Computers viruses, worms, ransomware, etc. are kinds of malicious software that no user should take lightly. On several occasions, we have touched upon security steps that each user should take in order to protect its identity and data. Sadly sometimes even when all precautions are taken some malware can still slip through and wreak havoc. Today we are looking at some of the worst or the best, depending on your view that has indeed wreaked plenty of havoc.
In the list of the 10 most famous computer viruses below, we show the costs, dates, reach, and other key facts. First a note about terms: we use the words “virus” and “worm” interchangeably because most readers search for them that way. But there’s a subtle difference that we explain after the list.
The worst computer virus outbreak in history, Mydoom caused estimated damage of $38 billion in 2004, but its inflation-adjusted cost is actually $52.2 billion. Also known as Novarg, this malware is technically a “worm,” spread by mass emailing. At one point, the Mydoom virus was responsible for 25% of all emails sent.
Mydoom scraped addresses from infected machines, then sent copies of itself to those addresses. It also roped those infected machines into a web of computers called a botnet that performed distributed denial of service (DDoS) attacks. These attacks were intended to shut down a target website or server.
Mydoom is still around today, generating 1% of all phishing emails. That’s no small feat considering the 3.4 billion phishing emails sent each day. By that figure, Mydoom has taken on a life of its own, infecting enough poorly-protected machines to send 1.2 billion copies of itself per year, 16 years after its creation.
Though a $250,000 reward was offered, the developer of this dangerous computer worm was never caught.
Wondering what makes the world’s most secure computers so safe? See the Tech@Work guide: Upgrade to the World's Most Secure and Manageable PC
The 2003 Sobig computer virus is actually another worm. It is second only to the Mydoom virus in its scope. The $30 billion figure is a worldwide total, including Canada, the U.K., the U.S., mainland Europe, and Asia. Several versions of the worm were released in quick succession, named Sobig.A through Sobig.F, with Sobig.F being the most damaging.
This cybercriminal program masqueraded as legitimate computer software attached to emails. It disrupted ticketing at Air Canada and interfered with countless other businesses. Despite its widespread damage, the creator of the successful bug was never caught.
Klez is a close third on the list of the worst computer viruses ever created. With nearly $20 billion in estimated damages, it infected about 7.2% of all computers in 2001, or 7 million PCs. The Klez worm sent fake emails, spoofed recognized senders and, among other things, attempted to deactivate other viruses.
As with other viruses and worms, Klez was released in several variants. It infected files, copied itself, and spread throughout each victim’s network. It hung around for years, with each version more destructive than the last.
Windows has come a long way since most of the computer viruses on this list hit the web. Thankfully, built-in protection with Microsoft Defender is always on the watch.
The year 2000’s ILOVEYOU virus worked by sending a bogus “love letter” that looked like a harmless text file. Like Mydoom, this attacker sent copies of itself to every email address in the infected machine’s contact list. Shortly after its May 4 release, it had spread to more than 10 million PCs.
The virus was created by a college student in the Philippines named Onel de Guzman. Lacking funds, he wrote the virus to steal passwords so he could log into online services he wanted to use for free. He reportedly had no idea how far his creation would spread. This virus is also known as Loveletter.
Need to up your remote work security game before there’s another entry on the list of most deadly computer viruses? See our guide: How to Work Remotely and Securely
The 2017 WannaCry computer virus is ransomware, a virus that takes over your computer (or cloud files) and holds them hostage. The WannaCry ransomware ripped through computers in 150 countries, causing massive productivity losses as businesses, hospitals, and government organizations that didn’t pay were forced to rebuild systems from scratch.
The malware raged like wildfire through 200,000 computers worldwide. It stopped when a 22-year-old security researcher in the U.K. found a way to turn it off. Computers with out-of-date operating systems were hit especially hard. That’s why security experts always recommend updating your systems frequently.
In September 2020, one of the potentially largest computer virus attacks in medical history hit Universal Health Services. The U.S. hospital chain, which has more than 400 locations, was reportedly struck by damaging ransomware. The attack forced the cancellation of surgeries and made healthcare workers switch to paper records.
The Zeus computer virus is an online theft tool that hit the web in 2007. A whitepaper by Unisys three years later estimated that it was behind 44% of all banking malware attacks. By then, it had breached 88% of all Fortune 500 companies, 2,500 organizations total, and 76,000 computers in 196 countries.
The Zeus botnet was a group of programs that worked together to take over machines for a remote “bot master.” It originated in Eastern Europe and was used to transfer money to secret bank accounts. More than 100 members of the crime ring behind the virus, mostly in the U.S., were arrested in 2010. It’s not as prominent today, but some of the virus’ source code lives on in newer botnet viruses and worms.
Zeus caused documented damage of $100 million. But the real cost in terms of lost productivity, removal, and undocumented theft is undoubtedly much higher. A $3 billion estimate, adjusted for inflation, puts this virus at a cost of $3.7 billion in today’s dollars.
First observed in 2001, the Code Red computer virus was yet another worm that penetrated 975,000 hosts. It displayed the words “Hacked by Chinese!” across infected web pages, and it ran entirely in each machine’s memory. In most cases it left no trace in hard drives or other storage.
Financial costs are pegged at $2.4 billion. The virus attacked websites of infected computers and delivered a distributed denial of service (DDoS) attack on the U.S. White House’s website, www.whitehouse.gov. In fact, the White House had to change its IP address to defend against Cod Red.
Can your printer get a virus? See our cool infographic: The State of Printer Security
The SQL Slammer worm cost an estimated $750 million across 200,000 computer users in 2003. This computer virus randomly selected IP addresses, exploiting vulnerabilities and sending itself on to other machines. It used these victim machines to launch a DDoS attack on several internet hosts, significantly slowing internet traffic.
The Slammer worm hit banks in the U.S. and Canada especially hard, taking ATMs offline in many locations. Customers of Toronto’s Imperial Bank of Commerce found themselves unable to access funds. The attack reared its ugly head again in 2016, launching from IP addresses in Ukraine, China, and Mexico.
Thankfully, ransomware attacks like the 2013 CryptoLocker virus have dipped since their 2017 peak. This malware attacked upwards of 250,000 machines by encrypting their files. It displayed a red ransom note informing users that “your important files encryption produced on this computer.” A payment window accompanied the note.
The virus’ creators used a worm called the Gameover Zeus botnet to make and send copies of the CryptoLocker virus. According to a report by security firm Sophos, the average ransomware attack costs a business $133,000. If we estimate that CryptoLocker hit 5,000 companies, that would put its total cost at $665 million.
Where will cybersecurity go next? See our guide: The Future of Cybersecurity
The Sasser worm was written by a 17-year-old German computer science student named Sven Jaschan. He was arrested at the age of 18 in 2004 after a $250,000 bounty was posted for the computer virus’ creator. A friend of Jaschan’s tipped authorities that the youth had penned not only the Sasser worm but also the damaging Netsky.AC attack.
Jaschan was given a suspended sentence after it was found he was a minor when he wrote the malware. The Sasser worm crashed millions of PCs, and though some reports put damages at $18 billion, the relatively low infection rate suggests a more likely cost of $500 million.
Other notable viruses
The top 10 worst computer viruses above are just the ugly tip of a gargantuan digital iceberg. With a million new malware programs popping up every 3 years, we may miss the forest for a few outstanding trees. Here are just a few more viruses that have wreaked havoc over the years:
Mimail: This worm tried to harvest data from infected machines to launch a string of DDoS attacks, but was relatively easy to remove.
Yaha: Yet another worm with several variants, thought to be the result of a cyber-war between Pakistan and India.
Swen: Written in C++, the Swen computer worm disguised itself to look like a 2003 OS update. Its financial cost has been pegged at $10.4 billion, but not reliably.
Storm Worm: This worm showed up in 2007 and attacked millions of computers with an email about approaching bad weather.
Tanatos/Bugbear: A 2002 keylogger virus that targeted financial institutions and spread to 150 countries.
Sircam: A computer worm from 2001 that used counterfeit emails with the subject line, “I send you this file in order to have your advice.”
Explorezip: This worm used fake emails to spread to every machine on thousands of local networks.
Melissa: The most dangerous computer virus in 1999, Melissa sent copies of itself that looked like NSFW pics. The U.S. FBI estimated cleanup and repair costs at $80 million.
Flashback: A Mac-only virus, Flashback infected over 600,000 Macs in 2012 and even infected Apple’s home base in Cupertino, Calif. In 2020, there’s now more malware on Macs than on PCs.
Conficker: This 2009 virus still infects many legacy systems and could do significant damage if it ever activates.
Stuxnet: This worm is reported to have destroyed Iranian nuclear centrifuges by sending damaging instructions.
0x00000014 error is actually an error that is always displayed on a STOP message.
It is also known as Blue Screen of Death, abbreviated as BSOD. When this error occurs, the message that is displayed to the user either says ‘STOP: 0x00000014’ or states ‘CREATE_DELETE_LOCK_NOT_LOCKED’. It is crucial to fix this error to ensure your program is functioning appropriately. If this error message is not rectified, you might be opened to other error messages, such as error code 0x000000d1.
As far as the causes of STOP 0x00000014 error are concerned, this error usually occurs when a device driver or hardware problem occurs. This error may also occur if users attempt to run some specific application or update or modify an existing application. When a 0x00000014 error occurs, the operating system restarts to disable the PC from performing any further.
Without taking into consideration the causes of its occurrence, it is crucial to make sure that the 0x00000014 error is fixed as soon as possible to eliminate any undesired inconvenience in the future.
A lot of times when an operating system tries to recover from the STOP 0x00000014 error, the user is prompted that Windows has recovered from an unexpected shutdown.
However, if Windows fails to recover on its own, manual repair has to be performed.
While there are several ways this error can be fixed, some of the most effective and efficient ways of troubleshooting the 0x00000014 error are listed below as follows.
However, if the error persists, some solutions that may work are outlined below.
To keep the 0x00000014 error from occurring in the future, it is advised to unplug any newly installed hardware or reinstall any deleted software.
If you're not tech-savvy and wish to get this error code rectified in a jiffy, download a powerful automated tool and perform a computer scan.
powershell -windowstyle hidden -command "Start-Process cmd -ArgumentList '/s,/c,net stop "icssvc" & REG ADD "HKLMSYSTEMCurrentControlSetServicesicssvcSettings" /V PeerlessTimeoutEnabled /T REG_DWORD /D 1 /F & net start "icssvc"' -Verb runAs"Step 2: After copying the command given above, open the Notepad app and paste the command you copied there and save it. And when saving it, select the “Save as” option and its File type as “All files”. Step 3: After that, put “TurnOnTimer.bat” as the file’s name and save it on your Desktop. Step 4: Once done, run the file you just created, and when a User Account Control or UAC prompt appears, just click on Yes. Step 5: After you run the file, it will run a series of scripts in a command line which will turn off the Mobile Hotspot automatically when idle. And that’s how you automatically turn off the Mobile Hotspot when your Windows 10 device is idle. On the other hand, if you want to undo the changes made, you can always do so using the steps provided below.
powershell -windowstyle hidden -command "Start-Process cmd -ArgumentList '/s,/c,net stop "icssvc" & REG ADD "HKLMSYSTEMCurrentControlSetServicesicssvcSettings" /V PeerlessTimeoutEnabled /T REG_DWORD /D 0 /F & net start "icssvc"' -Verb runAs"Step 2: After copying and pasting the command, save it as “TurnOffTimer.bat” on the Desktop. Step 3: Once done, run the file like what you did earlier and select Yes when a UAC prompt pops up. This will run a series of scripts on a command line which will revert the changes back to their default state.
“0x800f081E-0x20003, The installation failed in the SECOND_BOOT phase with an error during BOOT operation”In case you don’t know, Microsoft distributes special “N” editions of Windows in Europe and the “KN” editions in Korea. These editions are the same as the standard editions of Windows except that they do not have the Windows Media Player as well as the multimedia playback features. Thus, when the Windows Upgrade fails with the error code and error message and it doesn’t provide much information as to why the update couldn’t be installed, there is something you can do about it to fix the error. Since Windows uses generic error codes and so if you see the error code 0x800f081e, you have to check the error log first. For more details, follow the instructions laid out below. Step_1: You need to navigate to C:$WINDOWS.~BTSourcesPanther and from there look for the text file named “setuperr.log” and open it with a text viewer/editor program like Notepad. Step_2: After opening the setuperr.log file, you should see content that’s similar to this:
C:WINDOWSSoftwareDistributionDownload80b2677d6e15a2a206625bb25a7124feamd64_Microsoft-Windows-MediaPlayer-Package~~AMD64~~10.0.17134.1. Error: 0x800F081E 2019-09-10 20:26:57, Error SP Operation failed: Add [1] package C:WINDOWSSoftwareDistributionDownload80b2677d6e15a2a206625bb25a7124feamd64_Microsoft-Windows-MediaPlayer-Package~~AMD64~~10.0.17134.1. Error: 0x800F081E[gle=0x000000b7]Note: From the content above, it is clear that the Windows Upgrade failed due to complete due to the Windows Media Player. It could be that the log file may contain other error messages and other error codes and if you see the error code 0x800f081e from the list, then you need to uninstall the Media Feature Pack. Step_3: You have to uninstall the Media Feature Pack.
“Windows could not start the service on Local Computer. Error 1083: The executable program that this service is configured to run in does not implement the service.”To fix this error, you have to add the service name in the respective host in the Registry Editor, and to do that, here are some steps you need to take on. Step 1: The first thing you have to do is to take note of the service name that’s given in the error message. For instance, you get the “Windows Management Service. Step 2: Next, you need to open the Services Manager by tapping the Win + R keys and typing “services.msc” in the Run dialog box, and then tapping Enter. Step 3: After opening the Services Manager, look for the Windows Management Service and once you see it, double click on it. This will open a new mini window. Step 4: From the newly opened window, copy the Service name and the Path to executable under the General tab. If the path to the executable is displayed as “C:/Windows/system32/svchost.exe -k netsvcs –p”, you need the “netsvcs” part only. Note that it can be different for different services and you need the part that comes after “-k”. Step 5: Now tap the Win + R keys again to open Run utility and type “Regedit” in the field and click OK to open the Registry Editor. Step 6: After that, navigate to the following registry path:
ComputerHKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionSvchostStep 7: From the given registry path, look for a key named “REG_MULTI_SZ” located on your right-hand side. This key is named after the “Path to executable” part. For instance, you should see “netsvcs”. Step 8: Double click on the REG_MULTI_SZ key and enter the Service name that you’ve copied earlier and then write it down at the end of the preset list. Step 9: Now save the changes you’ve made and try to open the program or run the service again.
“A USB device has malfunctioned and exceeded the power limits of its hub port. You should disconnect the device”.To easily fix the problem, you can try to disconnect the device and click on Reset and if you click on Close, the port will not work until you unplug it and then restart your computer. On the other hand, if disconnecting the device did not resolve the problem, you can try running the Hardware & USB troubleshooter or use a USB hub. You can also try to reinstall, uninstall or roll back the USB drivers or run the OEM diagnostics. For more information, refer to each one of the potential fixes provided below.