answersLogoWhite

0


Best Answer

CODE RED, 2001: Exploiting a flaw in Microsoft software, "Code Red" was among the first "network worms" to spread rapidly because it required only a network connection, not a human opening an attachment. Although the flaw was known, many system operators had yet to install a software patch Microsoft made available a month earlier to fix it.

The worldwide cost of the "Code Red" computer worms that were unleashed on the internet in July and August has reached about $2.6 billion, an independent research firm said Friday. While hefty, that was just a part of the total cost of attacks on computer systems this year. The cost of virus attacks on information systems around the world reached an estimated $10.7 billion so far this year, according to Computer Economics of Carlsbad, Calif. That compares with $17.1 billion for all of 2000 and $12.1 billion in 1999, Computer Economics said.

The payload of the worm included:

* defacing the affected web site to display:

HELLO! Welcome to *WebAddress*! Hacked By Chinese!

(The last sentence became a cliché to indicate an online defeat)

* trying to spread itself by looking for more IIS servers on the Internet.

* waiting 20-27 days after it was installed to launch denial of service attacks on several fixed IP addresses. The IP address of the White House web server was among those.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What was the code red virus designed to do?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

Who is the creator of code red virus?

Ian Cano


What is tunneling virus in details?

Tunneling is a virus technique designed to prevent anti-virus applications from working correctly. Anti-virus programs work by intercepting the operating system before it can execute a virus. Tunneling viruses try to intercept the actions before the anti-virus software can detect the malicious code. New anti-virus programs can recognize many viruses with tunneling behavior.


What is A computer program designed to cause damage to computer files?

VIRUS


What are example of malicious code?

Malicious code is any code designed to have an effect that is unintended by the receiver. Viruses, Spyware and Malware are three examples. Virus: Any code designed with the intent to damage files or disrupt hardware on a computer and to pass itself to other computers with the same intent. Spyware: Code designed to track your usage on the internet and to deliver that information to outside marketing computers and advertise services to you. Malware: Code designed to steal personal information such as usernames, passwords, bank account info, credit card numbers and report that information to people who may use your financial information to steal from you. Other types may be called trojans, backdoors, worms, spyware, adware, or bloatware.


What is a camouflage virus?

Virus program writers can have fake code within the programto prevent virus checkers from spotting the patterns of instructions which are commonly used in virus programs

Related questions

Who created code red?

Its unknown who created the code red (computer worm) virus.


Who is the creator of code red virus?

Ian Cano


Which is a destructive computer code or virus that is designed to activate a a specific time?

a bomb


What is a DS Virus Code?

A DS virus code is a virus in the ds


What is computer virus worm?

A virus is a piece of code that attaches itself to a program or file so it can spread from computer to computer. A worm, like a virus, is designed to copy itself from one computer to another, but it does so automatically.


Which ammunition color code represents ammunition designed for riot control?

dark red


How did the code red virus spread?

well guess what i know who created it and how it spreads first of all i created it and it is spreaded by using a butter knife or using the toilet or (going potty). thank you for listening. by:junior watson


What are the 10 computer?

Here is a list of 10 different Computer Viruses. The storm virus, Sasser virus, Nimda virus, Melissa virus, Code Red 1 and 2 virus, Morris virus, ILOVEYOU virus, Brain computer virus, Conflicker, and Elk cloner are 10 different computer viruses.


How can virus bypass antivirus?

First hacker make the virus and scan it for virus... He then looks at the virus definition Anti-Virus gives to his virus Then Hacker tries to remove that anomaly by changing the code... He then crypts his virus with a encryption program specially designed to encrypt the viruses known as Crypters. Crypters encrypts the virus code in byte format using encryption algorithms. That way anti-virus won't have a chance to detect it. But as Anti-Viruses are becoming more strong, the viruses also... At the time of execution of crypted virus's code has to be decrypted... so that's where AV's hooks catches the virus. To remove this problem virus uses something called Portable Execution. This technique loads the virus code to memory, or into some other program like 'explorer.exe' and executes it. This way virus without even touching the Hard Disk of victim can do it's job and hence bypass the AV, just like a ghost.


What is tunneling virus in details?

Tunneling is a virus technique designed to prevent anti-virus applications from working correctly. Anti-virus programs work by intercepting the operating system before it can execute a virus. Tunneling viruses try to intercept the actions before the anti-virus software can detect the malicious code. New anti-virus programs can recognize many viruses with tunneling behavior.


What is a specific pattern of virus code?

Virus Signature


Bk virus nephropathy icd 9 code?

What is ICD 9 code for BK virus