{"id":22020,"date":"2021-07-10T18:01:48","date_gmt":"2021-07-10T10:01:48","guid":{"rendered":"https:\/\/www.hongkiat.com\/blog\/?p=22020"},"modified":"2023-09-04T19:56:06","modified_gmt":"2023-09-04T11:56:06","slug":"famous-malicious-computer-viruses","status":"publish","type":"post","link":"https:\/\/www.hongkiat.com\/blog\/famous-malicious-computer-viruses\/","title":{"rendered":"10 Deadliest Computer Viruses of All Time"},"content":{"rendered":"<p><strong>Experiencing a Computer Virus<\/strong> is something many users have faced at one point or another. For most, it\u2019s a minor inconvenience that calls for a <a target=\"_blank\" href=\"https:\/\/www.hongkiat.com\/blog\/fix-prevent-pc-virus-infections\/\" rel=\"noopener\">system cleanup<\/a> and the overdue installation of that <a href=\"https:\/\/www.hongkiat.com\/blog\/antivirus-software-mac\/\">antivirus software<\/a> you\u2019ve been planning to set up.<\/p>\n<p>However, in some instances, <strong>the impact can be devastating<\/strong>, rendering your computer an expensive paperweight that no antivirus software can salvage.<\/p>\n<p>In this article, we\u2019ll spotlight some of the most damaging and notorious computer viruses that have <strong>inflicted real-world harm<\/strong>. We\u2019re broadening our scope to include general malware like worms and trojan horses, as these have also caused significant damage, amounting to billions of dollars and affecting essential infrastructure.<\/p>\n<p>Let\u2019s dive into the <strong>10 most notorious and harmful computer viruses<\/strong> you should know about.<\/p>\n<div class=\"ref-block ref-block--post\" id=\"ref-post-1\">\n\t\t\t\t\t<a href=\"https:\/\/www.hongkiat.com\/blog\/pc-compromised-signs\/\" class=\"ref-block__link\" title=\"Read More: 10 Signs Your PC Has Been Compromised\" rel=\"bookmark\"><span class=\"screen-reader-text\">10 Signs Your PC Has Been Compromised<\/span><\/a>\n<div class=\"ref-block__thumbnail img-thumb img-thumb--jumbo\" data-img='{ \"src\" : \"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/pc-compromised-signs.jpg\" }'>\n\t\t\t\t\t\t\t<noscript>\n<style>.no-js #ref-block-post-19993 .ref-block__thumbnail { background-image: url(\"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/pc-compromised-signs.jpg\"); }<\/style>\n<\/noscript>\n\t\t\t\t\t\t<\/div>\n<div class=\"ref-block__summary\">\n<h4 class=\"ref-title\">10 Signs Your PC Has Been Compromised<\/h4>\n<p class=\"ref-description\">\n\t\t\t\t\t\tWe are all tired of our PC getting infected or compromised but truth is sometimes, instead of having...\t\t\t\t\t\t<span>Read more<\/span><\/p>\n<\/div>\n<\/div>\n<h2>1. The ILOVEYOU Virus<\/h2>\n<p>This virus caused chaos worldwide, inflicting an estimated <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.cnet.com\/tech\/tech-industry\/experts-estimate-damages-in-the-billions-for-bug\/\">$10 billion<\/a> in damages. It\u2019s believed that 10% of the world\u2019s computers were infected. The situation was so dire that governments and large corporations had to take their <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/web.archive.org\/web\/20070923005429\/http:\/\/news.zdnet.com\/2100-9595_22-520435.html?\">email systems offline<\/a> to prevent further spread.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/famous-malicious-computer-viruses\/iloveyou.jpg\" alt=\"ILOVEYOU virus\" width=\"500\" height=\"281\"><\/figure>\n<p>The virus was the work of two Filipino programmers, Reonel Ramones and Onel de Guzman. It <strong>leveraged social engineering<\/strong> to trick people into opening an attachment that appeared to be <strong>a love confession<\/strong>. However, the attachment was actually a malicious script disguised as a TXT file.<\/p>\n<p>Once activated, the virus would send itself to everyone in the user\u2019s email list and overwrite files, rendering the computer unusable. The creators were <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.nytimes.com\/2000\/08\/22\/business\/technology-philippines-to-drop-charges-on-e-mail-virus.html\">never prosecuted<\/a> due to a lack of relevant laws at the time, which <strong>led to the introduction of the E-Commerce Law<\/strong>.<\/p>\n<h2>2. The Code Red Worm<\/h2>\n<p>The Code Red worm emerged in 2001 and was discovered by two eEye Digital Security employees. It was <a rel=\"nofollow\" href=\"https:\/\/web.archive.org\/web\/20070104233539\/http:\/\/research.eeye.com\/html\/advisories\/published\/AL20010717.html\">named Code Red<\/a> as the discoverers were <strong>consuming Code Red Mountain Dew<\/strong> at the time.<\/p>\n<p>This worm <strong>targeted systems with Microsoft\u2019s IIS web server installed<\/strong>, exploiting a buffer overflow vulnerability. Remarkably, it operated entirely in memory and was just 3,569 bytes in size.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/famous-malicious-computer-viruses\/code-red.jpg\" alt=\"Code Red worm\" width=\"500\" height=\"366\"><\/figure>\n<p>Upon infection, the worm would replicate itself excessively due to a programming bug, consuming significant system resources. It then launched denial-of-service attacks on various IP addresses, including a notable <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.extremetech.com\/extreme\/50104-code-red-virus-attacking-white-house\">attack on the White House website<\/a>, and enabled remote access to the affected server.<\/p>\n<p>The worm became infamous for the message it displayed on compromised web pages: <strong>\u201cHacked By Chinese!\u201d<\/strong>. A patch was eventually released, but not before it <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.zdnet.com\/article\/the-cost-of-code-red\/\">cost<\/a> an estimated $2 billion in lost productivity, affecting 1-2 million servers out of 6 million IIS servers at the time.<\/p>\n<h2>3. The Melissa Virus<\/h2>\n<p>Named after an exotic dancer from Florida, this virus was created by David L. Smith in 1999. It began as <strong>a compromised Word document<\/strong> posted on a Usenet group, claiming to offer passwords for adult content websites. The curiosity it sparked led to widespread downloads, activating the macro inside and releasing its payload.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/famous-malicious-computer-viruses\/david-l-smith.jpg\" alt=\"David L. Smith, creator of the Melissa Virus\" width=\"500\" height=\"391\"><\/figure>\n<p>Once activated, <strong>the virus would email itself to the top 50 contacts in the user\u2019s email list<\/strong>, causing a surge in email traffic that disrupted services for governments and corporations. It also <strong>occasionally altered documents<\/strong>, inserting references from The Simpsons.<\/p>\n<p>Smith was <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/nakedsecurity.sophos.com\/2009\/03\/26\/memories-melissa-virus\/\">apprehended<\/a> when the document was traced back to him. He cooperated with the FBI to capture other malware creators and served only 20 months of a 10-year sentence, along with a $5,000 fine. The virus <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.sophos.com\/en-us\/press-office\/press-releases\/1999\/12\/va_melissa.aspx\">reportedly caused $80 million in damages<\/a>.<\/p>\n<h2>4. The Sasser Worm<\/h2>\n<p>Created by computer science student Sven Jaschan, this worm exploited a buffer overflow vulnerability in the Local Security Authority Subsystem Service (LSASS). While the payload was more of an annoyance-slowing down and crashing computers-it had <strong>far-reaching disruptive effects<\/strong>, affecting millions of computers and critical infrastructure.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/famous-malicious-computer-viruses\/sasser.jpg\" alt=\"The Sasser Worm\" width=\"500\" height=\"315\"><\/figure>\n<p>The worm propagated itself to other machines via the Internet, exploiting systems that hadn\u2019t updated their security. This led to <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.theguardian.com\/technology\/2004\/may\/04\/security.business\">more than a million infections<\/a>, impacting airlines, news agencies, hospitals, and public transport. The overall damage was <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.bullguard.com\/bullguard-security-center\/pc-security\/computer-security-resources\/sasser_worm_removal.aspx\">estimated at $18 billion<\/a>. Jaschen was tried as a minor and received a 21-month suspended sentence.<\/p>\n<h2>5. The Zeus Trojan<\/h2>\n<p>Designed to infect Windows computers, Zeus performs various illicit activities, most commonly <strong>man-in-the-browser keylogging and form grabbing<\/strong>. The primary infection methods were drive-by downloads and phishing scams.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/famous-malicious-computer-viruses\/zeus-botnet.jpg\" alt=\"Zeus botnet\" width=\"500\" height=\"344\"><\/figure>\n<p>First identified in 2009, Zeus <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.darkreading.com\/vulnerabilities-and-threats\/zeus-trojan-variant-steals-ftp-login-details\/d\/d-id\/1080988?\">compromised<\/a> thousands of FTP accounts and computers from <strong>major corporations and banks<\/strong>, including Amazon, Oracle, and Bank of America. The botnet was used to steal login credentials for social networks, email, and banking accounts.<\/p>\n<p>In the US alone, over 1 million computers were <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.infoworld.com\/article\/2607998\/now-s-your-chance-to-clean-up-your-gameover-zeus-infection.html\">estimated<\/a> to be infected, with 25% of those in the US. The operation was global, involving individuals worldwide acting as money mules. About $70 million was stolen, leading to the <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.bbc.com\/news\/world-us-canada-11457611\">arrest<\/a> of 100 people connected to the operation.<\/p>\n<h2>6. The Conficker Worm<\/h2>\n<p>Also known as Downup or Downadup, Conficker is a Windows worm that appeared in 2008. It <strong>exploits vulnerabilities in the operating system<\/strong> to create a botnet.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/famous-malicious-computer-viruses\/conficker.jpg\" alt=\"Conficker worm\" width=\"500\" height=\"354\"><\/figure>\n<p>The worm managed to <a rel=\"nofollow noopener\" target=\"_blank\" href=\"http:\/\/news.bbc.co.uk\/2\/hi\/technology\/7832652.stm\">infect<\/a> over 9 million computers globally, affecting governments, businesses, and individuals. It was one of the largest worm infections ever, causing an <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.zdnet.com\/article\/confickers-estimated-economic-cost-9-1-billion\/\">estimated<\/a> $9 billion in damages.<\/p>\n<p>Conficker <strong>exploited a network service vulnerability<\/strong> in unpatched Windows systems. Once infected, it would reset account lockout policies, block access to Windows update and antivirus sites, and disable various services. It then installed software to turn the computer into a botnet slave and scareware to extort money from the user. Microsoft and antivirus vendors later released fixes and updates.<\/p>\n<h2>7. The Stuxnet Worm<\/h2>\n<p>Believed to be a collaborative effort between the Israeli Defence Force and the American Government, Stuxnet serves as <strong>a prime example of a virus developed for cyberwarfare<\/strong>. Its primary target was Iran\u2019s nuclear program, and it <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.businessinsider.com\/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11?IR=T&\">successfully damaged<\/a> about one-fifth of Iran\u2019s nuclear centrifuges.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/famous-malicious-computer-viruses\/stuxnet.jpg\" alt=\"Stuxnet Worm\" width=\"500\" height=\"375\"><\/figure>\n<p>The worm was <strong>engineered to attack industrial Programmable Logic Controllers (PLC)<\/strong>, which are essential for automating various types of machinery. It specifically targeted Siemens PLCs and was distributed via infected USB drives.<\/p>\n<p>If the infected computer did not have Siemens software, the worm would remain dormant, infecting other computers in a limited manner to avoid detection. Siemens eventually developed a method to remove the malware from their systems.<\/p>\n<h2>8. The Mydoom Worm<\/h2>\n<p>Emerging in 2004, Mydoom is a worm designed for Windows systems and became one of the <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/edition.cnn.com\/2004\/TECH\/internet\/01\/28\/mydoom.spreadwed\/\">fastest-spreading<\/a> email worms since ILOVEYOU. The creator remains unknown, but a text message within the code suggests it was a commissioned job.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/famous-malicious-computer-viruses\/mydoom.jpg\" alt=\"Mydoom Worm\" width=\"500\" height=\"557\"><\/figure>\n<p>The worm <strong>propagates by disguising itself as an email transmission error<\/strong>, complete with an attachment of the worm. Once activated, it sends itself to email addresses found in the user\u2019s address book and also copies itself into any folder of P2P programs to spread through that network.<\/p>\n<p>Its payload serves two purposes: it opens a backdoor for remote access and launches a denial-of-service attack against the SCO Group. The attack was likely <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.bloomberg.com\/news\/articles\/2004-02-01\/the-most-hated-company-in-tech\">motivated by a conflict<\/a> over Linux code ownership. The worm <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.whoishostingthis.com\/blog\/2015\/06\/01\/8-worst-viruses\/\">caused an estimated $38.5 billion in damages<\/a> and remains active in some forms today.<\/p>\n<h2>9. The CryptoLocker Ransomware<\/h2>\n<p>CryptoLocker is a Trojan horse ransomware specifically designed to target Windows computers. It <strong>spreads through various means<\/strong>, including email, and encrypts files on the infected computer and any connected storage using RSA public key cryptography.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/famous-malicious-computer-viruses\/cryptolocker.jpg\" alt=\"CryptoLocker Ransomware\" width=\"500\" height=\"404\"><\/figure>\n<p>Although removing the malware is straightforward, the encrypted files remain locked. <strong>The only way to regain access to the files is to pay a ransom within a specified deadline<\/strong>. Failure to meet the deadline results in an increased ransom or deletion of the decryption keys. The typical ransom is around $400, payable in prepaid cash or Bitcoin.<\/p>\n<p>Law enforcement agencies and security companies eventually <strong>gained control over part of the botnet that operated CryptoLocker and Zeus<\/strong>, effectively halting the ransom operation. The ring leader, Evgeniy Bogachev, was <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.fbi.gov\/wanted\/cyber\/evgeniy-mikhailovich-bogachev\">charged<\/a>, and decryption keys were released to affected users. It is <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.bbc.com\/news\/technology-28661463\">estimated<\/a> that 500,000 computers were infected, with 1.3% of victims paying the ransom, totaling around $3 million.<\/p>\n<h2>10. The Flashback Trojan<\/h2>\n<p>Unlike most other entries on this list, Flashback specifically targeted Mac computers, dispelling the myth that Macs are immune to malware. Initially <strong>discovered in 2011<\/strong>, it posed as a fake Flash installer.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/famous-malicious-computer-viruses\/flashback.jpg\" alt=\"Flashback Trojan\" width=\"500\" height=\"357\"><\/figure>\n<p>In its evolved form, the Trojan infects users who have Java enabled. It spreads by compromising websites that contain JavaScript code to download the payload. Once installed, the infected Mac becomes part of a botnet.<\/p>\n<p>The good news is that the infection is <strong>limited to the specific user\u2019s account<\/strong>. However, <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/gadgets\/2012\/04\/flashback-trojan-reportedly-controls-half-a-million-macs-and-counting\/\">more than 600,000 Macs were infected<\/a>, including 274 located in Cupertino, the headquarters of Apple. Oracle and Apple have since released fixes, but as of 2014, an <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/information-technology\/2014\/01\/its-alive-once-prolific-flashback-trojan-still-infecting-22000-macs\/\">estimated 22,000 Macs remain infected<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Experiencing a Computer Virus is something many users have faced at one point or another. For most, it\u2019s a minor inconvenience that calls for a system cleanup and the overdue installation of that antivirus software you\u2019ve been planning to set up. However, in some instances, the impact can be devastating, rendering your computer an expensive&hellip;<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3398],"tags":[4668,4601],"topic":[4521],"class_list":["entry-content","is-maxi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>10 Deadliest Computer Viruses of All Time - Hongkiat<\/title>\n<meta name=\"description\" content=\"Experiencing a Computer Virus is something many users have faced at one point or another. For most, it&#039;s a minor inconvenience that calls for a system\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hongkiat.com\/blog\/famous-malicious-computer-viruses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Deadliest Computer Viruses of All Time\" \/>\n<meta property=\"og:description\" content=\"Experiencing a Computer Virus is something many users have faced at one point or another. For most, it&#039;s a minor inconvenience that calls for a system\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hongkiat.com\/blog\/famous-malicious-computer-viruses\/\" \/>\n<meta property=\"og:site_name\" content=\"Hongkiat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hongkiatcom\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-10T10:01:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-04T11:56:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.hongkiat.com\/uploads\/famous-malicious-computer-viruses\/iloveyou.jpg\" \/>\n<meta name=\"author\" content=\"Hongkiat.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:site\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hongkiat.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/famous-malicious-computer-viruses\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/famous-malicious-computer-viruses\\\/\"},\"author\":{\"name\":\"Hongkiat.com\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/7cc686597d92f9086729e4bcc1577ba3\"},\"headline\":\"10 Deadliest Computer Viruses of All Time\",\"datePublished\":\"2021-07-10T10:01:48+00:00\",\"dateModified\":\"2023-09-04T11:56:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/famous-malicious-computer-viruses\\\/\"},\"wordCount\":1393,\"commentCount\":26,\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/famous-malicious-computer-viruses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/famous-malicious-computer-viruses\\\/iloveyou.jpg\",\"keywords\":[\"gc\",\"Security and Privacy\"],\"articleSection\":[\"Internet\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/famous-malicious-computer-viruses\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/famous-malicious-computer-viruses\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/famous-malicious-computer-viruses\\\/\",\"name\":\"10 Deadliest Computer Viruses of All Time - Hongkiat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/famous-malicious-computer-viruses\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/famous-malicious-computer-viruses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/famous-malicious-computer-viruses\\\/iloveyou.jpg\",\"datePublished\":\"2021-07-10T10:01:48+00:00\",\"dateModified\":\"2023-09-04T11:56:06+00:00\",\"description\":\"Experiencing a Computer Virus is something many users have faced at one point or another. For most, it's a minor inconvenience that calls for a system\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/famous-malicious-computer-viruses\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/famous-malicious-computer-viruses\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/famous-malicious-computer-viruses\\\/#primaryimage\",\"url\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/famous-malicious-computer-viruses\\\/iloveyou.jpg\",\"contentUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/famous-malicious-computer-viruses\\\/iloveyou.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/famous-malicious-computer-viruses\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 Deadliest Computer Viruses of All Time\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"name\":\"Hongkiat\",\"description\":\"Tech and Design Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\",\"name\":\"Hongkiat.com\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"contentUrl\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"width\":1200,\"height\":799,\"caption\":\"Hongkiat.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/hongkiatcom\",\"https:\\\/\\\/x.com\\\/hongkiat\",\"https:\\\/\\\/www.pinterest.com\\\/hongkiat\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/7cc686597d92f9086729e4bcc1577ba3\",\"name\":\"Hongkiat.com\",\"description\":\"This post is published by an HKDC (hongkiat.com) staff. (I.e., intern, staff writer, or editor).\",\"sameAs\":[\"https:\\\/\\\/www.hongkiat.com\"],\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/author\\\/com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"10 Deadliest Computer Viruses of All Time - Hongkiat","description":"Experiencing a Computer Virus is something many users have faced at one point or another. For most, it's a minor inconvenience that calls for a system","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hongkiat.com\/blog\/famous-malicious-computer-viruses\/","og_locale":"en_US","og_type":"article","og_title":"10 Deadliest Computer Viruses of All Time","og_description":"Experiencing a Computer Virus is something many users have faced at one point or another. For most, it's a minor inconvenience that calls for a system","og_url":"https:\/\/www.hongkiat.com\/blog\/famous-malicious-computer-viruses\/","og_site_name":"Hongkiat","article_publisher":"https:\/\/www.facebook.com\/hongkiatcom","article_published_time":"2021-07-10T10:01:48+00:00","article_modified_time":"2023-09-04T11:56:06+00:00","og_image":[{"url":"https:\/\/assets.hongkiat.com\/uploads\/famous-malicious-computer-viruses\/iloveyou.jpg","type":"","width":"","height":""}],"author":"Hongkiat.com","twitter_card":"summary_large_image","twitter_creator":"@hongkiat","twitter_site":"@hongkiat","twitter_misc":{"Written by":"Hongkiat.com","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hongkiat.com\/blog\/famous-malicious-computer-viruses\/#article","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/famous-malicious-computer-viruses\/"},"author":{"name":"Hongkiat.com","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/7cc686597d92f9086729e4bcc1577ba3"},"headline":"10 Deadliest Computer Viruses of All Time","datePublished":"2021-07-10T10:01:48+00:00","dateModified":"2023-09-04T11:56:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/famous-malicious-computer-viruses\/"},"wordCount":1393,"commentCount":26,"publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/famous-malicious-computer-viruses\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.hongkiat.com\/uploads\/famous-malicious-computer-viruses\/iloveyou.jpg","keywords":["gc","Security and Privacy"],"articleSection":["Internet"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hongkiat.com\/blog\/famous-malicious-computer-viruses\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hongkiat.com\/blog\/famous-malicious-computer-viruses\/","url":"https:\/\/www.hongkiat.com\/blog\/famous-malicious-computer-viruses\/","name":"10 Deadliest Computer Viruses of All Time - Hongkiat","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/famous-malicious-computer-viruses\/#primaryimage"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/famous-malicious-computer-viruses\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.hongkiat.com\/uploads\/famous-malicious-computer-viruses\/iloveyou.jpg","datePublished":"2021-07-10T10:01:48+00:00","dateModified":"2023-09-04T11:56:06+00:00","description":"Experiencing a Computer Virus is something many users have faced at one point or another. For most, it's a minor inconvenience that calls for a system","breadcrumb":{"@id":"https:\/\/www.hongkiat.com\/blog\/famous-malicious-computer-viruses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hongkiat.com\/blog\/famous-malicious-computer-viruses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/famous-malicious-computer-viruses\/#primaryimage","url":"https:\/\/assets.hongkiat.com\/uploads\/famous-malicious-computer-viruses\/iloveyou.jpg","contentUrl":"https:\/\/assets.hongkiat.com\/uploads\/famous-malicious-computer-viruses\/iloveyou.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hongkiat.com\/blog\/famous-malicious-computer-viruses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hongkiat.com\/blog\/"},{"@type":"ListItem","position":2,"name":"10 Deadliest Computer Viruses of All Time"}]},{"@type":"WebSite","@id":"https:\/\/www.hongkiat.com\/blog\/#website","url":"https:\/\/www.hongkiat.com\/blog\/","name":"Hongkiat","description":"Tech and Design Tips","publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hongkiat.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hongkiat.com\/blog\/#organization","name":"Hongkiat.com","url":"https:\/\/www.hongkiat.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","contentUrl":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","width":1200,"height":799,"caption":"Hongkiat.com"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hongkiatcom","https:\/\/x.com\/hongkiat","https:\/\/www.pinterest.com\/hongkiat\/"]},{"@type":"Person","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/7cc686597d92f9086729e4bcc1577ba3","name":"Hongkiat.com","description":"This post is published by an HKDC (hongkiat.com) staff. (I.e., intern, staff writer, or editor).","sameAs":["https:\/\/www.hongkiat.com"],"url":"https:\/\/www.hongkiat.com\/blog\/author\/com\/"}]}},"jetpack_featured_media_url":"https:\/\/","jetpack_shortlink":"https:\/\/wp.me\/p4uxU-5Ja","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/22020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/comments?post=22020"}],"version-history":[{"count":3,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/22020\/revisions"}],"predecessor-version":[{"id":69092,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/22020\/revisions\/69092"}],"wp:attachment":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/media?parent=22020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/categories?post=22020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/tags?post=22020"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/topic?post=22020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}