Cybersecurity
Cybersecurity
I
Table of Content
1 The history of computer security.............................................................1
1.1 Initial Concerns and Military Origins (1950s-1960s).....................1
1.2 The Birth of ARPANET and Multics (1960s-1970s).....................1
1.3 The Orange Book and Formalization of Security Standards
(1970s-1980s).......................................................................................2
1.4 Rise of Hacker Culture and Public Awareness (1980s).................2
1.5 Emergence of Viruses and Worms (Late 1980s)............................2
1.6 Legal and Organizational Responses (1990s)................................3
1.7 Modern Developments in Cybersecurity (2000s to Present)..........3
2. Real cases of malware attacks................................................................3
2.1 Spyware ........................................................................................3
2.2 Trojan Horse..................................................................................4
2.3 computer worm ............................................................................6
2.4 Rootkit malware ...........................................................................7
2.5 The ILOVEYOU malware...........................................................10
3. famous cyber security problems...........................................................10
4. Most known and infamous ransomware programs...............................12
3. most common types of computer viruses.............................................13
Conclusion................................................................................................15
Reference..................................................................................................17
I
1 The history of computer security
The foundation of computer security can be traced back to the late 1950s
and early 1960s, primarily driven by military and research needs. As
computers evolved into tools for storing and processing sensitive data,
particularly within the U.S. Department of Defense, there was a growing
recognition of the need for robust security measures. Early mainframes
required mechanisms to control access and protect data from
unauthorized users.
The 1980s witnessed the rise of hacker culture, which brought both
challenges and advancements in computer security. The release of the
movie "WarGames" in 1983 brought the issue of hacking into the public
spotlight, highlighting the potential dangers of computer security
breaches. Notable figures such as Kevin Mitnick demonstrated the
vulnerabilities within computer systems, prompting the technology
community to develop more robust security practices and solutions.
A major turning point came in 1988 with the release of the Morris Worm,
created by Robert Tappan Morris, a graduate student at Cornell
University. The worm spread across ARPANET, causing significant
disruption and underscoring the need for better security measures. This
incident catalyzed the creation of antivirus software and network
monitoring tools, marking a significant advancement in the field of
computer security.
2
1.6 Legal and Organizational Responses (1990s)
In the 1990s, the rapid integration of the internet into daily life prompted
significant legislative and organizational responses. The United States
passed the Information Infrastructure Protection Act in 1996, one of the
first laws to address cybercrimes comprehensively. This period also saw
the establishment of dedicated cybersecurity organizations, such as the
Computer Emergency Response Team (CERT) at Carnegie Mellon
University, which was founded in 1988 in response to the Morris Worm
incident.
2.1 Spyware
3
information is then sent to advertisers, data collection firms, or
malicious third parties for a profit.
Spyware is one of the most common threats on the internet. It was
more commonly installed in Windows desktop browsers, but has
evolved to operate on Apple computers and mobile phones as well.
Mobile spyware attacks have become much more common and
advanced as people rely on their phones to conduct banking activities
and access other sensitive information. However, not all software that
tracks online activity is malicious. For example, some website
tracking cookies can serve as a legitimate function to customize a
user’s website experience by remembering login information.
4
Exploit Trojan: As the name implies, these Trojans identify and
exploit vulnerabilities within software applications in order to gain
access to the system.
Downloader Trojan: This type of malware typically targets
infected devices and installs a new version of a malicious program
onto the device.
Ransom Trojan: Like general ransomware, this Trojan malware
extorts users in order to restore an infected device and its contents.
Backdoor Trojan: The attacker uses the malware to set up access
points to the network.
Distributed Denial of Service (DDoS) attack Trojan: Backdoor
Trojans can be deployed to multiple devices in order to create a
botnet, or zombie network, that can then be used to carry out
a DDoS attack. In this type of attack, infected devices can access
wireless routers, which can then be used to redirect traffic or flood
a network.
Fake AV Trojan: Disguised as antivirus software, this Trojan is
actually ransomware that requires users to pay fees to detect or
remove threats. Like the software itself, the issues this program
claims to have found are usually fake.
Rootkit Trojan: This program attempts to hide or obscure an
object on the infected computer or device in order to extend the
amount of time the program can run undetected on an infected
system.
SMS Trojan: A mobile device attack, this Trojan malware can
send and intercept text messages. It can also be used to generate
revenue by sending SMS messages to premium-rate numbers.
Banking Trojan or Trojan Banker: This type of Trojan
specifically targets financial accounts. It is designed to steal data
5
related to bank accounts, credit or debit cards or other electronic
payment platforms.
Trojan GameThief: This program specifically targets online
gamers and attempts to access their gaming account credentials.
6
2.4 Rootkit malware
Types of rootkits
Firmware rootkits
7
Examples of firmware rootkits include:
UEFI rootkit
Cloaker
VGA rootkit
Bootloader rootkits
8
Examples of bootloader rootkits include:
Stoned Bootkit
Olmasco
Rovnix
Virtualized rootkits
Unlike kernel mode rootkits, which boot up at the same time the
targeted system boots up, a virtualized rootkit boots up before the
operating system boots up. Virtualized rootkits take hold deep in the
computer and are extremely difficult – or even impossible – to
remove.
Vanquish
Hacker Defender
Aphex
Memory rootkits
9
Memory rootkits load into the RAM, so they persist only until the
RAM is cleared when the system is restarted. While active, their
malicious activities consume the targeted system’s resources and thus
reduce the performance of its RAM memory.
10
NotPetya (2017): Initially appearing as ransomware, NotPetya was
actually a wiper malware designed to destroy data. It spread rapidly
through a Ukrainian accounting software, affecting global companies
like Maersk and FedEx. The attack caused billions of dollars in
damages and highlighted the risks of supply chain vulnerabilities
SolarWinds Attack (2020): This sophisticated cyber-espionage
campaign involved the compromise of the SolarWinds Orion
software, which was used by numerous government agencies and
Fortune 500 companies. The attackers inserted malicious code into a
software update, allowing them to spy on and steal data from affected
organizations
Colonial Pipeline Ransomware Attack (2021): A ransomware
attack on Colonial Pipeline, a major US fuel pipeline operator, led to
a temporary shutdown of operations, causing fuel shortages and price
spikes. The attack was attributed to the DarkSide ransomware group,
which demanded a ransom in cryptocurrency
Microsoft Exchange Server Hack (2021): This attack exploited
vulnerabilities in Microsoft Exchange Server, allowing hackers to
access email accounts and install malware. It affected tens of
thousands of organizations worldwide and was attributed to a state-
sponsored group from China
Log4Shell Vulnerability (2021): A critical vulnerability in the
widely-used Log4j logging library was discovered, which allowed
attackers to execute arbitrary code on affected systems. This
vulnerability had a massive impact, as Log4j is used in countless
applications and services
Ivanti VPN Breach (2024): A widespread compromise of Ivanti
VPNs impacted several U.S. government agencies. The breach
11
highlighted the ongoing vulnerabilities in remote access solutions and
the need for robust security measures
Change Healthcare Ransomware Attack (2024): This attack on
UnitedHealth-owned Change Healthcare caused massive disruption in
the U.S. healthcare system, preventing many pharmacies and
hospitals from processing claims and receiving payments. The
attackers demanded a $22 million ransom
12
Ryuk (2018): This ransomware targeted large organizations,
including hospitals and newspapers, by encrypting critical files and
demanding high ransom payments. Ryuk is known for its targeted
attacks and has caused millions of dollars in damages
Cerber (2016): Cerber is a ransomware-as-a-service (RaaS) platform
that allowed cybercriminals to use its infrastructure to launch attacks.
It encrypted files with AES-256 and demanded ransom payments in
Bitcoin. Cerber was highly effective and generated significant
revenue for its creators
Sodinokibi (REvil) (2019): This ransomware targeted businesses and
demanded large ransoms, often threatening to release stolen data if
the ransom was not paid. Sodinokibi was responsible for several high-
profile attacks, including the Kaseya VSA supply chain attack
Boot Sector Virus: This type of virus targets the master boot record
(MBR) of a computer. It is typically spread through infected USB
drives or other removable media. Boot sector viruses are notoriously
difficult to remove because they activate before the operating system
loads
Polymorphic Virus: Polymorphic viruses can change their code or
signature patterns each time they infect a new system, making them
difficult to detect with traditional antivirus software. They use
encryption and decryption techniques to evade detection
Resident Virus: These viruses embed themselves in a computer's
memory, allowing them to infect any file that is accessed by the
13
system. Resident viruses can be particularly destructive because they
remain active even after the original source of infection is removed
Multipartite Virus: This type of virus can infect multiple parts of a
system, such as the boot sector and executable files, simultaneously.
Multipartite viruses can spread quickly and are challenging to
eradicate because they attack different areas of the system
Macro Virus: Macro viruses are written in the macro language of
applications like Microsoft Word or Excel. They are typically spread
through infected documents and can execute malicious actions when
the document is opened
File Infector Virus: These viruses attach themselves to executable
files (.exe) and spread when the infected file is run. File infector
viruses can corrupt or delete files, making them a significant threat to
data integrity
14
Conclusion
15
Famous cybersecurity problems and events include the 2011 Sony
PlayStation Network breach, which exposed the data of 77 million users;
the 2015 Ukraine power grid attack, which caused a blackout for over
230,000 residents; and the 2017 Equifax data breach, which compromised
the personal information of 147 million people.
Infamous ransomware programs have caused significant disruption and
financial loss. Examples include CryptoLocker (2013), which encrypted
files and demanded ransom for decryption keys; WannaCry (2017),
which spread rapidly and affected critical infrastructure; and NotPetya
(2017), which initially appeared as ransomware but was designed to wipe
data, causing widespread damage.
16
Reference
https://cybermagazine.com/cyber-security/history-cybersecurity
https://link.springer.com/chapter/10.1007/978-1-4302-6383-8_2
https://www.csoonline.com/article/572911/11-infamous-malware-attacks-
the-first-and-the-worst.html
https://gatefy.com/blog/real-and-famous-cases-malware-attacks/
https://www.digitalguardian.com/blog/biggest-moments-cybersecurity-
history-past-10-years
https://nordvpn.com/blog/ransomware-examples/
https://www.csoonline.com/article/570361/the-worst-and-most-notable-
ransomware.html
https://wonderfulengineering.com/7-most-common-types-of-computer-
viruses/
https://www.csoonline.com/article/572901/9-types-of-computer-virus-
and-how-they-do-their-dirty-work.html
17