Malwareaware

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 4 June 2013

There is no good malware: Part 2.

Posted on 09:30 by Unknown
Before I begin, did you read Part 1 that was published 2 days ago? Because if not, now would be a good time to, and you can find it here. So go read it, I'll wait.


Got it? Good

Sony was not the first case of a company attempting to stop software piracy by use of malware. And I certainly wish that whoever thought to place rootkits on CDs would have looked back and saw that someone already tried something like that. I speak of a virus that is considered by many to be the first virus for MS-DOS. So we are going back quite a ways, back to January 1986. This virus, called Brain, infected the boot sector of storage media formatted with the DOS FAT file system.

The virus was only meant to target those that infringed copyright.

This virus was written by two brothers in an attempt to protect their medical software from piracy. Brain affected MS-DOS by replacing the boot sector of a floppy disk with a copy of the virus. The real boot sector is moved to another sector and marked as bad. The disk label is changed to ©Brain, and the following text can be seen in infected boot sectors:

"Welcome to the Dungeon (c) 1986 Brain & Amjads (pvt) Ltd VIRUS_SHOE RECORD V9.0 Dedicated to the dynamic memories of millions of viruses who are no longer with us today - Thanks GOODNESS!! BEWARE OF THE er..VIRUS : this program is catching program follows after these messages" 

The virus was only meant to target those that infringed copyright. So when the brothers began to receive a large number of phone calls from users from around the world demanding that they disinfect their machines, the two brothers were stunned and attempted to explain to outraged callers that their intention had not been malicious.

Thank You for reading. As always, I invite readers to comment below with any questions or comments. And if you were a user infected with Brain, I even more so invite you to comment and share your story, should you be able to recall. 
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Windows | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • How to remove System Doctor 2014
    There is a new rogue AV making the rounds on the web called System Doctor 2014. For those that have just started reading my blog or for thos...
  • What are Bitcoin Miners?
    For my first post about Bitcoins, and for what I wish to be my last about the subject, we are going to be talking about what Bitcoin miners ...
  • How to keep spies from monitoring you through your computer or your phone.
    Those of you in The United States of America have most likely heard about that whole IRS scandal and the accompanying scandals of wiretappin...
  • Spotlight on Malware: The Gruel Worm.
    It's been around since Windows 2000, but there still is not a way to remove this worm without formatting the hard drive. I speak of the ...
  • I am going to be a billionaire!
    For those of you that have been reading my blog for some time, you know I like to mess with scammers, fake tech support and the like. But th...
  • Use VBScript to pull a joke on your friends.
    Do you want to play a trick on your friends, family, or coworkers? Well this one's for you. You can make a fake piece of malware on your...
  • Spotlight on Malware: MyDoom
    The MyDoom Windows worm, also known as Novarg, and Shimgapi will be the subject of our focus for this post. The MyDoom worm was first discov...
  • CryptoLocker as of 11/3/2013
    If you have read my other posts on this, you know. But for those of you who do not, there is a piece of ransomware that has been making the ...
  • The Big Game: Who's on our side?
    I recently helped a friend of mine remove malware from their computer when she be one mused on how lonely my job must be. "It must be s...
  • Java: No more coffee for you.
    Odds are that every blogger that has a tight focus on computer security has authored a blog post about Java. So why am I wasting your time? ...

Categories

  • Android
  • History Of
  • iOS
  • Java
  • Macs
  • Passwords
  • Removal Guides
  • Spotlight On Malware
  • The CryptoLocker Saga
  • What Does It Mean?
  • What's in a name?
  • Windows

Blog Archive

  • ▼  2013 (151)
    • ►  November (10)
    • ►  October (5)
    • ►  September (15)
    • ►  August (22)
    • ►  July (26)
    • ▼  June (17)
      • How to remove the Reveton Ransomware (UPDATED)
      • News on the new blog.
      • Why read my blog?
      • 6 outdated gadgets that we still use.
      • Why malware writers write malware.
      • Interrupting the fake tech support scammer: Part 2
      • Interrupting the fake tech support scammer: Part 1
      • I am going to be a billionaire!
      • Use VBScript to pull a joke on your friends.
      • Armor For Android
      • 12,000 Views.
      • Fake Tech Support Conversations: FAILS
      • Malwarebytes Anti-Malware
      • Spotlight On Malware: The Ari Virus.
      • There is no good malware: Part 2.
      • How to remove System Doctor 2014
      • There is no good malware: Part 1.
    • ►  May (25)
    • ►  April (15)
    • ►  March (7)
    • ►  February (6)
    • ►  January (3)
Powered by Blogger.

About Me

Unknown
View my complete profile