Learning Library

← Back to Library

From Viruses to Ransomware: Malware Evolution

Key Points

  • Malware has transformed from early “just for fun” experiments and ego‑driven mischief into sophisticated, profit‑driven threats like today’s billion‑dollar ransomware attacks.
  • The original term “virus” described code that needed user interaction to spread, exemplified by the 2000 ILOVEYOU virus that caused billions in damage by disguising a script as a love letter attachment.
  • Worms differ from viruses by being self‑propagating without requiring user action, illustrating how malware evolved to become more autonomous and harder to detect.
  • Although many historic malware strains still exist in some form, modern threats focus on financial gain, data encryption, and extortion rather than mere notoriety.
  • The video concludes with practical tips for individuals to protect themselves, emphasizing awareness, cautious downloading, and up‑to‑date security measures.

Sections

Full Transcript

# From Viruses to Ransomware: Malware Evolution **Source:** [https://www.youtube.com/watch?v=h85G7dBqBKU](https://www.youtube.com/watch?v=h85G7dBqBKU) **Duration:** 00:21:13 ## Summary - Malware has transformed from early “just for fun” experiments and ego‑driven mischief into sophisticated, profit‑driven threats like today’s billion‑dollar ransomware attacks. - The original term “virus” described code that needed user interaction to spread, exemplified by the 2000 ILOVEYOU virus that caused billions in damage by disguising a script as a love letter attachment. - Worms differ from viruses by being self‑propagating without requiring user action, illustrating how malware evolved to become more autonomous and harder to detect. - Although many historic malware strains still exist in some form, modern threats focus on financial gain, data encryption, and extortion rather than mere notoriety. - The video concludes with practical tips for individuals to protect themselves, emphasizing awareness, cautious downloading, and up‑to‑date security measures. ## Sections - [00:00:00](https://www.youtube.com/watch?v=h85G7dBqBKU&t=0s) **Malware: Past, Present, Future** - The speaker outlines the historical shift of malware from early mischievous experiments to today's lucrative ransomware, previewing its current forms, future trends, and basic protection tips. - [00:03:02](https://www.youtube.com/watch?v=h85G7dBqBKU&t=182s) **Morris Worm and Zeus Trojan** - The speaker outlines the 1988 Morris worm’s accidental viral replication across the ARPANET and then explains Trojan horses, using the 2007 Zeus banking Trojan’s man‑in‑the‑browser credential theft as a prime example. - [00:06:11](https://www.youtube.com/watch?v=h85G7dBqBKU&t=371s) **Early Word Macro Malware** - The speaker recounts 1990s Word document macro viruses like Concept and Melissa, their hybrid worm behavior, and early rootkits, noting how early malware was noisy and visible. - [00:09:16](https://www.youtube.com/watch?v=h85G7dBqBKU&t=556s) **Ransomware and Info‑Stealer Threats** - The speaker explains ransomware extortion, citing WannaCry’s 2017 impact, and describes the rising threat of info‑stealer malware that captures passwords and personal data. - [00:12:37](https://www.youtube.com/watch?v=h85G7dBqBKU&t=757s) **IoT Malware and Mirai Botnet** - The speaker explains how unsecured Internet‑of‑Things devices are compromised by malware such as Mirai, creating massive botnets that unleash devastating distributed denial‑of‑service attacks—often without the owners’ awareness—and ties this threat to the growing prevalence of cryptocurrencies. - [00:15:54](https://www.youtube.com/watch?v=h85G7dBqBKU&t=954s) **AI-Enhanced Malware Targeting & Evasion** - The speaker explains how future AI models could automate malware planning, dynamically adapt attacks to evade detection, and use deepfake audio or visuals for sophisticated social‑engineering exploits. - [00:18:59](https://www.youtube.com/watch?v=h85G7dBqBKU&t=1139s) **Backup, Least Privilege, Firewalls** - The speaker outlines essential malware defenses—regular clean backups, limiting user admin rights, and using host‑ and network‑level firewalls that detect signatures and behavior—to mitigate infection and data loss. ## Full Transcript
0:00Malware is the invisible enemy of our digital age. 0:02Sometimes it's even hiding in plain sight and you just don't see it. 0:06You know that software you downloaded that you thought was perfectly okay? Well, 0:10maybe not. 0:11There could be something else inside. 0:13From harmless pranks in the early days of the internet 0:16to today's billion-dollar ransomware attacks, 0:19ransomware and malware has evolved, and it's not done yet. 0:23In this video, we're going to take a look at the evolution of malware: 0:26from where it started, what it looks like now, and where it could be going. 0:30And if you stick around until the end, 0:32you'll learn what you can do to protect yourself against it. 0:35Bear in mind that there are far too many types 0:37of malware to cover in this video, 0:39so I'll just summarize here and make some broad generalizations 0:42in the interest of simplicity and time. 0:44So if your favorite example of malware isn't mentioned, I beg your forgiveness. 0:49With that disclaimer out of the way, let's 0:50start with malware of the past. 0:53So we're going to take a look at how malware used to be. Now, 0:56it's not that these things don't exist anymore—and 1:00they still do exist in various forms—we 1:02just don't see them quite as much as we once did. 1:05Back in those days, malware was mostly experimental, or it was just mischief. Uh...it 1:10wasn't about money; 1:11it wasn't about...it was really more about curiosity, ego, and just disruption. So, 1:16if a guy could just make a name for himself 1:19by doing something on his PC, 1:21and then seeing that it showed up on the headlines, 1:24that was reward enough in and of itself. 1:26So let's take a look. Where did all this stuff start? 1:29Well, the...the original term that was used for all of these things 1:32that most people first became familiar with was the term virus. 1:36So a virus basically is malware 1:39that is attached to a file 1:41that needs user interaction in order for it to spread. 1:44And one of the biggest examples of these, although it certainly wasn't 1:48the first, was something known as the ILOVEYOU virus. 1:52Uh, in this case, and 1:54this was back in the year 2000 1:56that this came out and really did its damage, 1:59but it did billions of dollars in damage between 5 and 10 billion, 2:02according to some estimates. Basically, 2:03you got an email that came in 2:06and it said, "I love you" or "love letter" or something like that. 2:09It had a file in it, and if you double-clicked on it, it 2:12looked like it was going to be a text file; 2:14it turned out it was a Visual Basic script, 2:16which means it was inexecutable, 2:18it would run on your system, 2:20and then it would go start writing itself over a lot of different files, 2:23a lot of JPEGs and other files like that. 2:26So again, it required some user interaction, 2:28but it was damaging files on your system. 2:31Uh...nobody was making any money, just doing some damage 2:34and making some notorie... notoriety for the person who did it. 2:37Uh...another type is something we call a worm. Now, 2:40the difference between a virus and a worm sometimes gets a little bit dicey, 2:44but uh...the basic definition of a worm is it's 2:47self-replicating malware that spreads across networks. 2:50So it doesn't require any user intervention. 2:52It can just spread itself. 2:55So the...the really classical example, 2:58and really the first one that most people became 3:00aware of, was called the Morris worm. 3:02And it was written by a guy whose last name was Morris. 3:06It came out in 1988, 3:08and it was designed to basically 3:11uh...take a look at multiple vulnerabilities 3:13that were in systems in that day on what was known as the ARPANET, 3:17which was essentially the predecessor to today's internet. 3:20And it would go probing around seeing which systems 3:23had these vulnerabilities, and if it did, 3:25it would plant itself on those. 3:27The problem is, there was an error in the replication mechanism, 3:32and it would replicate itself to the same systems over and over again. 3:36And once this started going out, 3:38it became viral in terms of the way it spread. 3:41So, this worm now was going from one system 3:44to the next to the next, and then back to the first one, 3:46and then all of those others were going back to the first one 3:49and so on and so forth. 3:50So, this then basically took down 3:52large portions of what was the predecessor to the internet, uh...and 3:56it was something that maybe wasn't 3:59in...intended to be malicious, but it ended up being malicious in the long run. 4:03Another example of these are called Trojan horses, 4:06or Trojans for short. 4:08Uh...you know from Greek mythology, the story of the...the Trojan horse. 4:12Well, this is the same sort of thing. 4:14It's something masquerading as a legitimate software to trick users. 4:18So, one of the biggest examples of this is called Zeus. 4:22It was a banking Trojan, came out in 2007, 4:27and it was designed basically 4:29to...uh...to do credential theft. 4:31It did something that's known as a man-in-the-browser attack. 4:35So, it puts uh...a presence itself in your browser. 4:39So, when you go to your bank's website, it's sitting in there 4:42and it basically sees everything that you're typing as well as everything 4:46that's going back to the bank. 4:48And it's right there in the middle, 4:49and therefore it can...can change transactions, it 4:52can see your sensitive information and things like that. So, 4:55this was a big one. Again, cost a lot of money. Again 4:58in this case, it's masquerading as legitimate software 5:02but in fact has a...a deep-seated problem with it. 5:06Other types that were really less common, 5:09and we really don't see nearly as much of these anymore, 5:11would be things like boot sector malware. 5:14Well, why do we not see this? Well, think about it. 5:16We don't boot from floppies, 5:19and that's how most of these things were spread in those days. Uh...there 5:22was one called Michelangelo 5:24that came out in 1991 5:27that worked on the disk operating system—DOS—if 5:30any of you even remember that one anymore. So, 5:33it would be on the...the 5:35boot sector of the floppy drive, 5:38and then whenever you inserted it into a system and booted up, 5:41then this malware would implant itself on your system. 5:45So there were examples of that. 5:46Plenty of those back in the day. 5:48We don't use floppies so much, so we don't see those anymore. 5:50Another thing we don't see so much of anymore 5:53but was a big deal at one point: macro 5:55viruses. So, 5:57macros are things that could be embedded 5:59into Office documents like Microsoft document...documents 6:02like Word and PowerPoint and things like that. 6:05And these things would basically take advantage 6:08of the fact that you could embed code into those. 6:11You could have scripts or macros that were in a document. 6:15Most people thought of a DOC file 6:17as just being something that was read-only. 6:19It didn't really consider the fact that actually code could be inside that as well. 6:24Well, there was one called Concept, 6:26and it was called this because it basically was a proof of concept, 6:30came out in 1995. 6:33And basically when you open this Word Doc, 6:36it would just put up a message that says, "That's enough to prove my point." 6:40And a lot of people are like, "What in the world does that mean?" Well, 6:42it of course did prove the point. 6:44And later in 1999, 6:47Melissa came along—and not the person, but a Word Doc—uh...one 6:50of these macro viruses 6:52that was an attachment uh...to emails 6:56that then would send a copy of itself 6:58to the first 50 contacts that you had in your address book. 7:02So, this one was kind of a combination of macro, 7:06but it also had worm-like characteristics. 7:08And that's another thing to remember is that some of these things 7:11cross barriers and are hybrids of these. Um, 7:14one more I'll talk about is called a rootkit. 7:17And a rootkit 7:19was something that would basically hide malicious activity deep 7:24and persistent into the operating system itself. 7:27So this was one that you might not see any uh...signs of it, 7:31but it's gotten into the operating system, and now it's 7:34changing the way everything on your system operates. 7:37So back then, in summary, malware was loud 7:40and often visible: crash systems, 7:43it was showing strange messages and things like that. 7:45We don't see as much of that anymore, 7:47basically because we've got better operating system security, 7:51where the operating system vendors have done more to look 7:53for these kinds of things and put in some protections. 7:56We've got mal...better malware detection tools 7:59and more use of multifactor authentication 8:02so that if information is stolen, 8:04then if we have MFA in place, 8:06it's going to be harder to exploit some of those things. Okay, 8:10now let's take a look at malware of the present. 8:14What are we seeing, the 8:15kind of stuff today are the major threats. 8:18Well, we continue to see some of those things from the past, 8:21just maybe not quite as much uh...these days, 8:24although some of them still carry forward, for sure. 8:27But modern malware is smarter. 8:29It's stealthier, and above all, it's profitable. 8:32So it's not just about notoriety 8:34and trying to throw a monkey wrench into the system, 8:36It's about trying to see if I can actually profit from this. 8:41So that ends up being a major motivator 8:44for one of the major types of malware we see these days. 8:47And that's ransomware. 8:48With ransomware, there's 8:50basically two types that you can think about with these. 8:54One type of ransomware is basically, uh...here's 8:57your data, 8:58I've got your data, and I'm not going to give it back 9:01because I just encrypted it. 9:02And if you want to get it back, 9:04you got to pay me and then I'll give you the key, then 9:06you can have your data back. That's one type. 9:08Another major type of ransomware is basically, I've got a copy of your data, 9:14and I'm about to give it to the rest of the world. 9:16In this case, I'm going to extort you for money 9:19in order to keep me from telling the rest of the world 9:23whatever your sensitive data might be, 9:25which might be the secret sauce for your company. 9:27So two different types. Uh, 9:28one of the most famous examples, 9:31or infamous, if we want to think of it that way, 9:33examples of...of ransomware was a thing called WannaCry. 9:37And that's in fact what you wanted to do if this hit your system. Uh, 9:41it hit in 2017, 9:43targeted a lot of hospitals, but it could...could hit other systems as well. 9:47And basically what happened in this case is, 9:50uh...it would go and say, I've got your data encrypted 9:53and if you want it back, then you're going to have to pay us. 9:55And in fact, it cost organizations, 9:58estimates are anywhere from 4 billion to 8 billion worldwide, 10:02until they finally put an end to this one. 10:04And there's an interesting story behind that that you might want to research. 10:07Another type of malware 10:09that we're seeing an uptick on these days, lately—in 10:12fact, this came to us from the IBM X-Force 10:15Intelligence Index—uh...that 10:17there's a thing called info stealers. 10:20Info stealers are, just as their name implies, 10:23they are trying to steal things from you, 10:26and the thing they're trying to steal is info, like your password. 10:30So this is malware that sits on your system. 10:32When you go to type in your password, it's making a copy of that 10:35and then it sends that copy off to the attacker. 10:38Another thing it might try to get uh...in addition to passwords, it 10:42might try to get personally identifiable information about you. 10:46Maybe it looks on your system and sees your credit card number, 10:48or your government ID number, 10:51or your name and address and things like that. 10:53And that information then is sent to the attacker. 10:56They can then use that to get credit in your name, 10:59open a credit card or things like that. Uh...or 11:01if it's a business, they could be stealing 11:05uh...trade secrets and things like that. 11:07So another one in this. 11:08Like I said, we're seeing a...a rise on this type of...of malware. 11:13Finally, uh...in this space—actually not finally, 11:16but another category—is a RAT, a remote access Trojan. 11:21So I talked about Trojan horses in the past. Well, 11:24we still have Trojans. 11:26Now we see a lot more of them and a lot more damage 11:29being done from these kinds of things called RATs. 11:32A RAT is something that takes control of your system, 11:35but it's remotely accessible. So it's a remote access Trojan. 11:39In other words, you download the...the 11:42file on your system or it gets implanted on your system 11:45by something that you've done, most likely. 11:47And in that case, the bad guy 11:50now has complete control of your system remotely. 11:53So he can see whatever it is you type, 11:55whatever it is that's on your screen. 11:57If it's a mobile device or a laptop, can turn the camera on 12:01and look at you, can turn the microphone on 12:03and listen to everything you say, can track your comings 12:06and goings by...by checking the GPS. 12:09It's very, very invasive 12:11and it's very, very difficult in these cases to...to deal with some of these. 12:15One of the most pernicious examples of this is called Pegasus. Uh...this 12:19is one that dealt with a...a lot of journalists 12:23who were basically being stopped from being able to do their job 12:27because their systems were...were being infected by this mobile RAT 12:32that was going around and controlling all kinds of things. Very, very sophisticated. 12:37Not all of them are that sophisticated, but 12:39many of them are. So, 12:41this is one we really deal with a lot, 12:43and the consequences are devastating. 12:46Internet of Things. With IoT, essentially 12:48everything becomes a computer, 12:50and every computer can be hacked. 12:52So what that means is, everything can be hacked. 12:56That's the world of IoT 12:57from a malware perspective. 12:59And there's one particular example of this 13:02called the Mirai botnet 13:04that basically was a collection of IoT devices. 13:08All of those things like security cameras, 13:11uh...uh...DVRs, things like that, that you may have in your home... 13:14And these things were all infected with malware, 13:17this Mirai malware, 13:19and they were collected together 13:21and put into a botnet. 13:23So that means you have lots of these devices 13:26all over the world, 13:28and then you collect them and you have them perform 13:31a denial of service against whatever your target is. 13:34So they all start sending information into a system 13:38and can basically take it down. 13:40At that time, the largest distributed denial of service attack 13:43we'd ever seen on the internet came from Mirai botnet. 13:46So it was able to do a lot of damage. 13:48And the thing is, the people that have these devices... 13:50You've got your DVR, it still works. 13:53You don't know that you're in fact 13:54uh...basically accomplice 13:56to attacking other people's systems. 13:58And then, of course, if we're talking about the present time, 14:02you can't talk for...for too terribly long 14:04until you start talking about cryptocurrencies. 14:07So, if there's cryptocurrencies, then guess what? 14:10There's money. 14:12And if there's money, bad guys will go to where it is. So, 14:15there is a type of malware 14:17called a crypto jacker. 14:19You know that crypto mining is a way that people are able to make money. 14:23So what if they can silently hijack your hardware 14:26and then mine cryptocurrency, basically draining 14:29performance and power off of your system? 14:31So basically, they're using you 14:34and they're getting the profits. 14:36And you end up losing and they win. Okay, 14:38there we have the present, the 14:40kind of malware that we're mostly seeing these days. Now, 14:43we'll take a look at the future. 14:45Now here, we've got to look into the crystal ball. 14:48And nobody has a perfect crystal ball, 14:50so this is anyone's guess. 14:52But it seems like it'd be a safe guess to say that that future 14:56is going to have something to do with AI in large extent, 14:59because AI is really starting 15:01to launch into everything that we're seeing these days. So, 15:04for instance, uh...the next generation of malware is already forming, 15:08and we're beginning to see some of that. 15:11For instance, AI-augmented malware will adapt in 15:14real time, evading defenses and planning attacks intelligently. 15:18One example where AI could be involved 15:21is in the creation of malware. 15:23So imagine this case 15:25where you've got basically a description of a vulnerability. 15:30We call this a CVE—Common Vulnerabilities and Exposures report. 15:34That's a formal way that we describe 15:36some of these vulnerabilities and systems. 15:38And if I could feed that into an AI 15:41and have it write the exploit code 15:43that took advantage of that vulnerability. Well, 15:46in fact, there was a study that showed 15:48that the GPT-4 model in 87% of cases 15:52was able to do exactly that. 15:54So that's with the GPT-4 model today. The 15:57models of the future certainly will be more sophisticated and more capable 16:02of taking that and doing even more. 16:04So that's one aspect, is in the creation. 16:06How about in the execution 16:08of the malware attack? In this case... 16:11Now there's a lot of different steps that go along with this. 16:14One of them is the decision—trying to decide what is it 16:18that I'm going to try to attack in the first place? 16:21And what are...what kind of attack am I going to try to run? 16:24What are going to be the capabilities of that attack? So, 16:27we could also get it involved in targeting, 16:30figuring out what are the soft...soft targets that are out there, 16:34and ultimately using its intelligence 16:38to do evasion to make it harder to find. 16:41We've had, even in the past, this stuff called polymorphic malware, where 16:45whenever it would replicate itself, 16:47it would also change over time. 16:49And that made it harder for antivirus tools to detect, 16:52because the signatures were changing. The way 16:55the malware actually looked on the system 16:57was ever so slightly different. 16:59An AI-based system could be a lot smarter in doing that sort of stuff. 17:03So the potential here really is enormous. Now, 17:06another type of thing that might be involved that would leverage 17:09AI is using something called a deepfake. 17:13A deepfake is where the AI generates 17:16a realistic sounding version of your voice, 17:19or someone else's voice, or their image. 17:22And maybe imagine this: 17:24getting a call, a voice message 17:26that sounds exactly like your boss and tells you to do certain things. So, 17:30this is basically another type of malicious software 17:34that's generating this and maybe starts combining with some of these other capabilities. 17:38And we see a hybrid version that is far more sophisticated, 17:42far more difficult to detect 17:44and could do devastating damage. Okay, 17:46that's what we think AI might look like in the future, so 17:50we'll park that over there for right now. 17:53Now you need to live in the present 17:54and figure out what you need to do to stay safe. 17:57What actions do you need to take in order 18:00to keep from being a victim of all of this? 18:03Well, one of the most important, and I emphasize this 18:05on a lot of these videos, is keep your system patched. 18:08Keep it up to date with the latest software, 18:10because a lot of times, what these malware 18:13uh...examples are doing is taking advantage of vulnerabilities 18:17that are in the operating system, applications, databases, all this sort of stuff. 18:21And the vendor may have...have provided a patch, and 18:23if you haven't applied it, then the bad guys know how to take advantage 18:27and then the race is on. So, 18:29you need to make sure you're up to date with your software. 18:32You need to train yourself. 18:34And if you're running an organization, train your employees as well 18:37so that they know what kinds of behaviors 18:39they do that contribute to making the problem worse. 18:42That is, downloading untrusted code and doing those kinds of things. So, 18:46make sure that everybody's up to speed on what malware is 18:50and the various types. 18:52Uh...use the tried-and-true antivirus 18:54and now the newer class of endpoint detection and response tools. 18:59Uh...depends on which operating system you're on 19:02as to how effective some of these things will be. 19:04But there's something certainly to keep in your back pocket. Uh...some 19:07of these are better than others, some based on signatures. 19:10The more modern ones are based on behaviors and they're more adaptable. Uh...so 19:14these can...things can also help. 19:17Super critical here: make 19:19sure you have a backup of any important data. 19:22You have to assume that failure will occur. 19:25And if you have a backup, then the failure is not catastrophic. 19:29In that case, you can restore from backup. Also, 19:31make sure that your backups have not been infected 19:34by whatever malware is out there. So, 19:37very important to have that kind of capability. 19:40Another one, especially on desktop systems, I think, is to limit 19:45the access that the users have. 19:48Limit admin access. 19:50If an end user using a workstation doesn't really need 19:53admin access on that system, don't give it to them. 19:56Give them a lower level of privilege 19:58so that when they go and try to do certain 20:00things, or malware is running under their account, 20:03it won't have the ability to do a lot of damage 20:06because they're running just as a regular user, not as an administrator. 20:10You can use firewalls, uh...personal 20:12firewalls, essentially, that run on the system itself 20:16and look and see what uh... traffic is coming in. 20:19And maybe more importantly, some of these data 20:21that's being exfiltrated out of the system, 20:23and also network level firewalls 20:25that can look and see behaviors when we talk about these 20:28self-replicating type of uh...viruses and...and worms and things like that,we 20:33can uh...detect those kinds of things. 20:36And then can't see.... you...If...if 20:38you can't see it, you can't secure it. So, 20:40a security information event management system 20:43that gives you the overall view 20:45of the whole system and gives you that perspective so that you know what's happening. 20:49So, now we've taken a look at malware—malicious software. Past, 20:54present and future. 20:56Where is all this stuff going? Well, 20:58it started off basically as pranks, then 21:00it's moved to profit, and soon, potentially cyber weapons. 21:05As it evolves, we've got to evolve our defenses. So, 21:08bottom line? Stay curious, stay updated, 21:10and most importantly, stay safe.