Worst Computer Viruses Part 3

May 30, 2017 | IT Services

Part three of some of the worst computer viruses ever created.


A computer worm for Microsoft Windows, first appearing in mid-January 1999 spreading through email and Usenet. The worm installs itself and runs in the background of a victim’s machine, without their knowledge.


Malware that turns computer systems running Linux into remotely controlled “bots” that can be used as part of a botnet in large-scale network attacks.

Tiny Banker Trojan

Malware program that targets financial websites that establish man-in-the-browser attacks and network sniffing. Since its discovery, it has been found to have infected more than two dozen major banking institutions in the United States.


A Trojan that encrypts the files on a user’s hard drive then prompts them to pay a ransom to the developer in order to receive the decryption key.


A computer worm that propagates by email and has an attachment consisting of the worm’s executable with some file from the infected computer appended, affecting computers running Windows 95, Windows 98 and Windows ME.


A Windows-based backdoor Trojan horse that is capable of infecting versions of Windows from 95 to XP. Beas was one of the first Trojans to feature a reverse connection to its victim, and once established it gave the attacker complete control over the infected computer.

SQL Slammer

A computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic.


A worm that employs a user-mode rootkit technique to hide and steal its victim’s information.

Gameover ZeuS

A peer-to-peer botnet that uses an encrypted peer-to-peer communication system to communicate with its nodes and its command and control servers.


Malware which infects Linux systems in order to launch distributed denial-of-service attacks and can launch attacks up to 400 Gbps.

Browse Posts

By Archives

Want to Learn More?

Whether it’s physical or digital, we can provide a protected location to store all of your information including storage on our servers for off-site backups and provide you with secure access.


  • This field is for validation purposes and should be left unchanged.

Pin It on Pinterest

Share This