Well-Known Computer Viruses and Their Spread

📑 10 slides 👁 22 views 📅 2/3/2026
0.0 (0 ratings)

Introduction to Computer Viruses

Computer viruses are malicious programs that infect systems.

Introduction to Computer Viruses
2

ILOVEYOU Virus (2000)

  • Spread via email with 'ILOVEYOU' subject line.
  • Infected over 10 million computers globally.
  • Attached file executed a script to overwrite files.
  • Caused $15 billion in damages worldwide.
ILOVEYOU Virus (2000)
3

Melissa Virus (1999)

  • Spread through infected Word document attachments.
  • Auto-emailed itself to first 50 contacts in Outlook.
  • Overloaded email servers, causing disruptions.
  • Named after a stripper to lure users.
Melissa Virus (1999)
4

WannaCry Ransomware (2017)

  • Exploited Windows vulnerability to encrypt files.
  • Demanded Bitcoin payments to unlock data.
  • Affected 200,000 systems across 150 countries.
  • Hospitals and businesses were major targets.
WannaCry Ransomware (2017)
5

Stuxnet Worm (2010)

  • Targeted industrial control systems, especially Iran.
  • Spread via USB drives and network vulnerabilities.
  • Damaged nuclear centrifuges physically.
  • First known cyberweapon with real-world impact.
Stuxnet Worm (2010)
6

MyDoom Virus (2004)

  • Fastest-spreading email worm at its peak.
  • Created backdoors for remote access to systems.
  • Generated massive spam traffic to slow networks.
  • Origins remain unknown, possibly criminal or state-sponsored.
MyDoom Virus (2004)
7

CryptoLocker (2013)

  • Encrypted user files and demanded ransom payments.
  • Spread via phishing emails and malicious downloads.
  • Victims paid over $3 million in ransoms.
  • Led to improved cybersecurity awareness.
CryptoLocker (2013)
8

Zeus Trojan (2007)

  • Stole banking credentials via keylogging.
  • Spread through drive-by downloads and phishing.
  • Targeted financial institutions worldwide.
  • Created a massive botnet for criminal operations.
Zeus Trojan (2007)
9

Preventing Virus Infections

  • Use antivirus software and keep it updated.
  • Avoid opening suspicious email attachments.
  • Regularly backup important data offline.
  • Educate users about phishing and safe browsing.
Preventing Virus Infections
10

Conclusion & Key Takeaways

  • Viruses exploit human behavior and system weaknesses.
  • Different viruses use unique spreading methods.
  • Prevention requires both technology and awareness.
  • Stay informed to protect against evolving threats.
Conclusion & Key Takeaways
1 / 10