Never Let Down Your Computer Virus Awareness

Operating in today’s internet shrouded atmosphere is getting to be like playing in one of those first person shooter video games where the most aware succeed and the oblivious become chowder. Everyone is at risk from the high profile business to the private user. Even government and industrial networks of various countries have taken big hits from an array of dangerous computer viruses to hit the internet since its inception.

So, indeed, you are in a sort of wild-west arena when you logon, an aptitude for recognizing threats has had to become a staple any business, government or private user can’t be without. Having a top of the line anti-virus software will go a long way towards creating your force field. However, you still have to possess the skill to maneuver around the computer bombs that are there if you “click it” and some, these days, don’t even require a “click”.

Protecting today’s on-line atmosphere is no short of big business. The hackers will keep on trying and the anti-virus companies will keep developing the revisions of their software to combat them. This threat, and its apparent, will always be out there. Hackers are getting more sophisticated and complex as the clock ticks as well. While it is unclear whether the powers that be thought in depth of the attacks that could happen, the launch of the internet was definitely the future. The earliest hacks and implementation of viruses no doubt, had to originate from an individual with an idea to cause havoc. This practice caught like wildfire and created some of the worst viruses in the short history of the internet.

From the early 1990’s on, dangerous and damaging viruses have shocked the world. Take the virus “NIMDA” for instance. In 2001, a week after the 9/11 attack, this virus affected millions of computers. NIMDA’s main thrust was to slow down Internet traffic resulting in widespread network shutdowns. Another, in 2006 was a malicious Trojan horse program called “Storm Worm”. Storm Worm   suckered users into clicking on a subject line in their email; “230 die as storm batters Europe”. Of course the subject line was a fraud and users clicked on the fake link which would enable the perpetrator offsite    to operate a PC remotely. They utilized this path to send spam throughout the Internet. It was estimated Storm Worm affected 10 million PCs.

In 1998, one of the most destructive of viruses came to play. The “CIH” or “Chernobyl virus” infected the Windows 95 and 98 executable file and remained in the machines memory. It would constantly infect other executables within the machine. It is estimated that the CIH virus caused 250 million worth of destruction. 1999 brought in a macro-virus called “Melissa” it was a mass mailer virus that activated in the machine when the user clicked on an email link. The email came from a known source so it would appear ok, especially when the title was ” here is the document you asked for don’t show anyone else “The virus would then immediately seek out the first 50 users listed in the the users Outlook address book and email itself to them. This virus was one of the first utilized in email attachment, “Melissa “caused an estimated $300-$600 million in damage.

And it went on, in 2003, the “SQL Slammer” or “Sapphire” virus targeted servers by generating random IP addresses and discharging itself  this worm affected many businesses, banks and community operations including significant services provided by Bank of America; Continental Airlines and Seattle’s 911 emergency system to name a few. Estimated losses were between 950 million and 1 .2 billion.

Others such as the “Code Red” virus in 2001 activated on July 13 of that year. This virus did not require you to open an email attachment. It simply needed an open Internet connection and then gave you an opening webpage that said “Hacked by Chinese”; it brought down an estimated 400,000 servers including the White House Web server. Its damaging effect is estimated $2.6 billion loss.  The “SobigF” virus got in machines by an email telling the user that they have a security issue, when opened the intruder sends itself and traps the entire address book. This virus replicated itself to the tune of infecting millions of PC’s world-wide. Damages were estimated in the 3-4 billion range.

The first on to do the most damage was the “My Doom” or “Novarg” virus. On 26 January 2000 this virus circled the globe via email swiftly and 152 million computers and countless servers went on the blip. Creation of a huge “denial of service attack” and crippled computer atmospheres causing damages worldwide estimated at 30 billion.

Recent dangerous viruses have been “Poison Ivy” a remote access Trojan were the perpetrator uses backdoor technology to infect the user’s computer .Once installed the perpetrator has control of everything including record audio and video. This virus targets personal information to compromise identities that were proven to be bought and sold globally. This included online banking, shopping, and social security number and birth information reaping.

Cornficker, in 200i is a worm that targeted stealing financial data. A   very complex, difficult to stop virus, Cornficker caused the creation of a coalition of experts decided to stop it.  It was also called “Superbug”. The fact that this virus got into where it wanted and was able to do just about everything stumped. Cornficker has reconfigured several times and each time its effects are more sophisticated. Incredibly, the perpetrators have designed it to track the efforts taken to eradicate it. .

We have a very unique responsibility, being “on-line”. The internet is, at this point, just like any town on the map. There are places to go; there are places not to go. There are places in the internet that you might have to go to that are laced with lurking hackers just waiting for users to make that fateful
“click”. A good part of the battle can be waged here by just being vigilant. While you’re doing your financials, the stock market, shopping and all the day-to-day things that technology has provided you with that “one touch” to get to.

While aptitude to recognizing the “baddies” out there is a strong first suite, you’ll need help. The root of your defense lies in making sure you have a good Anti-Virus program, making sure it is always running and also your virus database is updated very often. Most of the anti-virus software out there has options for making all these concerns automatic. If you do, make sure you check they are all running as scheduled periodically. There are viruses that serve as precursors to bigger threats. What they do is literally turn-off all your anti-virus mechanisms without you knowing it until it’s too late.

So, be careful out there in your computing. Learn the signs that there is something amiss and act on it before taking another click. Once you get to know the common “this doesn’t look right” occurrence, the harder ones to recognize will be more understandable. One tip here, personnel users (because most businesses will not let users do this) DO NOT download any .EXE (executable) program or file without running it through the scanner. You might just be saving your computers life.


Brian J. Schweikert “Never Let Down Your Computer Virus Awareness”

Sabre88 LLC. N.p., Web. 19 October. 2016.

Editor’s note: Original Sources;