
Computers viruses, worms, ransomware, etc. are kinds of malicious software that no user should take lightly. On several occasions, we have touched upon security steps that each user should take in order to protect its identity and data. Sadly sometimes even when all precautions are taken some malware can still slip through and wreak havoc. Today we are looking at some of the worst or the best, depending on your view that has indeed wreaked plenty of havoc.
In the list of the 10 most famous computer viruses below, we show the costs, dates, reach, and other key facts. First a note about terms: we use the words “virus” and “worm” interchangeably because most readers search for them that way. But there’s a subtle difference that we explain after the list.
The worst computer virus outbreak in history, Mydoom caused estimated damage of $38 billion in 2004, but its inflation-adjusted cost is actually $52.2 billion. Also known as Novarg, this malware is technically a “worm,” spread by mass emailing. At one point, the Mydoom virus was responsible for 25% of all emails sent.
Mydoom scraped addresses from infected machines, then sent copies of itself to those addresses. It also roped those infected machines into a web of computers called a botnet that performed distributed denial of service (DDoS) attacks. These attacks were intended to shut down a target website or server.
Mydoom is still around today, generating 1% of all phishing emails. That’s no small feat considering the 3.4 billion phishing emails sent each day. By that figure, Mydoom has taken on a life of its own, infecting enough poorly-protected machines to send 1.2 billion copies of itself per year, 16 years after its creation.
Though a $250,000 reward was offered, the developer of this dangerous computer worm was never caught.
Wondering what makes the world’s most secure computers so safe? See the Tech@Work guide: Upgrade to the World's Most Secure and Manageable PC
The 2003 Sobig computer virus is actually another worm. It is second only to the Mydoom virus in its scope. The $30 billion figure is a worldwide total, including Canada, the U.K., the U.S., mainland Europe, and Asia. Several versions of the worm were released in quick succession, named Sobig.A through Sobig.F, with Sobig.F being the most damaging.
This cybercriminal program masqueraded as legitimate computer software attached to emails. It disrupted ticketing at Air Canada and interfered with countless other businesses. Despite its widespread damage, the creator of the successful bug was never caught.
Klez is a close third on the list of the worst computer viruses ever created. With nearly $20 billion in estimated damages, it infected about 7.2% of all computers in 2001, or 7 million PCs. The Klez worm sent fake emails, spoofed recognized senders and, among other things, attempted to deactivate other viruses.
As with other viruses and worms, Klez was released in several variants. It infected files, copied itself, and spread throughout each victim’s network. It hung around for years, with each version more destructive than the last.
Windows has come a long way since most of the computer viruses on this list hit the web. Thankfully, built-in protection with Microsoft Defender is always on the watch.
The year 2000’s ILOVEYOU virus worked by sending a bogus “love letter” that looked like a harmless text file. Like Mydoom, this attacker sent copies of itself to every email address in the infected machine’s contact list. Shortly after its May 4 release, it had spread to more than 10 million PCs.
The virus was created by a college student in the Philippines named Onel de Guzman. Lacking funds, he wrote the virus to steal passwords so he could log into online services he wanted to use for free. He reportedly had no idea how far his creation would spread. This virus is also known as Loveletter.
Need to up your remote work security game before there’s another entry on the list of most deadly computer viruses? See our guide: How to Work Remotely and Securely
The 2017 WannaCry computer virus is ransomware, a virus that takes over your computer (or cloud files) and holds them hostage. The WannaCry ransomware ripped through computers in 150 countries, causing massive productivity losses as businesses, hospitals, and government organizations that didn’t pay were forced to rebuild systems from scratch.
The malware raged like wildfire through 200,000 computers worldwide. It stopped when a 22-year-old security researcher in the U.K. found a way to turn it off. Computers with out-of-date operating systems were hit especially hard. That’s why security experts always recommend updating your systems frequently.
In September 2020, one of the potentially largest computer virus attacks in medical history hit Universal Health Services. The U.S. hospital chain, which has more than 400 locations, was reportedly struck by damaging ransomware. The attack forced the cancellation of surgeries and made healthcare workers switch to paper records.
The Zeus computer virus is an online theft tool that hit the web in 2007. A whitepaper by Unisys three years later estimated that it was behind 44% of all banking malware attacks. By then, it had breached 88% of all Fortune 500 companies, 2,500 organizations total, and 76,000 computers in 196 countries.
The Zeus botnet was a group of programs that worked together to take over machines for a remote “bot master.” It originated in Eastern Europe and was used to transfer money to secret bank accounts. More than 100 members of the crime ring behind the virus, mostly in the U.S., were arrested in 2010. It’s not as prominent today, but some of the virus’ source code lives on in newer botnet viruses and worms.
Zeus caused documented damage of $100 million. But the real cost in terms of lost productivity, removal, and undocumented theft is undoubtedly much higher. A $3 billion estimate, adjusted for inflation, puts this virus at a cost of $3.7 billion in today’s dollars.
First observed in 2001, the Code Red computer virus was yet another worm that penetrated 975,000 hosts. It displayed the words “Hacked by Chinese!” across infected web pages, and it ran entirely in each machine’s memory. In most cases it left no trace in hard drives or other storage.
Financial costs are pegged at $2.4 billion. The virus attacked websites of infected computers and delivered a distributed denial of service (DDoS) attack on the U.S. White House’s website, www.whitehouse.gov. In fact, the White House had to change its IP address to defend against Cod Red.
Can your printer get a virus? See our cool infographic: The State of Printer Security
The SQL Slammer worm cost an estimated $750 million across 200,000 computer users in 2003. This computer virus randomly selected IP addresses, exploiting vulnerabilities and sending itself on to other machines. It used these victim machines to launch a DDoS attack on several internet hosts, significantly slowing internet traffic.
The Slammer worm hit banks in the U.S. and Canada especially hard, taking ATMs offline in many locations. Customers of Toronto’s Imperial Bank of Commerce found themselves unable to access funds. The attack reared its ugly head again in 2016, launching from IP addresses in Ukraine, China, and Mexico.
Thankfully, ransomware attacks like the 2013 CryptoLocker virus have dipped since their 2017 peak. This malware attacked upwards of 250,000 machines by encrypting their files. It displayed a red ransom note informing users that “your important files encryption produced on this computer.” A payment window accompanied the note.
The virus’ creators used a worm called the Gameover Zeus botnet to make and send copies of the CryptoLocker virus. According to a report by security firm Sophos, the average ransomware attack costs a business $133,000. If we estimate that CryptoLocker hit 5,000 companies, that would put its total cost at $665 million.
Where will cybersecurity go next? See our guide: The Future of Cybersecurity
The Sasser worm was written by a 17-year-old German computer science student named Sven Jaschan. He was arrested at the age of 18 in 2004 after a $250,000 bounty was posted for the computer virus’ creator. A friend of Jaschan’s tipped authorities that the youth had penned not only the Sasser worm but also the damaging Netsky.AC attack.
Jaschan was given a suspended sentence after it was found he was a minor when he wrote the malware. The Sasser worm crashed millions of PCs, and though some reports put damages at $18 billion, the relatively low infection rate suggests a more likely cost of $500 million.
Other notable viruses
The top 10 worst computer viruses above are just the ugly tip of a gargantuan digital iceberg. With a million new malware programs popping up every 3 years, we may miss the forest for a few outstanding trees. Here are just a few more viruses that have wreaked havoc over the years:
Mimail: This worm tried to harvest data from infected machines to launch a string of DDoS attacks, but was relatively easy to remove.
Yaha: Yet another worm with several variants, thought to be the result of a cyber-war between Pakistan and India.
Swen: Written in C++, the Swen computer worm disguised itself to look like a 2003 OS update. Its financial cost has been pegged at $10.4 billion, but not reliably.
Storm Worm: This worm showed up in 2007 and attacked millions of computers with an email about approaching bad weather.
Tanatos/Bugbear: A 2002 keylogger virus that targeted financial institutions and spread to 150 countries.
Sircam: A computer worm from 2001 that used counterfeit emails with the subject line, “I send you this file in order to have your advice.”
Explorezip: This worm used fake emails to spread to every machine on thousands of local networks.
Melissa: The most dangerous computer virus in 1999, Melissa sent copies of itself that looked like NSFW pics. The U.S. FBI estimated cleanup and repair costs at $80 million.
Flashback: A Mac-only virus, Flashback infected over 600,000 Macs in 2012 and even infected Apple’s home base in Cupertino, Calif. In 2020, there’s now more malware on Macs than on PCs.
Conficker: This 2009 virus still infects many legacy systems and could do significant damage if it ever activates.
Stuxnet: This worm is reported to have destroyed Iranian nuclear centrifuges by sending damaging instructions.
Holiday Photo Edit is a Browser Extension for Google Chrome developed by Mindspark Inc. and offers users a basic photo editing tool alongside links to some popular editing websites.
When installed this extension changes your default search engine to MyWay and hijacks your New Tab page, changing it to HolidayPhotoEdit. It monitors user browsing activity recording visited websites and clicked links in order to learn more about the user, this data is later used/sold to better target Injected Ads.
While browsing the internet with the HolidayPhotoEdit extension enabled, users will experience more ads throughout their search results, additional sponsored links to partner products, and sometimes even pop-up ads with special giveaways designed to lure users to buy something.
Popular anti-virus scanners have marked HolidayPhotoEdit as a Browser Hijacker, and it is recommended to remove it from your computer.
Windows 10 error code 0x80072EE2 usually occurs as a result of a disruption during the upgrade process when users attempt to upgrade their operating system using Windows Update. The disruption may be caused by a loss of Internet connection. Error code 0x80072EE2 may also occur due to problems related to one’s firewall. Common symptoms of this error code include the following:
Upgrade error codes like error code 0x80072EE2 usually occur when disruptions or problems related to system files, or third-party apps prevent Windows Update from completing an upgrade. In the case of error code 0x80072EE2, the most likely cause is a bad Internet connection.
Windows 10 error codes are numerous and so are the solutions to fixing these problems. In most cases, Windows users have access to several manual repair solutions depending on the error code present on their device. These manual repair methods are usually easy to implement, with the exception of a few solutions that require technical knowledge and skills. In such cases, you may need to consider using an effective automated tool or you may contact a Windows repair technician to assist you.
In terms of error code 0x80072EE2, however, no technical skills are required. Manual repair solutions for this error code involve checking and troubleshoot network problems if your connection was disrupted. Also, you may need to check your firewall settings and disable it temporarily to verify whether or not your firewall is preventing you from accessing the upgrade. Further details are provided below.
If for whatever reason you lost Internet connection while attempting to upgrade your operating system via Windows Update, your upgrade will time out and error code 0x80072EE2 in Windows 10 may occur. For this reason, it is important for you to check your connection once you notice the presence of error code 0x80072EE2 on your device.
There are many ways you can verify your Internet connection but one of the simplest ways is to first open your preferred Internet browser and type the web address of a site you normally visit. Once you are able to access the website, you will know for sure that your connection is not an issue. Simply restart your PC and reattempt the upgrade.
If you are unable to complete the upgrade process, however, this simply means that there is another issue causing error code 0x80072EE2 to occur. Proceed to the next manual repair method. This method may also apply if you were unable to connect to the Internet.
Though you may be able to access a website or open your Internet browser, there may be other issues affecting your network that are causing the error code to occur. To verify for certain whether or not the issue causing error code 0x80072EE2 in Windows 10 is related to your network, troubleshoot your network using the Network Troubleshooter tool found on your PC.
Once the issue has been resolved, it is time to verify if the error code is fixed. Open Windows Update then select the option which enables you to access the latest upgrades to your machine. Wait to see if the error code reoccurs or if you can now access the upgrade to your operating system. If the error code reoccurs, move to the next manual repair method.
Another issue that may be causing an error code to occur is your firewall. To verify if your firewall is preventing you from accessing the upgrade, disable your firewall. If you are using third-party security software, simply open the security app and check its firewall settings. Select disable or turn off the firewall.
Restart your computer, then open Windows Update to reattempt to upgrade your device. If this proves successful, you will be able to access the upgrade. Error code 0x80072EE2 in Windows 10 will no longer be present.
If you wish to always have at your disposal a utility tool to fix these Windows 10 and other related issues when they do arise, download and install a powerful automated tool.
DISM.exe /Online /Cleanup-Image /RestoreHealth /Source:C:RepairSourceWindows /LimitAccess
net stop wuauserv net start cryptSvc net start bits net start msiserver
net start wuauserv net start cryptSvc net start bits net start msiserver
“We couldn’t install Windows 10 We’ve set your PC back to the way it was before you started installing Windows 10 0x8007002C-0x4001E, The installation failed in the SECOND_BOOT phase with an error during PRE_OOBE operation.”To resolve the 0x8007002C-0x4001E, The installation failed in the SECOND_BOOT phase error, here are some suggestions that might help.
net stop wuauserv net start cryptSvc net start bits net start msiserver
net start wuauserv net start cryptSvc net start bits net start msiserver