{"id":28255,"date":"2022-06-18T11:11:43","date_gmt":"2022-06-18T11:11:43","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=28255"},"modified":"2023-08-03T11:32:22","modified_gmt":"2023-08-03T11:32:22","slug":"top-5-notorious-malware-attacks-of-all-time","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/top-5-notorious-malware-attacks-of-all-time\/","title":{"rendered":"Top 5 Notorious Malware Attacks of all Time"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">You may not know it, but at least one <\/span><b>malware attack<\/b><span style=\"font-weight: 400;\"> occurs every 39 seconds. Sounds terrifying, right?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019ll discuss some of the most<\/span><b> notorious cyberattacks<\/b><span style=\"font-weight: 400;\"> in this blog. You\u2019ll get a better idea of how hackers have succeeded in accessing confidential data, defrauding victims, and even stealing money.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But before that: <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-malware-and-how-can-you-prevent-it\/\"><b>What is a malware attack<\/b><span style=\"font-weight: 400;\">?<\/span><\/a><span style=\"font-weight: 400;\"> Well, malware is short for malicious software developed to damage a system, spread other malware, or steal crucial data. Generally, its purpose is to make money or defraud an individual or company.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, now that you\u2019ve got a fair idea of <\/span><b>what a malware attack is<\/b><span style=\"font-weight: 400;\">, let\u2019s look at the five <\/span><b>most notorious malware attacks<\/b><span style=\"font-weight: 400;\"> of all time.<\/span><\/p>\n<h2><b>An Early Case of Social Engineering via Email<\/b><\/h2>\n<p><a href=\"https:\/\/easydmarc.com\/blog\/social-engineering-a-complete-guide\/\"><span style=\"font-weight: 400;\">Social engineering<\/span><\/a><span style=\"font-weight: 400;\"> is a tactic to persuade someone into sharing confidential details or transferring money by impersonating a trusted person or company. Attackers use fake email addresses that look similar to the original one. This makes it difficult for victims to catch the differences at first glance.<\/span><\/p>\n<h3><b>A Real-Life Incident<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In 2020, <\/span><b>Barbara Corcoran<\/b><span style=\"font-weight: 400;\">, the judge of the famous show \u2018Shark Tank,\u2019 was tricked into paying $380,000. She became a victim of a social engineering email that hackers sent. The <\/span><b>notorious cyberattack<\/b><span style=\"font-weight: 400;\"> was successful because the scammers created an email address similar to her assistant\u2019s official email address. However, it had a minor misspelling, which went unnoticed by Barbara.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The email had a fake invoice from FFH Concept GmbH, a Germany-based marketing and <a href=\"https:\/\/www.adobe.com\/express\/create\/advertisement\">advertising<\/a> company. It was meant for real estate renovations, something which Barbara frequently invests in. Hence, it didn\u2019t create any suspicion, which is why she asked her bookkeeper to wire the invoiced amount to the fake account.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Barbara realized the scam only once the bookkeeper carbon copied (CC) her assistant\u2019s actual email address in a follow-up confirmation email. The businesswoman later confirmed the conjecture by tweeting, \u201c<\/span><i><span style=\"font-weight: 400;\">Lesson learned; Be careful when you wire money<\/span><\/i><span style=\"font-weight: 400;\">!\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We can all learn a lesson here, no?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h2><b>A Case of Exploiting a Zero-Day Vulnerability<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A zero-day vulnerability is a flaw in the system known only to hackers. They exploit it to attempt a <\/span><a href=\"https:\/\/easydmarc.com\/blog\/11-types-of-malware-and-how-to-recognize-them\/\"><b>malware attack<\/b><\/a><span style=\"font-weight: 400;\"> before vendors know and patch it. It\u2019s one of the most dangerous <\/span><a href=\"https:\/\/easydmarc.com\/blog\/top-10-most-common-types-of-cyber-attacks\/\"><span style=\"font-weight: 400;\">cyberattacks<\/span><\/a><span style=\"font-weight: 400;\"> as you can\u2019t take preventive measures against an unknown vulnerability.<\/span><\/p>\n<h3><b>A Real-Life Incident\u00a0<\/b><\/h3>\n<p><b>Stuxnet<\/b><span style=\"font-weight: 400;\">, one of the <\/span><b>most notorious malware attacks <\/b><span style=\"font-weight: 400;\">uncovered in 2010, was believed to have been under development since 2005. It\u2019s a computer worm designed to manipulate vulnerabilities in specific industrial control systems, causing equipment breakdown.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It works by feeding false data into the system, which disrupts the normal functioning of machines. The malicious software targets supervisory control and data acquisition or SCADA, a structure meant to control computers, networked data communications, and user interfaces for superintending processes. It was supposedly\u00a0 created to cause massive damage to Iran\u2019s nuclear program through <\/span><b>malware attacks<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Though none of the countries have confessed openly, the malware is believed to be jointly developed by the United States and Israel as a cyberweapon. It reportedly damaged almost 20% of Iran&#8217;s nuclear centrifuges. Moreover, Stuxnet infected more than 200,000 computers and caused 1,000 machines to cease functioning.<\/span><\/p>\n<h2><b>The Most Famous Ransomware<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Ransomware is a <\/span><span style=\"font-weight: 400;\">malware<\/span><span style=\"font-weight: 400;\"> designed to access data or computer systems that hackers usually encrypt until a ransom is paid. There are chances of repeat <\/span><b>malware attacks<\/b><span style=\"font-weight: 400;\">, especially when the company or individuals don\u2019t take adequate measures to clean the system.<\/span><\/p>\n<h3><b>A Real-Life Incident\u00a0<\/b><\/h3>\n<p><b>RobbinHood Ransomware<\/b><span style=\"font-weight: 400;\"> is considered among the<\/span><b> top 10 most notorious cyberattacks in history<\/b><span style=\"font-weight: 400;\">. It was first detected in 2019 after exploiting several Maryland and Greenville systems. The authorities reported accumulative extortion of almost $1.5 million. However, scammers didn\u2019t use the money to help the poor like the crusader in the famous English folklore.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As per reports, victims are asked to transfer the ransom of anywhere between 3 and 13 Bitcoins for a single infected system. If victims don\u2019t pay within the specified range, the ransom increases by $10,000 each day. After 10 days of no ransom transfer, they\u2019ll lose their data forever.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">RobbinHood gains access through trojans or brute-force attack techniques. It may even remove any existing backup file to succeed in receiving a ransom.<\/span><\/p>\n<h2><b>Trojan Attacks Against Financial Institutions<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A trojan attack is a malware attack attempted to damage, disrupt, or intercept your data or network. It either looks like a legitimate program or enters your system unnoticed, thus loading and executing malicious script to cause you harm.\u00a0<\/span><\/p>\n<h3><b>A Real-Life Incident\u00a0<\/b><\/h3>\n<p><b>Zeus <\/b><span style=\"font-weight: 400;\">is<\/span> <span style=\"font-weight: 400;\">a<\/span> <a href=\"https:\/\/easydmarc.com\/blog\/12-types-of-phishing-attacks-and-how-to-identify-them\/\"><b>phishing attack<\/b><\/a><b> malware that targets<\/b><span style=\"font-weight: 400;\"> Microsoft Windows to obtain financial information. It\u2019s designed to steal banking credentials using a software keylogger that tracks and records keystrokes as you type.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It was first detected in 2007 when hackers used it to steal data from the United States Department of Transportation. Almost two years later, it was found that Zeus exploited over 74,000 file transfer protocol (FTP) accounts of Bank of America, NASA, Monster.com, ABC, Oracle, Play.com, Cisco, Amazon, and BusinessWeek.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s among the <\/span><b>top notorious malware attacks<\/b><span style=\"font-weight: 400;\"> as it has affected millions of machines and spawned new malware using its source code. Some of its variants can even get around the two-factor authentication security feature. Originally, it attacked only Microsoft Windows OS, but the latest variants can affect Symbian, BlackBerry, and Android mobile devices as well.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Although the original version of Zeus has been neutralized, new and emerging malware built off its code are still a threat.\u00a0<\/span><\/p>\n<h2><b>Leveraging COVID-19 Fears<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The spread of coronavirus increased the number of <\/span><b>phishing attacks<\/b><span style=\"font-weight: 400;\"> through<\/span><b> malware<\/b><span style=\"font-weight: 400;\">. One such ransom-demanding malware is <\/span><b>CovidLock<\/b><span style=\"font-weight: 400;\">. It\u2019s an application claiming to provide real-time statistics about COVID-19, but convinces users to grant administrative access during installation.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This permits it to access and encrypt contacts, photos, videos, social media accounts, etc. until a ransom is paid. The scammers threaten to leak all the private information if the demanded amount isn\u2019t paid in Bitcoin.\u00a0<\/span><\/p>\n<h2><b>Final Thoughts<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Malware attacks are common, however your alertness can mitigate the damage. We hope the above <\/span><b>most notorious malware attacks<\/b><span style=\"font-weight: 400;\">, namely Stuxnet, RobbinHood Ransomware, Zeus, and CovidLock, will give you an insight into how they function.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Companies must educate their employees to read the signs of malware and know how to protect and clean their systems after an attack.<br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You may not know it, but at least &#8230;<\/p>\n","protected":false},"author":1,"featured_media":28256,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[204,290,199,296],"tags":[],"class_list":["post-28255","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity","category-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Top 5 Notorious Malware Attacks of all Time | EasyDMARC<\/title>\n<meta name=\"description\" content=\"The scope of some cyberattacks cannot go unnoticed. We discuss the five most notorious malware attacks here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/top-5-notorious-malware-attacks-of-all-time\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 5 Notorious Malware Attacks of all Time\" \/>\n<meta property=\"og:description\" content=\"The scope of some cyberattacks cannot go unnoticed. We discuss the five most notorious malware attacks here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/top-5-notorious-malware-attacks-of-all-time\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-18T11:11:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-03T11:32:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/06\/Top-5-Notorious-Malware-Attacks-of-all-Time.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-notorious-malware-attacks-of-all-time\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-notorious-malware-attacks-of-all-time\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"Top 5 Notorious Malware Attacks of all Time\",\"datePublished\":\"2022-06-18T11:11:43+00:00\",\"dateModified\":\"2023-08-03T11:32:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-notorious-malware-attacks-of-all-time\\\/\"},\"wordCount\":1050,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-notorious-malware-attacks-of-all-time\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Top-5-Notorious-Malware-Attacks-of-all-Time.jpg\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\",\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-notorious-malware-attacks-of-all-time\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-notorious-malware-attacks-of-all-time\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-notorious-malware-attacks-of-all-time\\\/\",\"name\":\"Top 5 Notorious Malware Attacks of all Time | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-notorious-malware-attacks-of-all-time\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-notorious-malware-attacks-of-all-time\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Top-5-Notorious-Malware-Attacks-of-all-Time.jpg\",\"datePublished\":\"2022-06-18T11:11:43+00:00\",\"dateModified\":\"2023-08-03T11:32:22+00:00\",\"description\":\"The scope of some cyberattacks cannot go unnoticed. We discuss the five most notorious malware attacks here.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-notorious-malware-attacks-of-all-time\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-notorious-malware-attacks-of-all-time\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-notorious-malware-attacks-of-all-time\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Top-5-Notorious-Malware-Attacks-of-all-Time.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Top-5-Notorious-Malware-Attacks-of-all-Time.jpg\",\"width\":1440,\"height\":910,\"caption\":\"Top 5 Notorious Malware Attacks of all Time\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-notorious-malware-attacks-of-all-time\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Malware\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/malware\\\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Top 5 Notorious Malware Attacks of all Time\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Top 5 Notorious Malware Attacks of all Time | EasyDMARC","description":"The scope of some cyberattacks cannot go unnoticed. We discuss the five most notorious malware attacks here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/top-5-notorious-malware-attacks-of-all-time\/","og_locale":"en_US","og_type":"article","og_title":"Top 5 Notorious Malware Attacks of all Time","og_description":"The scope of some cyberattacks cannot go unnoticed. We discuss the five most notorious malware attacks here.","og_url":"https:\/\/easydmarc.com\/blog\/top-5-notorious-malware-attacks-of-all-time\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-06-18T11:11:43+00:00","article_modified_time":"2023-08-03T11:32:22+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/06\/Top-5-Notorious-Malware-Attacks-of-all-Time.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/top-5-notorious-malware-attacks-of-all-time\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/top-5-notorious-malware-attacks-of-all-time\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"Top 5 Notorious Malware Attacks of all Time","datePublished":"2022-06-18T11:11:43+00:00","dateModified":"2023-08-03T11:32:22+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/top-5-notorious-malware-attacks-of-all-time\/"},"wordCount":1050,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/top-5-notorious-malware-attacks-of-all-time\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/06\/Top-5-Notorious-Malware-Attacks-of-all-Time.jpg","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity","Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/top-5-notorious-malware-attacks-of-all-time\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/top-5-notorious-malware-attacks-of-all-time\/","url":"https:\/\/easydmarc.com\/blog\/top-5-notorious-malware-attacks-of-all-time\/","name":"Top 5 Notorious Malware Attacks of all Time | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/top-5-notorious-malware-attacks-of-all-time\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/top-5-notorious-malware-attacks-of-all-time\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/06\/Top-5-Notorious-Malware-Attacks-of-all-Time.jpg","datePublished":"2022-06-18T11:11:43+00:00","dateModified":"2023-08-03T11:32:22+00:00","description":"The scope of some cyberattacks cannot go unnoticed. We discuss the five most notorious malware attacks here.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/top-5-notorious-malware-attacks-of-all-time\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/top-5-notorious-malware-attacks-of-all-time\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/top-5-notorious-malware-attacks-of-all-time\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/06\/Top-5-Notorious-Malware-Attacks-of-all-Time.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/06\/Top-5-Notorious-Malware-Attacks-of-all-Time.jpg","width":1440,"height":910,"caption":"Top 5 Notorious Malware Attacks of all Time"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/top-5-notorious-malware-attacks-of-all-time\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"Malware","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/malware\/"},{"@type":"ListItem","position":6,"name":"Top 5 Notorious Malware Attacks of all Time"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/06\/Top-5-Notorious-Malware-Attacks-of-all-Time.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/28255","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=28255"}],"version-history":[{"count":0,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/28255\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/28256"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=28255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=28255"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=28255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}