Top 10 Most Damaging Computer Virus


10 Stuxnet

Stuxnet is a computer worm that was designed to attack Iran’s nuclear facilities but has now evolved and spread to other industrial and energy-generating sites. The first Stuxnet virus assault was aimed at PLCs, which are used to automate industrial processes. According to Sean McGurk, director of the Department of Homeland Security’s Cybersecurity Center, this virus may infiltrate any system and steal any manufacturing recipe. Stuxnet, according to Gurk, is a “game changer.” According to Symantec, there were 44,000 Stuxnet infections all across the world. Although 1,600 of the illnesses came from the United States, Iran accounted for 60% of the cases.

9 SirCam

Sircam is a computer worm that initially infected Microsoft Windows PCs in 2001 via e-mail. It impacted Windows 95, Windows 98, and Windows Me machines. By opening the linked document in the email, the SirCam was distributed. Unsuspecting e-mail recipients are likely to read the message, which always begins with “How are you?” and concludes with “See you later and thanks.” The receiver will be asked to open the attached file in the midst of the letter since the sender is seeking opinion on anything. If you open the linked document, the bug will propagate to your hard drive, and the process will start all over again.

8 Slammer

SQL Slammer was a computer worm that infected several Internet servers in 2003, causing a denial of service and significantly slowing overall Internet traffic. It spread quickly, infecting the majority of the 75,000 people infected within ten minutes. SQL Slammer is a worm that exploited a vulnerability in Microsoft’s database software. The worm took advantage of an outdated security flaw in the server software. Once the worm has attacked the server, it will send a series of data requests to other internet addresses, increasing the possibilities of infecting additional machines. The worm, on the other hand, does not infect any desktop computers and cannot replicate in e-mails.

7 Klez.H

Klez.H initially emerged on April 15, 2002, and one out of every 300 emails was infected. Several variants of the virus have been published in cyberspace, but the Klez.H virus is the most dangerous. Klez.H targets Windows throughout its attack, but it has no effect on Microsoft Outlook email since Microsoft has improved its anti-virus capabilities. The virus selects multiple names from the address book, but each email has a unique topic, attachment name, and content, making it impossible to track down and determine which emails contain the infection.

6 Sasser

Sasser is a computer worm that was discovered on April 30, 2004. It targets machines running vulnerable versions of Microsoft Windows XP and Windows 2000. The worm spreads by exploiting a weak network port in the operating system. Windows 2000, as well as other Windows operating systems such as Windows 95, Windows 98, Windows XP, and Windows ME, were all attacked by the worm. According to an Ohio security specialist, the worm Sasser was aggressive and capable of rapid replication. What makes matters even more difficult is that an email went across the internet promising a “patch” for the Sasser worm, but the “repair” also contained another infection called Netsky-AC.

5 Conficker

The Conficker worm infected millions of systems in over 190 countries, including government, corporate, and personal computers, making it the most widespread computer worm outbreak since the 2003 Welchia. The worm may spread over a network and cure the problem, while other worms trying to do the same are shut out. However, workstations infected with Conficker A were activated the next day, despite Microsoft strongly advising users to install quick upgrades to mitigate vulnerabilities. It subsequently began to utilise various groups of 250 domains for additional instructions on a daily basis. At the time, it was estimated that 500,000 PCs were infected with the worm.

4 MyDoom

Mydoom is a computer worm that first appeared in January 2004 that affects the Microsoft Windows operating system. Mydoom was transmitted via an infected email attachment attached to a message with the subject lines “Error”, “Mail Delivery System”, and “Mail Transaction Failed”. Thousands of e-mails were sent out within hours of MyDoom’s discovery. The worm infected machines that ran on the Microsoft Windows operating system. Microsoft has declared that any information leading to the arrest of the author of the MyDoom malware would be eligible for a $250,000 prize. According to Brad Smith, Microsoft’s general counsel, the MyDoom worm was a criminal act since it was designed to disturb computer users.

3 iloveyou bug

ILOVEYOU is a computer worm that infected over ten million Windows personal computers on and after May 5, 2000, when it began propagating as an email message with the subject line “ILOVEYOU” and the attachment “LOVE-LETTER-FOR-YOU.TXT.vbs.” Computer security experts estimated the cost of the programme damage at $100 million, with some speculating that it may possibly surpass $1 billion. The problem had even infiltrated the computer system of the United States Senate, and the e-mail system had to be forced shut down at the time, but very minor impacts were noticed in the US Congress.

2 Gameover Zeus

Gameover Zeus is a peer-to-peer (P2P) malware extension of the Zeus family that steals bank credentials and is a CryptoLocker ransomware distributor. It was detected for the first time in 2011. It is used by cyber thieves to “filter” money away from bank clients. Meanwhile, Cryptolocker was responsible for the hacking of 200,000 computers in 2013, half of which were from the United States. In the first two months, the computer victims were extorted for $27 million. After the system was infected by Cryptolocker, one police department in Swansea, Massachusetts, paid a ransom to cyber thieves to regain access to the files.

1 Code Red

On July 15, 2001, a computer worm known as Code Red was discovered on the Internet. It targeted machines that used Microsoft’s IIS web server. When the Code Red worm exploited a vulnerability identified by Riley Hassell, eEye Digital Security employees Marc Maiffret and Ryan Permeh initially detected and investigated it. At least 225,000 machines were infected, according to the CERT Coordination Center, an emergency response organisation based at Carnegie Mellon University. Meanwhile, the US Computer Emergency Response Team said that Code Red had infected tens of thousands of websites. The cost of Code Red’s damage was estimated to be about $1.2 billion.