Computer Virus Removal
Malicious Computer Viruses

Computer virus infections are very common, and for most of the users, it can be just a mild inconvenience that needs a thorough cleanup. However, in some of the cases, viruses can wreak havoc and turn your computer into a brick. In such situations, you need to seek help of expert computer virus removal team to get rid of the infection. Below are some of the most malicious computer viruses that have led to much damage to computers.


The ILOVEYOU virus is one of the most notorious and virulent among all the viruses ever created. This virus spread globally and it is estimated that it caused damages nearing to ten billion dollars. It is believed that about ten percent of all the computers connected to the internet were affected by this virus. The infection was so bad that many corporations and governments were forced to take their mailing systems offline to prevent the virus infection.

The ILOVEYOU virus was made by two programmers from Philippines. The virus made use of social engineering to make users open the mail attachment. The attachment will seem to be a love confession, which actually is a script posing as a normal text file. Once the user clicks on the attachment, the virus will send itself to all the contacts in the mailing list of the user and will overwrite files, making the computer unbootable. It was this virus that led to the enactment of the Ecommerce Law.

Code Red

This virus surfaced in the year 2001 and was developed by two digital security employees. It was named Code Red as the developers were drinking Code Red Mountain Dew while coding the virus. Code Red specifically targeted computers that were installed with Microsoft IIS web server and exploited buffer overflow vulnerability in the web server system. The virus left little to no trace on the hard drive and ran entirely on the computer memory with just a size of 3,569 bytes.

After infecting computer, the virus will make many copies of it and can end up eating much memory space and other system resources. The program will then launch a denial of service attack and also offers a backdoor access to the server. The website of the White House was also infected by this virus, and left behind a message “Hacked By Chinese!” It was estimated that the virus affected about two million servers across the world and resulted in a productivity loss of about 2 million dollars.


This is another virus that was made in 2004 by a student named Sven Jaschan. The payload of the virus was considered annoying, but the effects of it were very disruptive and affected the infrastructure badly. This virus made use of buffer overflow vulnerability in Local Security Authority Subsystem Service (LSASS). The virus also makes use of system resources to propagate to other computers and infect them.

The virus had widespread effects as many computers were not updated with the patch to the virus and resulted in an infection of more than a million. Sasser took out many critical infrastructures like public transportation, airlines, hospitals, news agencies, and many more. The overall damage caused by the virus was estimated to be 18 billion dollars.


PC Tech Support
Troubleshooting Tips

This virus was named after an exotic dancer from Florida and was created by a person named David Smith in 1999. The virus started as an infected Word document posted in a user group and claimed to share a list of login credentials for many pornographic websites. This lured many users to download the document and open it, triggering the macro inside to unleash the payload of the virus. After unleashing its outcomes, the virus mailed itself to fifty people in the address book of the user.

The propagation of the virus via email messages led to an increase in the email traffic resulting in a disruption of email services of large corporations and governments. The Melissa virus also corrupted some of the documents by adding a Simpson’s reference to them.


Zeus is a Trojan horse that was designed to attack and infect Windows computers and make them do criminal activities. The common tasks are form grabbing and browser keylogging. Most of the computers were infected via phishing scams or drive by downloads. This virus compromised numerous computers and FTP accounts from many multinational banks and corporations like Oracle, Cisco, Bank of America, and Amazon. The controllers of the Trojan made use of the virus to steal credentials of email accounts, social networks and banking accounts.

Zeus infected more than a million computers and the operation involved many people from across the globe to act as mules to transfer cash to the leaders in Europe. It is estimated that about seventy million dollars were stolen by the ring and hundred people were arrested in connection with it.

Tagged ,

Leave a Reply

Your email address will not be published. Required fields are marked *