The Cloud Consultancy Europe Ltd.
+44 (0) 203 637 6667 [email protected]

We’ve already discussed some of the current malware threats looming large today. But there is a long, storied history of malware, dating back to infected floppy disks swapped by Apple II hobbyists in the 1980s and the Morris Worm spreading across Unix machines in 1988. Some of the other high-profile malware attacks have included:

ILOVEYOU, a worm that spread like wildfire in 2000 and did more than $15 billion in damage

SQL Slammer, which ground internet traffic to a halt within minutes of its first rapid spread in 2003

Conficker, a worm that exploited unpatched flaws in Windows and leveraged a variety of attack vectors – from injecting malicious code to phishing emails – to ultimately crack passwords and hijack Windows devices into a botnet.

Zeus, a late ’00s keylogger Trojan that targeted banking information

CryptoLocker, the first widespread ransomware attack, whose code keeps getting repurposed in similar malware projects

Stuxnet, an extremely sophisticated worm that infected computers worldwide but only did real damage in one place: the Iranian nuclear facility at Natanz, where it destroyed uranium-enriching centrifuges, the mission it was built for by U.S. and Israeli intelligence agencies

Source: CSO

PROTECT YOUR OFFICE 365 DATA FROM A MALWARE ATTACK WITH SAAS PROTECTION