Ransomware, fileless attacks, cryptomining malware, IoT botnets – these are just some of the latest entrants in the ever-growing horde of cyber threats. While many of these threats come and go, a lot of them have withstood the test of time. In the spirit of Throwback Tuesday* (#TBT), we thought we’d highlight a few of the threats that have been hounding us since… well, forever.
In fact, the predecessors of some of these threats were among the biggest in history, impacting several industries and costing businesses billions of dollars in a short period of time. Let’s take a brief look back at some of the threats that have left an indelible mark in the history of hacking and cybercrime.
The early days of cybercrime
Did you know that the oldest known hacking incident didn’t take place on the Internet or even on a LAN? It was actually in an auditorium and dates back to 1903. Obviously, computers weren’t involved – or invented – yet, but it certainly was one of the forebears of today’s cyberattacks.
In this landmark incident, Nevil Maskelyne, a magician and inventor, managed to disrupt a demonstration of Guglielmo Marconi’s purportedly secure wireless telegraph, and consequently highlighted its technological flaws (sound familiar?), by beaming a stream of mocking messages from a distant transmitter. That hacking incident, then dubbed as “scientific hooliganism”, damaged the pride of inventor Marconi more than anything else. But today, more than a century later, cyberattacks have become far more grandiose and detrimental to both people and organizations.
Before we got to where we are today though, the imaginations and creativity of screenplay writers were years ahead of the actual hackers. Some of the most potentially catastrophic cyber threats in history are the ones that never happened in real life. If you recall the 1983 movie WarGames, you likely know it’s one of the most iconic hacking films and perhaps the first one that really brought public awareness to cyber threats and their potential to wreak havoc.
A brief history lesson
Thankfully, real-world cyber threats haven’t been launching ICBMs yet. But that doesn’t mean we can let our guard down. With the proliferation of Internet of Things (IoT) devices, today’s threats are increasingly closer to becoming life-threatening. The WannaCry ransomware attack in 2017, which affected more than 200,000 computers in 150 countries, crippled National Health Service hospitals in the UK, disrupting several health services and medical procedures. This incident, and many more, have elevated cyberattacks to a level where people’s lives can now be endangered.
It’s not easy to develop a definitive list of major threats in history, but in my opinion, the below are the most notable ones in each of the last 4 decades:
|1980’s||Brain virus||Released in the wild at a time when floppy disks reigned supreme, viruses were more feared than they are today. Brain was the first computer virus that targeted MS-DOS, Microsoft’s CLI-based OS.|
|Ping-Pong virus||Named after its main symptom – a ball bouncing across the screen – the Ping-Pong virus was, at the time, the most popular boot sector virus. It managed to spread to other systems when a user would boot a computer with an infected disk, consequently infecting that PC. When another disk was inserted into that PC, the disk too got infected.|
|1990’s||Michelangelo virus||Thanks to John McAfee’s estimate of the virus potentially infecting as many as 5 million computers (a terrifying number at that time), Michelangelo managed to inflict global paranoia. While it rendered infected disks unusable when activated every March 6 (the Renaissance painter’s birthday), the actual number of infections was minimal.|
|Melissa virus||At the turn of the decade, while everyone was busy preparing for the Y2K bug, the Melissa macro virus infected tens of thousands of computers through the ubiquitous email client, Microsoft Outlook. At the peak of the outbreak, Internet connectivity and business processes suffered, with the disruption costing businesses an estimated $80 million.|
|2000’s||SQL Slammer||Dubbed the fastest propagating worm of all time, SQL Slammer infected 75,000 systems in just 10 minutes. It mainly attacked MSSQL Server, Microsoft’s widely used RDBMs. Although most home PCs didn’t run SQL Server and hence weren’t affected, many businesses did, consequently suffering serious Internet connectivity issues.|
|Conficker||This worm infected between 9 to 15 million servers running Windows and disrupted operations in several military installations, as well as warships and submarines, in the French and Royal (UK) navies, prompting Microsoft to unleash a bounty of $250,000 to fund the capture of the malware’s author.|
|2010’s||Cryptolocker||The 2010’s saw the rise of ransomware, with Cryptolocker among the first variants to gain notoriety. This malware mainly spread via malicious email attachments or botnets. Once it gained a foothold into a system, it locked up certain types of files through encryption and then displayed a message demanding ransom.|
|Gameover Zeus||This botnet ensnares systems to unleash different kinds of nefarious acts (depending on the cybercriminal campaign it’s configured for), such as launching a DDoS attack, distributing ransomware (Cryptolocker being one of them), and facilitating banking fraud. Because of its various exploits, Gameover Zeus has prompted the US Department of Justice to spearhead an international interagency collaboration built to dismantle the botnet’s infrastructure.|
These threats are just some of the major instances we’ve seen play out through recent history, but they certainly do not cover the wide range of risks we see on a daily basis. Everyday cybercriminals are learning from and implementing old threats that have worked in the past and adjusting them to combat today’s technological and cybersecurity advances – why reinvent the wheel, right?
Threats throughout history have not only persisted and gained strength, but they’ve helped shape the robust world of cybersecurity we know today. So, while we know there will always be something more malicious coming our way, we also know – from history – what tactics to put in place to keep the worst from happening.