请输入您要查询的百科知识:

 

词条 Comparison of computer viruses
释义

  1. Scope

  2. Comparison of viruses and related programs

      Related lists    Unusual subtypes    Notable instances    Similar software    Security topics  

  3. See also

  4. References

  5. External links

{{distinguish|Timeline of computer viruses and worms}}{{update|date= January 2016}}

The compilation of a unified list of computer viruses is made difficult because of naming. To aid the fight against computer viruses and other types of malicious software, many security advisory organizations and developers of anti-virus software compile and publish lists of viruses. When a new virus appears, the rush begins to identify and understand it as well as develop appropriate counter-measures to stop its propagation. Along the way, a name is attached to the virus. As the developers of anti-virus software compete partly based on how quickly they react to the new threat, they usually study and name the viruses independently. By the time the virus is identified, many names denote the same virus.

Another source of ambiguity in names is that sometimes a virus initially identified as a completely new virus is found to be a variation of an earlier known virus, in which cases, it is often renamed. For example, the second variation of the Sobig worm was initially called "Palyh" but later renamed "Sobig.b". Again, depending on how quickly this happens, the old name may persist.

Scope

In terms of scope, there are two major variants: the list of "in-the-wild" viruses, which list viruses in active circulation, and lists of all known viruses, which also contain viruses believed not to be in active circulation (also called "zoo viruses"). The sizes are vastly different: in-the-wild lists contain a hundred viruses but full lists contain tens of thousands.

Comparison of viruses and related programs

VirusAlias(es)TypesSubtypeIsolation DateIsolationOriginAuthorNotes
1260V2PxDOSPolymorphic[1]1990First virus to use polymorphic encryption
4K4096DOS1990-01The first virus to use stealth
5loDOS1992-10Infects .EXE files only
AbraxasAbraxas5DOS,
Windows 95, 98
[1]1993-04EuropeARCV groupInfects COM file. Disk directory listing will be set to the system date and time when infection occurred.
AcidAcid.670, Acid.670a, Avatar.Acid.670, Keeper.Acid.670DOS,
Windows 95, 98
1992Corp-$MZUInfects COM file. Disk directory listing will not be altered.
AcmeDOS,
Windows 95 DOS
Upon executing infected EXE, this infects another EXE in current directory by making a hidden COM file with same base name.
ABCABC-2378, ABC.2378, ABC.2905DOS1992-10ABC causes keystrokes on the compromised machine to be repeated.
ActifedDOS
AdaDOS1991-10ArgentinaThe Ada virus mainly targets .COM files, specifically COMMAND.COM.
AGI-PlanMonth 4-6DOSMülheim an der Ruhr, GermanyAGI-Plan is notable for reappearing in South Africa in what appeared to be an intentional re-release.
AIDOS
AIDSAIDSB, Hahaha, TauntDOS1990Dr. Joseph PoppAIDS is the first virus known to exploit the DOS "corresponding file" vulnerability.
AIDS II
AlabamaAlabama.BDOS1989-10Hebrew University, JerusalemFiles infected by Alabama increase in size by 1,560 bytes.
Alcon[1]RSY, Kendesm, Ken&Desmond, EtherDOS1997-12Overwrites random information on disk causing damage over time.
Ambulance
Anna KournikovaE-Mail
VBScript
2001-02-11Sneek, NetherlandsJan de WitA Dutch court stated that US$166,000 in damages was caused by the worm.
ANTIANTI-A, ANTI-ANGE, ANTI-B, Anti-VariantMac OS1989-02FranceThe first Mac OS virus not to create additional resources; instead, it patches existing CODE resources.
AntiCMOSDue to a bug in the virus code, the virus fails to erase CMOS information as intended.
ARCV-nDOS1992-10/1992-11England, United KingdomARCV GroupARCV-n is a term for a large family of viruses written by the ARCV group.
BomberCommanderBomberDOSBulgariaPolymorphic virus which infects systems by inserting fragments of its code randomly into executable files.
BrainPakistani flu1986-01Lahore, PakistanBasit and Amjad Farooq AlviConsidered to be the first computer virus for the PC
Byte BanditAmiga, bootsector virus1988-01Swiss Cracking AssociationIt was one of the most feared Amiga viruses until the infamous Lamer Exterminator.
Christmas Tree
CIHChernobyl, SpacefillerWindows 95, 98, Me1998-06TaiwanTaiwanChen ing-HauActivates on April 26, in which it destroys partition tables, and tries to overwrite the BIOS.
CommwarriorSymbian Bluetooth wormFamous for being the first worm to spread via MMS and Bluetooth.
CreeperTENEX operating system1971Bob ThomasAn experimental self-replicating program which gained access via the ARPANET and copied itself to the remote system.
ElizaDOS1991-12
Elk ClonerApple II1982Mt. Lebanon, Pennsylvania, United StatesMt. Lebanon, Pennsylvania, United StatesRich SkrentaThe first virus observed "in the wild"
FormDOS1990SwitzerlandA very common boot virus, triggers on the 18th of any month.
GraybirdGraybird P
HareDOS,
Windows 95, Windows 98
1996-08Famous for press coverage which blew its destructiveness out of proportion
ILOVEYOU2000-05-05Manila, PhilippinesMichael Buen, Onel de GuzmanComputer worm that attacked tens of millions of Windows personal computers
INIT 1984Mac OS1992-03-13Malicious, triggered on Friday the 13th.
JerusalemDOS1987-10Jerusalem was initially very common and spawned a large number of variants.
Kama SutraBlackworm, Nyxem, and Blackmal2006-01-16Designed to destroy common files such as Microsoft Word, Excel, and PowerPoint documents.
KokoDOS1991-03The payload of this virus activates on July 29 and February 15 and may erase data on the users hard drive
Lamer ExterminatorAmiga, Boot sector virus1989-10GermanyRandom encryption, fills random sector with "LAMER"
MacMagDrew, Bradow, Aldus, Peace1987-12
MDEFGarfield, Top Cat1990-05
MelissaMailissa, Simpsons, Kwyjibo, KwejeeboMicrosoft Word macro virus1999-03-26New Jersey, United StatesDavid L. SmithPart macro virus and part worm. Melissa, a MS Word-based macro that replicates itself through e-mail.
MichelangeloDOS1991-02-04AustraliaRan March 6 (Michelangelo's birthday)
Navidad2000-12
NatasMultipartite, stealth, polymorphic1994"Priest"
nVIRMODM, nCAM, nFLU, kOOL, Hpat, JudeMac OS1987nVIR has been known to 'hybridize' with different variants of nVIR on the same machine.
OneHalfSlovak Bomber, Freelove or Explosion-IIDOS1994SlovakiaVyvojarIt is also known as one of the first viruses to implement a technique of "patchy infection"
Ontario.1024
Ontario.2048
OntarioSBCDOS1990-07Ontario, Canada"Death Angel"
Pikachu virus2000-06-28AsiaThe Pikachu virus is believed to be the first computer virus geared at children.
Ping-pong Boot, Bouncing Ball, Bouncing Dot, Italian, Italian-A, VeraCruz Boot sector virus Harmless to most computers
RavMonE.exeRJump.A, Rajump, JisxWorm2006-06-20Once distributed in Apple iPods, but a Windows-only virus
SCAAmiga, Boot sector virus1987-11SwitzerlandSwiss Cracking AssociationPuts a message on screen. Harmless except it might destroy a legitimate non-standard boot block.
ScoresEric, Vult, NASA, San Jose FluClassic Mac OS1988 SpringDesigned to attack two specific applications which were never released.
Scott's ValleyDOS1990-09Scotts Valley, California, United StatesInfected files will contain the seemingly meaningless hex string 5E8BDE909081C63200B912082E.
SevenDust666, MDEF, 9806, Graphics Accelerator, SevenDClassic Mac OS1998
Shankar's Virus.}}Marker{{Not a typo|.}}oPolymorphic1999-06-03Sam RogersInfects Word Documents
SimileEtap, MetaPHORWindowsPolymorphicThe Mental DrillerThe metamorphic code accounts for around 90% of the virus' code
SMEG engineDOSPolymorphic1994United KingdomThe Black BaronTwo viruses were created using the engine: Pathogen and Queeg.
Stoned1987Wellington, New ZealandOne of the earliest and most prevalent boot sector viruses
SundayDOSJerusalem.Sunday1989-11Seattle, Washington, United StatesBecause of an error in coding, the virus fails to execute its payload.
TDL-4BotnetJD virus
WhaleDOSPolymorphic1990-07-01Hamburg, GermanyR HomerAt 9216 bytes, was for its time the largest virus ever discovered.
ZMist.}}MistfallZombie.MistfallZ0mbieIt was the first virus to use a technique known as "code integration".

Related lists

  • List of computer worms
  • Timeline of computer viruses and worms

Unusual subtypes

  • Palm OS viruses
  • Linux malware

Notable instances

  • Conficker
  • Creeper virus - The first malware that ran on ARPANET
  • ILOVEYOU
  • Leap - Mac OS X Trojan horse
  • Shamoon a wiper virus with stolen digital certificates destroyed over 35,000 computers owned by Saudi Aramco.
  • Storm Worm - A Windows trojan horse that forms the Storm botnet
  • Stuxnet First destructive ICS-targeting Trojan which destroyed part of Iran's nuclear program. The virus destroyed the centrifuge components making it impossible to enrich uranium to weapons grade.

Similar software

  • Adware
  • Malware
  • Spamming
  • Spyware
  • Computer worm
  • Trojan horse

Security topics

  • Antivirus software
  • Computer insecurity
  • Cryptovirology
  • Security through obscurity
  • Cyberwarfare

See also

  • Computer worm
  • Spyware
  • Virus hoax
  • Zombie computer

References

1. ^{{cite news |url=http://www.spywareloop.com/news/computer-viruses|title=Computer Viruses in SpyWareLoop.com|author= Vincentas |newspaper=Spyware Loop |date=11 July 2013 |accessdate=28 July 2013}}

External links

  • [https://web.archive.org/web/20040203114836/http://www.wildlist.org/WildList/ The WildList], by WildList Organization International
  • List of Computer Viruses - listing of the Latest Viruses by Symantec.
  • List of all viruses All viruses cataloged in Panda Security’s Collective Intelligence servers.
{{Malware}}

2 : Computer viruses|Computing-related lists

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/22 11:37:20