{"id":3123,"date":"2014-04-01T10:39:25","date_gmt":"2014-04-01T14:39:25","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=3123"},"modified":"2017-09-24T18:38:34","modified_gmt":"2017-09-24T14:38:34","slug":"careware","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/careware\/3123\/","title":{"rendered":"Careware: Top 5 Somewhat Useful Malicious Programs"},"content":{"rendered":"<p>In the days of cyberwars and cybermafia, it\u2019s hard to recall times when computer viruses and worms were just research projects or pranks. \u00a0Back then, there were no monetary incentive to write malware, and not every virus creator was evil. That\u2019s why some programmers explored the possibility of writing \u201cuseful\u201d viruses or tried to take care of minimizing the negative impact of their creations. In a few extraordinary cases, viruses were even thought to get rid of dangerous malware or optimize the computer\u2019s resources. Let\u2019s look at 5 of the most notable \u201ccareware\u201d (as opposed to malware) viruses of the past.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/04\/05111153\/careware-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4340\" alt=\"careware\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/04\/05111153\/careware-1.jpg\" width=\"640\" height=\"480\"><\/a><\/p>\n<p><strong>5. The Creeper (1971)<\/strong><\/p>\n<p>The first known computer virus in history was really academic research, and, as you might expect, it was harmless. It was called the Creeper, and it appeared in 1971, written by an employee of the US Ministry of Defense\u2019s Defense Advanced Research Projects Agency. This primitive worm looked for other computers on the network, which back then was a small, localized affair, copied itself to them and displayed the following message: \u201cI\u2019M THE CREEPER: CATCH ME IF YOU CAN.\u201d If Creeper found an existing copy of itself on a computer, it simply \u201cjumped over\u201d to another computer. It did not cause any harm to the computer system.<\/p>\n<p><strong>4. Stoned (1988)<\/strong><\/p>\n<p>Stoned was another \u201cfun\u201d virus whose main purpose was to promote a message to the user. It was first detected in 1988 in New Zealand. It was a boot virus that was modifying the boot sector of floppies instead of executable files. Just like Creeper, it did not cause any harm to the computer. It simply displayed a message on the screen during the boot time: \u201cYour computer is now stoned.\u201d Some samples also contained more specific calls to action: \u201cLegalize Marijuana.\u201d It seems that message finally reached its desired destination (namely U.S. politics) only in 2013.<\/p>\n<p><b>\u00a0<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/04\/05102359\/april1-stoned.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4343\" alt=\"april1-stoned\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/04\/05102359\/april1-stoned.png\" width=\"599\" height=\"390\"><\/a><\/b><\/p>\n<p><strong>3. HPS (1997)<\/strong><\/p>\n<p>The \u201cprank virus\u201d title is deservedly held by HPS, a program that was created specifically for the Windows 98 operating system but, in fact, spread months before this environment was released. One of the odd things about this virus was that it was only active on Saturdays: once a week it reversed non-compressed bitmap graphic objects. Typically it led to Windows startup and shutdown images being displayed in the mirrored state.<\/p>\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/tVPXeb-Xqqc?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span>\n<p><strong>2. The Cruncher (1993)<\/strong><\/p>\n<p>The Cruncher was a typical resident file virus of the nineties. It infected executable files and used an algorithm (stolen from then-popular DIET utility) to compress data and pack the infected file, so the infected file was shorter than the original, while remaining fully functional. This freed up room on the user\u2019s hard drive.<\/p>\n<p><strong>1.\u00a0 Welchia aka Nachi (2003)<\/strong><\/p>\n<p>The Welchia virus is a strong contender in the \u201cmost helpful worm\u201d contest. Back in 2003, when personal firewalls and regular software updates were extremely uncommon, it was possible that just plugging the network cord in could infect your computer. This was enabled by serious vulnerabilities in Windows network-related components and utilized by numerous network worms. One of the most widespread malware of this type was Lovesan, aka Blaster, which managed to paralyze entire networks in some companies. Welchia utilized exactly the same vulnerabilities to infect a computer, however its next actions were very unusual. It checked if Blaster was present in the processor memory: if so, it stopped its operation and deleted the entire malicious file from the disk. This was not the end of Welchia\u2019s mercy mission: after eliminating the malware, the \u201cbenign\u201d virus checked if there was an update in the system to patch the vulnerability through, and the worm penetrated the system. If not, the virus initiated a download from the manufacturer\u2019s site. Welchia then destroyed itself after completing all these operations.<\/p>\n<div class=\"pullquote\">Today, practically 100% of viruses are written with just one goal in mind: stealing money or confidential data<\/div>\n<p>Don\u2019t read this the wrong way though, even harmless or \u201cuseful\u201d viruses are unwanted on your devices.\u00a0 They might cause damage because of a programming mistake and even a malware creator may not be able to fix this. Even plain vanilla programs have negative side effects, like consuming your computer resources. However, the concept of \u201cnon-malicious malware\u201d itself is not relevant nowadays.<\/p>\n<p>\u201cToday, practically 100% of viruses are written with just one goal in mind: stealing money or confidential data,\u201d said Alexander Gostev, Chief Security Expert at Global Research &amp; Analysis Team, Kaspersky Lab.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the days of cyberwars and cybermafia, it\u2019s hard to recall times when computer viruses and worms were just research projects or pranks. \u00a0Back then, there were no monetary incentive<\/p>\n","protected":false},"author":32,"featured_media":3125,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[547,546,36,154],"class_list":{"0":"post-3123","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-april-1st","9":"tag-history","10":"tag-malware-2","11":"tag-viruses"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/careware\/3123\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/careware\/3253\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/careware\/3542\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/careware\/3541\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/careware\/3016\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/careware\/3508\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/careware\/4341\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/careware\/2879\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/careware\/3114\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/careware\/3508\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/careware\/4341\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/careware\/4341\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/april-1st\/","name":"April 1st"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3123"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3123\/revisions"}],"predecessor-version":[{"id":7198,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3123\/revisions\/7198"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/3125"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}