It began quietly, almost like a prank. In the late 1980’s, computers were still new to most of the world, They were used in the universities, offices, and labs, not yet the lifeline of everyday life. But then, and invisible disease began to spread from floppy disk to floppy disk.
The first widely known virus was called the Brain Virus (1986), created in Pakistan by two brothers who claimed they made it to stop software piracy. Instead, it spread across the globe, infecting thousands of computers. Every infected disk carried their names and address, as if mocking the world: "We are here, and you can't stop us"
Viruses like Brain were just the beginning. Soon came more dangerous ones.
Michelangelo (1992):programmed to activate on March 6th, Michelangelo's birthday. It would corrupt hard drives, wiping out everything. For years, people feared turning on their PCs on that dayILOVEYOU (2000):disguised as a love letter in an email, this virus infected over 45 million computers in just days. It deleted photos, documents, and spread itself to every contact in the victim's inbox. Entire companies went offline and Governments panicked
These early viruses revealed a chilling truth: malware could spread faster than most people could even understand it. All it took was one click, one careless moment, and the infection would crawl into your machine and then leap to the next victim.
Unlike ransomware or spyware, viruses didn’t need money to cause chaos. Their power came from the sheer destruction they left behind. Lost files. Crashed systems. Days, even weeks, of recovery.
How Do Viruses Work?
A computer virus is a program that is designed to replicate itself and spread from one system to another. Unlike worms, which can travel on their across networks, viruses need human action to propagate. For example opening a file, clicking a link, or inserting an infected disk
Key Elements of a virus:
Replication: How it makes copiesA virus attaches itself to files or programs on your system. When that file is opened or executed, the virus code runs and writes copies of itself into other files or system locations. Some viruses also copy themselves to removable devices, such as USBs or other shared network folders, ensuring they spread to other machines. Essentially, the virus piggyback on files you use, every time the file is opened, the virus hitchhikes to a new host.
Activation Trigger: How It Knows When to StrikeA virus usually contains a conditional check, meaning it "waits" for a specific condition to be met. This could be:A specific date( like Michelangelo activating on March 6th)A specific action( opening a file, clicking a link, or booting the PC)A system state (detecting a certain type of software or environment)
Once the condition is true, the virus executes its payload. Until then it can remain dormant, invisible, and undetected.
Payload: How It Does the DamageThe Payload is just more code within the virus, but it can perform any action the infected program or user has permissions for. For example:Deleting Files: The virus can call system functions to remove or overwrite filesChanging settings: it can modify registry entries or configuration filesDisplaying messages: Simple graphical or text outputs on your screen
In short, the virus doesn’t need magic, it exploits the permissions of the program or user running it. If you can run a program, the virus piggybacked on that program can do the same things
Viruses are clever, but their mechanics are simple: replicate, detect a trigger, and execute the payload.
Understanding this helps people see why even a single click or file download can be enough to infect a system, and why prevention( like antivirus, safe browsing, and cautious downloads is so critical.
Viruses were blunt, destructive, and sometimes accidental, but they set the stage for everything that came after. From worms that move autonomously, to Trojans hiding in plain sight, and ransomware holding entire cities hostage, viruses were the spark that ignited the digital age of malware.
Next we will dive into worms, the self propagating malware that took the world by storm, spreading faster and more aggressively than any virus ever could.
Leave a comment