{"id":759,"date":"2024-12-12T06:54:45","date_gmt":"2024-12-12T06:54:45","guid":{"rendered":"https:\/\/reversea.me\/?p=759"},"modified":"2024-12-12T06:54:45","modified_gmt":"2024-12-12T06:54:45","slug":"a-brief-history-of-malware-part-4","status":"publish","type":"post","link":"https:\/\/reversea.me\/index.php\/a-brief-history-of-malware-part-4\/","title":{"rendered":"A Brief History of Malware (Part 4)"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 9<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\n<p><strong>TL;DR<\/strong>: The 2000s witnessed the rapid evolution of malware into more aggressive worms that exploited software vulnerabilities to autonomously spread and cause significant disruption. Notable worms such as <code>ILOVEYOU<\/code>, <code>Slammer<\/code>, and <code>Conficker<\/code> leveraged social engineering, multi-vector propagation, and advanced evasion techniques. This era also marked the rise of botnets, large-scale distributed denial of service (DDoS) attacks, and the expansion of malware to mobile devices, laying the groundwork for the sophisticated malware we see today.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">The Adolescence of Malware: The Rise of Worms. The 2000s<\/h2>\n\n\n\n<p>The turn of the century marked the &#8220;adolescence&#8221; of malware, a period characterized by the rapid evolution of malicious software into more aggressive and widespread forms, particularly <em>worms<\/em>. The rise of Internet access, combined with the increasing popularity of operating systems such as Microsoft Windows, provided fertile ground for worm development and propagation. Unlike earlier malware, which often served as proof-of-concept or were created for experimentation, worms in the 2000s had more destructive intentions: they exploited security vulnerabilities, spread autonomously, and caused massive disruptions.<\/p>\n\n\n\n<p>The decade began with the well-known <code>ILOVEYOU<\/code> worm (2000) [1]. Developed in VBScript, this malware targeted Windows, borrowing ideas from <code>Melissa<\/code>. When infected, it sent itself to all contacts in the user&#8217;s Microsoft Outlook address book. It could also spread through mIRC, a popular Internet Relay Chat client at the time. At a moment when businesses and individuals were undergoing digital transformation, the <code>ILOVEYOU<\/code> worm caused massive disruption, leading to an estimated $8 to $10 billion in damages worldwide [2, 3]. Figure 1 shows an email with an attachment infected with <code>ILOVEYOU<\/code> from those days. It demonstrated the effectiveness of exploiting human curiosity and trust through seemingly innocent messages.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"480\" height=\"294\" src=\"https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/iloveyou.png\" alt=\"\" class=\"wp-image-773\" srcset=\"https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/iloveyou.png 480w, https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/iloveyou-300x184.png 300w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><figcaption class=\"wp-element-caption\">Figure 1: Email with an attachement infected with <code>ILOVEYOU<\/code> (source: <a href=\"https:\/\/en.wikipedia.org\/wiki\/ILOVEYOU\">Wikipedia<\/a>)<\/figcaption><\/figure><\/div>\n\n\n<p>In the same year, the first IRC bot named <code>GTBot<\/code> also appeared, spreading as a Trojan horse disguised as a software utility. Once launched, it used the mIRC client to communicate with attackers, who leveraged infected systems for DoS attacks. Continuing the trend of VBScript-based worms, the <code>Anna Kournikova<\/code> worm appeared in 2001. It spread by launching a VBScript program when an email attachment was opened in Microsoft Outlook, forwarding itself to all contacts in the victim&#8217;s address book (see Figure 2). Its rapid dissemination led to DoS issues in many email servers worldwide [4]. Interestingly, <code>Anna Kournikova<\/code> was created using Kalamar&#8217;s VBS Worm Generator, a tool specifically designed to generate new worm-like malware of that time.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"340\" src=\"https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/anna-kournikova.jpg\" alt=\"\" class=\"wp-image-774\" srcset=\"https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/anna-kournikova.jpg 500w, https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/anna-kournikova-300x204.jpg 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption class=\"wp-element-caption\">Figure 2: Email with an attachment infected with <code>Anna Kournikova<\/code> (source: <a href=\"https:\/\/grahamcluley.com\/memories-anna-kournikova-worm\/\">Memories of the Anna Kournikova worm, Graham Cluley<\/a>)<\/figcaption><\/figure><\/div>\n\n\n<p>The early 2000s also saw the rise of more technically advanced worms, such as <code>Sadmind<\/code> [5] and <code>CodeRed<\/code> [6], which targeted vulnerabilities in server software. Specifically, <code>Sadmind<\/code> infected Solaris and Microsoft IIS servers, defacing websites [7], while <code>CodeRed<\/code> exploited vulnerabilities in Microsoft IIS to similarly deface web pages [8] (see Figure 3 for an example). The impact of these worms was amplified by their focus on servers, which, when compromised, affected numerous users.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"328\" height=\"144\" src=\"https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/code-red.png\" alt=\"\" class=\"wp-image-776\" srcset=\"https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/code-red.png 328w, https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/code-red-300x132.png 300w\" sizes=\"auto, (max-width: 328px) 100vw, 328px\" \/><figcaption class=\"wp-element-caption\">Figure 3: A website defaced by the <code>CodeRed<\/code> worm (source: <a href=\"https:\/\/en.wikipedia.org\/wiki\/Code_Red_(computer_worm)\">Wikipedia<\/a>)<\/figcaption><\/figure><\/div>\n\n\n<p>Soon after, in 2001, <code>Nimda<\/code> emerged, notable for its ability to execute without any email attachment being opened. Due to configuration vulnerabilities in Microsoft Internet Explorer, merely previewing an email would activate <code>Nimda<\/code> [9]. It spread across Microsoft Windows workstations and servers, moving from client to client using email, open network shares, and from web server to client by exploiting backdoors left by <code>Sadmind<\/code> and <code>CodeRed<\/code>.<\/p>\n\n\n\n<p>Later in 2001, <code>Klez<\/code> appeared [10]. Like Nimda, it did not require email attachments to be opened, and it further complicated matters by spoofing the sender&#8217;s identity. Some variants of <code>Klez<\/code> included drive-by-downloads (a drive-by-download attack is the inadvertent download of malicious files or potentially unwanted software onto a computer system), file-infectors, and file deletion behaviors, marking a shift toward more harmful intentions, while others attempted to remove <code>Nimda<\/code> and <code>CodeRed<\/code> from infected systems.<\/p>\n\n\n\n<p><code>MetaPHOR<\/code> (also known as <code>Win32\/Simile<\/code> or <code>Etap<\/code>), the first metamorphic virus, was released in early 2002. It was capable of self-transformation, rewriting its own code, and was written in assembly [11]. Around the same time, <code>MyLife<\/code> appeared as a mass mailing worm, while <code>Tanatos<\/code> emerged as a Trojan capable of keylogging and backdoor functions, affecting Windows systems [12, 13].<\/p>\n\n\n\n<p>The first recognized spammer worm, <code>Sobig<\/code>, emerged in 2003, spreading via email and network shares [14]. Another major event in 2003 was the release of <code>Slammer<\/code>, which further illustrated how quickly malware could spread. Exploiting a buffer overflow vulnerability in Microsoft SQL Server 2000, <code>Slammer<\/code> managed to infect hundreds of thousands of systems in a matter of minutes, leading to widespread network congestion and denial of service [15]. Its ability to spread so rapidly earned it the nickname of the first &#8220;Warhol worm&#8221; [16], capable of infecting nearly the entire vulnerable Internet within 15 minutes. Figure 4 shows the UDP package sent by <code>Slammer<\/code> to compromise MS SQL servers. <code>Spybot<\/code>, the first peer-to-peer worm, also appeared in 2003 [17].<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"645\" src=\"https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/slammer-1024x645.png\" alt=\"\" class=\"wp-image-777\" srcset=\"https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/slammer-1024x645.png 1024w, https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/slammer-300x189.png 300w, https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/slammer-768x484.png 768w, https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/slammer.png 1242w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Figure 4. <code>Slammer<\/code> UDP package (source: <a href=\"https:\/\/slideplayer.com\/slide\/2010570\/\">SlidePlayer<\/a>)<\/figcaption><\/figure><\/div>\n\n\n<p>The 2000s also marked the beginning of malware specifically designed to create botnets, networks of compromised computers used for various malicious activities. <code>Blaster<\/code>, which also emerged in 2003, exploited a Windows vulnerability (specifically, in a DCOM RPC component) to launch DDoS attacks [18] (see Figure 5), while <code>Sasser<\/code>, in 2004, targeted another Windows vulnerability (specifically, the LSSASS service in Windows XP and Windows 2000 systems), leading to significant disruption despite not being intentionally destructive [19]. These worms were early examples of malware that sought to leverage a large number of infected systems to conduct coordinated attacks, a trend that would become increasingly prominent. Related to <code>Blaster<\/code>, it is worth also mentioning the non-malicious <code>Welchia<\/code>\/<code>Nachi<\/code> worm (classified as a <em>nematode<\/em>) aimed to remove <code>Blaster<\/code> infections while patching the vulnerable systems to prevent further infections.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"338\" height=\"151\" src=\"https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/blaster.png\" alt=\"\" class=\"wp-image-778\" srcset=\"https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/blaster.png 338w, https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/blaster-300x134.png 300w\" sizes=\"auto, (max-width: 338px) 100vw, 338px\" \/><figcaption class=\"wp-element-caption\">Figure 5: Hex dump of the <code>Blaster<\/code> worm, showing a message left by the programmer to Microsoft founder Bill Gates (source: <a href=\"https:\/\/en.wikipedia.org\/wiki\/Blaster_(computer_worm)\">Wikipedia<\/a>)<\/figcaption><\/figure><\/div>\n\n\n<p>Besides <code>Sasser<\/code>, the year 2004 also saw the emergence of <code>MyDoom<\/code>, which spread via email and the Kazaa P2P network, launching DDoS attacks and creating backdoors [20]. <code>Santy<\/code>, the first web worm, targeted phpBB forums, while <code>Witty<\/code>, the first high-propagation worm, targeted specific security systems [21, 22]. This era also saw the appearance of the first worms targeting non-PC environments. <code>Cabir<\/code>, which appeared in 2004, was the first worm to infect mobile phones and spread via Bluetooth connections to Symbian-based devices [23]. This marked the beginning of the malware spreading into new environments, paving the way for future attacks on mobile and IoT devices.<\/p>\n\n\n\n<p>In 2005, <code>Zotob<\/code> spread by exploiting a vulnerability in Windows 2000&#8217;s Plug and Play service, turning infected systems into part of botnets [24]. This year was also notable for the Sony BMG rootkit incident. To control the ripping and distribution of music, Sony implemented the <code>XCP rootkit<\/code> as a way to prevent a user from copying a music CD, while still allowing the CD to play as music [25]. <code>Brontok<\/code> also emerged this year, spreading via email and removable drives and causing DoS to specific websites such as PlayBoy or Israeli government-related websites [26].<\/p>\n\n\n\n<p>The first macOS-targeting worm, <code>Oompa<\/code> (or <code>Leap<\/code>), was released in 2006, spreading via iChat [27]. <code>Inqtana<\/code>, another macOS worm (technically speaking, classified as a <em>proof-of-concept worm<\/em>), exploited Bluetooth vulnerabilities [28], while <code>Stration<\/code> (also known as <code>Warezov<\/code>), another Windows worm, spread through email and removable drives, forming botnets [29]. <code>Tamiami<\/code> also appeared this year, and unlike the others, it was a Windows worm incorporating file-infecting behavior.<\/p>\n\n\n\n<p><code>Zhelatin<\/code>, a mass mailing worm from 2007, utilized a rootkit and keylogger, and infected systems became part of the &#8220;Storm Worm&#8221; botnet [30]. This year also saw the emergence of <code>Zeus<\/code>, a sophisticated banking Trojan that stole credentials via web browsers [31, 32] and would later become one of the most long-lived and damaging malware in history, responsible for significant financial losses and featuring prominently in several high-profile takedown operation (see Figure 6 to understand its infrastructure) [33].<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"760\" src=\"https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/Screenshot-2024-11-02-at-09.21.48-1024x760.png\" alt=\"\" class=\"wp-image-779\" srcset=\"https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/Screenshot-2024-11-02-at-09.21.48-1024x760.png 1024w, https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/Screenshot-2024-11-02-at-09.21.48-300x223.png 300w, https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/Screenshot-2024-11-02-at-09.21.48-768x570.png 768w, https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/Screenshot-2024-11-02-at-09.21.48.png 1150w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Figure 6: Infrastructure of GameOver Zeus botnet (source: &#8220;<a href=\"https:\/\/www.mecs-press.org\/ijcnis\/ijcnis-v14-n1\/IJCNIS-V14-N1-3.pdf\">A Bayesian Attack-Network Modeling Approach to Mitigating Malware-Based Banking Cyberattacks<\/a>&#8220;).<\/figcaption><\/figure><\/div>\n\n\n<p>In 2008, social networks experienced their first worm with <code>Koobface<\/code>, which initially targeted Facebook and later spread to Twitter and MySpace [33]. <code>Conficker<\/code> (also known as <code>Downadup<\/code> and <code>Kido<\/code>), another major worm, exploited the MS08-067 vulnerability, becoming the most widespread infection since <code>Slammer<\/code> [34]. In particular, exploiting the MS08-067 vulnerability in Windows (this vulnerability would also be exploited two years later by Stuxnet [35]), <code>Conficker<\/code> demonstrated how modern malware could spread at scale, affecting millions of computers worldwide. It represented a significant escalation in the level of sophistication and coordination seen in malware attacks, using advanced techniques such as domain generation algorithms to evade detection and ensure persistence. The impact of <code>Conflicker<\/code> was wide, reaching both home users and critical infrastructure, setting a precedent for the scale and severity of future cyber threats. This made a wake-up call for the cybersecurity community, highlighting the urgent need for better vulnerability management and cooperative defense strategies.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"724\" src=\"https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/image-1024x724.png\" alt=\"\" class=\"wp-image-780\" style=\"width:840px;height:auto\" srcset=\"https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/image-1024x724.png 1024w, https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/image-300x212.png 300w, https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/image-768x543.png 768w, https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/image-1536x1087.png 1536w, https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/image-2048x1449.png 2048w, https:\/\/reversea.me\/wp-content\/uploads\/2024\/11\/image-1440x1019.png 1440w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Figure 7: Spread of Conficker worm (source: <a href=\"https:\/\/en.wikipedia.org\/wiki\/Conficker\">Wikipedia<\/a>).<\/figcaption><\/figure><\/div>\n\n\n<p>And so the turbulent decade of the 2000s comes to an end! This decade saw malware evolve from simple viruses to highly effective self-replicating worms, culminating in <code>Conficker<\/code>, a worm that highlighted just how serious the threat landscape had become.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">References<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>The Virus Encyclopedia. Loveletter. [Online; <a href=\"http:\/\/virus.wikidot.com\/loveletter\">http:\/\/virus.wikidot.com\/loveletter<\/a>]. Accessed on February 10, 2023<\/li>\n\n\n\n<li>Enoch Root. ILOVEYOU: the virus that loved everyone. [Online; <a href=\"https:\/\/www.kaspersky.com\/blog\/cybersecurity-history-iloveyou\/45001\/\">https:\/\/www.kaspersky.com\/blog\/cybersecurity-history-iloveyou\/45001\/<\/a>], August 2022. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>Robert S. Mueller. Protecting the U.S. Economy in a Global Age. [Online; <a href=\"https:\/\/archives.fbi.gov\/archives\/news\/speeches\/protecting-the-u.s.-economy-in-a-global-age\">https:\/\/archives.fbi.gov\/archives\/news\/speeches\/protecting-the-u.s.-economy-in-a-global-age<\/a>], October 2003. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>Graham Cluley. Memories of the Anna Kournikova worm. [Online; <a href=\"https:\/\/grahamcluley.com\/memories-anna-kournikova-worm\/\">https:\/\/grahamcluley.com\/memories-anna-kournikova-worm\/<\/a>], February 2011. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>The Virus Encyclopedia. Sadmind. [Online; <a href=\"http:\/\/virus.wikidot.com\/sadmind\">http:\/\/virus.wikidot.com\/sadmind<\/a>]. Accessed on February 10, 2023<\/li>\n\n\n\n<li>The Virus Encyclopedia. Codered. [Online; <a href=\"http:\/\/virus.wikidot.com\/codered\">http:\/\/virus.wikidot.com\/codered<\/a>]. Accessed on February 10, 2023<\/li>\n\n\n\n<li>The Malware Wiki. Sadmind. [Online; <a href=\"https:\/\/malwiki.org\/index.php?title=Sadmind\">https:\/\/malwiki.org\/index.php?title=Sadmind<\/a>], February 2021. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>Ryan Permeh and Marc Maiffret. ANALYSIS: .ida \u201cCode Red\u201d Worm. [Online; <a href=\"https:\/\/web.archive.org\/web\/20110722192419\/http:\/\/www.eeye.com\/Resources\/Security-Center\/Research\/Security-Advisories\/AL20010717\">https:\/\/web.archive.org\/web\/20110722192419\/http:\/\/www.eeye.com\/Resources\/Security-Center\/Research\/Security-Advisories\/AL20010717<\/a>], July 2001. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>CERT Division. 2001 CERT Advisories. techreport DM17-0052, Carnegie Mellon University, 2017.<\/li>\n\n\n\n<li>The Malware Wiki. Klez. [Online; <a href=\"https:\/\/malwiki.org\/index.php?title=Klez\">https:\/\/malwiki.org\/index.php?title=Klez<\/a>], July 2021. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>The Mental Driller. Metamorphic Permutating High-Obfuscating Reassembler. [Online; <a href=\"http:\/\/dsr.segfault.es\/stuff\/website-mirrors\/29A\/29a-6\/29a-6.602\">http:\/\/dsr.segfault.es\/stuff\/website-mirrors\/29A\/29a-6\/29a-6.602<\/a>], February 2002. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>F-Secure. Mylife. [Online; <a href=\"https:\/\/www.f-secure.com\/v-descs\/mylife.shtml\">https:\/\/www.f-secure.com\/v-descs\/mylife.shtml<\/a>]. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>The Malware Wiki. Tanatos. [Online; <a href=\"https:\/\/malwiki.org\/index.php?title=Tanatos\">https:\/\/malwiki.org\/index.php?title=Tanatos<\/a>], February 2021. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>ANY.RUN. Malware History: Sobig. [Online; <a href=\"https:\/\/any.run\/cybersecurity-blog\/malware-history-sobig\/\">https:\/\/any.run\/cybersecurity-blog\/malware-history-sobig\/<\/a>], September 2020. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>F-Secure. Worm:W32\/Slammer. [Online; <a href=\"https:\/\/www.f-secure.com\/v-descs\/mssqlm.shtml\">https:\/\/www.f-secure.com\/v-descs\/mssqlm.shtml<\/a>]. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>Stuart Staniford, Vern Paxson, and Nicholas Weaver. How to Own the Internet in Your Spare Time. In <em>Proceedings of the 11th USENIX Security Symposium (USENIX Security 02)<\/em>, 2002<\/li>\n\n\n\n<li>The Malware Wiki. Spybot. [Online; <a href=\"https:\/\/malwiki.org\/index.php?title=Spybot\">https:\/\/malwiki.org\/index.php?title=Spybot<\/a>], May 2021. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>The Virus Encyclopedia. Blaster. [Online; <a href=\"http:\/\/virus.wikidot.com\/blaster\">http:\/\/virus.wikidot.com\/blaster<\/a>]. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>Duncan Macrae. Everything you need to know about the Sasser worm. [Online; <a href=\"https:\/\/techmonitor.ai\/technology\/cybersecurity\/everything-you-need-to-know-about-the-sasser-worm-4213147\">https:\/\/techmonitor.ai\/technology\/cybersecurity\/everything-you-need-to-know-about-the-sasser-worm-4213147<\/a>], April 2014. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>GetSupport. Mydoom: The Fascinating Story Behind the World\u2019s Fastest Computer Virus. [Online; <a href=\"https:\/\/www.getsupport.co.uk\/blog\/2021-10\/mydoom-the-fascinating-story-behind-the-worlds-fastest-computer-virus\/\">https:\/\/www.getsupport.co.uk\/blog\/2021-10\/mydoom-the-fascinating-story-behind-the-worlds-fastest-computer-virus\/<\/a>], October 2021. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>F-Secure. Net-Worm:W32\/Santy.A. [Online; <a href=\"https:\/\/www.f-secure.com\/v-descs\/santy_a.shtml\">https:\/\/www.f-secure.com\/v-descs\/santy_a.shtml<\/a>]. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>Bruce Schneier. The Witty worm: A new chapter in malware. [Online; <a href=\"https:\/\/www.computerworld.com\/article\/2565119\/the-wittyworm--a-new-chapter-in-malware.html\">https:\/\/www.computerworld.com\/article\/2565119\/the-wittyworm&#8211;a-new-chapter-in-malware.html<\/a>], June 2004. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>F-Secure. Bluetooth-Worm:SymbOS\/Cabir. [Online; <a href=\"https:\/\/www.f-secure.com\/v-descs\/cabir.shtml\">https:\/\/www.f-secure.com\/v-descs\/cabir.shtml<\/a>]. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>The Malware Wiki. Zotob. [Online; https:\/\/malwiki.org\/index.php?title=Zotob], June 2021. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>FSFE. Revisiting the Sony Rootkit. [Online; <a href=\"https:\/\/fsfe.org\/activities\/drm\/sony-rootkit-fiasco.en.html\">https:\/\/fsfe.org\/activities\/drm\/sony-rootkit-fiasco.en.html<\/a>]. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>The Malware Wiki. Brontok. [Online; <a href=\"https:\/\/malwiki.org\/index.php?title=Brontok\">https:\/\/malwiki.org\/index.php?title=Brontok<\/a>], June 2021. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>Rob Griffiths. Leap-A malware: what you need to know. [Online; <a href=\"https:\/\/www.macworld.com\/article\/178862\/leapafaq-2.html\">https:\/\/www.macworld.com\/article\/178862\/leapafaq-2.html<\/a>], February 2006. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>John Leyden. Mac OS X malware latches onto Bluetooth vulnerability. [Online; <a href=\"https:\/\/www.theregister.com\/2006\/02\/17\/macosx_bluetooth_worm\/\">https:\/\/www.theregister.com\/2006\/02\/17\/macosx_bluetooth_worm\/<\/a>], February 2006. Accessed on February 10, 2023.<br>TODO Checquear si este es de macos o de windows<\/li>\n\n\n\n<li>The Virus Encyclopedia. Stration. [Online; <a href=\"http:\/\/virus.wikidot.com\/stration\">http:\/\/virus.wikidot.com\/stration<\/a>]. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>The Virus Encyclopedia. Zhelatin. [Online; <a href=\"http:\/\/virus.wikidot.com\/zhelatin\">http:\/\/virus.wikidot.com\/zhelatin<\/a>]. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>Malwarebytes Labs. The life and death of the ZeuS Trojan. [Online; <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2021\/07\/the-life-anddeath- of-the-zeus-trojan\">https:\/\/www.malwarebytes.com\/blog\/news\/2021\/07\/the-life-anddeath-<br>of-the-zeus-trojan<\/a>], July 2021. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>Konstantinos P. Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Costas Vassilakis, and Stavros Shiaeles. Understanding and Mitigating Banking Trojans: From Zeus to Emotet. In <em>2021 IEEE International Conference on Cyber Security and Resilience (CSR)<\/em>, pages 121&#8211;128, 2021.<\/li>\n\n\n\n<li>FBI. GameOver Zeus Botnet Disrupted. [Online; <a href=\"https:\/\/www.fbi.gov\/news\/stories\/gameover-zeus-botnet-disrupted\">https:\/\/www.fbi.gov\/news\/stories\/gameover-zeus-botnet-disrupted<\/a>]. Accessed on November 2, 2024.<\/li>\n\n\n\n<li>The Malware Wiki. Koobface. [Online; <a href=\"https:\/\/malwiki.org\/index.php?title=Koobface\">https:\/\/malwiki.org\/index.php?title=Koobface<\/a>], April 2021. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>AVG South Africa. Conficker\/Downadup\/Kido worm infects over 9 Million PCs. [Online; <a href=\"https:\/\/www.itweb.co.za\/content\/JN1gP7O2BA5vjL6m\">https:\/\/www.itweb.co.za\/content\/JN1gP7O2BA5vjL6m<\/a>], March 2009. Accessed on February 10, 2023.<\/li>\n\n\n\n<li>Ralph Langner. Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Security &amp; Privacy, vol. 9, no. 3, pp. 49&#8211;51<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>And that&#8217;s it, folks! In this blog post, we&#8217;ve explored the adolescence of malware in the 2000s, a period marked by a shift towards self-replicating worms that exploited vulnerabilities in widely used software (especially, web servers), combining sophisticated propagation techniques, and causing significant economic damage. This era laid the frundwork for modern malware, emphasizing the growing importance of Internet security and the constant challenges in defending against rapidly evolving digital threats. In the next blog post, we&#8217;ll dive into malware&#8217;s adulthood starting in 2010, where sophisticated, targeted attacks, including ransomware and APTs, reshaped the threat landscape again. See you in the next blog post!<\/p>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 9<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>TL;DR: The 2000s witnessed the rapid evolution of malware into more aggressive worms that exploited software vulnerabilities to autonomously spread and cause significant disruption. Notable worms such as ILOVEYOU, Slammer, and Conficker leveraged social engineering, multi-vector propagation, and advanced evasion techniques. This era also marked the rise of botnets, large-scale distributed denial of service (DDoS) [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[28],"class_list":["post-759","post","type-post","status-publish","format-standard","hentry","category-malware","tag-malware","no-featured-image"],"_links":{"self":[{"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/posts\/759","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/comments?post=759"}],"version-history":[{"count":3,"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/posts\/759\/revisions"}],"predecessor-version":[{"id":781,"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/posts\/759\/revisions\/781"}],"wp:attachment":[{"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/media?parent=759"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/categories?post=759"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/tags?post=759"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}