Who created the first computer virus
Author: f | 2025-04-24
The First Computer Virus: Creeper Creeper is considered as the first computer virus that was created in the early 2025s. It was created by Bob Thomas, a computer engineer who was working on an experimental program called TENEX for the US Department of Defense.
Who created the first computer virus? - Science
A cracker can insert a Keylogger code inside any web browser extension. The code gets activated every time you visit a login page. It then captures all your keystrokes to steal your username and password.Logic bombs can be inserted into existing software or into other forms of malware, such as worms, viruses, or Trojan horses. They then lie dormant until the trigger occurs, and can go undetected for years. Protection: Periodically scan all files, including compressed ones, and keep your antivirus software updated.Frequently Asked QuestionsWhen was the very first computer virus created?The first-ever computer virus (named Creeper) was written by Bob Thomas at BBN Technologies in 1971. Creeper was an experimental self-replicating program that had no malicious intent. It only displayed a simple message: “I’m creeper. Catch me if you can!”Who created the first PC virus?In 1986, Amjad Farooq Alvi and Basit Farooq Alvi wrote a boot sector virus named ‘Brain’ to deter unauthorized copying of the software they had created. ‘Brain’ is considered to be the first computer virus for the IBM PC and compatibles.Amjad Farooq and Basit Farooq made world’s first computer virus named “Brain Boot Sector Virus” in 1986. It was made for MS-DOS operating systems. The virus used to infect the boot sector of storage media formatted with the DOS File Allocation Table (FAT) file system. pic.twitter.com/MnOaJoDEDJ— Rafay (@xgboostin) January 26, 2021The first virus to specifically target Microsoft Windows was WinVir. It was discovered in 1992. The virus didn’t contain any Windows API calls. Instead, it relied on the DOS API.What is the most expensive cyberattack of all time?The most destructive malware to date is MyDoom. First sighted in January 2004, it became the fastest-spreading email worm ever. It created network openings that allowed attackers to access infected machines. In 2004, nearly one-fourth of all emails had been infected by MyDoom. The virus caused over 38 billion in estimated damages.Emerging cybersecurity trends that can help combat computer virusesIn recent years, we have witnessed several emerging trends and technologies in cybersecurity aimed at combating computer viruses. For example, Artificial Intelligence and Machine Learning models are being used to detect previously unseen threatsBehavioral analytics can detect abnormal patterns that may go unnoticed by traditional signature-based methods Endpoint Detection and Response (EDR) solutions provide visibility into activities on individual devices, enabling faster response to potential threats Blockchain technology provides a decentralized and tamper-resistant way to store and verify security-related Computer viruses have been around just about as long as the personal computer has existed. With the advent of the Internet, the ability of viruses to rapidly spread has increased substantially. Despite this increase in capability to infect large numbers of computers across international borders, the definition of a computer virus has not substantially changed over time. That is, a computer virus continues to be defined as a computer program that when it is run or executed is capable of copying itself into data files, other computer programs, or even the boot sector of a computer’s hard drive. Once the replication process is successful, the targeted computing device is “infected” by the virus. Once delivered, a computer virus may or may not have a payload designed to do any manner of activities to include deleting files, stealing information, or displaying information on the target computer. Although over the history of computer viruses, the definition of the malware has not changed, the techniques and payload delivery has evolved alongside the Internet itself.Early Beginnings of Computer VirusesPublic computer virus history finds its origins in the early 1980s. The first virus to be publicly discussed was created by Rich Skrenta who was in high school in the United States at the time of creation. The virus was called, “Elk Cloner” and would attach itself to the Apple DOS 3.3 operating system. The virus was designed to be spread via floppy disk and was originally designed as a joke. When a computer became infected by the Elk Cloner, it would copy itself into a video game and would be set off on the 50th play of the game. Once activated, a poem about the virus would be displayed on the computer screen.The first personal computer (PC) computer virus was created by Basit and Amjad Farooq Alvi and was called “Brain.” The brother’s intentions with the virus were simply to protect their own work from piracy and to target those who infringed on their copyright. In this same timeframe, there was another variant of the source code referred to as the Ashar virus, which may have been authored prior to the Brain malware, but was not publicly documented until later.How Did Computer Viruses Spread Before the Internet?Before the Internet was invented and saw widespread use, the majority of computer viruses were spread between computing devices using removable media. In this timeframe, the primary device used to transport information between computers was the floppy disk. The viruses of this timeframe would infect one or more programs stored on the disk or alternatively were inserted into the boot sector of the disk. The boot sector viruses would be activated when the end-user would boot the computer fromWho created the first computer virus? And when did the first computer
A computer virus is a harmful program intentionally designed to access a computer without the owner’s permission, often with the goal of stealing or destroying data.Viruses often infect systems because of programming errors, weaknesses in operating systems, and lax security practices. According to AV-Test, an independent organization that analyzes and rates antivirus and security suite software, about 560,000 new malware pieces are detected every day.Computer viruses come in various types, classified by their origin, how they spread, where they store themselves, the files they affect, and their destructive capabilities. Each type brings a unique set of characteristics and threats. Let’s dig deeper to see how different types of viruses actually work. Did you know? In 2017, the WannaCry ransomware affected over 200,000 computers across 150 countries by exploiting a vulnerability in Windows systems. This cybercrime is estimated to have caused $4 billion in losses worldwide. Table of Contents 1. Boot Sector Virus2. Direct Action Virus3. Overwrite Virus4. Web Scripting Virus5. Directory Virus6. Polymorphic Virus7. Memory Resident Virus8. Macro Virus9. Companion Virus10. Multipartite Virus11. FAT VirusOther Malware That Are Not Viruses But Are Equally Dangerous12. Trojan Horse13. Worm14. Logic BombsFrequently Asked QuestionsWhen was the very first computer virus created?Who created the first PC virus?What is the most expensive cyberattack of all time?Emerging cybersecurity trends that can help combat computer virusesCyber Security Market Size1. Boot Sector Virus Examples: Form, Disk Killer, Stone virus, Polyboot.B Can affect: Any file after getting into the main memoryA Boot Sector virus targets a storage device’s master boot record (MBR). Any media, whether it is bootable or not, can trigger this virus. The virus injects its code into the hard disk’s partition table and enters the computer’s main memory upon restarting.The common issues that may arise after getting infected include booting problems, unstable system performance, and inability to locate hard disks.Since the boot sector virus can encrypt the boot sector, it may be difficult to remove. In most cases, users are not even aware they have been infected with a virus until they scan the system with an antivirus program.However, this type of virus has become rare since the decline in floppy disks. Modern operating systems come with an inbuilt boot sector safeguard, which makes it difficult to find the MBR. Protection: Make sure that the disk you are using is write-protected. Do not start/restart the computer with unknown external disks connected.2. Direct Action Virus Example: VCL.428,. The First Computer Virus: Creeper Creeper is considered as the first computer virus that was created in the early 2025s. It was created by Bob Thomas, a computer engineer who was working on an experimental program called TENEX for the US Department of Defense.Who created the first virus for computer? - California Learning
The disk.In this timeframe, there was also a significant increase in use of Bulletin Board Systems (BBSs) where computer users would share software. This use allowed computer viruses and Trojan horses to rapidly spread and infect computers of those who were interested in getting hold of the latest software programs. As a result, computer virus authors took significant advantage of the predictable behavior of BBS users and increasingly complex malware was authored and deployed to the “wild.”By the early-to-mid 1990s, the macro virus was created and deployed. These viruses take advantage of productivity suite documents which allow computer macros to be embedded within the document for advanced calculations or visual effects. Macro virus authors, instead use this capability to infect an end-user’s computer and spread malware to other computers. Early software programs known to be susceptible to getting infected by a Macro virus include Microsoft Word, other Microsoft Office products, and other word processing applications which permit the use of macro programs within documents. When an infected document is opened, the malicious macro is executed without the end-user’s permission, spreads to the target computer, and delivers its payload. Despite the ability of modern antivirus programs to detect macro viruses, they are still commonly encountered today.How do Macro Viruses Work?Today, macro viruses are still around. They are able to be spread to new computing devices through infected email attachments, networks, modems, via portable media, and over the Internet. Most of the macro viruses encountered today will automatically start when an infected document is closed or opened. One of the common methods used for infecting the target computer is to replace a normal macro but will execute malicious code when regular commands are run by the macro. This technique helps the macro virus avoid detection since the user is not aware of the virus execution.When a macro virus is triggered, it will also commonly attempt to embed itself in templates and new documents when they are created. They will also attempt to corrupt additional parts of a computing system depending on what applications can be accessed by the macro. As the end user shares documents with other computing systems or users, the virus will continue to spread to additional computers.One of the best-known examples of the macro virus was the Melissa Virus that was discovered in 1999. Whenever a document was opened that was infected with Melissa, the local installation of Microsoft Office would then get infected. Melissa would subsequently replicate by sending itself via email to the first 50 email addresses in the Outlook address book. This “feature” of the virus made sure that it spread at a rapid pace. Due to Melissa and other macro viruses targeting an application vice When Mark Washburn was working on an analysis of the Vienna and Cascade viruses with Ralf Burger, he developed the first family of polymorphic virus called the Chameleon family.The 1260, or V2PX, was the first computer virus that used a form of polymorphic encryption. Washburn created the virus derived from Ralph Burger's publication of the disassembled Vienna virus source code. The 1260 added a cipher and varied its signature by randomizing its decryption algorithm. 1260 is a memory-resident DOS virus, like Vienna, affects .com files.HistoryEdit1260 was written in 1989, derived from Ralph Burger's Vienna virus source code, the 1260 added a cipher and varied its signature by randomizing its decryption algorithm. 1260 infects .COM files in the current or PATH directories upon execution. Changing an authenticated executable file is detected by most modern computer operating systems.While its basic functions were based mostly on Vienna, the 1260 is original enough to be considered to have its own family.Who created the first Computer virus? - Mad Penguin
It displays a harmless message on thousands of infected devices.1972: The first antivirus program, Reaper, is created to destroy the Creeper virus.1973: Robert Metcalfe identifies ARPANET vulnerabilities. This marks one of the first times cybersecurity issues were brought to light.1975: Bill Gates and Paul Allen found Microsoft.1976: Apple Computer Inc. is created.1980s1983: The movie WarGames popularizes the concept of hacking, bringing cybersecurity to public attention.1986: The Computer Fraud and Abuse Act (CFAA) is passed in the U.S., criminalizing unauthorized access to computer systems.1988: The Morris Worm, one of the first major network-disrupting worms, infects ARPANET, affecting approximately 10% of connected systems. The creator is later the first person convicted for hacking under the CFAA.1989: Joseph Popps uses floppy discs to deliver the world’s first ransomware attack.1990s1991: The Michelangelo virus is discovered. With the potential to spread undetected and brick affected devices, Michelangelo garners widespread attention in the media. Months later, Norton updates its antivirus so that it can detect and remove Michelangelo.1994: The first mass phishing attack targets AOL users. Thousands of users have their passwords stolen.1995: The Java programming language introduces sandboxing as a way to contain potentially malicious code.1999: The Melissa Virus spreads widely thanks to its ability to hijack victims’ email. The FBI estimates that Melissa caused $80 million in damages.2000s & Beyond2000: The ILOVEYOU Worm infects millions of computers, causing billions of dollars in damages.2001: Exploiting a vulnerability in Microsoft IIS servers, the Code Red worm infects 359,000 systems in less than 14 hours.2003: The infamousWho Created the First Computer Virus? - Reactionary Times
The computer’s operating system, it was able to spread to computers running Microsoft Word on multiple operating systems to include Macintosh computers. The Melissa virus infections of the late 1990s and early 2000s are credited with significantly increasing caution on the part of computer users when opening email attachments and other documents received via email.Attack of the WormsThe Melissa virus would be the first in a number of viruses in the late 1990s which would create a large amount of damage to computing systems. As a result, industry and home computer users started to significantly increase the rate of antivirus and computer security program installations to help guard against computer virus infection. From 2001 through 2003, there were several computer worms deployed which quickly spread throughout the Internet. The means of distribution of these viruses included being attached to a frequently downloaded image as well as being embedded as an email attachment. Some of the more commonly encountered worms and viruses in this timeframe of computer virus history included the Code Red worm, the Klez worm, and the Nimda computer virus. In 2004, the MyDoom email worm would become the fastest spreading email worm and would infect millions of computers throughout the world by convincing end-users to open the infected email attachment. The first variants of the worm contained the text, “andy; I’m just doing my job, nothing personal, sorry” making some computer security professionals believe that the virus author was paid to create MyDoom. The actual author of the virus has not been named at the time of this writing.History of Computer Viruses TimelineThe following is a timeline of many of the significant viruses discovered publicly from 1982 to date. Not every virus is listed below, but many of the major outbreaks or changes in virus infection techniques are highlighted.1982The first known virus to be released in public was Elk Cloner. The virus author was Rich Skrenta who designed it to spread via floppy disk and targeted Apple DOS 3.3 computers.1983The first year that the term computer virus started to be used in public discourse. Fred Cohen from the University of Southern California is credited with coining the term.1986The first year that large numbers of computer viruses which targeted personal computers (PCs) started to appear. The Brain virus (authored in Pakistan) was one of the first and most well-known from this timeframe. It is a boot sector virus and would spread to new computers through infected floppy disks.The virus included the following text in the boot sector of the infected disk:Welcome to the Dungeon (c) 1986 Basit & Amjads (pvt) Ltd VIRUS_SHOE RECORD V9.0 Dedicated to the dynamic memories of millions of viruses who are no longer with us. The First Computer Virus: Creeper Creeper is considered as the first computer virus that was created in the early 2025s. It was created by Bob Thomas, a computer engineer who was working on an experimental program called TENEX for the US Department of Defense. Who re-designed the Creeper Virus? How is data transferred through a network? HINT: It is a form of switching. Who created the first concept of a virus? HINT: He also created a computerThe Man Who Created the First Computer Virus! - YouTube
You might think that in the days before the internet, computer viruses just wouldn't exist. Yet, on this day in 1986, three years after being named “Man of the Year”, the personal computer got sick with the first PC virus. The culprit was the “Brain” virus, which was spread on 5.25-inch floppy disks. It was created by two brothers in Pakistan, Basit and Amjad Farooq Alvi, aged 17 and 24. They ran a software business and were having problems with piracy, so they added the virus to the disks containing their software to combat it.The virus infected the boot sector of the disk, but did relatively little damage. The creators claim it was a “friendly virus”, unlike the more devastating viruses used by cyber criminals today. When a PC was infected, the volume label was changed to read “Brain”, and the following message appeared: Welcome to the Dungeon (c) 1986 Basit & Amjad (pvt) Ltd. BRAIN COMPUTER SERVICES 730 NIZAB BLOCK ALLAMA IQBAL TOWN LAHORE-PAKISTAN PHONE :430791,443248,280530. Beware of this VIRUS.... Contact us for vaccination............ $#@%$@!! Soon, people started calling. The first call was from a woman working on a magazine in Miami, wanting to know how to remove it.The brothers still operate Brain Telecommunication with a third brother, from the same office in Lahore as they wrote the virus back in 1986. Now, however, their business is one of Pakistan's biggest internet service providers.Subscribe to MoneyWeekSubscribe to MoneyWeek today and get your first six magazine issues absolutely FREEGet 6Comments
A cracker can insert a Keylogger code inside any web browser extension. The code gets activated every time you visit a login page. It then captures all your keystrokes to steal your username and password.Logic bombs can be inserted into existing software or into other forms of malware, such as worms, viruses, or Trojan horses. They then lie dormant until the trigger occurs, and can go undetected for years. Protection: Periodically scan all files, including compressed ones, and keep your antivirus software updated.Frequently Asked QuestionsWhen was the very first computer virus created?The first-ever computer virus (named Creeper) was written by Bob Thomas at BBN Technologies in 1971. Creeper was an experimental self-replicating program that had no malicious intent. It only displayed a simple message: “I’m creeper. Catch me if you can!”Who created the first PC virus?In 1986, Amjad Farooq Alvi and Basit Farooq Alvi wrote a boot sector virus named ‘Brain’ to deter unauthorized copying of the software they had created. ‘Brain’ is considered to be the first computer virus for the IBM PC and compatibles.Amjad Farooq and Basit Farooq made world’s first computer virus named “Brain Boot Sector Virus” in 1986. It was made for MS-DOS operating systems. The virus used to infect the boot sector of storage media formatted with the DOS File Allocation Table (FAT) file system. pic.twitter.com/MnOaJoDEDJ— Rafay (@xgboostin) January 26, 2021The first virus to specifically target Microsoft Windows was WinVir. It was discovered in 1992. The virus didn’t contain any Windows API calls. Instead, it relied on the DOS API.What is the most expensive cyberattack of all time?The most destructive malware to date is MyDoom. First sighted in January 2004, it became the fastest-spreading email worm ever. It created network openings that allowed attackers to access infected machines. In 2004, nearly one-fourth of all emails had been infected by MyDoom. The virus caused over 38 billion in estimated damages.Emerging cybersecurity trends that can help combat computer virusesIn recent years, we have witnessed several emerging trends and technologies in cybersecurity aimed at combating computer viruses. For example, Artificial Intelligence and Machine Learning models are being used to detect previously unseen threatsBehavioral analytics can detect abnormal patterns that may go unnoticed by traditional signature-based methods Endpoint Detection and Response (EDR) solutions provide visibility into activities on individual devices, enabling faster response to potential threats Blockchain technology provides a decentralized and tamper-resistant way to store and verify security-related
2025-03-30Computer viruses have been around just about as long as the personal computer has existed. With the advent of the Internet, the ability of viruses to rapidly spread has increased substantially. Despite this increase in capability to infect large numbers of computers across international borders, the definition of a computer virus has not substantially changed over time. That is, a computer virus continues to be defined as a computer program that when it is run or executed is capable of copying itself into data files, other computer programs, or even the boot sector of a computer’s hard drive. Once the replication process is successful, the targeted computing device is “infected” by the virus. Once delivered, a computer virus may or may not have a payload designed to do any manner of activities to include deleting files, stealing information, or displaying information on the target computer. Although over the history of computer viruses, the definition of the malware has not changed, the techniques and payload delivery has evolved alongside the Internet itself.Early Beginnings of Computer VirusesPublic computer virus history finds its origins in the early 1980s. The first virus to be publicly discussed was created by Rich Skrenta who was in high school in the United States at the time of creation. The virus was called, “Elk Cloner” and would attach itself to the Apple DOS 3.3 operating system. The virus was designed to be spread via floppy disk and was originally designed as a joke. When a computer became infected by the Elk Cloner, it would copy itself into a video game and would be set off on the 50th play of the game. Once activated, a poem about the virus would be displayed on the computer screen.The first personal computer (PC) computer virus was created by Basit and Amjad Farooq Alvi and was called “Brain.” The brother’s intentions with the virus were simply to protect their own work from piracy and to target those who infringed on their copyright. In this same timeframe, there was another variant of the source code referred to as the Ashar virus, which may have been authored prior to the Brain malware, but was not publicly documented until later.How Did Computer Viruses Spread Before the Internet?Before the Internet was invented and saw widespread use, the majority of computer viruses were spread between computing devices using removable media. In this timeframe, the primary device used to transport information between computers was the floppy disk. The viruses of this timeframe would infect one or more programs stored on the disk or alternatively were inserted into the boot sector of the disk. The boot sector viruses would be activated when the end-user would boot the computer from
2025-04-07A computer virus is a harmful program intentionally designed to access a computer without the owner’s permission, often with the goal of stealing or destroying data.Viruses often infect systems because of programming errors, weaknesses in operating systems, and lax security practices. According to AV-Test, an independent organization that analyzes and rates antivirus and security suite software, about 560,000 new malware pieces are detected every day.Computer viruses come in various types, classified by their origin, how they spread, where they store themselves, the files they affect, and their destructive capabilities. Each type brings a unique set of characteristics and threats. Let’s dig deeper to see how different types of viruses actually work. Did you know? In 2017, the WannaCry ransomware affected over 200,000 computers across 150 countries by exploiting a vulnerability in Windows systems. This cybercrime is estimated to have caused $4 billion in losses worldwide. Table of Contents 1. Boot Sector Virus2. Direct Action Virus3. Overwrite Virus4. Web Scripting Virus5. Directory Virus6. Polymorphic Virus7. Memory Resident Virus8. Macro Virus9. Companion Virus10. Multipartite Virus11. FAT VirusOther Malware That Are Not Viruses But Are Equally Dangerous12. Trojan Horse13. Worm14. Logic BombsFrequently Asked QuestionsWhen was the very first computer virus created?Who created the first PC virus?What is the most expensive cyberattack of all time?Emerging cybersecurity trends that can help combat computer virusesCyber Security Market Size1. Boot Sector Virus Examples: Form, Disk Killer, Stone virus, Polyboot.B Can affect: Any file after getting into the main memoryA Boot Sector virus targets a storage device’s master boot record (MBR). Any media, whether it is bootable or not, can trigger this virus. The virus injects its code into the hard disk’s partition table and enters the computer’s main memory upon restarting.The common issues that may arise after getting infected include booting problems, unstable system performance, and inability to locate hard disks.Since the boot sector virus can encrypt the boot sector, it may be difficult to remove. In most cases, users are not even aware they have been infected with a virus until they scan the system with an antivirus program.However, this type of virus has become rare since the decline in floppy disks. Modern operating systems come with an inbuilt boot sector safeguard, which makes it difficult to find the MBR. Protection: Make sure that the disk you are using is write-protected. Do not start/restart the computer with unknown external disks connected.2. Direct Action Virus Example: VCL.428,
2025-04-04The disk.In this timeframe, there was also a significant increase in use of Bulletin Board Systems (BBSs) where computer users would share software. This use allowed computer viruses and Trojan horses to rapidly spread and infect computers of those who were interested in getting hold of the latest software programs. As a result, computer virus authors took significant advantage of the predictable behavior of BBS users and increasingly complex malware was authored and deployed to the “wild.”By the early-to-mid 1990s, the macro virus was created and deployed. These viruses take advantage of productivity suite documents which allow computer macros to be embedded within the document for advanced calculations or visual effects. Macro virus authors, instead use this capability to infect an end-user’s computer and spread malware to other computers. Early software programs known to be susceptible to getting infected by a Macro virus include Microsoft Word, other Microsoft Office products, and other word processing applications which permit the use of macro programs within documents. When an infected document is opened, the malicious macro is executed without the end-user’s permission, spreads to the target computer, and delivers its payload. Despite the ability of modern antivirus programs to detect macro viruses, they are still commonly encountered today.How do Macro Viruses Work?Today, macro viruses are still around. They are able to be spread to new computing devices through infected email attachments, networks, modems, via portable media, and over the Internet. Most of the macro viruses encountered today will automatically start when an infected document is closed or opened. One of the common methods used for infecting the target computer is to replace a normal macro but will execute malicious code when regular commands are run by the macro. This technique helps the macro virus avoid detection since the user is not aware of the virus execution.When a macro virus is triggered, it will also commonly attempt to embed itself in templates and new documents when they are created. They will also attempt to corrupt additional parts of a computing system depending on what applications can be accessed by the macro. As the end user shares documents with other computing systems or users, the virus will continue to spread to additional computers.One of the best-known examples of the macro virus was the Melissa Virus that was discovered in 1999. Whenever a document was opened that was infected with Melissa, the local installation of Microsoft Office would then get infected. Melissa would subsequently replicate by sending itself via email to the first 50 email addresses in the Outlook address book. This “feature” of the virus made sure that it spread at a rapid pace. Due to Melissa and other macro viruses targeting an application vice
2025-03-28When Mark Washburn was working on an analysis of the Vienna and Cascade viruses with Ralf Burger, he developed the first family of polymorphic virus called the Chameleon family.The 1260, or V2PX, was the first computer virus that used a form of polymorphic encryption. Washburn created the virus derived from Ralph Burger's publication of the disassembled Vienna virus source code. The 1260 added a cipher and varied its signature by randomizing its decryption algorithm. 1260 is a memory-resident DOS virus, like Vienna, affects .com files.HistoryEdit1260 was written in 1989, derived from Ralph Burger's Vienna virus source code, the 1260 added a cipher and varied its signature by randomizing its decryption algorithm. 1260 infects .COM files in the current or PATH directories upon execution. Changing an authenticated executable file is detected by most modern computer operating systems.While its basic functions were based mostly on Vienna, the 1260 is original enough to be considered to have its own family.
2025-04-11