What is the Chernobyl virus? (2024)

What is the Chernobyl virus? (1)

By

  • Katie Terrell Hanna

What is the Chernobyl virus?

The Chernobyl virus is a computer virus with a potentially devastating payload that destroys all computer data when an infected file is executed.

Since many files are executed during computer use, the virus is able to spread quickly and infect those files.

The Chernobyl virus is most notably recognized as the first virus known to have the power to damage computer hardware. The activated viral strain attempts to erase the hard drive and overwrite the system's BIOS as well.

The Chernobyl virus was actually a variant of a parent virus known as CIH, the initials for the alleged author of the virus, Chen Ing-Hau, a computer engineering student in Taiwan.

CIH is sometimes referred to as a "space filler virus," referring to its ability to clandestinely take up file space on computers and prevent antivirus software from running.

It was named after the famous Chernobyl nuclear disaster that occurred in the Soviet Union on April 26, 1986.

When was the Chernobyl virus circulated?

The virus was detected as early as 1998, but its payload was first triggered on April 26, 1999 -- which was the 13th anniversary of the disaster at the Chernobyl nuclear reactor.

Although U.S. and European computer users were affected, especially students and some businesses, most of Chernobyl's damage was wrought in Asia and the Middle East.

At the time, CIH variants would activate on the 26th day of each month, while others did their damage on April 26 or June 26.

Users of Microsoft Windows 95 and Windows 98 operating systems with machines containing motherboards with the Intel 430TX chipset were the most susceptible to contracting the CIH virus.

Thus, users of DOS, Windows 3.x, Windows NT, Windows 2000, IBM or Macintosh computers were not considered at risk at the time.

After the initial spread, several variants of the CIH virus emerged behind it:

  • CIH v1.2/CIH.1003 was the most common one and contained the string CIH v1.2 TTIT. It was activated on April 26.
  • CIH v1.3/CIH.1010.A and CIH1010 contained the string CIH v1.3 TTIT. They was also activated on April 26.
  • CIH v1.4/CIH.1019 is still circulating on a limited basis, contains the string CIH v1.4 TATUNG and can be activated on any day of the month.
What is the Chernobyl virus? (2)

How did the Chernobyl virus operate?

The Chernobyl parent virus, CIH, was spread via a portable .exe file format. It infected the host system by splitting its code up and inserting it into inter-section gaps within the infected files.

From there, it reassembled and routed its code segments in unused space within the P.E. header. This is how it earned its nickname, "Spacefiller."

The first payload would then overwrite the first megabyte of the hard disk and delete the partition table, causing the infected machine to execute the blue screen of death.

What is the Chernobyl virus? (3)

The second payload would rewrite the flash BIOS chip by replacing critical boot code with junk code. When executed properly, the computer would then not restart at all. However, it would sometimes not work on certain machines.

This was last updated in December 2021

Continue Reading About Chernobyl virus

  • 10 ways to prevent computer security threats from insiders
  • How does antimalware software work and what are the detection types?

Related Terms

What is cloud detection and response (CDR)?
Cloud computing requires a security approach that is different than traditional protections. Where does cloud detection and ...Seecompletedefinition
What is cybercrime and how can you prevent it?
Cybercrime is any criminal activity that involves a computer, network or networked device.Seecompletedefinition
What is threat detection and response (TDR)? Complete guide
Threat detection and response (TDR) is the process of recognizing potential cyberthreats and reacting to them before harm can be ...Seecompletedefinition

Dig Deeper on Threats and vulnerabilities

What is the Chernobyl virus? (2024)
Top Articles
Cloud Pricing Comparison 2023: AWS vs Azure vs Google Cloud
What's the difference between Azure Security Center, Azure Defender and Azure Sentinel?
Pollen Count Los Altos
It’s Time to Answer Your Questions About Super Bowl LVII (Published 2023)
Edina Omni Portal
Inducement Small Bribe
Restaurer Triple Vitrage
Brgeneral Patient Portal
Practical Magic 123Movies
Craigslist Kennewick Pasco Richland
Craigslist In South Carolina - Craigslist Near You
Www.megaredrewards.com
Devourer Of Gods Resprite
LA Times Studios Partners With ABC News on Randall Emmett Doc Amid #Scandoval Controversy
Sotyktu Pronounce
Revitalising marine ecosystems: D-Shape’s innovative 3D-printed reef restoration solution - StartmeupHK
Indiana Immediate Care.webpay.md
Bc Hyundai Tupelo Ms
Valentina Gonzalez Leak
Craigslist Panama City Fl
Parent Resources - Padua Franciscan High School
Who called you from +19192464227 (9192464227): 5 reviews
Itziar Atienza Bikini
T Mobile Rival Crossword Clue
Surplus property Definition: 397 Samples | Law Insider
Aspenx2 Newburyport
Bento - A link in bio, but rich and beautiful.
The Boogeyman (Film, 2023) - MovieMeter.nl
Kirk Franklin Mother Debra Jones Age
Great ATV Riding Tips for Beginners
Pokémon Unbound Starters
Boneyard Barbers
47 Orchid Varieties: Different Types of Orchids (With Pictures)
Metra Union Pacific West Schedule
Truis Bank Near Me
Sedano's Supermarkets Expands to Orlando - Sedano's Supermarkets
2012 Street Glide Blue Book Value
Columbia Ms Buy Sell Trade
How Many Dogs Can You Have in Idaho | GetJerry.com
US-amerikanisches Fernsehen 2023 in Deutschland schauen
Alston – Travel guide at Wikivoyage
Academic Notice and Subject to Dismissal
Nu Carnival Scenes
About Us
Killer Intelligence Center Download
Mega Millions Lottery - Winning Numbers & Results
25100 N 104Th Way
2487872771
Ocean County Mugshots
Pauline Frommer's Paris 2007 (Pauline Frommer Guides) - SILO.PUB
Latest Posts
Article information

Author: Aracelis Kilback

Last Updated:

Views: 5554

Rating: 4.3 / 5 (44 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Aracelis Kilback

Birthday: 1994-11-22

Address: Apt. 895 30151 Green Plain, Lake Mariela, RI 98141

Phone: +5992291857476

Job: Legal Officer

Hobby: LARPing, role-playing games, Slacklining, Reading, Inline skating, Brazilian jiu-jitsu, Dance

Introduction: My name is Aracelis Kilback, I am a nice, gentle, agreeable, joyous, attractive, combative, gifted person who loves writing and wants to share my knowledge and understanding with you.