Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Code Red Computer Virus

Katelyn M, Victor C, Katie A

Citations

Data / Numbers

Code Red would trigger a virtual lockdown, old.post-

gazette.com/nation/20030330codered0330p6.asp.

“Code Red (Computer worm).” Wikipedia, Wikimedia Foundation, 8 Aug. 2017, en.wikipedia.org/wiki/

Code_Red_(computer_worm)#Concept. Meinel, Carolyn. “Code Red: Worm Assault on the Web.” Scientific American, 28 Oct. 2002, www.scientificamerican.com/article/code-red-worm-assault-on

"The Spread of the Code-Red Worm (CRv2).” CAIDA, www.caida.org/research/security/code-red/coderedv2_analysis.xml#conclusions.

How does it compare to other computer viruses?

  • Code Red Version 1 - 359,000
  • ILOVEYOU - 420,000
  • WannaCry - 200,000

"On July 19, 2001, more than 359,000 computers were infected with the Code Red worm in less than 14 hours," says David Moore of the Cooperative Association for Internet Analysis. "At the peak of the infection frenzy, more than 2,000 new hosts were infected each minute."

It is one of the most popular computer virus outbreak, it has infected a large amount of computers, earning the popularity of this virus.

What is Code Red

How many computers have been infected to date?

  • Has infected over 359,000 machines

How many computers could become infected?

  • No more computers could be infected because most machines have virus software stopping the virus

What was the purpose of Code Red?

  • To spread the virus to other machines, then launch a Distribution Denial of Service (DDoS) to the White House cycling every month

Where are the most new cases being transported

  • There are no new cases since all servers have updated their virus software

About Code Red

Code Red Version 1

Why is it called Code Red?

  • Its called Code Red because of the amount of

Code Red Mountain Dew the eEye Digital Security

drunk while disassembled the worm.

- Code Red has many versions, we choose to do Code Red Version 1 because it is the original version and there were a lot more numbers to work with.

  • How can the virus be transmitted?

Through emails, it searches for IIS Servers then finds a section of code that is vulnerable, causing a buffer overflow

  • How “contagious” is the virus?

After It transmits via email and if open can cause damage and emails itself to 50 other people

  • Where does the virus come from?

From the Chinese, because many web pages had "Hacked by Chinese" with a red format

  • What are the symptoms?

Causes a buffer overload, allowing the attacker to complete control the server and run foreign code

  • When/where did the outbreak begin?

July 13th, 2001 found by eEye Digital Security employees Marc Maiffret and Ryan Permeh

Learn more about creating dynamic, engaging presentations with Prezi