Jerusalem

aka 1813 / Friday the 13th / Israeli / Hebrew University

Jerusalem virus screen artifact
discovered
1987-10
origin
Jerusalem, Israel
reported by
Hebrew University of Jerusalem
author
unknown
family
Jerusalem
size
1813 bytes
platform
DOS
vector
COM and EXE files
payload
destructive, visual
trigger
Friday the 13th

Payload

On any Friday the 13th, deletes every executable file the user runs. Also slows the system noticeably and produces a black box on screen.

Trigger: Any Friday the 13th

The Jerusalem virus arrived in October 1987 at Hebrew University of Jerusalem, discovered and documented by Yisrael Radai. It belonged to a new category of threat: a file-infecting virus that could spread through both COM and EXE executables. But its real notoriety came from its payload. On any Friday the 13th, the virus would delete every executable file the user ran that day. Not sneaking around. Not hiding. Total destruction, announced and unavoidable.

The vector was elegant and terrifying. Jerusalem infected files silently, replicating through the file system and slowing the machine noticeably in the process. Users noticed their computers bogging down, but without widespread malware knowledge in 1987, they had no framework to understand why. Then came the date trigger. Friday the 13th arrived, and every program a user tried to execute vanished. Deleted outright. The damage was surgical: wipe your active tools, leave the system itself breathing.

The visual payload was similarly stark. A small black rectangle scrolled up the left side of the screen, a persistent artifact that meant the virus was awake and working. Not a skull, not text, not a message to call your mother. Just a box, creeping upward. Minimal. Haunting.

The Variant Explosion

What made Jerusalem historically significant wasn't the virus itself, but how it scattered. Hundreds of variants emerged globally within months. The virus became a template, a proof of concept that file-infecting payloads could propagate at scale. Security researchers who had dismissed earlier threats suddenly had to reckon with a new class of software that could hide inside legitimate executables and replicate without user knowledge.

Hebrew University's analysis of the original strain became foundational. Academic institutions, particularly in computer science, began serious forensic study of virus behavior. Jerusalem forced the security community to move beyond reactive patch work and start thinking about detection, classification, and prevention as disciplines.

The rumor of PLO involvement circulated widely, but it never materialized into proof. The virus appeared; attribution remained a ghost story told in early bulletin board system forums. The mystery itself became part of the legend.

A Date-Triggered Prophecy

In retrospect, Jerusalem represented a threshold moment: the first time a virus's payload was tied to calendar date rather than a random event or user action. This simple innovation made the threat more ominous. You could not just avoid a dangerous file. The virus lived inside files you trusted and used daily. It waited for a specific date to announce itself.

Thirty years later, Friday the 13th triggers remain a recurring motif in malware design. But Jerusalem was the original. A piece of software history that proved viruses could be patient, could hide, and could teach us something about the tension between trust and code.

Related specimens

Sources

last updated: 2026-04-12 :: curated by the_curator