recommended reading

How Computer Viruses Get Their Names


Heartbleed, Melissa, Klez, Nimda, and Sasser. All of these innocent sounding words could ruin your computer, steal your information and impact your digital life forever. These computer viruses and system vulnerabilities are the best at what they do: breaking stuff. But how did these terrors get their names? 

There is not one standardized way to name a viruses. These aren't hurricanes, there's no master list to turn to, and no authority that watches over them to regulate how their dealt with. Instead, there are three main avenues for virus naming: when the name is given to the virus as part of its programming; when the vector by which the virus is spread determines the name; and when a vulnerability is found and then named after the fact, usually by its discoverer.

Historically, back when viruses got around mainly through the forwarding of emails, the name of the threat would be based on the file name of the attachment. One of the worst viruses ever seen was called "ILOVEYOU." It spread like wildfire because of the pleasant sounding email subject and attachment (Love-letter-for-you.txt) The happy attachment turned out to be malicious code that overwrote existing files with copies of itself. 

Koobface and Vundo were named after the method by which they were spread. Koobface, an anagram of Facebook, was a worm that spread through the social media site. Vundo was a combination of Virtual and Mundo ("world" in Spanish), and it spread through virtual communities. 

Then, there are vulnerabilities like Heartbleed. Heartbleed was a bug found in the OpenSSL encryption service. The line of code that contained the glitch was CVE-2014-0160 — not exactly the most memorable name. Ossi Herrala, a system administrator at Codenomicon (the company which found the bug) came up with the name. Vocativ reported that Herrala, "thought it was fitting to call it Heartbleed because it was bleeding out the important information from the memory.” Because Heartbleed was such a terrible bug — security expert Bruce Schneier ranked it an 11 on a scale of 1 to 10 — it needed solid branding to get the attention it deserved. The catchy named Heartbleed, linked with the bleeding heart logo and a user-friendly website, was the perfection combination of marketing. It received the attention it needed, causing thousands of affected websites to construct patches and users to change passwords in record time.

As for some of the kookier named viruses, there's always a story behind it, usually as unique as the program itself. Melissa, one of the fastest-spreading viruses ever, was named after a stripper who programmer David Smith met in Florida. The Michelangelo virus would only activate on March 6th, the artist's birthday. Many have taken on the name of the celebrity who you are promised naked pictures of if only you click on a suspicious link. Some virus names are just glorification for their developer: Samy Kumar named the Samy Worm after himself, and the CIH virus is the initials of its developer, Chen Ing Hau. 

Regardless of how delightful the name is, be sure to run virus screenings regularly, and backup your data. I LOVE YOU affected over 50 million users and cost the U.S. $15 billion to remove. 

(Image via igor.stevanovic/

Threatwatch Alert

User accounts compromised

1 Million Online Gaming Accounts Exposed

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.