YouTube: https://youtube.com/watch?v=DF8Ka8Jh0BQ
Previous: Why Does Garlic Ruin Dates?
Next: Why Are Octopi So Insanely Intelligent?

Categories

Statistics

View count:7,644,444
Likes:132,652
Comments:17,728
Duration:09:37
Uploaded:2016-06-26
Last sync:2024-10-03 23:45

Citation

Citation formatting is not guaranteed to be accurate.
MLA Full: "The 5 Worst Computer Viruses in History." YouTube, uploaded by SciShow, 26 June 2016, www.youtube.com/watch?v=DF8Ka8Jh0BQ.
MLA Inline: (SciShow, 2016)
APA Full: SciShow. (2016, June 26). The 5 Worst Computer Viruses in History [Video]. YouTube. https://youtube.com/watch?v=DF8Ka8Jh0BQ
APA Inline: (SciShow, 2016)
Chicago Full: SciShow, "The 5 Worst Computer Viruses in History.", June 26, 2016, YouTube, 09:37,
https://youtube.com/watch?v=DF8Ka8Jh0BQ.
Have you heard of some of the infamous computer viruses that rattled the digital world? Trust us—you do NOT want these bad boys on your computer. Join Michael Aranda and learn all about these nefarious viruses in this new episode of SciShow!
----------
Support SciShow by becoming a patron on Patreon: https://www.patreon.com/scishow
----------
Dooblydoo thanks go to the following Patreon supporters -- we couldn't make SciShow without them! Shout out to Justin Ove, Andreas Heydeck, Justin Lentz, Will and Sonja Marple, Benny, Chris Peters, Tim Curwick, Philippe von Bergen, Patrick, Fatima Iqbal, Lucy McGlasson, Mark Terrio-Cameron, Accalia Elementia, Kathy & Tim Philip, charles george, Kevin Bealer, Thomas J., and Patrick D. Ashmore.
----------
Like SciShow? Want to help support us, and also get things to put on your walls, cover your torso and hold your liquids? Check out our awesome products over at DFTBA Records: http://dftba.com/scishow
----------
Looking for SciShow elsewhere on the internet?
Facebook: http://www.facebook.com/scishow
Twitter: http://www.twitter.com/scishow
Tumblr: http://scishow.tumblr.com
Instagram: http://instagram.com/thescishow
----------
Sources:
Melissa:

http://www.networkworld.com/article/2235008/data-center/melissa-virus-turning-10------age-of-the-stripper-unknown-.html
https://www.sans.org/security-resources/idfaq/what-was-the-melissa-virus-and-what-can-we-learn-from-it/5/3
http://www.pandasecurity.com/mediacenter/malware/most-famous-virus-history-melissa/
https://www.f-secure.com/v-descs/melissa.shtml
http://www.cnn.com/TECH/computing/9904/02/melissa.arrest.03/index.html?eref=yahoo
http://www.nytimes.com/2002/05/02/nyregion/creator-of-melissa-virus-gets-20-months-in-jail.html

ILOVEYOU:

http://www.pcmag.com/article2/0,2817,2363172,00.asp
http://www.bbc.com/news/10095957
http://money.cnn.com/2000/05/05/technology/loveyou/
http://motherboard.vice.com/read/love-bug-the-virus-that-hit-50-million-people-turns-15

Slammer:

http://www.wired.com/2003/07/slammer/
https://www.f-secure.com/v-descs/mssqlm.shtml
http://www.icsi.berkeley.edu/pubs/networking/insidetheslammerworm03.pdf

Storm Worm:

https://www.symantec.com/security_response/writeup.jsp?docid=2001-060615-1534-99&tabid=2
http://www.informationweek.com/storm-worm-erupts-into-worst-virus-attack-in-2-years/d/d-id/1057418
http://krebsonsecurity.com/2010/04/infamous-storm-worm-stages-a-comeback/
https://www.schneier.com/blog/archives/2007/10/the_storm_worm.html

Mebroot/Torpig:

https://seclab.cs.ucsb.edu/media/uploads/papers/torpig.pdf
https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/your_computer_is_now_stoned.pdf
https://www.secureworks.com/research/top-banking-botnets-of-2013
http://news.bbc.co.uk/2/hi/technology/7701227.stm
https://css.csail.mit.edu/6.858/2009/readings/torpig.pdf


Images:
Servers: https://commons.wikimedia.org/wiki/File:Wikimedia_Servers-0051_18.jpg

 Introduction (00:00)



[SciShow intro plays]

This episode of SciShow might make you a little paranoid about computer viruses and internet security, but that's probably a good thing.

When we talk about a computer virus, we usually mean any kind of code that's designed to do harm and spread itself to more computers. They're created by malicious programmers who might want to use your computer to attack other targets, or make money by stealing your personal information. They could also just be trying to see how far their virus will spread.

Different viruses can affect Windows, Mac, and Linux computers and even the data servers that keep companies, and even the internet itself, running. Antivirus programs help, but they can have trouble dealing with threats they've never seen before. 
Over the years there have been thousands and thousands of viruses spread online, and they've caused billions of dollars of damage from lost productivity, wasted resources, and broken machines.

A few dozen of those viruses stand out. Some spread especially quickly, or affected a lot of people, or created a ton of damage all by themselves. Some did all of the above. Since a lot of viruses were very bad in a lot of different ways, it's hard to pick out which ones were objectively the worst. But, with that in mind, here are five of those extra destructive viruses. These are snippets of code that changed the way people thought about computer security, both the people designing the viruses, and the people trying to protect against them. 

 Melissa Virus (01:16


Say it's May 1999, you're an unsuspecting computer user who's never gotten a virus, let alone been trained to look for the signs that an email might be malicious. You get an email someone you know with a subject line that says it's an important message. The message inside just says "Here is that document you asked for...don't show anyone else ;)" with a winking emoticon. The attachment is a word document labelled "list", so you click on it because you're curious, and a lot of porn sites pop up. At this point you realize the email was probably some kind of virus, but it's too late. The first fifty people in your address book have already gotten a copy of the exact same email with a subject line saying the message is from you!

That was the Melissa Virus. It spread through Microsoft's Outlook email program and even though the attachment seemed like an innocent word document, it was able to infect computers because of something called a "macro." A macro is a specific kind of computer program that's used to create shortcuts. In word, they're meant to make it easier to edit a document. Instead of manually making a set of changes to the document one by one, a macro is a piece of code that will let you do it all with one click.
The problem is, that functionality gives macros a lot of power over your computer, so a macro that's actually a virus, like Melissa, takes advantage of that power using malicious code. In just a few days, Melissa spread to hundreds of thousands of computers. It didn't do any damage toothed computers themselves, but it did make email services slow way down, and cost companies about eighty million dollars overall. 
Eventually, IT professionals and antivirus programs put safeguards in place to stop the virus, both by preventing the emails from sending, and by keeping from reaching other people's inboxes if they did send.

The programmer behind the virus, David L. Smith, was caught about a week after Melissa was first released. He spent twenty months in prison, and paid a five thousand dollar fine.

Why "Melissa"? Apparently that was the name of a stripper he met in Florida. Melissa spread very quickly because of social engineering, it was designed to make people curious enough to open the attachment.

  The ILOVEYOU virus (3:00)


The ILOVEYOU virus, which spread about a year later, in May of 2000, was also successful because of social engineering. It reached around 45 million computers in just two days, and caused about $10 billion dollars in damage. The infected email had the subject line “ILOVEYOU”, and came with an attachment titled “love letter for you.txt”. When you clicked on the attachment, the virus would go through your system’s files, looking for media like documents, images, and audio files. Then it would overwrite them with copies of itself, so if you didn’t have your files backed up, you’d lose all your data. Meanwhile, the virus would send itself to everyone in your address book.

ILOVEYOU was a type of virus called a worm, which means that it was a standalone program that didn’t use a host program to run, the way Melissa used Microsoft Word. It looked like a text document, so opening it seemed relatively harmless, but the “love letter for you” file was actually a type of file called a visual basic script, which uses the file extension .vbs. Users couldn’t see the vbs at the end of the filename, though, because the Windows operating system they were using was hiding file extensions by default.

Visual basic scripts send your computer a list of instructions to execute. So if they’re meant to cause harm, they can be very dangerous, and do things like delete all of your files. Like Melissa, the ILOVEYOU worm was mostly contained after a few days. It was filtered out of people’s inboxes and companies released fixes for machines that had been infected. But plenty of damage had already been done. The virus was attributed to two programmers in the Philippines. But even though they were both arrested, they were released because at the time, there weren’t any laws against what they’d done.


 Slo Slammer (4:25)



ILOVEYOU showed just how easily, and quickly, a worm could spread, and how much damage it could do. On January 25, 2003, just before 6 AM, the internet broke. South Korea lost both internet and cell phone service. 300,000 people in Portugal couldn’t connect to the internet. Airlines couldn’t process tickets and had to cancel flights. Bank ATMs went down. 911 in Seattle had to start using paper to log calls. Even for a lot of devices that were still connected to the internet, the connections had become suddenly very slow, even by 2003 standards.

So what happened? As you can probably guess by now, all of this chaos was caused by a virus. But it wasn’t the kind of virus that spreads through email, or infects the sort of computer most people have at home. Slammer was a worm that targeted SQL servers, which store databases using a piece of Microsoft software called... Microsoft SQL [sequel] Server. It worked by taking advantage of a bug in the software: it sent the server a specially-formatted piece of code, one that looked like it was just an ordinary request for information, but actually reprogrammed the server to send out more copies of the same worm.

The worm spread faster than any other virus ever had, infecting 75,000 servers in just 10 minutes. Those servers were all sending requests to thousands of other servers, which couldn’t handle all the traffic. In all, millions of servers were affected, and the internet went kaput for a while. Slammer is thought to have caused about $1.2 billion in damage before it was stopped, and the programmer behind it was never caught. The whole mess could have been prevented, though. Six months earlier, Microsoft released a fix for the bug that Slammer exploited, but lots of people just hadn’t installed it yet.

  The 2007 Storm Worm (5:57)


The 2007 Storm Worm was another worm that spread through email. But its purpose wasn’t to destroy your computer or information, it wanted to take over your computer instead. The original subject line read “230 dead as storm batters europe,” which is where the virus gets its name. But instead of an attachment, the email contained a link to a website, which promptly downloaded the virus onto the user’s machine. And then... nothing happened. Or at least, nothing the user could see.

Storm Worm was designed to be as invisible as possible, so that you wouldn’t detect and destroy it. This way, it was able to use your computer to do all kinds of stuff in the background. The virus would connect your machine to what’s known as a bot-net, a collection of computers that form a network. A bot-net can do all kinds of things, from launching coordinated attacks that slow down or disable the web servers that keep a company going, to stealing passwords, banking, and identity information. But at first, the network didn’t actually do very much, it just grew.

Antivirus and IT companies knew it was there, but it was hard to stop it. For one thing, different machines in the network had different jobs. Only a small fraction of infected computers were in charge of spreading the virus. Another small set of computers served as the command-and-control centers, which sent out instructions and helped control the rest of the bot-net. The rest just followed those instructions. So even if you shut down most of the computers spreading the virus, the network would still be out there, doing its thing.

But it was hard to stop Storm Worm from spreading in the first place. Sure, it started out as an email about a storm in Europe, but soon there were emails with all kinds of different headlines. And since they were coming from someone in your address book, they seemed relatively innocent. To make matters worse, antivirus programs had trouble finding the virus on an infected machine. The code for Storm Worm was designed to change every half hour, so it always looked different. At its peak, the Storm Worm bot-net consisted of about 1.5 million machines.

The programmers didn’t seem to be using it for anything nefarious, though, they just sold the network to other criminals and scammers. After a while, companies did figure out how to stop the virus from spreading. They removed it from infected machines, and by late 2008, the bot-net was mostly gone. But, like with Slammer, the people behind it were never caught.


 Mebroot (7:50)



Mebroot is also a virus that slowly started to spread in 2007. And its main goal was also to hook you up to a bot-net, called Torpig. Both are especially sophisticated. Mebroot usually gets into your computer via a drive-by download, where you visit a malicious web page and the program downloads in the background without you even knowing it. From there, it overwrites what’s known as the Master Boot Record, the part of your computer’s hard drive that stores the instructions that tell your computer how to start up.

Being able to control the Master Boot Record gives mebroot a lot of power, because it can tell your computer what to do right from the start. And what it tells your computer, is to connect to the Torpig bot-net... which then steals all of your information. Torpig uses a spying technique known as Man-in-the-Browser, which is as creepy as it sounds. It lurks in your browser, logging everything you do and any private information you happen to enter. It’ll also try to actively steal information, using fake websites that look and behave exactly like the originals, but send the data to the Torpig servers instead. And all the while, you’d never know it was there. By late 2008, Torpig had stolen info connected to 500,000 bank accounts, and again, the people who created it haven’t been caught.


 Outro (8:50)



By now, you might be wondering whether a worm will make the internet go down tomorrow, or whether your computer is secretly part of a bot-net. And I don’t really blame you. There are things you can do to avoid getting viruses: install an antivirus program. Don’t click on suspicious links or emails from Nigerian princes. Keep your operating system and computer programs updated with the latest security patches. Computers are amazing, but they just do what they’re told, and when viruses tell them to do bad things, it can create a lot of damage.

Thanks for watching this episode of SciShow, brought to you by our patrons on Patreon. If you want to help support the show, just go to patreon.com/scishow. And don’t forget to go to youtube.com/scishow and subscribe!