#the mydoom worm
Explore tagged Tumblr posts
Text
Fate Fanservant: The Morris Worm, Destroyer of the Internet
Ascension Stages:
First Stage: The Morris Worm takes the form of a young woman dressed in ragged pink prisoner’s clothes. A worn pilot’s jacket rests on her shoulders, and on the top of her head is a pair of broken and cracked goggles. Broken cuffs are on her arms and legs, but she offers the player an uneasy smile.
Second Stage: [REDACTED]
Final Stage: [REDACTED]
#this bio has some secrets and surprises inside and I can't exactly hide them on tumblr#so i'm just gonna post the doc itself here#i may post the full bio later on but for now this'll have to do#sorry!#fate#fate fanservant#fanservant#fate oc#fate grand order#fgo#the morris worm#the iloveyou worm#the mydoom worm#computer worms#writing and other stuff#it was pretty fun working with the binary translations and such here#this is also my second longest bio after Cinderella#which makes sense since this is THREE BIOS IN ONE#either way#this is a more offbeat idea of mine#but I hope you enjoy!
55 notes
·
View notes
Text
i feel obligated to put this here too
#... i'll maintag this. that's hilarious.#isat#but only one#ns.tiff#i love old web viruses and worms and trojans and i think kinitopet has afflicted my brain in a very special way#so now after IsaLY i have almost a full set lined up#(you are an idiot; happy99; mydoom [debatable]; bonzi but in a more tasteful manner)#dont have a primary hyperfixation every other interest that spawns will smush into it
21 notes
·
View notes
Text
My computer virus (worm) oc Andy Melissa! (Virus puns) based on One weird tip and the MyDoom virus- he can change form and multiply. He loves to play solitaire on your computer
#computer art#computer virus oc#computer virus#webcore#computer worm#MyDoom#web#old computer#old web#he is gay#no pan actually#solitaire
2 notes
·
View notes
Text
MALWARE / VIRUS ID
[IMAGE ID: A flag with seven horizontal stripes, the center stripe being black with a gradient to the vibrant top and bottom stripes. There's an angular/geometrical version of the biohazard symbol in the middle. The first flag has a bright red symbol with darker red stripes, the second flag has a bright green symbol with darker green stripes. /ID END]
— Someone who is queer, non-human, alter-human, therian, otherkin, and/or fictionkin who's identity is associated with malware, computer viruses, trojans, "computer worms", or anything similar.
— Someone who is malwarekin/viruskin/malwaregender/virusgender may or may not kin, identify as, or be associated with computer viruses/worms/trojans/malware, such as ILOVEYOU, You Are An Idiot, Mydoom, or others.
Pronouns associated with being a virus are:
— xe/xem/xemself
— computer/computers/computerself
— it/its/itself
— that/that thing/that things
— glitch/glitches/glitchself
— web/site/webself (or siteself)
— byte/bytes/byteself
+ OTHERS
FREE TO USE
#mogai#mogai coining#mogai flag#mogai term#mogai community#flag coining#liom#lgbt flag#queer flag#lgbt safe#mogai safe#liom safe#xenogender coining#xenogender#xenogender flag#xenogender flag coining#lgbt coining#lgbt identity#lgbtq#lgbtq coining#lgbtq identity#flag coining post#coining post#coining#gender coining#kin#alterhuman#otherkin#factkin#fictionkin
190 notes
·
View notes
Note
Salutations!
🐌🎤What is the maximum possible lifespan of malworms?
I'm very curious about it.
Malworms, as I imagine any darkner based on code rather than a physical object would be, are technically immortal in terms of age, but can die or “be deleted” by numerous things.
A malworm's actual average lifespan is barely six months. In their natural environment, below the Surface Web and inside the dark and maze-like caverns of the Deep Web (the private part of the web that encompasses 90% of the internet, including anything from personal private files to the less than 0.01% Dark Web), malworms compete with other malworm species for resources, often killing and eating each other in the process. Malworms are considered such pests that other darkners will gladly kill them before their population can get out of control.
As an invasive species on the Surface Web, malworms still don't live long. While they can multiply quickly and easily find victims at the start, their prey fights back. Whether it's through antivirus robots, the burning of nests, parasite testing kits, tracking trips, evacuation—the malworms are eventually killed. And, if they aren't, they'll eat every last program and starve within the destroyed city they created.
Spamton himself is around 21 years old when the fic takes place (2018), though he'd mentally be considered closer to the middle aged dumpster man we all know and love (HATE GET OUT OF MY HEAD GET OUT OF MY HEAD GET). Aside from malnourishment prolonging the time it took Spamton to reach adulthood, he gradually grew at a healthy rate from 10 ft to around 16 ft over 10 years.
Malworm growth plateaus past the 10 year mark. Their bodies keep regenerating cells and producing new eggs and venom indefinitely. However, their ability to successfully infect a victim typically declines, especially decades after their prime. Depending on what a malware program originally exploited, modern computers can easily detect and delete them, and other old malware can't even run on newer computers. So, older malworm infections are easy to detect, and sometimes can even be cured with modern medicine.
Some malworms do remain active, even 20 years later. Most notably is MyDoom, a 2004 computer worm widely considered the most destructive malware in history, which is still active to this day. I think it's much more exciting if Spamton's species falls under this group. The BIGSHOT malworm's whole thing is that it was an extremely destructive email worm that was forgotten because of its lack of any surviving records—whose to say it couldn't still steal all your passwords and brick your PC if someone actually could find a copy?
(One record does still exist. An unlabeled 3.5” floppy disk with a thousandth of a gigabyte of storage, buried in the dust of a cramped closet, and hidden within the obsolete computer room of a rural village's library. A poisoned apple, waiting for the bite, forgotten until the end of time.)
7 notes
·
View notes
Text
im going to edit this to be a proper introduction post eventually. probably
for now. list of malware (and other software) that has characters made based off of them:
-Melissa Worm
-ILOVEYOU
-Newton "Virus"
-Bonzi Buddy
-You Are An Idiot
-Goggle.com
-Leap-A/Oompa Loompa Worm
-Creeper
-Reaper
-Morris Worm
-Mydoom
-Mad Virus A
-Nuclear
-PH33R
-Fractureiser
-WannaCry
-Pixel (And its variants)
-LockerGoga
-Flip
-KinitoPET
to be updated if more are added
Category of non-malreapers
-Heron
-Flora
12 notes
·
View notes
Text
Would you still love me if I was a (Mydoom) worm?
2 notes
·
View notes
Note
I’ve had a dumb idea, how would slammer react to a large scale rts like hoi4 (where you play as an entire country throughout the world war period) how would it react to games without any actual characters as well like Tetris and how would it effect something like rule the waves 3 or the unity game dev engine? Would the slammer virus ever play with a user for entertainment or a challenge? Does the slammer virus keep any deals it makes with other viruses/.exes?
how would slammer react to a large scale rts like hoi4 (where you play as an entire country throughout the world war period)
1: Joke answer
Slammer: where the fuck am I? (standing in the middle of a battle field just so damn confused)
Actual answer: I think Slammer would treat a game like that similar to how plague Ink works, though honestly it's more likely the virus would just consume the games code to the point it becomes unplayable/unable to be opened.
how would it react to games without any actual characters
2: Honestly it would just leave games like that alone, there's not really any fun to be had in games like that for Slammer, the virus has bit of a sadistic side to it, and it likes putting others thru pain.
Would the slammer virus ever play with a user for entertainment or a challenge?
3: Basically would Slammer act like the original Sonic.exe in anyway? I like to think yes if they got powerful enough Slammer Prime, would likely start to mess with actual people and make a player witness everything it does to a game.
Slammer would also leave cryptic messages throughout the user's computer and alter their computer's files, though it has no way to actually harm them, the virus would at some point be powerful enough to make it seem like it could. By controlling any and all electronics inside someones home.
Sometimes it all ain't about killing, it's about striking fear and making humans/players think you can kill them at any time, breaking down someone's mind to the point of insanity is much more fun for Slammer.
Does the slammer virus keep any deals it makes with other viruses/.exes?
4: Officially Slammer has not met any virus or exe's, but if they did well they would likely yes keep the deal they make Slammer might be sadistic, but they also remain loyal even if Slammer became powerful enough to kill them. The only time Slammer would betray someone is if they tried to first.
Slammer isn't above assimilating other virus/exe's though and I know for a fact, Slammer has at least assimilated another virus known as MyDoom, Slammer uses that viruses ability's to travel thru emails it was able to assimilate it easier since that was another worm virus.
But say Slammer did assimilate another exe? Yes they'd keep some of the exe's traits at least in their Prime version, so the more exe's the more Slammer primes Sonic form would be altered slightly.
Mod Monnie: Bonus Answer for a question you didn't ask but it's important!
I've stated in the past but Slammer uses they/them, it/it's pronouns HOWEVER if it has a host from a game aka Slammer Prime and Sonic? it will take it's hosts pronouns as well.
So Slammer Prime (Slammer Sonic) would be They/Them, It/It's and He/Him.
#Sonic The Hedgehog#Sonic.EXE#Sonic.EXE au#Sonic.EXE OC#Slammer Sonic#Slammer Virus#your computer virus has pronouns
8 notes
·
View notes
Text
"Where's Sasser?" It's one of my favorites but that would be too obvious :) it's actually tied with one other.
2 notes
·
View notes
Note
a little while back (like february?) u posted art for a computer virus oc, they were green and had a cigar and looked rlly cool
who are they? whats their deal?
This is Malus!! He's the manifestation of the IRL MyDoom virus!
He's part of a group of OCs I have based on tech issues and computer viruses, specifically he's part of a small group of "virus super criminals" that are currently imprisoned and the main group is trying to free them. The group of criminals consists of Cry (the Wannacry ransomware), Storm worm (virus of the same name), Offiz (the You Are An Idiot virus), Luvbug (ILOVEYOU virus), and the leader, Malus!
Malus is a typical hardcore but mysterious evil leader who's always got a plan. I'm hoping to draw these computer characters more often since people seem to like it when I do!
5 notes
·
View notes
Text
Viruses in the 2000s
These times were considered some of the most destructive years for computer viruses ever. With the introduction of new operating systems such as Windows 2000 and Windows XP and computers for personal use becoming more commonplace, hackers were able to gain access to personal devices faster and more easily.
Year 2000 - ILOVEYOU Bug
This is sometimes referred to as the love bug or love letter for you virus. This virus was created by 2 men located in the Philippines named Onel Guzman and Reonel Ramones. It was initially intended to steal the passwords of the person they sent the virus to because at the time they was struggling for money and wanted to gain access to the internet without having to pay for it. However, this virus managed to spread through multiple email addresses and eventually became a worldwide issue. It was able to infect over ten million windows PCs on and after May 5th 2000.
It would present itself in the form of an email sent by a user's contacts with the subject line "ILOVEYOU" attached with a .vbs file.
Once it was opened the following tasks were performed:
Made multiple copies of itself and overwrite personal files Made changes to the user's registry key Send itself to everyone in that user's contact list Downloaded a file call "WIN-BUGFIX.exe" designed to steal passwords
The destruction it cause was attributed to the it's design, since it was a visual basic script it was easy for a user to access the source code and have the virus do whatever they wanted it to do. It was said that it caused US$5.5 - $8.7 billion in damages worldwide and estimated to cost US$10-15 billion to remove the worm. within 10 days, over 50 million infections had been reported.
The two creators eventually were the targets of a criminal investigation by agents of the Philippines (NBI) due to the number of reports made to Sky Internet provider from European computer users alleging it was sent to them.
The creators were later arrested and placed under investigating but because there were no laws against writing malware in the Philippines at the time, both of the creators were released with all charges dropped. To this day, the creator states that they never intended for the virus to spread as far as it did and was shocked to find out how much damaged was caused.
Notable Virus from this Time Period:
Blaster Worm
Hackers exploited a vulnerability in windows software and had the virus spread itself without the end user having to open any attachment
Would turn a user's computer in a "zombie" and render it unusable while recruiting other computers for self-propagation
- Able to launch DDos attacks against the microsoft corporation's own websites.
Netsky:
Created in 2004 by Sven Johnson in June 2004
29 variants of the virus roamed the internet and was the source of many DDos attacks spread via email and copied itself onto the victim's local hard drive
at one time 25% of all viruses on the internet were all Netsky variants.
This lead to the creator being arrested but only received probation due to their age.
MyDoom:
Was considered a massive threat as the worm hit thousands of computers through what was called a "peer to peer" network where files were shared through one network to another.
Notable P2P sharing site example - Limewire
At the time, it was the fastest spreading email worm in history
Was thought to have disappeared but reappeared in 2009 targeting countries like South Korea and the US.
Sasser:
Created by the creator of the Netsky virus
Did not require email to spread, simply placed itself on an infected machine and started looking for vulnerable systems. Once found, it would contact those systems and tell them to download the virus.
Conficker:
Derived from the words "configuration" and "ficker"
Exploited vulnerabilities in windows and used the standard dictionary to crack administrator passwords
Over 200 countries were affected and it affected everyone from average users to major corporations and government organizations
Attacked the ministry of defense in the UK
Each variant is named after a letter (Conficker A,B,C,D and E)
3 notes
·
View notes
Text
Cyber Security Market Scope, Size, Share, Trends, Forecast By 2031
The cybersecurity landscape is witnessing a significant transformation with the growing adoption of the cybersecurity mesh. This innovative approach is redefining security architectures by enabling distributed enterprises to deploy and extend security precisely where it is needed the most. By decentralizing security measures and focusing on individual users and access points, the cybersecurity mesh is emerging as a rapidly growing strategy in the realm of IT security.
For Full Industry Insights: https://www.fairfieldmarketresearch.com/report/cybersecurity-market
The Concept of Cybersecurity Mesh
The cybersecurity mesh acknowledges that traditional network boundaries are becoming obsolete in today's interconnected world. Organizations are now required to create security perimeters around each user, allowing secure access to assets from any location or device. This model shifts policy enforcement to cloud services, focusing on assets rather than devices. By establishing smaller, individual perimeters around each access point, the cybersecurity mesh offers a robust framework to protect identities and restrict network access to authorized users or systems, whether on-premises or in the cloud.
IoT Security Adoption and Market Demand
The surge in IoT traffic is expected to drive cybersecurity market demand significantly. As enterprises across various industries adopt IoT devices to enhance operational efficiency and communication, the scope of cybercriminals' attacks broadens. The increasing adoption of these devices necessitates a cybersecurity model that provides greater visibility into network access points, user activities, and application usage. Businesses are turning to advanced cybersecurity solutions to inspect all network traffic, detect malicious activities, and address visibility issues arising from the large volume of IoT queries.
Types of Computer Viruses
In the evolving threat landscape, various types of computer viruses pose significant risks to organizations:
Malware: Including worms, Trojans, adware, and ransomware, malware is designed to damage computer systems, gain unauthorized access, or steal information.
Ransomware: This type of malware encrypts data, demanding payment or other actions to restore access. Even large enterprises and city governments have fallen victim to ransomware attacks.
Trojans: Requiring user action, Trojans often deceive users into running malicious programs or accessing harmful websites.
Top Destructive Cyber Viruses
Some of the most destructive cyber viruses include CryptoLocker Ransomware, Plug X malware, Zeus (Gameover) virus, Stuxnet worm, MyDoom worm, Sasser and Netsky worms, Code Red worm, Nimda virus, ILOVEYOU virus, Melissa virus, Cyborg Ransomware, GoBrut virus, Jokeroo malware, CryptoMix Clop Ransomware, Trojan Glupteba virus, Fake Windows Updates (Hidden Ransomware), and News Malware Attacks.
Hot Technologies in Cybersecurity
To combat evolving cyber threats, several hot technologies are gaining traction:
Context-Aware Behavioral Analytics: By using sophisticated behavioral analytics, companies can monitor and identify suspicious behavior or transactions, addressing the issue of overwhelming security alerts.
Next Generation Breach Detection: Combining machine learning and behavioral analytics, these technologies detect breaches and trace them to their source, tackling "zero-day" exploits.
Virtual Dispersive Networking (VDN): VDN splits messages into multiple parts, encrypts them, and routes them over different protocols on independent paths, enhancing encryption security.
Challenges in Cybersecurity
Despite the advancements, several challenges persist in the cybersecurity domain:
Low Cybersecurity Budget and High Installation Costs: Emerging startups often lack sufficient budgets to implement Next-Generation Firewalls (NGFWs) and Advanced Threat Protection (ATP) solutions. This limits the adoption of cybersecurity solutions, particularly in small businesses within developing economies.
Designing and Deploying Cybersecurity Solutions: Transitioning from a network perimeter-based approach to a user-based and application-based security model presents design and implementation challenges. This transition requires a thorough network analysis and a deep understanding of each user, device, application, and resource.
Regional Analysis
The North American region is at the forefront of cybersecurity advancements, with several prominent market players delivering cutting-edge solutions across various industries. Strategic investments, partnerships, and significant R&D activities contribute to the widespread deployment of cybersecurity solutions. Key players such as IBM, Oracle, Fortinet, Microsoft, and Trend Micro, along with several startups, are offering enhanced cybersecurity software solutions and services to meet customer needs, driving market growth in North America.
0 notes
Text
10 Most Damaging Computer Virus In History
A computer virus is a harmful program that sneaks into your device and takes control of it, changing how it works. It often pretends to be a safe program or file and can stay hidden until you open the program it’s attached to. List of Top 10 Most Damaging Computer Virus In History
ILOVEYOU – $15 Billion
ILOVEYOU, also known as the Love Bug, was a computer worm that originated in the Philippines in May 2000. It was distributed via an email attachment that appeared to be a love confession from a secret admirer.
2 Mydoom – $38 Billion
MyDoom is a computer worm that spread through email in 2004 and caused a lot of damage. It is considered to be one of the fastest-spreading email worms ever, affecting millions of computers around the world.
3 Sobig – $37 Billion
SoBig was a computer worm that first appeared in August 2003 and quickly spread through email attachments, causing an estimated $37 billion in damages.
4 Klez – $19.8 Billion
Klez is a computer worm that first appeared in 2001 and is considered one of the most damaging worms of all time. It is estimated to have caused $19.8 billion in damages, with its most significant impact felt in the United States and China.
5 WannaCry – $4 Billion
WannaCry was a type of ransomware attack that caused widespread damage in 2017, infecting more than 200,000 computers in 150 countries.
6 Code Red $2.4 Billion
Code Red was a computer worm that infected Microsoft IIS web servers running on Windows NT and 2000 operating systems in 2001.
7 Melissa
Melissa was a macro virus that was spread through infected email attachments in 1999. It caused widespread disruption by rapidly infecting computers and clogging email servers, resulting in an estimated $1.2 billion in damages.
8 Sasser $500 Million
Sasser was able to spread rapidly and caused significant disruption to computer networks worldwide. It caused significant damage, estimated at $1.1 billion. The worm was designed to scan for and infect vulnerable systems, causing them to crash or experience other issues.
10 Nimda
Nimda was a computer worm that caused significant damage in 2001. It spread through email and web servers, infecting computers and causing disruptions to businesses and individuals.
10 SQL Slammer -
SQL Slammer was a computer worm that caused significant damage in 2003. It targeted Microsoft SQL Server and Desktop Engine databases, infecting computers and causing widespread disruption.
0 notes
Text
Love Letter: I wonder if the deep web has x readers.
MyDoom: Please go to bed.
2 notes
·
View notes
Text
Malachi Dyer (MD/Doom)
It/She
Based on the MyDoom worm
A waiter in the same club as Melissa. MD is a quiet individual, keeping to its business more often than not. It works to keep the small place up, and has developed a friendship with Melissa that has ended up with it seeing her like a daughter.
Under the secret identity of Doom, she is also the most feared hitman TechnicOut has to offer. A silent killer that has not missed once, she carries the highest kill count in the company with big difference from the second. MD is insistent on leading a double life, up until the two collide, and she's forced to make a choice of which one she values more.
2 notes
·
View notes
Text
computer viruses
its almost halloween, and im really excited. heres some worms for you. ----- MyDoom 38.5 billion dollars, thats alot right? thats like.. some rich guys net worth right..??? nope! thats how much money in damages mydoom caused. being one of-if not the-worse computer viruses in history, mydoom will remain in what i call the computer virus hall of fame forever. well. its in my hall of fame. mydoom was known for its fast spread, ability to take down websites, and just the massive fucking impact it had. its also known a novarg like many at the time (2004) mydoom was email spread. it scraped addresses from infected computers and sent copies of itself to thoose addresses. infected machines were roped into a "bonnet", or a series of DDoS attacks ( distributed denial of service ) which were intented to shut down websites and servers. its rumored to have shut down a website for 2 weeks. this virus targeted primarily one website, which doesn't seem like alot, but when you have millions of computers all adding up agaisnt one website its. alot. mydoom was once responible for 25% of all emails sent. its still around (as of 2020 from the hp website ) and makes up about 1% of all phishing emails. (demonstration of mydoom can be watched here, more information here ) a hefty reward was offered for the creator of this virus, but they were never caught. --- WannaCry ransomware strikes again! you thought it was gone. think again you stupid bitch look whats here wannacry was a crypto ransomware that took over your files and held them hostage, demanding money for them back. in this case- it was 300 dollars bitcoin, which hit especially hard since it was in the 2017 bitcoin craze. while holding your files hostage, it would give directions on how to give the bitcoin, and even give you a timer on how long you had left to pay! how sweet! no. the price raised every two days, the deadline being a week before your files were gone. and even when you did pay the money, no files were returned. ----------- that concludes. the viruses for today. sorry for missing like two days i exploded
23 notes
·
View notes