Something wicked: The 10 scariest computer viruses of all time

 

Connecting state and local government leaders

These 10 doses of malware caused nightmares, and a few changed the world.

The dreary winter months are approaching, and little ghosts and goblins are starting to crawl from their haunts. With the spooky Halloween season about to get into full swing, we thought we might help get into the mood with a look at the 10 most frightening viruses of all time.

Hide your hard drives, lock up your files and make sure your AV shields are at maximum power as we enter…the dark realm of computer programs gone bad.

10. It Came From Above! OK, so the virus that showed up in ground systems connected with the U.S. fleet of combat drones probably isn’t going to be much of a danger to anyone’s PC. But we’re talking scary, and it’s the thought that counts: The thought of malicious code connected even with ground systems involved with so much destructive power is enough to put a little lump in the back of your throat. A typical virus might erase your e-mail. But if UAVs themselves ever got infected, they could put a hellfire missile up your tailpipe.

9. The Creeper. Even the name is scary. Creeper wasn’t actually all that malignant, and it only affected TENEX operating systems in the 1970s. But it was the first real worm, and a program with an even scarier name, the Reaper, was created to kill it. Don’t fear the reaper? If you were a bit of Creeper code, you probably would.

8. The Undead. As Stephen King once said, sometimes they come back. Stoned.Angelina had a relatively minor history of destruction back in 1994, and the anti-virus programs of the time wiped it out rather easily, or so we thought. But instead of going quietly, it hid buried on floppy disks and eventually in the darkest corners of the Internet, watching and waiting for a sign. That sign was Windows Vista. Suddenly, in 2007, Stoned.Angelina came back to infect more than 100,000 PCs running the new operating system. Microsoft’s Vista just happened to have the same flaw that the undead virus had exploited before, and it came roaring back to life like a zombie from a B-grade horror movie. It was quickly destroyed after its second big splash — or so we think. (Insert evil laughter now.)

7. Nuclear Terrorism, For Good? Stuxnet probably didn’t affect anyone reading this article. It was a virus allegedly created by the U.S. government — or Israel, but to date it’s all speculation — to do one thing: cripple the Iranian nuclear program. Stuxnet probably affected 20 computers at most in the entire world. It found systems running a Siemens programmable logic controller, which is used only in heavy industrial applications, most notably with centrifuges for nuclear materials. It causes the engine to rotate at the wrong speed, which breaks the machines and ruins their work. There are those who say that hurting Iran’s nuclear ambitions is a good thing, and I’ll not argue with them, but any virus that messes with nukes isn’t all that safe. We all know where the road paved by good intentions leads…

6. Beauty and the Beast. You all know the tale of Medusa. She looked pretty from a distance but when you got close a bunch of snakes came out and she looked so horrible that it turned people to stone. That was the principle behind the Anna Kournikova virus in 2001. E-mail would be delivered that offered a picture of the tennis beauty. But what really happened was that a worm was installed on your computer. When most people want to see Anna Kournikova, that desire is coming from a completely different part of the brain than the fear center — at least I hope. Mixing the two just seems wrong, unless you’re watching one of those terribly bad slasher flicks.

5. Horrible B.O. Back Orifice is not really a virus per se, but it’s close enough and damaging enough that it makes the list at our halfway point of scary programs. It basically gives remote access privileges to someone at another computer. On the surface, this could actually be a good thing, if you are say, trying to provide tech support to your grandmother. But programs that install BO maliciously without a user’s knowledge  are the problem. Once inside your system, the controller can do anything they want short of making you cluck like a chicken.

4. Merry Frickin’ Christmas. OK, wrong holiday, but it brings up a not-so-nice greeting card many people received in December of 1987. The Christmas Tree EXEC program paralyzed a lot of internal networks. When an infected computer booted up, a crude Christmas tree was drawn on their screens. The program told people not to worry and to simply type "Christmas." But that actually launched part of the worm, which sent itself to a user’s contact list. So much for peace and love over the holidays. Little known fact: The virus was actually called CHRISTMA, because IBM PCs only supported eight-character file names at the time. So Merry Christma, everyone!

3. Red Alert! Now we are getting truly scary, as in viruses that affected computers on a massive global scale. This is not on par with a typical zombie outbreak. These next viruses are full-scale "War of the Worlds" stuff. The Code Red virus was one of the first to successfully target Web servers running IIS in 2001. Leaving individual users largely untouched, it sought bigger prey. And it did very well, infecting over 350,000 computers at its peak. It did different things on different days of the month, but from the 20th through the 27th, it was programmed to attack fixed IP addresses, including that of the White House. And it defaced websites, adding “Hacked By the Chinese!” to their main pages. This may be one instance where the Chinese were not actually responsible for an Internet hacking, as the culprit was never found. The world may never know.

2. My Not-So-Sweet Melissa. The Allman Brothers liked to sing about sweet Melissa, but they probably didn’t have the Melissa virus of 1999 in mind. Named after a two-toed sloth at the New York Zoo, probably one of the least frightening animals on Earth, the Melissa virus was not really a true virus, but it sure caused more damage than almost any other. Spread by e-mail, it simply sent itself to the first 50 addresses in a user’s contact list. And then they sent it the first 50 on each of those contact lists, often going back to the original person. And so on and so on through new users and loops of the same users until mail servers worldwide ground to a halt under the strain. In several locations, the still-young Internet lost its ability to send e-mail. In this case, the hacker, David L. Smith, was caught and convicted. He got 10 years in prison but was released after 20 months and agreed to help the FBI track down Jan de Wit, the infamous creator of the No. 6 scary virus on our list, the Anna Kournikova worm.

1. You Give Love A Bad Name. The worst virus of all time used a power that has conquered and baffled humans since the beginning of time: love. Everybody wants to be loved, and an e-mail from a secret admirer is a nice surprise, right? Not when it’s really the I Love You virus, which racked up an impressive kill tally of tens of millions of computers in the year 2000. 

This killer virus had it all. It was self-replicating. It enticed users with social engineering tools to open it up. It made very bad changes to computers that prevented them from working properly. It copied parts of itself to the root directories of systems to prevent removal. It caused 5 billion dollars in damages and forced the CIA and the Pentagon to turn off their e-mail systems to keep them safe from the infection, like the last stage of some horrible outbreak movie.

It was the star of the nightly news, getting top-story billing nearly every day for weeks. A massive global investigation led to the arrest of two students from the Philippines who unsuccessfully tried to destroy evidence by dumping computers into a canal near their house. However, because virus writing was not technically illegal in the Philippines at the time, they were released without charge. And that might be the scariest fact of all!  

 

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.