Well-Known Computer Viruses and Their Spread
📑 10 slides
👁 22 views
📅 2/3/2026
Introduction to Computer Viruses
Computer viruses are malicious programs that infect systems.
2
ILOVEYOU Virus (2000)
- Spread via email with 'ILOVEYOU' subject line.
- Infected over 10 million computers globally.
- Attached file executed a script to overwrite files.
- Caused $15 billion in damages worldwide.
3
Melissa Virus (1999)
- Spread through infected Word document attachments.
- Auto-emailed itself to first 50 contacts in Outlook.
- Overloaded email servers, causing disruptions.
- Named after a stripper to lure users.
4
WannaCry Ransomware (2017)
- Exploited Windows vulnerability to encrypt files.
- Demanded Bitcoin payments to unlock data.
- Affected 200,000 systems across 150 countries.
- Hospitals and businesses were major targets.
5
Stuxnet Worm (2010)
- Targeted industrial control systems, especially Iran.
- Spread via USB drives and network vulnerabilities.
- Damaged nuclear centrifuges physically.
- First known cyberweapon with real-world impact.
6
MyDoom Virus (2004)
- Fastest-spreading email worm at its peak.
- Created backdoors for remote access to systems.
- Generated massive spam traffic to slow networks.
- Origins remain unknown, possibly criminal or state-sponsored.
7
CryptoLocker (2013)
- Encrypted user files and demanded ransom payments.
- Spread via phishing emails and malicious downloads.
- Victims paid over $3 million in ransoms.
- Led to improved cybersecurity awareness.
8
Zeus Trojan (2007)
- Stole banking credentials via keylogging.
- Spread through drive-by downloads and phishing.
- Targeted financial institutions worldwide.
- Created a massive botnet for criminal operations.
9
Preventing Virus Infections
- Use antivirus software and keep it updated.
- Avoid opening suspicious email attachments.
- Regularly backup important data offline.
- Educate users about phishing and safe browsing.
10
Conclusion & Key Takeaways
- Viruses exploit human behavior and system weaknesses.
- Different viruses use unique spreading methods.
- Prevention requires both technology and awareness.
- Stay informed to protect against evolving threats.
1 / 10