An Introduction To Computer Viruses
An Introduction To Computer Viruses
An Introduction To Computer Viruses
Resident Viruses: This type of virus is a permanent which dwells in the RAM
memory. Examples include: Randex, CMJ, Meve, and MrKlunky.
Direct Action Viruses: The main purpose of this virus is to replicate and take
action when it is executed.
Overwrite Viruses: Virus of this kind is characterized by the fact that it deletes the
information contained in the files that it infects, rendering them partially or totally
useless once they have been infected.
Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.
Directory Virus: Directory viruses change the paths that indicate the location of a
file.
Polymorphic Virus: Polymorphic viruses encrypt or encode themselves in a
different way (using different algorithms and encryption keys) every time they infect
a system.
Companion Viruses: Companion viruses can be considered file infector viruses like
resident or direct action types. Some examples include: Stator, Asimov.1539, and
Terrax.1069
Boot Sector viruses: infect the Dos Boot Record or Master Boot Record (partition
table) of disks. They include some of the commonest viruses: Brain, Stoned, Form,
Michelangelo, Flame (also known as Torch or Stamford) and AntiCMOS.
Macro Virus: Macro viruses infect files that are created using certain applications
or programs that contain macros. Examples of macro viruses: Relax, Melissa.A,
Bablas, O97M/Y2K.
File viruses: also known as parasitic viruses infect executable files. Some examples
are Jerusalem (also known as Israeli or Friday 13th), _1099, Ping Pong (also known
as Bouncing Ball) and Vtech.
FAT Viruses: The file allocation table or FAT is the part of a disk used to connect
information and is a vital part of the normal functioning of the computer.
Worms: Computer worms are programs that reproduce, execute independently and
travel across the network connections. The key difference between a virus and worm
is the manner in which it reproduces and spreads. Two very prominent examples of
worms are the MS-Blaster and Sasser worms.
Link viruses: also called cluster viruses modify the record of where files are stored
in order to infect. There is one example, DIR II.
Computer viruses can not infect write protected disks or infect written
documents. Viruses do not infect compressed files, unless the file was infected prior
to the compression. [Compressed files are programs or files with its common
characters, etc. removed to take up less space on a disk.] Viruses do not infect
computer hardware, such as monitors or computer chips; they only infect software.
Viruses begin to work and spread when you start up the program or
application of which the virus is present. For example, a word processing program
that contains a virus will place the virus in memory every time the word processing
program is run.
Once in memory, one of a number of things can happen. The virus may be
programmed to attach to other applications, disks or folders. It may infect a network
if given the opportunity.
Viruses behave in different ways. Some viruses stay active only when the
application it is part of is running. Turn the computer off and the virus is inactive.
Other viruses will operate every time you turn on your computer after
infecting a system file or network.
The History of the Computer Virus
The first computer viruspopularly known as the 'Brain virus' was created in
1986 by two Pakistani brothers, Amjad and Basit Farooq Alvi. This virus, which
spread via floppy disks, was known only to infect boot records and not computer
hard drives like most viruses today. The virus also known as the Lahore, Pakistani,
Pakistani Brain, Brain-A and UIUC would occupy unused space on the floppy disk so
that it could not be used and would hide from detection. It would also disguise itself
by displaying the uninfected bootsector on the disk.
In 1987, the Lehigh virus was discovered at Lehigh University in the United
States. The Lehigh virus was the first memory resident file infector that attacked
executable files and took control when a file was opened. The Jerusalem virus also
appeared around this time at Hebrew University in Israel. Like the Lehigh virus, the
Jerusalem virus was also a memory resident file infector. It contained bugs to re-
infect programs that were already infected.
In March 1988, the first anti-virus was designed to detect and remove the
Brain virus. The anti-virus also immunized floppy disks to get rid of the Brian
infection. At the same time, the Cascade virus appeared in Germany. The Cascade
virus was the first encrypted virus, which was coded and could not be changed or
removed.
Thus, during the late 1980's and the early 1990's, viruses on the loose which
infected files, disks etc. on the computer and caused a great deal of damage received
a lot of media attention. Magazines such a Business Week, Newsweek, Fortune, PC
magazine, and Time began publishing articles about these destructive viruses
running wild and demanded a solution for all these problems.
A few years ago, in 2000, the ILOVEYOU virus wreaked havoc around the
world. The virus that was created in the Philippines was sent through email and
spread around the world in one day infecting 10 percent of computers connected to
the Internet and causing $ 5.5 billion dollars in damage. Hence, viruses are still
common and still create chaos even today. It is hard to determine the reasons for all
these actions and why virus writers create computer viruses. Some do it for their
personal gain, for research projects, pranks, vandalism, etc., while others want to
help make improvements in programs.
Nonresident viruses
Resident Viruses
This type of virus is a permanent which dwells in the RAM memory. From
there it can overcome and interrupt all of the operations executed by the system:
corrupting files and programs that are opened, closed, copied, renamed etc.
Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information
contained in the files that it infects, rendering them partially or totally useless once
they have been infected.
The only way to clean a file infected by an overwrite virus is to delete the file
completely, thus losing the original content.
Directory Virus
Directory viruses change the paths that indicate the location of a file. By
executing a program (file with the extension .EXE or .COM) which has been infected
by a virus, you are unknowingly running the virus program, while the original file
and program have been previously moved by the virus.
Once infected it becomes impossible to locate the original files.
Polymorphic Virus
Polymorphic viruses encrypt or encode themselves in a different way (using
different algorithms and encryption keys) every time they infect a system.
This makes it impossible for anti-viruses to find them using string or signature
searches (because they are different in each encryption) and also enables them to
create a large number of copies of themselves.
Companion Viruses
Companion viruses can be considered file infector viruses like resident or
direct action types. They are known as companion viruses because once they get into
the system they "accompany" the other files that already exist. In other words, in
order to carry out their infection routines, companion viruses can wait in memory
until a program is run (resident viruses) or act immediately by making copies of
themselves (direct action viruses).
Some examples include: Stator, Asimov.1539, and Terrax.1069
Boot Virus
This type of virus affects the boot sector of a floppy or hard disk. This is a
crucial part of a disk, in which information on the disk itself is stored together with a
program that makes it possible to boot (start) the computer from the disk.
Damage Caused
Boot sector viruses gain complete control of the master boot record or the
DOS boot sector by replacing the operating system contents with that of its own. This
allows the virus to spread fast and cause damage:
• By gaining control of the master boot record and the DOS boot sector the boot
sector viruses can sometimes hide the resources that the computer has( the
floppy drive even though attached may not be present)
• Some boot sector viruses move the master boot record to another location
causing the system to crash when it boots up. Other boot sector viruses cause
damage to the master boot record
• Some boot sector viruses damage the File Allocation Table (FAT) which is the
index of all the files on the drive. This causes loss of data
Removal
The best way to remove boot sector virus is to boot the computer with using a
clean boot disk and then rewrite the files with the good operating system files on the
infected disk. These viruses were very much prevalent in the ninety's and a host of
antivirus programs are now available to detect and clean them effectively
Examples of boot viruses include: Polyboot.B, AntiEXE
Macro Virus
Macro viruses infect files that are created using certain applications or
programs that contain macros. These mini-programs make it possible to automate
series of operations so that they are performed as a single action, thereby saving the
user from having to carry them out one by one.
Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.
Damage Caused
Some common macros are
• AutoExec
• AutoNew
• AutoOpen
• AutoClose
• AutoExit
The existence of the 'auto-exec' macro makes it possible to create many macro
viruses.The 'auto-exec' macro is executed in response to some event and does not
depend on the user command. The autoexec macro and other auto macros are
dangerous tools for the virus writer. Other existing Macro viruses are those which
replace command names (existing commands like save, open etc.) with their code.
Unlike the auto macros which can be disabled; commands cannot be disabled. Once
the macro virus uses these commands it can copy itself to other files and even delete
files.
Removal
Prevention is better than cure and the ways to prevent the virus from running
is that the autoexec macro can be prevented from executing by starting word from
command prompt. Use the following command to start word 'winword /m'. The auto
macros are disabled if we use the command 'DisableAutoMacros' in any macro that is
written. It can also be disabled by holding down the shift key while opening a
document. Word documents cannot contain macros only word templates can. You
can mask a template as a document file to prevent it from infection.
File Infectors
This type of virus infects programs or executable files (files with an .EXE or
.COM extension). When one of these programs is run, directly or indirectly, the virus
is activated, producing the damaging effects it is programmed to carry out. The
majority of existing viruses belong to this category, and can be classified depending
on the actions that they carry out.
Damage Caused
The File infector virus can cause irreversible damage to files. By overwriting
files it permanently destroys the content of these files. Some files viruses have also
operated as email worm and Trojan horse as well.
Removal
The only way to disinfect files from the file virus is that the files affected with
the file virus have to be deleted and restored from back up.
FAT Virus
The file allocation table or FAT is the part of a disk used to connect
information and is a vital part of the normal functioning of the computer.
This type of virus attack can be especially dangerous, by preventing access
to certain sections of the disk where important files are stored. Damage
caused can result in information losses from individual files or even entire
directories.
Worms
The Melissa worm founded in 1999, the Sobig worms founded in 2003 and the
Mydoom worm founded in 2004 all spread through e-mail. These worms shared
some features of a Trojan Horse, in that they spread by tempting a user to open an
infected e-mail attachment.
Mydoom also attempted to spread itself through the peer-to-peer file sharing
application called KaZaA. The Mydoom worms attempted a Denial of Service (DoS)
attack against SCO and Microsoft.
Ways Of Infection
Examples Of Worms
Melissa is an infamous mass-mailing worm that was first found in the early
1999. It comes attached to e-mail messages and looks like a text document. However,
when a user opens such an attachment, the worm silently installs itself to the system
and starts to spread. It modifies Microsoft Word settings and infects lots of text
documents. Then it sends out infected documents attached to e-mails to all the
contacts from the address book. These actions disclose user's personal information
and other confidential data. The worm sends out huge amount of infected letters and
can overload mail servers. Some Melissa variants delete critical system files and
therefore damage the entire system.
ILoveYou, also known as Love Letter and Love Bug, is perhaps the most
widely-known worm in all history of worms. It struck the computer world in 2000,
and infected a big number of systems all over the world. ILoveYou spreads through
email as an attachment to the letters. But the text of the letters seems so nice and
sweet that users open attachments without even thinking that there could be a virus.
The text of e-mail may contain words like “I love you” and everything that is similar
to that. ILoveYou spreads very fast, because when it gets to the system, it
immediately sends its copies to all the addresses from the Microsoft Outlook Express
address book. It also harms the system, by overwriting essential system files, user
personal documents, multimedia files and other critical data. Some ILoveYou
variants are responsible for a Denial of Service attack on the official White House
web site.
A worm by itself is a great privacy risk. Lots of these parasites are designed
specially to collect valuable user information like passwords, bank account details,
credit card numbers or identity data and silently transfer it to the attacker. Some
worms are made for criminal purposes. They are created to infect computers of
corporate users and steal or disclose to public secret documents and other
confidential information.Protect yourself against Computer Worms
Worms work in the same manner as the regular computer viruses and
therefore can be found and removed with the help of effective antivirus products like
Symantec Norton AntiVirus, Kaspersky Anti-Virus, McAfee VirusScan, eTrust EZ
Antivirus, Panda Titanium Antivirus, AVG Anti-Virus. Some advanced spyware
removers, which are able to scan the system in a similar way antivirus software does
and have extensive parasite signature databases can also detect and remove certain
worms and related malicious components. Powerful anti-spyware solutions such as
Microsoft AntiSpyware Beta, Spyware Doctor, Ad-Aware SE, SpyHunter or eTrust
PestPatrol are known for quite fair worm detection and removal capabilities.
In some cases even an antivirus or spyware remover can fail to get rid of a
particular worm. That is why there are Internet resources such as 2-Spyware.com,
which provide manual malware removal instructions. These instructions allow the
user to manually delete all the files, directories, registry entries and other objects that
belong to a parasite. However, manual removal requires fair system knowledge and
therefore can be a quite difficult and tedious task for novices.
Computer worms which spread like Trojan Horse can best be defended
against by avoiding opening of attachments in your e-mail. These infected
attachments are not limited to .EXE files. Microsoft Word and Excel files can contain
macros which spread infection.
A trojan horse is typically separated into two parts – a server and a client. It’s
the client that is cleverly disguised as significant software and positioned in peer-to-
peer file sharing networks, or unauthorized download websites. Once the client
Trojan executes on your computer, the attacker, i.e. the person running the server,
has a high level of control over your computer, which can lead to destructive effects
depending on the attacker’s purpose.
A trojan horse virus can spread in a number of ways. The most common
means of infection is through email attachments. The developer of the virus usually
uses various spamming techniques in order to distribute the virus to unsuspecting
users. Another method used by malware developers to spread their trojan horse
viruses is via chat software such as Yahoo Messenger and Skype. Another method
used by this virus in order to infect other machines is through sending copies of itself
to the people in the address book of a user whose computer has already been infected
by the virus.
Types of Trojan horse Viruses
Remote Access Trojans are the most frequently available trojans. These give
an attacker absolute control over the victim’s computers. The attacker can go through
the files and access any personal information about the user that may be stored in the
files, such as credit card numbers, passwords, and vital financial documents.
Key Loggers
Key Loggers type of Trojans logs victims’ keystrokes and then send the log
files to the attacker. It then searches for passwords or other sensitive data in the log
files. Most of the Key Loggers come with two functions, such as online and offline
recording. Of course, they can be configured to send the log file to a specific email
address on a daily basis.
Destructive Trojans
The only purpose of Destructive Trojans is to destroy and delete files from the
victims’ computers. They can automatically delete all the core system files of the
computer. The destructive trojan could be controlled by the attacker or could be
programmed to strike like a logic bomb, starting on a particular day or at specific
time.
Denial of Service (DoS) Attack Trojans
The core design intention behind Denial of Service (DoS) Attack Trojan is to
produce a lot of internet traffic on the victim’s computer or server, to the point that
the Internet connection becomes too congested to let anyone visit a website or
download something. An additional variation of DoS Trojan is the Mail-Bomb
Trojan, whose key plan is to infect as many computers as possible, concurrently
attacking numerous email addresses with haphazard subjects and contents that
cannot be filtered.
Proxy/Wingate Trojans
FTP Trojans
FTP Trojans are possibly the most simple, and are outdated. The only action
they perform is, open a port numbered 21 – the port for FTP transfers – and let
anyone connect to your computer via FTP protocol. Advance versions are password-
protected, so only the attacker can connect to your computer.
Note: A Trojan could have any one or a combination of the above mentioned
functionalities.
The best way to prevent a Trojan Horse Virus from entering and infecting your
computer is to never open email attachments or files that have been sent by unknown
senders. However, not all files we can receive are guaranteed to be virus-free. With
this, a good way of protecting your PC against malicious programs such as this
harmful application is to install and update an antivirus program.
1 Reboot your computer if you have a Mac. Do this by holding down the "Shift"
key while the computer restarts itself.
3 Exit the antivirus program on your Mac. Restart your computer again to
ensure that the Trojan has been deleted. Empty the trash can on your computer once
it is back up and running.
4 Disable the System Restore feature if you're a Windows user. Go to "Start" at
the bottom of your screen, then right-click the "My Computer" icon to go to
"Properties." Check "Turn off System Restore" under the System Restore tab in the
"Properties" window, then select "Apply." Confirm that you want to disable System
Restore by clicking "Yes" and "OK."
5 Update your virus definitions in your antivirus program. Open the program,
or go to the website, to download the latest definitions so that you can receive the
most recent alerts and keep your computer protected.
6 Scan your files to detect the Trojan file. Follow the instructions in your
antivirus program to delete any suspicious files. You may want to write down the
path and file name of the Trojan, which is usually found in the "C:\" hard drive.
Then, edit your computer's backup registry by choosing "Start," then "Run." Type
"regedit" in the window that appears and click "OK."
7 Search for the registry entry from which the Trojan derived, which may begin
with "HKEY" followed by the file path. Delete the registry entry to ensure that the
Trojan is removed. Exit the registry entry, and restart your computer so that the
changes can take effect.
Logic Bombs
They are not considered viruses because they do not replicate. They are not
even programs in their own right but rather camouflaged segments of other
programs.
Many types of viruses do more than viruses do. Some are file type viruses and
then a trigger may activate a code to make them behave like a worm. Therefore
classification becomes difficult in these cases. The basic behavior of a virus which
makes it different from a Trojan is that it replicates very fast.
Detection of viruses
Each of these methods can be used in two forms, passive and active. A passive
search is run at intervals by the user, like many of today's popular scanners.
Unfortunantly, users may forget to scan regularly, and the viruses can spread
uncontrolled between scans. Active protection is loaded into memory and checks
each program when it is executed, copied or written. This can detect infections at the
earliest possible time, before they have spread. However, it occupies memory, which
is particularly important in the limited DOS environment, and requires the machine
to do extra processing, slowing it down. These speed and size limitations force a
balance to be struck: a resident signature scanner that detects all viruses but also
occupies all memory is a useless as one which is extremely small but detects virtually
no viruses. Active protection utilities will usually lie between these two extreme
1. Load only software from original disks or CD's. Pirated or copied software is
always a risk for a virus.
2. Execute only programs of which you are familiar as to their origin. Programs
sent by email should always be suspicious.
3. Computer uploads and "system configuration" changes should always be
performed by the person who is responsible for the computer. Password
protection should be employed.
4. Check all shareware and free programs downloaded from on-line services with
a virus checking program.
5. Purchase a virus program that runs as you boot or work your computer. Up-
date it frequently.
If you run Windows on your computer, you should also run an up-to-date
antivirus program. Not only will such a utility protect you against the most common
viruses, but it can also detect many (although not all) the backdoor agents and
trojans an intruder might install on your system.