<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-04-01</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Daily+Telegraph&rft.atitle=French+fighter+planes+grounded+by+computer+virus&rft.date=2009-02-07&rft.aulast=Willsher&rft.aufirst=Kim&rft_id=http%3A%2F%2Ftelegraph.co.uk%2Fnews%2Fworldnews%2Feurope%2Ffrance%2F4547649%2FFrench-fighter-planes-grounded-by-computer-virus.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-51"><span class="mw-cite-backlink"><b><a href="#cite_ref-51">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWilliams2009" class="citation web cs1">Williams, Chris (2009-01-20). <a rel="nofollow" class="external text" href="http://theregister.co.uk/2009/01/20/mod_malware_still_going_strong">"MoD networks still malware-plagued after two weeks"</a>. <i>The Register</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2009-01-20</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=The+Register&rft.atitle=MoD+networks+still+malware-plagued+after+two+weeks&rft.date=2009-01-20&rft.aulast=Williams&rft.aufirst=Chris&rft_id=http%3A%2F%2Ftheregister.co.uk%2F2009%2F01%2F20%2Fmod_malware_still_going_strong&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-52"><span class="mw-cite-backlink"><b><a href="#cite_ref-52">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWilliams2009" class="citation web cs1">Williams, Chris (2009-01-20). <a rel="nofollow" class="external text" href="http://theregister.co.uk/2009/01/20/sheffield_conficker">"Conficker seizes city's hospital network"</a>. <i>The Register</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2009-01-20</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=The+Register&rft.atitle=Conficker+seizes+city%27s+hospital+network&rft.date=2009-01-20&rft.aulast=Williams&rft.aufirst=Chris&rft_id=http%3A%2F%2Ftheregister.co.uk%2F2009%2F01%2F20%2Fsheffield_conficker&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-53"><span class="mw-cite-backlink"><b><a href="#cite_ref-53">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1 cs1-prop-foreign-lang-source"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20090321171256/http://www.pc-professionell.de/news/2009/02/16/conficker_wurm_infiziert_hunderte_bundeswehr_rechner">"Conficker-Wurm infiziert hunderte Bundeswehr-Rechner"</a> (in German). PC Professionell. 2009-02-16. Archived from <a rel="nofollow" class="external text" href="http://www.pc-professionell.de/news/2009/02/16/conficker_wurm_infiziert_hunderte_bundeswehr_rechner">the original</a> on 2009-03-21<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-04-01</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Conficker-Wurm+infiziert+hunderte+Bundeswehr-Rechner&rft.pub=PC+Professionell&rft.date=2009-02-16&rft_id=http%3A%2F%2Fwww.pc-professionell.de%2Fnews%2F2009%2F02%2F16%2Fconficker_wurm_infiziert_hunderte_bundeswehr_rechner&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-54"><span class="mw-cite-backlink"><b><a href="#cite_ref-54">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNeild2009" class="citation news cs1">Neild, Barry (2009-02-13). <a rel="nofollow" class="external text" href="http://www.cnn.com/2009/TECH/ptech/02/13/virus.downadup/index.html">"$250K Microsoft bounty to catch worm creator"</a>. CNN<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-29</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%24250K+Microsoft+bounty+to+catch+worm+creator&rft.date=2009-02-13&rft.aulast=Neild&rft.aufirst=Barry&rft_id=http%3A%2F%2Fwww.cnn.com%2F2009%2FTECH%2Fptech%2F02%2F13%2Fvirus.downadup%2Findex.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-55"><span class="mw-cite-backlink"><b><a href="#cite_ref-55">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://support.microsoft.com/kb/958644">"MS08-067: Vulnerability in Server service could allow remote code execution"</a>. Microsoft Corporation.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=MS08-067%3A+Vulnerability+in+Server+service+could+allow+remote+code+execution&rft.pub=Microsoft+Corporation&rft_id=http%3A%2F%2Fsupport.microsoft.com%2Fkb%2F958644&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-56"><span class="mw-cite-backlink"><b><a href="#cite_ref-56">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDancho_Danchev" class="citation web cs1">Dancho Danchev. <a rel="nofollow" class="external text" href="https://www.zdnet.com/article/source-code-for-skype-eavesdropping-trojan-in-the-wild/">"Source code for Skype eavesdropping trojan in the wild"</a>. <i>ZDNet</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=ZDNet&rft.atitle=Source+code+for+Skype+eavesdropping+trojan+in+the+wild&rft.au=Dancho+Danchev&rft_id=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsource-code-for-skype-eavesdropping-trojan-in-the-wild%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-57"><span class="mw-cite-backlink"><b><a href="#cite_ref-57">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation magazine cs1"><a rel="nofollow" class="external text" href="https://www.wired.com/2009/08/skype-trojan/">"Code for Skype Spyware Released to Thwart Surveillance"</a>. <i>WIRED</i>. 31 August 2009.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=WIRED&rft.atitle=Code+for+Skype+Spyware+Released+to+Thwart+Surveillance&rft.date=2009-08-31&rft_id=https%3A%2F%2Fwww.wired.com%2F2009%2F08%2Fskype-trojan%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-58"><span class="mw-cite-backlink"><b><a href="#cite_ref-58">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHarvison2010" class="citation web cs1">Harvison, Josh (September 27, 2010). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20160611145434/http://www.kait8.com/Global/story.asp?S=13220447">"Blackmail virus infects computers, holds information ransom"</a>. kait8.com. Archived from <a rel="nofollow" class="external text" href="http://www.kait8.com/Global/story.asp?S=13220447">the original</a> on 2016-06-11<span class="reference-accessdate">. Retrieved <span class="nowrap">20 November</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Blackmail+virus+infects+computers%2C+holds+information+ransom&rft.pub=kait8.com&rft.date=2010-09-27&rft.aulast=Harvison&rft.aufirst=Josh&rft_id=http%3A%2F%2Fwww.kait8.com%2FGlobal%2Fstory.asp%3FS%3D13220447&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-59"><span class="mw-cite-backlink"><b><a href="#cite_ref-59">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://honeyblog.org/archives/52-Waledac-Takedown-Successful.html">"Waledac Takedown Successful"</a>. honeyblog.org. February 25, 2010<span class="reference-accessdate">. Retrieved <span class="nowrap">16 November</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Waledac+Takedown+Successful&rft.pub=honeyblog.org&rft.date=2010-02-25&rft_id=http%3A%2F%2Fhoneyblog.org%2Farchives%2F52-Waledac-Takedown-Successful.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-60"><span class="mw-cite-backlink"><b><a href="#cite_ref-60">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPaul2009" class="citation web cs1">Paul, Ian (25 March 2009). <a rel="nofollow" class="external text" href="http://www.pcworld.com/article/161941/nasty_new_worm_targets_home_routers_cable_modems.html?tk=rss_main">"Nasty New Worm Targets Home Routers, Cable Modems"</a>. <i>PC World</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-26</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=PC+World&rft.atitle=Nasty+New+Worm+Targets+Home+Routers%2C+Cable+Modems&rft.date=2009-03-25&rft.aulast=Paul&rft.aufirst=Ian&rft_id=http%3A%2F%2Fwww.pcworld.com%2Farticle%2F161941%2Fnasty_new_worm_targets_home_routers_cable_modems.html%3Ftk%3Drss_main&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-61"><span class="mw-cite-backlink"><b><a href="#cite_ref-61">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Win32%2fAlureon">"Alureon trojan caused Windows 7 BSoD"</a>. microsoft.com. February 18, 2010<span class="reference-accessdate">. Retrieved <span class="nowrap">2010-02-18</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Alureon+trojan+caused+Windows+7+BSoD&rft.pub=microsoft.com&rft.date=2010-02-18&rft_id=http%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fportal%2FThreat%2FEncyclopedia%2FEntry.aspx%3FName%3DWin32%252fAlureon&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-62"><span class="mw-cite-backlink"><b><a href="#cite_ref-62">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://anti-virus.by/en/tempo.shtml">"VirusBlokAda News"</a>. Anti-virus.by<span class="reference-accessdate">. Retrieved <span class="nowrap">2012-03-29</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=VirusBlokAda+News&rft.pub=Anti-virus.by&rft_id=http%3A%2F%2Fanti-virus.by%2Fen%2Ftempo.shtml&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-Keizer1-63"><span class="mw-cite-backlink"><b><a href="#cite_ref-Keizer1_63-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGregg_Keizer2010" class="citation magazine cs1">Gregg Keizer (16 September 2010). <a rel="nofollow" class="external text" href="https://archive.today/20121205012450/http://www.infoworld.com/print/137598">"Is Stuxnet the 'best' malware ever?"</a>. <i><a href="/wiki/InfoWorld" title="InfoWorld">InfoWorld</a></i>. Archived from <a rel="nofollow" class="external text" href="http://www.infoworld.com/print/137598">the original</a> on 5 December 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">16 September</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=InfoWorld&rft.atitle=Is+Stuxnet+the+%27best%27+malware+ever%3F&rft.date=2010-09-16&rft.au=Gregg+Keizer&rft_id=http%3A%2F%2Fwww.infoworld.com%2Fprint%2F137598&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-64"><span class="mw-cite-backlink"><b><a href="#cite_ref-64">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.telegraph.co.uk/technology/news/8021102/Stuxnet-virus-worm-could-be-aimed-at-high-profile-Iranian-targets.html">Stuxnet virus: worm 'could be aimed at high-profile Iranian targets’</a>, Telegraph, 23 Sep 2010</span> </li> <li id="cite_note-65"><span class="mw-cite-backlink"><b><a href="#cite_ref-65">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://threatpost.com/possible-new-rootkit-has-drivers-signed-realtek-071510">"Possible New Rootkit Has Drivers Signed by Realtek"</a>. Kaspersky Labs. 15 July 2010.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Possible+New+Rootkit+Has+Drivers+Signed+by+Realtek&rft.pub=Kaspersky+Labs&rft.date=2010-07-15&rft_id=http%3A%2F%2Fthreatpost.com%2Fpossible-new-rootkit-has-drivers-signed-realtek-071510&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-66"><span class="mw-cite-backlink"><b><a href="#cite_ref-66">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.theregister.co.uk/2011/01/25/spyeye_zeus_merger/">"Bastard child of SpyEye/ZeuS merger appears online"</a>. <i>The Register</i>. 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">April 11,</span> 2011</span>. <q>Bastard child of SpyEye/ZeuS merger appears online</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Register&rft.atitle=Bastard+child+of+SpyEye%2FZeuS+merger+appears+online&rft.date=2011&rft_id=https%3A%2F%2Fwww.theregister.co.uk%2F2011%2F01%2F25%2Fspyeye_zeus_merger%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-67"><span class="mw-cite-backlink"><b><a href="#cite_ref-67">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.theregister.co.uk/2011/04/05/spyeye_mobile_trojan/">"SpyEye mobile banking Trojan uses same tactics as ZeuS"</a>. <i>The Register</i>. 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">April 11,</span> 2011</span>. <q>SpyEye mobile banking Trojan uses same tactics as ZeuS</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=The+Register&rft.atitle=SpyEye+mobile+banking+Trojan+uses+same+tactics+as+ZeuS&rft.date=2011&rft_id=https%3A%2F%2Fwww.theregister.co.uk%2F2011%2F04%2F05%2Fspyeye_mobile_trojan%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-68"><span class="mw-cite-backlink"><b><a href="#cite_ref-68">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.precisesecurity.com/rogue/xp-anti-spyware-2011/">"XP AntiSpyware 2011 – Virus Solution and Removal"</a>. Precisesecurity.com<span class="reference-accessdate">. Retrieved <span class="nowrap">2012-03-29</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=XP+AntiSpyware+2011+%E2%80%93+Virus+Solution+and+Removal&rft.pub=Precisesecurity.com&rft_id=http%3A%2F%2Fwww.precisesecurity.com%2Frogue%2Fxp-anti-spyware-2011%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-morto-69"><span class="mw-cite-backlink"><b><a href="#cite_ref-morto_69-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20111014022544/http://blogs.appriver.com/blog/digital-degenerate-2/morto-worm-spreads-to-weak-systems">"Morto Worm Spreads to Weak Systems"</a>. <i>blogs.appriver.com</i>. 2011. Archived from <a rel="nofollow" class="external text" href="http://blogs.appriver.com/blog/digital-degenerate-2/morto-worm-spreads-to-weak-systems">the original</a> on 2011-10-14<span class="reference-accessdate">. Retrieved <span class="nowrap">2011-08-31</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=blogs.appriver.com&rft.atitle=Morto+Worm+Spreads+to+Weak+Systems&rft.date=2011&rft_id=http%3A%2F%2Fblogs.appriver.com%2Fblog%2Fdigital-degenerate-2%2Fmorto-worm-spreads-to-weak-systems&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-imperva-70"><span class="mw-cite-backlink"><b><a href="#cite_ref-imperva_70-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.imperva.com/blog/archive/morto-post-mortem-a-worm-deep-dive/">"Morto Post Mortem: Dissecting a Worm"</a>. <i>blog.imperva.com</i>. 2011-09-07<span class="reference-accessdate">. Retrieved <span class="nowrap">2024-07-05</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=blog.imperva.com&rft.atitle=Morto+Post+Mortem%3A+Dissecting+a+Worm&rft.date=2011-09-07&rft_id=https%3A%2F%2Fwww.imperva.com%2Fblog%2Farchive%2Fmorto-post-mortem-a-worm-deep-dive%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-71"><span class="mw-cite-backlink"><b><a href="#cite_ref-71">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.crysys.hu/">"Laboratory of Cryptography and System Security (CrySyS)"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">4 November</span> 2011</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Laboratory+of+Cryptography+and+System+Security+%28CrySyS%29&rft_id=http%3A%2F%2Fwww.crysys.hu%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-72"><span class="mw-cite-backlink"><b><a href="#cite_ref-72">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.crysys.hu/publications/files/bencsathPBF11duqu.pdf">"Duqu: A Stuxnet-like malware found in the wild, technical report"</a> <span class="cs1-format">(PDF)</span>. Laboratory of Cryptography of Systems Security (CrySyS). 14 October 2011.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Duqu%3A+A+Stuxnet-like+malware+found+in+the+wild%2C+technical+report&rft.pub=Laboratory+of+Cryptography+of+Systems+Security+%28CrySyS%29&rft.date=2011-10-14&rft_id=http%3A%2F%2Fwww.crysys.hu%2Fpublications%2Ffiles%2FbencsathPBF11duqu.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-73"><span class="mw-cite-backlink"><b><a href="#cite_ref-73">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20121002235948/http://crysys.hu/in-the-press.html">"Statement on Duqu's initial analysis"</a>. Laboratory of Cryptography of Systems Security (CrySyS). 21 October 2011. Archived from <a rel="nofollow" class="external text" href="http://www.crysys.hu/in-the-press.html">the original</a> on 2 October 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">25 October</span> 2011</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Statement+on+Duqu%27s+initial+analysis&rft.pub=Laboratory+of+Cryptography+of+Systems+Security+%28CrySyS%29&rft.date=2011-10-21&rft_id=http%3A%2F%2Fwww.crysys.hu%2Fin-the-press.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-syamantecduqu-74"><span class="mw-cite-backlink"><b><a href="#cite_ref-syamantecduqu_74-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20111213083345/http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_duqu_the_precursor_to_the_next_stuxnet.pdf">"W32.Duqu – The precursor to the next Stuxnet (Version 1.4)"</a> <span class="cs1-format">(PDF)</span>. <a href="/wiki/NortonLifeLock" class="mw-redirect" title="NortonLifeLock">Symantec</a>. 23 November 2011. Archived from <a rel="nofollow" class="external text" href="http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_duqu_the_precursor_to_the_next_stuxnet.pdf">the original</a> <span class="cs1-format">(PDF)</span> on December 13, 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">30 December</span> 2011</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=W32.Duqu+%E2%80%93+The+precursor+to+the+next+Stuxnet+%28Version+1.4%29&rft.pub=Symantec&rft.date=2011-11-23&rft_id=http%3A%2F%2Fwww.symantec.com%2Fcontent%2Fen%2Fus%2Fenterprise%2Fmedia%2Fsecurity_response%2Fwhitepapers%2Fw32_duqu_the_precursor_to_the_next_stuxnet.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:0-75"><span class="mw-cite-backlink"><b><a href="#cite_ref-:0_75-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20120528142705/http://www.crysys.hu/skywiper/skywiper.pdf">"sKyWIper: A Complex Malware for Targeted Attacks"</a> <span class="cs1-format">(PDF)</span>. <a href="/wiki/Budapest_University_of_Technology_and_Economics" title="Budapest University of Technology and Economics">Budapest University of Technology and Economics</a>. 28 May 2012. Archived from <a rel="nofollow" class="external text" href="http://www.crysys.hu/skywiper/skywiper.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 28 May 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">29 May</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=sKyWIper%3A+A+Complex+Malware+for+Targeted+Attacks&rft.pub=Budapest+University+of+Technology+and+Economics&rft.date=2012-05-28&rft_id=http%3A%2F%2Fwww.crysys.hu%2Fskywiper%2Fskywiper.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:1-76"><span class="mw-cite-backlink"><b><a href="#cite_ref-:1_76-0">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.enigmasoftware.com/ngrbot-removal/">"NGRBot"</a>, Enigma Software Group, 15 October 2012. Retrieved 9 September 2013.</span> </li> <li id="cite_note-:2-77"><span class="mw-cite-backlink"><b><a href="#cite_ref-:2_77-0">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.virusbtn.com/virusbulletin/archive/2012/01/vb201201-NGR-botnet">"Dissecting the NGR bot framework: IRC botnets die hard"</a>, Aditya K. Sood and Richard J. Enbody, Michigan State University, USA, and Rohit Bansal, SecNiche Security, USA, with Helen Martin1 (ed.), January 2012. Retrieved 9 September 2013. <span style="font-size:0.95em; font-size:95%; color: var( --color-subtle, #555 )">(subscription required)</span></span> </li> <li id="cite_note-:3-78"><span class="mw-cite-backlink"><b><a href="#cite_ref-:3_78-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGoodin,_Dan2013" class="citation web cs1">Goodin, Dan (2013-11-27). <a rel="nofollow" class="external text" href="https://arstechnica.com/security/2013/11/new-linux-worm-targets-routers-cameras-internet-of-things-devices/">"New Linux worm targets routers, cameras, "Internet of things" devices"</a>. <i><a href="/wiki/Ars_Technica" title="Ars Technica">Ars Technica</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">October 24,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Ars+Technica&rft.atitle=New+Linux+worm+targets+routers%2C+cameras%2C+%22Internet+of+things%22+devices&rft.date=2013-11-27&rft.au=Goodin%2C+Dan&rft_id=https%3A%2F%2Farstechnica.com%2Fsecurity%2F2013%2F11%2Fnew-linux-worm-targets-routers-cameras-internet-of-things-devices%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:4-79"><span class="mw-cite-backlink"><b><a href="#cite_ref-:4_79-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSterling,_Bruce2014" class="citation magazine cs1">Sterling, Bruce (2014-01-29). <a rel="nofollow" class="external text" href="https://www.wired.com/2014/01/spime-watch-linux-darlloz-internet-things-worm/">"Linux.Darlloz, the Internet-of-Things worm"</a>. <i><a href="/wiki/Wired_(magazine)" title="Wired (magazine)">Wired</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">24 October</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Wired&rft.atitle=Linux.Darlloz%2C+the+Internet-of-Things+worm&rft.date=2014-01-29&rft.au=Sterling%2C+Bruce&rft_id=https%3A%2F%2Fwww.wired.com%2F2014%2F01%2Fspime-watch-linux-darlloz-internet-things-worm%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-Level3-80"><span class="mw-cite-backlink"><b><a href="#cite_ref-Level3_80-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://blog.level3.com/security/attack-of-things/">"Attack of Things!"</a>. Level 3 Threat Research Labs. 25 August 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">6 November</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Attack+of+Things%21&rft.pub=Level+3+Threat+Research+Labs&rft.date=2016-08-25&rft_id=http%3A%2F%2Fblog.level3.com%2Fsecurity%2Fattack-of-things%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-symantec1-81"><span class="mw-cite-backlink"><b><a href="#cite_ref-symantec1_81-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBallano,_Mario2015" class="citation web cs1">Ballano, Mario (1 Oct 2015). <a rel="nofollow" class="external text" href="https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=ef23b297-5cc6-4c4a-b2e7-ff41635965fe&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments">"Is there an Internet-of-Things vigilante out there?"</a>. <a href="/wiki/NortonLifeLock" class="mw-redirect" title="NortonLifeLock">Symantec</a><span class="reference-accessdate">. Retrieved <span class="nowrap">14 November</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Is+there+an+Internet-of-Things+vigilante+out+there%3F&rft.pub=Symantec&rft.date=2015-10-01&rft.au=Ballano%2C+Mario&rft_id=https%3A%2F%2Fcommunity.broadcom.com%2Fsymantecenterprise%2Fcommunities%2Fcommunity-home%2Flibrarydocuments%2Fviewdocument%3FDocumentKey%3Def23b297-5cc6-4c4a-b2e7-ff41635965fe%26CommunityKey%3D1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68%26tab%3Dlibrarydocuments&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:5-82"><span class="mw-cite-backlink"><b><a href="#cite_ref-:5_82-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://gitlab.com/rav7teif/linux.wifatch">"linux.wifatch"</a>. The White Team. October 5, 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">15 November</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=linux.wifatch&rft.pub=The+White+Team&rft.date=2015-10-05&rft_id=https%3A%2F%2Fgitlab.com%2Frav7teif%2Flinux.wifatch&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:6-83"><span class="mw-cite-backlink"><b><a href="#cite_ref-:6_83-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCimpanu,_Catalin2015" class="citation web cs1">Cimpanu, Catalin (Oct 7, 2015). <a rel="nofollow" class="external text" href="http://news.softpedia.com/news/creators-of-the-benevolent-linux-wifatch-malware-reveal-themselves-493938.shtml">"Creators of the Benevolent Linux.Wifatch Malware Reveal Themselves"</a>. <a href="/wiki/Softpedia" title="Softpedia">Softpedia</a><span class="reference-accessdate">. Retrieved <span class="nowrap">14 November</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Creators+of+the+Benevolent+Linux.Wifatch+Malware+Reveal+Themselves&rft.pub=Softpedia&rft.date=2015-10-07&rft.au=Cimpanu%2C+Catalin&rft_id=http%3A%2F%2Fnews.softpedia.com%2Fnews%2Fcreators-of-the-benevolent-linux-wifatch-malware-reveal-themselves-493938.shtml&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-memz_1-84"><span class="mw-cite-backlink"><b><a href="#cite_ref-memz_1_84-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFOberhaus2016" class="citation magazine cs1">Oberhaus, Daniel (July 9, 2016). <a rel="nofollow" class="external text" href="https://motherboard.vice.com/en_us/article/yp3nm7/watch-this-malware-turn-a-computer-into-a-digital-hellscape">"Watch This Malware Turn a Computer into a Digital Hellscape"</a>. <i><a href="/wiki/Vice_(magazine)" title="Vice (magazine)">Motherboard</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">July 4,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Motherboard&rft.atitle=Watch+This+Malware+Turn+a+Computer+into+a+Digital+Hellscape&rft.date=2016-07-09&rft.aulast=Oberhaus&rft.aufirst=Daniel&rft_id=https%3A%2F%2Fmotherboard.vice.com%2Fen_us%2Farticle%2Fyp3nm7%2Fwatch-this-malware-turn-a-computer-into-a-digital-hellscape&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-memz_2-85"><span class="mw-cite-backlink"><b><a href="#cite_ref-memz_2_85-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDean2016" class="citation web cs1">Dean, Madeleine (August 26, 2016). <a rel="nofollow" class="external text" href="https://windowsreport.com/memz-virus-windows-pc/">"MEMZ virus: what is it and how it affects Windows PC?"</a>. Windows Report<span class="reference-accessdate">. Retrieved <span class="nowrap">July 4,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=MEMZ+virus%3A+what+is+it+and+how+it+affects+Windows+PC%3F&rft.pub=Windows+Report&rft.date=2016-08-26&rft.aulast=Dean&rft.aufirst=Madeleine&rft_id=https%3A%2F%2Fwindowsreport.com%2Fmemz-virus-windows-pc%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:7-86"><span class="mw-cite-backlink"><b><a href="#cite_ref-:7_86-0">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.bsi-fuer-buerger.de/BSIFB/DE/Service/Aktuell/Informationen/Artikel/Ransomware.html">"Ransomware: Erpresserische Schadprogramme"</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20160221102402/https://www.bsi-fuer-buerger.de/BSIFB/DE/Service/Aktuell/Informationen/Artikel/Ransomware.html">Archived</a> 2016-02-21 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>, bsi-fuer-buerger.de, 9 February 2016. Retrieved 10 March 2016.</span> </li> <li id="cite_note-:8-87"><span class="mw-cite-backlink"><b><a href="#cite_ref-:8_87-0">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=5dcac8a2-6d48-4ebb-9060-f45e2fa5f465&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments">"Locky ransomware on aggressive hunt for victims"</a>, Symantec.com, 18 February 2016. Retrieved 10 March 2016.</span> </li> <li id="cite_note-:9-88"><span class="mw-cite-backlink"><b><a href="#cite_ref-:9_88-0">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.virustotal.com/en/file/5e945c1d27c9ad77a2b63ae10af46aee7d29a6a43605a9bfbf35cebbcff184d8/analysis/1455638481/">"Antivirus scan for (Locky)"</a>, virustotal.com, 16 February 2016. Retrieved 10 March 2016.</span> </li> <li id="cite_note-:10-89"><span class="mw-cite-backlink"><b><a href="#cite_ref-:10_89-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFdanielevir2014" class="citation web cs1">danielevir (19 September 2014). <a rel="nofollow" class="external text" href="https://www.massivealliance.com/2014/09/19/tiny-banker-malware-attempted-customers-us-banks/">"<span class="cs1-kern-left"></span>'Tiny Banker' Malware Attempted At Customers Of US Banks"</a>. <i>Massive Alliance</i><span class="reference-accessdate">. Retrieved <span class="nowrap">10 September</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Massive+Alliance&rft.atitle=%27Tiny+Banker%27+Malware+Attempted+At+Customers+Of+US+Banks&rft.date=2014-09-19&rft.au=danielevir&rft_id=https%3A%2F%2Fwww.massivealliance.com%2F2014%2F09%2F19%2Ftiny-banker-malware-attempted-customers-us-banks%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:11-90"><span class="mw-cite-backlink"><b><a href="#cite_ref-:11_90-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.entrust.com/modified-tiny-banker-trojan-found-targeting-major-u-s-banks/">"Modified Tiny Banker Trojan Found Targeting Major U.S. Banks"</a>. <i>Entrust, Inc</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Entrust%2C+Inc.&rft.atitle=Modified+Tiny+Banker+Trojan+Found+Targeting+Major+U.S.+Banks&rft_id=https%3A%2F%2Fwww.entrust.com%2Fmodified-tiny-banker-trojan-found-targeting-major-u-s-banks%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:12-91"><span class="mw-cite-backlink"><b><a href="#cite_ref-:12_91-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJeremy_Kirk2014" class="citation web cs1">Jeremy Kirk (15 September 2014). <a rel="nofollow" class="external text" href="http://www.pcworld.com/article/2684112/tiny-banker-malware-targets-us-financial-institutions.html">"<span class="cs1-kern-left"></span>'Tiny banker' malware targets US financial institutions"</a>. <i>PCWorld</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=PCWorld&rft.atitle=%27Tiny+banker%27+malware+targets+US+financial+institutions&rft.date=2014-09-15&rft.au=Jeremy+Kirk&rft_id=http%3A%2F%2Fwww.pcworld.com%2Farticle%2F2684112%2Ftiny-banker-malware-targets-us-financial-institutions.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:13-92"><span class="mw-cite-backlink"><b><a href="#cite_ref-:13_92-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.tripwire.com/state-of-security/latest-security-news/tiny-banker-malware-targets-dozens-of-major-us-financial-institutions/">"<span class="cs1-kern-left"></span>'Tiny Banker' Malware Targets Dozens of Major US Financial Institutions"</a>. <i>The State of Security</i>. 2014-09-16.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=The+State+of+Security&rft.atitle=%27Tiny+Banker%27+Malware+Targets+Dozens+of+Major+US+Financial+Institutions&rft.date=2014-09-16&rft_id=http%3A%2F%2Fwww.tripwire.com%2Fstate-of-security%2Flatest-security-news%2Ftiny-banker-malware-targets-dozens-of-major-us-financial-institutions%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:14-93"><span class="mw-cite-backlink"><b><a href="#cite_ref-:14_93-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.nbcnews.com/id/wbna47633142">"Tiny 'Tinba' Banking Trojan Is Big Trouble"</a>. <i>msnbc.com</i>. 2012-05-31.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=msnbc.com&rft.atitle=Tiny+%27Tinba%27+Banking+Trojan+Is+Big+Trouble&rft.date=2012-05-31&rft_id=https%3A%2F%2Fwww.nbcnews.com%2Fid%2Fwbna47633142&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-94"><span class="mw-cite-backlink"><b><a href="#cite_ref-94">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones">"What is Pegasus spyware and how does it hack phones?"</a>. <i>The Guardian</i>. 18 July 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">13 August</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=What+is+Pegasus+spyware+and+how+does+it+hack+phones%3F&rft.date=2021-07-18&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fnews%2F2021%2Fjul%2F18%2Fwhat-is-pegasus-spyware-and-how-does-it-hack-phones&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:15-95"><span class="mw-cite-backlink"><b><a href="#cite_ref-:15_95-0">^</a></b></span> <span class="reference-text"><i><a href="/wiki/The_Economist" title="The Economist">The Economist</a></i>, 8 October 2016, <a rel="nofollow" class="external text" href="https://www.economist.com/news/science-and-technology/21708220-electronic-tsunami-crashes-down-solitary-journalist-internet">The internet of stings</a></span> </li> <li id="cite_note-securityintelligence-96"><span class="mw-cite-backlink"><b><a href="#cite_ref-securityintelligence_96-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBonderud,_Douglas2016" class="citation web cs1">Bonderud, Douglas (October 4, 2016). <a rel="nofollow" class="external text" href="https://securityintelligence.com/news/leaked-mirai-malware-boosts-iot-insecurity-threat-level/">"Leaked Mirai Malware Boosts IoT Insecurity Threat Level"</a>. securityintelligence.com<span class="reference-accessdate">. Retrieved <span class="nowrap">20 October</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Leaked+Mirai+Malware+Boosts+IoT+Insecurity+Threat+Level&rft.pub=securityintelligence.com&rft.date=2016-10-04&rft.au=Bonderud%2C+Douglas&rft_id=https%3A%2F%2Fsecurityintelligence.com%2Fnews%2Fleaked-mirai-malware-boosts-iot-insecurity-threat-level%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:16-97"><span class="mw-cite-backlink"><b><a href="#cite_ref-:16_97-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.theregister.co.uk/2016/10/21/dyn_dns_ddos_explained/">"Today the web was broken by countless hacked devices"</a>. theregister.co.uk. 21 October 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">24 October</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Today+the+web+was+broken+by+countless+hacked+devices&rft.pub=theregister.co.uk&rft.date=2016-10-21&rft_id=https%3A%2F%2Fwww.theregister.co.uk%2F2016%2F10%2F21%2Fdyn_dns_ddos_explained%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:17-98"><span class="mw-cite-backlink"><b><a href="#cite_ref-:17_98-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://motherboard.vice.com/read/blame-the-internet-of-things-for-destroying-the-internet-today">"Blame the Internet of Things for Destroying the Internet Today"</a>. <i>Motherboard</i>. VICE. 2016-10-21<span class="reference-accessdate">. Retrieved <span class="nowrap">27 October</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Motherboard&rft.atitle=Blame+the+Internet+of+Things+for+Destroying+the+Internet+Today&rft.date=2016-10-21&rft_id=http%3A%2F%2Fmotherboard.vice.com%2Fread%2Fblame-the-internet-of-things-for-destroying-the-internet-today&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:18-99"><span class="mw-cite-backlink"><b><a href="#cite_ref-:18_99-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWongSolon2017" class="citation news cs1"><a href="/wiki/Julia_Carrie_Wong" title="Julia Carrie Wong">Wong, Julia Carrie</a>; Solon, Olivia (2017-05-12). <a rel="nofollow" class="external text" href="https://www.theguardian.com/technology/2017/may/12/global-cyber-attack-ransomware-nsa-uk-nhs">"Massive ransomware cyber-attack hits 74 countries around the world"</a>. <i>The Guardian</i>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0261-3077">0261-3077</a><span class="reference-accessdate">. Retrieved <span class="nowrap">2017-05-12</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=Massive+ransomware+cyber-attack+hits+74+countries+around+the+world&rft.date=2017-05-12&rft.issn=0261-3077&rft.aulast=Wong&rft.aufirst=Julia+Carrie&rft.au=Solon%2C+Olivia&rft_id=https%3A%2F%2Fwww.theguardian.com%2Ftechnology%2F2017%2Fmay%2F12%2Fglobal-cyber-attack-ransomware-nsa-uk-nhs&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:19-100"><span class="mw-cite-backlink"><b><a href="#cite_ref-:19_100-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSolon2017" class="citation news cs1">Solon, Olivia (2017-05-13). <a rel="nofollow" class="external text" href="https://www.theguardian.com/technology/2017/may/13/accidental-hero-finds-kill-switch-to-stop-spread-of-ransomware-cyber-attack">"<span class="cs1-kern-left"></span>'Accidental hero' finds kill switch to stop spread of ransomware cyber-attack"</a>. <i>The Guardian</i>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0261-3077">0261-3077</a><span class="reference-accessdate">. Retrieved <span class="nowrap">2017-05-13</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=%27Accidental+hero%27+finds+kill+switch+to+stop+spread+of+ransomware+cyber-attack&rft.date=2017-05-13&rft.issn=0261-3077&rft.aulast=Solon&rft.aufirst=Olivia&rft_id=https%3A%2F%2Fwww.theguardian.com%2Ftechnology%2F2017%2Fmay%2F13%2Faccidental-hero-finds-kill-switch-to-stop-spread-of-ransomware-cyber-attack&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:20-101"><span class="mw-cite-backlink"><b><a href="#cite_ref-:20_101-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKhandelwal" class="citation news cs1">Khandelwal, Swati. <a rel="nofollow" class="external text" href="http://thehackernews.com/2017/05/wannacry-ransomware-cyber-attack.html">"It's Not Over, WannaCry 2.0 Ransomware Just Arrived With No 'Kill-Switch'<span class="cs1-kern-right"></span>"</a>. <i>The Hacker News</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2017-05-14</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Hacker+News&rft.atitle=It%27s+Not+Over%2C+WannaCry+2.0+Ransomware+Just+Arrived+With+No+%27Kill-Switch%27&rft.aulast=Khandelwal&rft.aufirst=Swati&rft_id=http%3A%2F%2Fthehackernews.com%2F2017%2F05%2Fwannacry-ransomware-cyber-attack.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:21-102"><span class="mw-cite-backlink"><b><a href="#cite_ref-:21_102-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20170629093754/https://www.symantec.com/connect/blogs/petya-ransomware-outbreak-here-s-what-you-need-know">"Petya ransomware outbreak: Here's what you need to know"</a>. Archived from <a rel="nofollow" class="external text" href="https://www.symantec.com/connect/blogs/petya-ransomware-outbreak-here-s-what-you-need-know">the original</a> on June 29, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">10 September</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Petya+ransomware+outbreak%3A+Here%27s+what+you+need+to+know&rft_id=https%3A%2F%2Fwww.symantec.com%2Fconnect%2Fblogs%2Fpetya-ransomware-outbreak-here-s-what-you-need-know&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:22-103"><span class="mw-cite-backlink"><b><a href="#cite_ref-:22_103-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20160902114244/https://www.symantec.com/security_response/writeup.jsp?docid=2016-032913-4222-99">"Ransom.Petya - Symantec"</a>. <i><a href="/wiki/Broadcom#Symantec_enterprise_security" title="Broadcom">Symantec</a></i>. Archived from <a rel="nofollow" class="external text" href="https://www.symantec.com/security_response/writeup.jsp?docid=2016-032913-4222-99">the original</a> on September 2, 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">10 September</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Symantec&rft.atitle=Ransom.Petya+-+Symantec&rft_id=https%3A%2F%2Fwww.symantec.com%2Fsecurity_response%2Fwriteup.jsp%3Fdocid%3D2016-032913-4222-99&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:23-104"><span class="mw-cite-backlink"><b><a href="#cite_ref-:23_104-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://krebsonsecurity.com/2017/06/petya-ransomware-outbreak-goes-global/">"<span class="cs1-kern-left"></span>'Petya' Ransomware Outbreak Goes Global — Krebs on Security"</a>. <i>krebsonsecurity.com</i>. 28 June 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">10 September</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=krebsonsecurity.com&rft.atitle=%27Petya%27+Ransomware+Outbreak+Goes+Global+%E2%80%94+Krebs+on+Security&rft.date=2017-06-28&rft_id=https%3A%2F%2Fkrebsonsecurity.com%2F2017%2F06%2Fpetya-ransomware-outbreak-goes-global%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:24-105"><span class="mw-cite-backlink"><b><a href="#cite_ref-:24_105-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="http://economictimes.indiatimes.com/tech/internet/new-malware-steals-users-money-through-mobile-phones-report/articleshow/60448837.cms">"New malware steals users' money through mobile phones: Report"</a>. <i>The Economic Times</i>. 10 September 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">10 September</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Economic+Times&rft.atitle=New+malware+steals+users%27+money+through+mobile+phones%3A+Report&rft.date=2017-09-10&rft_id=http%3A%2F%2Feconomictimes.indiatimes.com%2Ftech%2Finternet%2Fnew-malware-steals-users-money-through-mobile-phones-report%2Farticleshow%2F60448837.cms&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:25-106"><span class="mw-cite-backlink"><b><a href="#cite_ref-:25_106-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.firstpost.com/tech/news-analysis/xafecopy-trojan-a-new-malware-detected-in-india-it-disguises-itself-as-an-app-to-steals-money-via-mobile-phones-4028709.html">"Xafecopy Trojan, a new malware detected in India; it disguises itself as an app to steals money via mobile phones"</a>. <i>Tech2</i>. 2017-09-10<span class="reference-accessdate">. Retrieved <span class="nowrap">10 September</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Tech2&rft.atitle=Xafecopy+Trojan%2C+a+new+malware+detected+in+India%3B+it+disguises+itself+as+an+app+to+steals+money+via+mobile+phones&rft.date=2017-09-10&rft_id=http%3A%2F%2Fwww.firstpost.com%2Ftech%2Fnews-analysis%2Fxafecopy-trojan-a-new-malware-detected-in-india-it-disguises-itself-as-an-app-to-steals-money-via-mobile-phones-4028709.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:26-107"><span class="mw-cite-backlink"><b><a href="#cite_ref-:26_107-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.techscoop.in/2017/09/KediRAT-can-steal-your-information-and.html">"Kedi RAT can steal your information and send it through gmail"</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Kedi+RAT+can+steal+your+information+and+send+it+through+gmail&rft_id=https%3A%2F%2Fwww.techscoop.in%2F2017%2F09%2FKediRAT-can-steal-your-information-and.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:27-108"><span class="mw-cite-backlink"><b><a href="#cite_ref-:27_108-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://nakedsecurity.sophos.com/2017/09/12/beware-the-kedi-rat-pretending-to-be-a-citrix-file-that-gmails-home/">"Beware the Kedi RAT pretending to be a Citrix file that Gmails home"</a>. 2017-09-12.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Beware+the+Kedi+RAT+pretending+to+be+a+Citrix+file+that+Gmails+home&rft.date=2017-09-12&rft_id=https%3A%2F%2Fnakedsecurity.sophos.com%2F2017%2F09%2F12%2Fbeware-the-kedi-rat-pretending-to-be-a-citrix-file-that-gmails-home%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-:28-109"><span class="mw-cite-backlink"><b><a href="#cite_ref-:28_109-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAbrams2018" class="citation web cs1">Abrams, Lawrence (February 26, 2018). <a rel="nofollow" class="external text" href="https://www.bleepingcomputer.com/news/security/thanatos-ransomware-is-first-to-use-bitcoin-cash-messes-up-encryption/">"Thanatos Ransomware Is First to Use Bitcoin Cash. Messes Up Encryption"</a>. <i><a href="/wiki/Bleeping_Computer" title="Bleeping Computer">Bleeping Computer</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">June 25,</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Bleeping+Computer&rft.atitle=Thanatos+Ransomware+Is+First+to+Use+Bitcoin+Cash.+Messes+Up+Encryption&rft.date=2018-02-26&rft.aulast=Abrams&rft.aufirst=Lawrence&rft_id=https%3A%2F%2Fwww.bleepingcomputer.com%2Fnews%2Fsecurity%2Fthanatos-ransomware-is-first-to-use-bitcoin-cash-messes-up-encryption%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-KAS-20191108-110"><span class="mw-cite-backlink"><b><a href="#cite_ref-KAS-20191108_110-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAMR2019" class="citation news cs1">AMR, GReAT (8 November 2019). <a rel="nofollow" class="external text" href="https://securelist.com/titanium-the-platinum-group-strikes-again/94961/">"Titanium: the Platinum group strikes again"</a>. <i><a href="/wiki/Kaspersky_Lab" title="Kaspersky Lab">Kaspersky Lab</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">9 November</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Kaspersky+Lab&rft.atitle=Titanium%3A+the+Platinum+group+strikes+again&rft.date=2019-11-08&rft.aulast=AMR&rft.aufirst=GReAT&rft_id=https%3A%2F%2Fsecurelist.com%2Ftitanium-the-platinum-group-strikes-again%2F94961%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-111"><span class="mw-cite-backlink"><b><a href="#cite_ref-111">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWIRED2024" class="citation web cs1">WIRED (2024-03-02). <a rel="nofollow" class="external text" href="https://arstechnica.com/ai/2024/03/researchers-create-ai-worms-that-can-spread-from-one-system-to-another/">"Researchers create AI worms that can spread from one system to another"</a>. <i>Ars Technica</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2024-03-07</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Ars+Technica&rft.atitle=Researchers+create+AI+worms+that+can+spread+from+one+system+to+another&rft.date=2024-03-02&rft.au=WIRED&rft_id=https%3A%2F%2Farstechnica.com%2Fai%2F2024%2F03%2Fresearchers-create-ai-worms-that-can-spread-from-one-system-to-another%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> <li id="cite_note-112"><span class="mw-cite-backlink"><b><a href="#cite_ref-112">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCorbet2024" class="citation web cs1">Corbet, Jonathan (2024-03-29). <a rel="nofollow" class="external text" href="https://lwn.net/Articles/967180/">"A backdoor in xz"</a>. <i>LWN</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2024-04-03</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=LWN&rft.atitle=A+backdoor+in+xz&rft.date=2024-03-29&rft.aulast=Corbet&rft.aufirst=Jonathan&rft_id=https%3A%2F%2Flwn.net%2FArticles%2F967180%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ATimeline+of+computer+viruses+and+worms" class="Z3988"></span></span> </li> </ol></div></div> <div class="mw-heading mw-heading2"><h2 id="External_links">External links</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Timeline_of_computer_viruses_and_worms&action=edit&section=55" title="Edit section: External links"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20090502053018/http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=Government&articleId=9131924&taxonomyId=13&pageNumber=1">A short history of hacks, worms, and cyberterror</a> by Mari Keefe, Computerworld, April 2009</li> <li><a rel="nofollow" class="external text" href="http://www.5thutility.co.uk/10-worst-computer-viruses-time/">5th Utility Ltd list of the 10 worst computer viruses of all time</a></li></ul> <div class="navbox-styles"><style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style></div><div role="navigation" class="navbox" aria-labelledby="Malware_topics" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Malware" title="Template:Malware"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Malware" title="Template talk:Malware"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Malware" title="Special:EditPage/Template:Malware"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Malware_topics" style="font-size:114%;margin:0 4em"><a href="/wiki/Malware" title="Malware">Malware</a> topics</div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Infectious malware</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Comparison_of_computer_viruses" title="Comparison of computer viruses">Comparison of computer viruses</a></li> <li><a href="/wiki/Computer_virus" title="Computer virus">Computer virus</a></li> <li><a href="/wiki/Computer_worm" title="Computer worm">Computer worm</a></li> <li><a href="/wiki/List_of_computer_worms" title="List of computer worms">List of computer worms</a></li> <li><a class="mw-selflink selflink">Timeline of computer viruses and worms</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Concealment</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">Backdoor</a></li> <li><a href="/wiki/Clickjacking" title="Clickjacking">Clickjacking</a></li> <li><a href="/wiki/Man-in-the-browser" title="Man-in-the-browser">Man-in-the-browser</a></li> <li><a href="/wiki/Man-in-the-middle_attack" title="Man-in-the-middle attack">Man-in-the-middle</a></li> <li><a href="/wiki/Rootkit" title="Rootkit">Rootkit</a></li> <li><a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">Trojan horse</a></li> <li><a href="/wiki/Zombie_(computing)" title="Zombie (computing)">Zombie computer</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Malware for profit</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Adware" title="Adware">Adware</a></li> <li><a href="/wiki/Botnet" title="Botnet">Botnet</a></li> <li><a href="/wiki/Crimeware" title="Crimeware">Crimeware</a></li> <li><a href="/wiki/Fleeceware" title="Fleeceware">Fleeceware</a></li> <li><a href="/wiki/Form_grabbing" title="Form grabbing">Form grabbing</a></li> <li><a href="/wiki/Dialer#Fraudulent_dialer" title="Dialer">Fraudulent dialer</a></li> <li><a href="/wiki/Infostealer" title="Infostealer">Infostealer</a></li> <li><a href="/wiki/Keystroke_logging" title="Keystroke logging">Keystroke logging</a></li> <li><a href="/wiki/Internet_bot#Malicious_purposes" title="Internet bot">Malbot</a></li> <li><a href="/wiki/Privacy-invasive_software" title="Privacy-invasive software">Privacy-invasive software</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Rogue_security_software" title="Rogue security software">Rogue security software</a></li> <li><a href="/wiki/Scareware" title="Scareware">Scareware</a></li> <li><a href="/wiki/Spyware" title="Spyware">Spyware</a></li> <li><a href="/wiki/Web_threat" title="Web threat">Web threats</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">By operating system</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Category:Android_(operating_system)_malware" title="Category:Android (operating system) malware">Android malware</a></li> <li><a href="/wiki/Category:Classic_Mac_OS_viruses" title="Category:Classic Mac OS viruses">Classic Mac OS viruses</a></li> <li><a href="/wiki/Category:IOS_malware" title="Category:IOS malware">iOS malware</a></li> <li><a href="/wiki/Linux_malware" title="Linux malware">Linux malware</a></li> <li><a href="/wiki/Category:MacOS_malware" title="Category:MacOS malware">MacOS malware</a></li> <li><a href="/wiki/Macro_virus" title="Macro virus">Macro virus</a></li> <li><a href="/wiki/Mobile_malware" title="Mobile malware">Mobile malware</a></li> <li><a href="/wiki/Palm_OS_viruses" title="Palm OS viruses">Palm OS viruses</a></li> <li><a href="/wiki/HyperCard_viruses" class="mw-redirect" title="HyperCard viruses">HyperCard viruses</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Protection</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Anti-keylogger" title="Anti-keylogger">Anti-keylogger</a></li> <li><a href="/wiki/Antivirus_software" title="Antivirus software">Antivirus software</a></li> <li><a href="/wiki/Browser_security" title="Browser security">Browser security</a></li> <li><a href="/wiki/Data_loss_prevention_software" title="Data loss prevention software">Data loss prevention software</a></li> <li><a href="/wiki/Defensive_computing" title="Defensive computing">Defensive computing</a></li> <li><a href="/wiki/Firewall_(computing)" title="Firewall (computing)">Firewall</a></li> <li><a href="/wiki/Internet_security" title="Internet security">Internet security</a></li> <li><a href="/wiki/Intrusion_detection_system" title="Intrusion detection system">Intrusion detection system</a></li> <li><a href="/wiki/Mobile_security" title="Mobile security">Mobile security</a></li> <li><a href="/wiki/Network_security" title="Network security">Network security</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Countermeasures</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Computer_and_network_surveillance" title="Computer and network surveillance">Computer and network surveillance</a></li> <li><a href="/wiki/Honeypot_(computing)" title="Honeypot (computing)">Honeypot</a></li> <li><a href="/wiki/Operation:_Bot_Roast" title="Operation: Bot Roast">Operation: Bot Roast</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="Timelines_of_computing" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Timelines_of_computing" title="Template:Timelines of computing"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Timelines_of_computing" title="Template talk:Timelines of computing"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Timelines_of_computing" title="Special:EditPage/Template:Timelines of computing"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Timelines_of_computing" style="font-size:114%;margin:0 4em"><a href="/wiki/Category:Computing_timelines" title="Category:Computing timelines">Timelines of computing</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Timeline_of_computing" title="Timeline of computing">Computing</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Timeline_of_computing_hardware_before_1950" title="Timeline of computing hardware before 1950">Before 1950</a></li> <li><a href="/wiki/Timeline_of_computing_1950%E2%80%931979" title="Timeline of computing 1950–1979">1950–1979</a></li> <li><a href="/wiki/Timeline_of_computing_1980%E2%80%931989" title="Timeline of computing 1980–1989">1980s</a></li> <li><a href="/wiki/Timeline_of_computing_1990%E2%80%931999" title="Timeline of computing 1990–1999">1990s</a></li> <li><a href="/wiki/Timeline_of_computing_2000%E2%80%932009" title="Timeline of computing 2000–2009">2000s</a></li> <li><a href="/wiki/Timeline_of_computing_2010%E2%80%932019" title="Timeline of computing 2010–2019">2010s</a></li> <li><a href="/wiki/Timeline_of_computing_2020%E2%80%93present" title="Timeline of computing 2020–present">2020s</a></li> <li><a href="/wiki/Timeline_of_scientific_computing" title="Timeline of scientific computing">Scientific</a></li> <li><a href="/wiki/Timeline_of_women_in_computing" title="Timeline of women in computing">Women in computing</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Computer_science" title="Computer science">Computer science</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Timeline_of_algorithms" title="Timeline of algorithms">Algorithms</a></li> <li><a href="/wiki/Timeline_of_artificial_intelligence" title="Timeline of artificial intelligence">Artificial intelligence</a></li> <li><a href="/wiki/Timeline_of_binary_prefixes" title="Timeline of binary prefixes">Binary prefixes</a></li> <li><a href="/wiki/Timeline_of_cryptography" title="Timeline of cryptography">Cryptography</a></li> <li><a href="/wiki/Timeline_of_machine_learning" title="Timeline of machine learning">Machine learning</a></li> <li><a href="/wiki/Timeline_of_quantum_computing_and_communication" title="Timeline of quantum computing and communication">Quantum computing and communication</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Software" title="Software">Software</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Timeline_of_free_and_open-source_software" title="Timeline of free and open-source software">Free and open-source software</a></li> <li><a href="/wiki/Timeline_of_hypertext_technology" title="Timeline of hypertext technology">Hypertext technology</a></li> <li><a href="/wiki/Timeline_of_operating_systems" title="Timeline of operating systems">Operating systems</a> <ul><li><a href="/wiki/Timeline_of_DOS_operating_systems" title="Timeline of DOS operating systems">DOS family</a></li> <li><a href="/wiki/Timeline_of_Microsoft_Windows" class="mw-redirect" title="Timeline of Microsoft Windows">Windows</a></li> <li><a href="/wiki/Linux_kernel_version_history" title="Linux kernel version history">Linux</a></li></ul></li> <li><a href="/wiki/Timeline_of_programming_languages" title="Timeline of programming languages">Programming languages</a></li> <li><a href="/wiki/Timeline_of_virtualization_development" class="mw-redirect" title="Timeline of virtualization development">Virtualization development</a></li> <li><a class="mw-selflink selflink">Malware</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Internet" title="Internet">Internet</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Timeline_of_Internet_conflicts" title="Timeline of Internet conflicts">Internet conflicts</a></li> <li><a href="/wiki/Timeline_of_web_browsers" title="Timeline of web browsers">Web browsers</a></li> <li><a href="/wiki/Timeline_of_web_search_engines" title="Timeline of web search engines">Web search engines</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Notable people</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Kathleen_Antonelli" title="Kathleen Antonelli">Kathleen Antonelli</a></li> <li><a href="/wiki/John_Vincent_Atanasoff" title="John Vincent Atanasoff">John Vincent Atanasoff</a></li> <li><a href="/wiki/Charles_Babbage" title="Charles Babbage">Charles Babbage</a></li> <li><a href="/wiki/John_Backus" title="John Backus">John Backus</a></li> <li><a href="/wiki/Jean_Bartik" title="Jean Bartik">Jean Bartik</a></li> <li><a href="/wiki/George_Boole" title="George Boole">George Boole</a></li> <li><a href="/wiki/Vint_Cerf" title="Vint Cerf">Vint Cerf</a></li> <li><a href="/wiki/John_Cocke_(computer_scientist)" title="John Cocke (computer scientist)">John Cocke</a></li> <li><a href="/wiki/Stephen_Cook" title="Stephen Cook">Stephen Cook</a></li> <li><a href="/wiki/Edsger_W._Dijkstra" title="Edsger W. Dijkstra">Edsger W. Dijkstra</a></li> <li><a href="/wiki/J._Presper_Eckert" title="J. Presper Eckert">J. Presper Eckert</a></li> <li><a href="/wiki/Adele_Goldstine" title="Adele Goldstine">Adele Goldstine</a></li> <li><a href="/wiki/Lois_Haibt" title="Lois Haibt">Lois Haibt</a></li> <li><a href="/wiki/Betty_Holberton" title="Betty Holberton">Betty Holberton</a></li> <li><a href="/wiki/Margaret_Hamilton_(software_engineer)" title="Margaret Hamilton (software engineer)">Margaret Hamilton</a></li> <li><a href="/wiki/Grace_Hopper" title="Grace Hopper">Grace Hopper</a></li> <li><a href="/wiki/David_A._Huffman" title="David A. Huffman">David A. Huffman</a></li> <li><a href="/wiki/Robert_Kahn_(computer_scientist)" title="Robert Kahn (computer scientist)">Bob Kahn</a></li> <li><a href="/wiki/Brian_Kernighan" title="Brian Kernighan">Brian Kernighan</a></li> <li><a href="/wiki/Andrew_Koenig_(programmer)" title="Andrew Koenig (programmer)">Andrew Koenig</a></li> <li><a href="/wiki/Semyon_Korsakov" title="Semyon Korsakov">Semyon Korsakov</a></li> <li><a href="/wiki/Nancy_Leveson" title="Nancy Leveson">Nancy Leveson</a></li> <li><a href="/wiki/Ada_Lovelace" title="Ada Lovelace">Ada Lovelace</a></li> <li><a href="/wiki/Donald_Knuth" title="Donald Knuth">Donald Knuth</a></li> <li><a href="/wiki/Joseph_Kruskal" title="Joseph Kruskal">Joseph Kruskal</a></li> <li><a href="/wiki/Douglas_McIlroy" title="Douglas McIlroy">Douglas McIlroy</a></li> <li><a href="/wiki/Marlyn_Meltzer" title="Marlyn Meltzer">Marlyn Meltzer</a></li> <li><a href="/wiki/John_von_Neumann" title="John von Neumann">John von Neumann</a></li> <li><a href="/wiki/Kl%C3%A1ra_D%C3%A1n_von_Neumann" title="Klára Dán von Neumann">Klára Dán von Neumann</a></li> <li><a href="/wiki/Dennis_Ritchie" title="Dennis Ritchie">Dennis Ritchie</a></li> <li><a href="/wiki/Guido_van_Rossum" title="Guido van Rossum">Guido van Rossum</a></li> <li><a href="/wiki/Claude_Shannon" title="Claude Shannon">Claude Shannon</a></li> <li><a href="/wiki/Frances_Spence" title="Frances Spence">Frances Spence</a></li> <li><a href="/wiki/Bjarne_Stroustrup" title="Bjarne Stroustrup">Bjarne Stroustrup</a></li> <li><a href="/wiki/Ruth_Teitelbaum" title="Ruth Teitelbaum">Ruth Teitelbaum</a></li> <li><a href="/wiki/Ken_Thompson" title="Ken Thompson">Ken Thompson</a></li> <li><a href="/wiki/Linus_Torvalds" title="Linus Torvalds">Linus Torvalds</a></li> <li><a href="/wiki/Alan_Turing" title="Alan Turing">Alan Turing</a></li> <li><a href="/wiki/Paul_Vixie" title="Paul Vixie">Paul Vixie</a></li> <li><a href="/wiki/Larry_Wall" title="Larry Wall">Larry Wall</a></li> <li><a href="/wiki/Stephen_Wolfram" title="Stephen Wolfram">Stephen Wolfram</a></li> <li><a href="/wiki/Niklaus_Wirth" title="Niklaus Wirth">Niklaus Wirth</a></li> <li><a href="/wiki/Steve_Wozniak" title="Steve Wozniak">Steve Wozniak</a></li> <li><a href="/wiki/Konrad_Zuse" title="Konrad Zuse">Konrad Zuse</a></li></ul> </div></td></tr></tbody></table></div> <!-- NewPP limit report Parsed by mw‐web.codfw.main‐f69cdc8f6‐svl76 Cached time: 20241122140712 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 1.450 seconds Real time usage: 1.630 seconds Preprocessor visited node count: 6381/1000000 Post‐expand include size: 210400/2097152 bytes Template argument size: 5652/2097152 bytes Highest expansion depth: 15/100 Expensive parser function count: 11/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 372413/5000000 bytes Lua time usage: 0.919/10.000 seconds Lua memory usage: 7144817/52428800 bytes Number of Wikibase entities loaded: 0/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 1369.490 1 -total 63.35% 867.577 1 Template:Reflist 34.91% 478.034 79 Template:Cite_web 9.53% 130.551 4 Template:Cite_book 8.11% 111.109 1 Template:Cleanup 8.11% 111.032 1 Template:Malware 8.03% 110.016 2 Template:Navbox 7.66% 104.892 6 Template:Main_other 6.82% 93.371 1 Template:Short_description 5.81% 79.567 1 Template:Ambox --> <!-- Saved in parser cache with key enwiki:pcache:idhash:174761-0!canonical and timestamp 20241122140712 and revision id 1257293623. Rendering was triggered because: page-view --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?type=1x1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Timeline_of_computer_viruses_and_worms&oldid=1257293623">https://en.wikipedia.org/w/index.php?title=Timeline_of_computer_viruses_and_worms&oldid=1257293623</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Computing_timelines" title="Category:Computing timelines">Computing timelines</a></li><li><a href="/wiki/Category:Malware" title="Category:Malware">Malware</a></li><li><a href="/wiki/Category:Trojan_horses" title="Category:Trojan horses">Trojan horses</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:CS1_maint:_location" title="Category:CS1 maint: location">CS1 maint: location</a></li><li><a href="/wiki/Category:CS1_German-language_sources_(de)" title="Category:CS1 German-language sources (de)">CS1 German-language sources (de)</a></li><li><a href="/wiki/Category:Pages_containing_links_to_subscription-only_content" title="Category:Pages containing links to subscription-only content">Pages containing links to subscription-only content</a></li><li><a href="/wiki/Category:Webarchive_template_wayback_links" title="Category:Webarchive template wayback links">Webarchive template wayback links</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_matches_Wikidata" title="Category:Short description matches Wikidata">Short description matches Wikidata</a></li><li><a href="/wiki/Category:Articles_needing_cleanup_from_November_2015" title="Category:Articles needing cleanup from November 2015">Articles needing cleanup from November 2015</a></li><li><a href="/wiki/Category:All_pages_needing_cleanup" title="Category:All pages needing cleanup">All pages needing cleanup</a></li><li><a href="/wiki/Category:Cleanup_tagged_articles_with_a_reason_field_from_November_2015" title="Category:Cleanup tagged articles with a reason field from November 2015">Cleanup tagged articles with a reason field from November 2015</a></li><li><a href="/wiki/Category:Wikipedia_pages_needing_cleanup_from_November_2015" title="Category:Wikipedia pages needing cleanup from November 2015">Wikipedia pages needing cleanup from November 2015</a></li><li><a href="/wiki/Category:Wikipedia_articles_needing_clarification_from_May_2017" title="Category:Wikipedia articles needing clarification from May 2017">Wikipedia articles needing clarification from May 2017</a></li><li><a href="/wiki/Category:All_articles_with_failed_verification" title="Category:All articles with failed verification">All articles with failed verification</a></li><li><a href="/wiki/Category:Articles_with_failed_verification_from_May_2017" title="Category:Articles with failed verification from May 2017">Articles with failed verification from May 2017</a></li><li><a href="/wiki/Category:Articles_with_failed_verification_from_December_2013" title="Category:Articles with failed verification from December 2013">Articles with failed verification from December 2013</a></li><li><a href="/wiki/Category:All_articles_with_unsourced_statements" title="Category:All articles with unsourced statements">All articles with unsourced statements</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_April_2019" title="Category:Articles with unsourced statements from April 2019">Articles with unsourced statements from April 2019</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_August_2020" title="Category:Articles with unsourced statements from August 2020">Articles with unsourced statements from August 2020</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 14 November 2024, at 05:10<span class="anonymous-show"> (UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=Timeline_of_computer_viruses_and_worms&mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/w/resources/assets/poweredby_mediawiki.svg" alt="Powered by MediaWiki" width="88" height="31" loading="lazy"></a></li> </ul> </footer> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-f69cdc8f6-vthpd","wgBackendResponseTime":139,"wgPageParseReport":{"limitreport":{"cputime":"1.450","walltime":"1.630","ppvisitednodes":{"value":6381,"limit":1000000},"postexpandincludesize":{"value":210400,"limit":2097152},"templateargumentsize":{"value":5652,"limit":2097152},"expansiondepth":{"value":15,"limit":100},"expensivefunctioncount":{"value":11,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":372413,"limit":5000000},"entityaccesscount":{"value":0,"limit":400},"timingprofile":["100.00% 1369.490 1 -total"," 63.35% 867.577 1 Template:Reflist"," 34.91% 478.034 79 Template:Cite_web"," 9.53% 130.551 4 Template:Cite_book"," 8.11% 111.109 1 Template:Cleanup"," 8.11% 111.032 1 Template:Malware"," 8.03% 110.016 2 Template:Navbox"," 7.66% 104.892 6 Template:Main_other"," 6.82% 93.371 1 Template:Short_description"," 5.81% 79.567 1 Template:Ambox"]},"scribunto":{"limitreport-timeusage":{"value":"0.919","limit":"10.000"},"limitreport-memusage":{"value":7144817,"limit":52428800}},"cachereport":{"origin":"mw-web.codfw.main-f69cdc8f6-svl76","timestamp":"20241122140712","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Timeline of computer viruses and worms","url":"https:\/\/en.wikipedia.org\/wiki\/Timeline_of_computer_viruses_and_worms","sameAs":"http:\/\/www.wikidata.org\/entity\/Q1292360","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q1292360","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2003-01-26T16:40:03Z","dateModified":"2024-11-14T05:10:30Z","image":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/e\/ec\/Virus_Blaster.jpg","headline":"computer malware timeline"}</script> </body> </html>