Introduction To Computer Viruses
Introduction To Computer Viruses
Introduction To Computer Viruses
VIRUS
&
ANTIVIRUS
SYSTEMS
INDEX
1. Introduction
2. General information
7. AntiVirus
8. AntiVirus Databases
9. Statistics
10.Conclusion
11.Forecast
The person might have a computer virus infection when the computer starts
acting differently. For instance getting slow or when they turn the computer on,
it says that all the data is erased or when they start writing a document, it looks
different, some chapters might be missing or something else ubnormal has
happened.
The next thing usually the person whose computer might be infected with virus,
panics. The person might think that all the work that have been done is
missing. That could be true, but in most cases viruses have not done any harm
jet, but when one start doing something and are not sure what you do, that
might be harmful. When some people try to get rid of viruses they delete files
or they might even format the whole hard disk like my cousin did. That is not
the best way to act when the person think that he has a virus infection.
What people do when they get sick? They go to see a doctor if they do not know
what is wrong with them. It is the same way with viruses, if the person does
not know what to do they call someone who knows more about viruses and they
get professional help.
If the person read email at their PC or if they use diskettes to transfer files
between the computer at work and the computer at home, or if they just
transfer files between the two computers they have a good possibility to get a
virus. They might get viruses also when they download files from any internet
site. There was a time when people were able to be sure that some sites we
secure, that those secure sites did not have any virus problems, but nowadays
the people can not be sure of anything. There has been viruses even in
Microsoft's download sites.
In this report I am going to introduce different malware types and how they
spread out and how to deal with them. Most common viruses nowadays are
macro viruses and I am going to spend a little more time with them. I am going
to give an example of trojan horses stealing passwords.
1995
Word Concept becomes one of the most prevalent viruses in the mid-
1990s. It is spread through Microsoft Word documents.
1996
Baza, Laroux (a macro virus), and Staog viruses are the first to infect
Windows95 files, Excel, and Linux respectively.
1998
Currently harmless and yet to be found in the wild, StrangeBrew is the
first virus to infect Java files. The virus modifies CLASS files to contain a
copy of itself within the middle of the file's code and to begin execution
from the virus section.
The Chernobyl virus spreads quickly via .exe files. As the notoriety
attached to its name would suggest, the virus is quite destructive,
attacking not only files but also a certain chip within infected computers.
Two California teenagers infiltrate and take control of more than 500
military, government, and private sector computer systems.
1999
The Melissa virus, W97M/Melissa, executes a macro in a document
attached to an email, which forwards the document to 50 people in the
user's Outlook address book. The virus also infects other Word documents
and subsequently mails them out as attachments. Melissa spread faster
than any previous virus, infecting an estimated 1 million PCs.
Bubble Boy is the first worm that does not depend on the recipient
opening an attachment in order for infection to occur. As soon as the user
opens the email, Bubble Boy sets to work.
Tristate is the first multi-program macro virus; it infects Word, Excel, and
PowerPoint files.
2000
The Love Bug, also known as the ILOVEYOU virus, sends itself out via
Outlook, much like Melissa. The virus comes as a VBS attachment and
deletes files, including MP3, MP2, and .JPG. It also sends usernames and
passwords to the virus's author.
W97M.Resume.A, a new variation of the Melissa virus, is determined to be
in the wild. The “resume” virus acts much like Melissa, using a Word
macro to infect Outlook and spread itself.
The “Stages” virus, disguised as a joke email about the stages of life,
spreads across the Internet. Unlike most previous viruses, Stages is
hidden in an attachment with a false “.txt” extension, making it easier to
lure recipients into opening it. Until now, it has generally been safe to
assume that text files are safe.
“Distributed denial-of-service” attacks by hackers knock Yahoo, eBay,
Amazon, and other high profile web sites offline for several hours.
2001
Shortly after the September 11th attacks, the Nimda virus infects
hundreds of thousands of computers in the world. The virus is one of the
most sophisticated to date with as many as five different methods of
replicating and infecting systems. The “Anna Kournikova” virus, which
mails itself to persons listed in the victim's Microsoft Outlook address
book, worries analysts who believe the relatively harmless virus was
written with a “tool kit” that would allow even the most inexperienced
programmers to create viruses. Worms increase in prevalence with
Sircam, CodeRed, and BadTrans creating the most problems. Sircam
spreads personal documents over the Internet through email. CodeRed
attacks vulnerable webpages, and was expected to eventually reroute its
attack to the White House homepage. It infected approximately 359,000
hosts in the first twelve hours. BadTrans is designed to capture passwords
and credit card information.
2002
Author of the Melissa virus, David L. Smith, is sentenced to 20 months in
federal prison. The LFM-926 virus appears in early January, displaying the
message “Loading.Flash.Movie” as it infects Shockwave Flash (.swf) files.
Celebrity named viruses continue with the “Shakira,” “Britney Spears,”
and “Jennifer Lopez” viruses emerging. The Klez worm, an example of the
increasing trend of worms that spread through email, overwrites files (its
payload fills files with zeroes), creates hidden copies of the originals, and
attempts to disable common anti-virus products. The Bugbear worm also
makes it first appearance in September. It is a complex worm with many
methods of infecting systems.
2003
In January the relatively benign “Slammer” (Sapphire) worm becomes the
fastest spreading worm to date, infecting 75,000 computers in
approximately ten minutes, doubling its numbers every 8.5 seconds in its
first minute of infection. The Sobig worm becomes the one of the first to
join the spam community. Infected computer systems have the potential
to become spam relay points and spamming techniques are used to mass-
mail copies of the worm to potential victims.
2004
In January a computer worm, called MyDoom or Novarg, spreads through
emails and file-sharing software faster than any previous virus or worm.
MyDoom entices email recipients to open an attachment that allows
hackers to access the hard drive of the infected computer. The intended
goal is a “denial of service attack” on the SCO Group, a company that is
suing various groups for using an open-source version of its Unix
programming language. SCO offers a $250,000 reward to anyone giving
information that leads to the arrest and conviction of the people who
wrote the worm.
Virus Origins
Computer viruses are called viruses because they share some of the traits of
biological viruses. A computer virus passes from computer to computer like a
biological virus passes from person to person.
Unlike a cell, a virus has no way to reproduce by itself. Instead, a biological
virus must inject its DNA into a cell. The viral DNA then uses the cell's existing
machinery to reproduce itself. In some cases, the cell fills with new viral
particles until it bursts, releasing the virus. In other cases, the new virus
particles bud off the cell one at a time, and the cell remains alive.
A computer virus shares some of these traits. A computer virus must
piggyback on top of some other program or document in order to launch. Once
it is running, it can infect other programs or documents. Obviously, the analogy
between computer and biological viruses stretches things a bit, but there are
enough similarities that the name sticks.
2.1.1 Viruses
A computer virus is a program, a block of executable code, which attach itself
to, overwrite or otherwise replace another program in order to reproduce itself
without a knowledge of a PC user.
There are a couple of different types of computer viruses: boot sector viruses,
parasitic viruses, multi-partite viruses, companion viruses, link viruses and
macro viruses. These classifications take into account the different ways in
which the virus can infect different parts of a system. The manner in which each
of these types operates has one thing in common: any virus has to be executed
in order to operate.
Most viruses are pretty harmless. The user might not even notice the virus for
years. Sometimes viruses might cause random damage to data files and over a
long period they might destroy files and disks. Even benign viruses cause
damage by occupying disk space and main memory, by using up CPU
processing time. There is also the time and expense wasted in detecting and
removing viruses.
2.1.2 Trojan
A Trojan Horse is a program that does something else that the user thought it
would do. It is mostly done to someone on purpose. The Trojan Horses are
usually masked so that they look interesting, for example a saxophone.wav file
that interests a person collecting sound samples of instruments. A Trojan Horse
differs from a destructive virus in that it doesn't reproduce. There has been a
password trojan out in AOL land (the American On Line). Password30 and
Pasword50 which some people thought were wav. files, but they were disguised
and people did not know that they had the trojan in their systems until they
tried to change their passwords.
According to an administrator of AOL, the Trojan steals passwords and sends an
E-mail to the hackers fake name and then the hacker has your account in his
hands.
2.1.3 Worms
A worm is a program which spreads usually over network connections. Unlike a
virus which attach itself to a host program, worms always need a host program
to spread. In practice, worms are not normally associated with one person
computer systems. They are mostly found in multi-user systems such as Unix
environments. A classic example of a worm is Robert Morrisis Internet-worm
1988.
Macro viruses spread from applications which use macros. The macro viruses
which are receiving attention currently are specific to Word 6, WordBasic and
Excel. However, many applications, not all of them Windows applications, have
potentially damaging and infective macro capabilities too.
A CAP macro virus, now widespread, infects macros attached to Word 6.0 for
Windows, Word 6.0.1 for Macintosh, Word 6.0 for Windows NT, and Word for
Windows 95 documents.
What makes such a virus possible is that the macros are created by WordBASIC
and even allows DOS commands to be run. WordBASIC in a program language
which links features used in Word to macros.
A virus, named "Concept," has no destructive payload; it merely spreads, after
a document containing the virus is opened. Concept copies itself to other
documents when they are saved, without affecting the contents of documents.
Since then, however, other macro viruses have been discovered, and some of
them contain destructive routines.
Microsoft suggests opening files without macros to prevent macro viruses from
spreading, unless the user can verify that the macros contained in the
document will not cause damage. This does NOT work for all macro viruses.
Why are macro viruses so successful? Today people share so much data, email
documents and use the Internet to get programs and documents. Macros are
also very easy to write. The problem is also that Word for Windows corrupts
macros inadvertently creating new macro viruses.
Corruption's also creates "remnant" macros which are not infectious, but look
like viruses and cause false alarms. Known macro virus can get together and
create wholly new viruses.
There have been viruses since 1986 and macro viruses since 1995. Now about
15 percent of virus
are macro viruses. There are about 2.000 macro viruses and about 11.000 DOS
viruses, but the problem is that macro viruses spreads so fast. New macro
viruses are created in the work-place, on a daily basis, on typical end-user
machines, not in a virus lab. New macro virus creation is due to corruption,
mating, and conversion. Traditional anti-virus programs are also not good at
detecting new macro viruses.
Almost all virus detected in the Helsinki University of Technology have been macro viruses,
according to Tapio Keihänen, the virus specialist in HUT.
Before macro viruses it was more easy to detect and repair virus infections with
anti-virus programs. But now when there are new macro viruses, it is harder to
detect macro viruses and people are more in contact with their anti-virus
vendor to detect an repair unknown macro viruses, because new macro viruses
spread faster than new anti-virus program updates come up.
2.3 Virus sources
Viruses don not just appear, there is always somebody that has made it and
they have own reason to so. Viruses are written everywhere in the world. Now
when the information flow in the net and Internet grows, it does not matter
where the virus is made.
Most of the writers are young men. There are also few university students,
professors, computer store managers, writers and even a doctor has written a
virus. One thing is common to these writers, all of them are men, women do
not waste their time writing viruses. Women are either smarter or they are just
so good that never get caught.
2.3.1 Why do people write and spread viruses?
It is difficult to know why people write them. Everyone has their own reasons.
Some general reasons are to experiment how to write viruses or to test their
programming talent. Some people just like to see how the virus spreads and
gets famous around the World. The following is a list from news group postings
alt.comp.virus and tries to explain why people write and spread viruses.
• they don't understand or prefer not to think about the consequences for
other people
• they simply don't care
• they don't consider it to be their problem if someone else is
inconvenienced
• they draw a false distinction between creating/publishing viruses and
distributing them
• they consider it to be the responsibility of someone else to protect
systems from their creations
• they get a buzz, acknowledged or otherwise, from vandalism
• they consider they're fighting authority
• they like 'matching wits' with anti virus vendors
• it's a way of getting attention, getting recognition from their peers and
their names (or at least that of their virus) in the papers and the Wild List
• they're keeping the anti virus vendors in a job
A file virus infects other files, when the program to which it is attached is run,
and so a file virus can spread across a network and often very quickly. They
may be spread from the same sources as boot sector viruses, but also from
sources such as Internet FTP sites and newsgroups. Trojan horses spread just
like file viruses.
A multipartite virus infects boot sectors and files. Often, an infected file is used
to infect the boot sector: thus, this is one case where a boot sector infection
could spread across a network.
Today's most common virus is the macro virus. Cap virus is one of the macro
viruses. Last month there were 3100 Cap macro virus accesses during the last
30 days in Data Fellows. Next common virus was Join the Crew with 1171
accesses and third common was Pen pal Greetings with 895 accesses.
Picture 5 Twenty most accessed virus descriptions during the last 30 days
7. Antivirus
Antivirus software are computer programs that attempt to identify, neutralize
or eliminate malicious software. The term "antivirus" is used because the
earliest examples were designed exclusively to combat computer viruses;
however most modern antivirus software is now designed to combat a wide
range of threats, including worms, phishing attacks, rootkits, trojan horses and
other malware. Antivirus software typically uses two different approaches to
accomplish this:
• examining (scanning) files to look for known viruses matching definitions
in a virus dictionary, and
• identifying suspicious behavior from any computer program which might
indicate infection.
The second approach is called heuristic analysis. Such analysis may include data
captures, port monitoring and other methods.
Most commercial antivirus software uses both of these approaches, with an
emphasis on the virus dictionary approach. Although some people consider
network firewalls to be a type of antivirus software, this categorization is not
correct
In the virus dictionary approach, when the antivirus software looks at a file, it
refers to a dictionary of known viruses that the authors of the antivirus software
have identified. If a piece of code in the file matches any virus identified in the
dictionary, then the antivirus software can take one of the following actions:
1. attempt to repair the file by removing the virus itself from the file,
2. quarantine the file (such that the file remains inaccessible to other
programs and its virus can no longer spread), or
3. delete the infected file.
To achieve consistent success in the medium and long term, the virus dictionary
approach requires periodic (generally online) downloads of updated virus
dictionary entries. As civically-minded and technically-inclined users identify
new viruses "in the wild", they can send their infected files to the authors of
antivirus software, who then include information about the new viruses in their
dictionaries.
Dictionary-based antivirus software typically examines files when the
computer's operating system creates, opens, closes, or e-mails them. In this
way it can detect a known virus immediately upon receipt. Note too that a
System Administrator can typically schedule the antivirus software to examine
(scan) all files on the computer's hard disk on a regular basis.
Proprietary
• eScan AntiVirus
• ArcaVir by arcabit.com
• avast!
• Avira
• AVG Anti-Virus
• BitDefender
• BullGuard
• CA Anti-Virus
• Cisco Security Agent
• Dr.Web
• DriveSentry (antivirus, antispyware and HIPS technologies)
• eSafe
• Fortinet FortiClient End Point Security
• F-PROT
• F-Secure
• G DATA AntiVirus
• IKARUS antivirus
• INCA Internet
• Kaspersky Anti-Virus
• LinuxShield
• McAfee VirusScan
• Mks vir
• NOD32
• Norman ASA
• Norton AntiVirus
• Panda Security
• PC Tools AntiVirus
• Rising AntiVirus
• Sophos Anti-Virus
• Trend Micro Internet Security
• TrustPort Antivirus -AEC
• Vba32 AntiVirus
• Virus Chaser
• Windows Live OneCare
• ZoneAlarm
FreeWare
• Avira AntiVir Personal - Free Antivirus
• AOL Active Virus Shield (no longer available via AOL)
• AVG Anti-Virus Free (Registerware, Nagware)
• avast! Home (Registerware)
• BitDefender Free version does not provide real time scanning
• Comodo AntiVirus
• DriveSentry Fully functional free version
• F-PROT (for Linux, FreeBSD and DOS only)
• PC Tools AntiVirus Free Edition
Open FreeWare
• Clam AntiVirus
• ClamWin
• OpenAntiVirus
• Winpooch
• Untangle
AbandonWare
• Cyberhawk (now ThreatFire AntiVirus)
• Eliashim (now eSafe)
• The Antidote and Antidote SuperLite
8. Antivirus databases
Kaspersky Lab has shortened its response time to the growing number and
increasing speed of new threats by releasing an increased number of antivirus
database updates.
The number of new records in Kaspersky Lab’s antivirus database each month
in 2006 varied from approximately 5,000 to tens of thousands towards the end
of the year. The average monthly number of new records amounts to 7,240 (not
counting records in the extended databases). The average monthly number of
new records was 4,496 in 2005.
Number of new antivirus database records (yellow indicates standard databases; red indicates
extended databases)
As the chart above shows, the number of monthly records in the antivirus
databases increased irregularly over the course of the year. Each month with an
increase was followed by a decrease. However by the end of the year there was
steady growth that led to a record high of over 10,000 new records per month.
Kaspersky Lab responds to the appearance of new malicious programs by
releasing two types of antivirus database updates: standard updates (about
once an hour) and urgent updates (in the event of an epidemic).
The total number of standard database updates in 2006 exceeded 7,000, with a
monthly average of 600.
Number of standard updates per month
As far as urgent updates are concerned, the data shown in the charts is
particularly interesting for two reasons. First of all, they show the total number
of “epidemiological” situations in 2006 and provide the opportunity to compare
this information with figures from 2005. In addition, they can help us track and
predict when epidemics are likely to occur.
From July 2008 onwards, the Top Twenty will be composed using data
generated by Kaspersky Security Network (KSN), a new technology
implemented in the 2009 personal product line. This data not only makes it
possible for Kaspersky Lab to get timely information about threats and to track
their evolution, but also makes it possible for us to detect unknown threats, and
roll out that protection to users, as quickly as possible.
The 2009 personal products haven't been officially launched in all countries,
e.g. in Russian and the USA. The data presented in this report therefore
provides an objective reflection of the threat landscape in the majority of
European and Asian countries. However, in the near future, such reports will
include data provided by users in other countries of the world.
The data received from KSN in July 2008 has been used to compile the following
rankings.
As the rating is only compiled using data received during the course of a single
month, it's very hard to make any predictions. However, future reports will
include such forecasts.
Overall, in July 2008, there were 20704 unique malicious, advertising, and
potentially unwanted programs detected on users' computers. Our data
indicates that out of these, approximately 20000 of them were found in the
wild. The second Top Twenty provides figures on the most common malicious
programs among all infected objects detected.
Position Name
1 Trojan.Win32.DNSChanger.ech
1 Virus.Win32.Virut.q
2 Worm.Win32.Fujack.ap
3 Net-Worm.Win32.Nimda
4 Virus.Win32.Hidrag.a
5 Virus.Win32.Neshta.a
6 Virus.Win32.Parite.b
7 Virus.Win32.Sality.z
8 Virus.Win32.Alman.b
9 Virus.Win32.Virut.n
10 Virus.Win32.Xorer.du
11 Worm.Win32.Fujack.aa
12 Worm.Win32.Otwycal.g
13 Worm.Win32.Fujack.k
14 Virus.Win32.Parite.a
15 Trojan-Downloader.WMA.GetCodec.d
16 Virus.Win32.Sality.l
17 Virus.Win32.Sality.s
18 Worm.Win32.Viking.ce
19 Worm.VBS.Headtail.a
20 Net-Worm.Win32.Allaple.b
The majority of the programs listed above are able to infect files. The figures
given are interesting as they indicate the spread of threats which need to be
disinfected, rather than simply dealt with by deleting infected objects.
Change
Positio in Proactive Percentag
Name
n positio Detection Flag e
n
1. 0 Email-Worm.Win32.NetSky.q Trojan.generic 23.12
The May 2008 Email Top Twenty is a short one; this is explained by the well-
known fact that virus writers take a break over the summer months. The
complete absence of any epidemics in mail traffic, which is obvious from even a
cursory glance at this month's rankings, bears this out.
In fact, the only significant change to the rankings was caused by the re-entry
of a few worms which have been in circulation for several years now.
Trojan-Downloader programs such as Agent.ica, Agent.hsl, and Diehard that
were active during the first four months of 2008 disappeared without trace in
May.
The Warezov and Zhelatin worms have not reappeared since dropping out of the
Top Twenty back in February. The authors have stopped sending out the
executable components of the worms by email, confining themselves to
distributing the code via links on infected websites.
This does mean that the threat posed by malicious code in email has declined.
However, phishing and spam continue to pose very real threats and have the
potential to create just as big a problem for the end user.
Other malicious programs made up a significant percentage (12.15%) of all
malicious code found in mail traffic.
Summary
• Moved up: Email-Worm.Win32.NetSky.y, Email-
Worm.Win32.Scano.gen, Email-Worm.Win32.Nyxem.e, Net-
Worm.Win32.Mytob.c, Email-Worm.Win32.NetSky.t.
11.Forecast
In light of all of the trends and events described above, we expect that in 2007
virus writers will continue to concentrate their efforts on various types of
Trojans used to steal personal information. Attacks will largely be focused on
the users of various banking and payment systems in addition to online gamers.
Virus writers and spammers will continue to pool their efforts; this symbiotic
relationship will lead to the use of infected computers both for organizing
epidemics and attacks, and for sending spam.
Browser vulnerabilities and email will remain the primary infection vectors. The
use of direct port attacks will be less widespread and will fully depend on critical
vulnerabilities being discovered in Windows services. P2P networks or IRC
channels will not be widely used to infect machines, but they will be to some
extent, especially locally (for example, the P2P client Winny, which is very
popular in Japan, could become a serious threat to Asian users in 2007). IM
systems will remain in the top three most actively used mean of attack, even
though we do not expect to see any significant increase in malicious use.
Without a doubt, the most important underlying theme of 2007 will be the new
Microsoft Vista operating system and its vulnerabilities. Vista’s vulnerabilities
and limitations will determine the development of the virus industry in the years
to come. We do not expect to see any fast-moving or major changes, although
this new OS will definitely define the trends in the year to come.