SlideShare a Scribd company logo
1 of 27
Introduction
Computer virus have become today’s headline
 news
With the increasing use of the Internet, it has
 become easier for virus to spread
Virus show us loopholes in software
Most virus are targeted at the MS Windows OS
Definition
 Virus : A true virus is capable of self replication
 on a machine. It may spread between files or
 disks, but the defining character is that it can
 recreate itself on it’s own with out traveling to a
 new host
Overview
Background
Symptoms
Classifying Viruses
Examples
Protection/Prevention
Conclusion
Background
There are estimated 30,000 computer
 viruses in existence
Over 300 new ones are created each
 month
First virus was created to show loopholes
 in software
Virus Languages
ANSI COBOL
C/C++
Pascal
VBA
Unix Shell Scripts
JavaScript
Basically any language that works on the system
 that is the target
Symptoms of Virus Attack
 Computer runs slower then usual
 Computer no longer boots up
 Screen sometimes flicker
 PC speaker beeps periodically
 System crashes for no reason
 Files/directories sometimes disappear
 Denial of Service (DoS)
Virus through the Internet
Today almost 87% of all viruses are spread
 through the internet (source: ZDNet)
Transmission time to a new host is relatively low,
 on the order of hours to days
“Latent virus”
Classifying Virus - General
Virus Information
     Discovery Date:
     Origin:
     Length:
     Type:
     SubType:
     Risk Assessment:
     Category:
Classifying Virus - Categories

Stealth
Polymorphic
Companion
Armored
Classifying Virus - Types
Trojan Horse
Worm
Macro
Trojan Horse
Covert
Leaks information
Usually does not reproduce
Trojan Horse
Back Orifice
    Discovery Date:      10/15/1998
    Origin:        Pro-hacker Website
    Length:        124,928
    Type: Trojan
    SubType:       Remote Access
    Risk Assessment: Low
    Category:      Stealth
Trojan Horse
About Back Orifice
  requires Windows to work
  distributed by “Cult of the Dead Cow”
  similar to PC Anywhere, Carbon Copy software
  allows remote access and control of other computers
  install a reference in the registry
  once infected, runs in the background
  by default uses UDP port 54320
                  TCP port 54321
  In Australia 72% of 92 ISP surveyed were infected with
   Back Orifice
Trojan Horse
 Features of Back Orifice
  pings and query servers
  reboot or lock up the system
  list cached and screen saver password
  display system information
  logs keystrokes
  edit registry
  server control
  receive and send files
  display a message box
Worms
Spread over network connection
Worms replicate
First worm released on the Internet was called
 Morris worm, it was released on Nov 2, 1988.
Worms
Bubbleboy
    Discovery Date:    11/8/1999
    Origin:     Argentina (?)
    Length:     4992
    Type:       Worm/Macro
    SubType:    VbScript
    Risk Assessment: Low
    Category:   Stealth/Companion
Worms
Bubbleboy
 requires WSL (windows scripting language), Outlook
   or Outlook Express, and IE5
 Does not work in Windows NT
 Effects Spanish and English version of Windows
 2 variants have been identified
 Is a “latent virus” on a Unix or Linux system
 May cause DoS
Worms
How Bubbleboy works
  Bubbleboy is embedded within an email message of
   HTML format.
  a VbScript while the user views a HTML page
  a file named “Update.hta” is placed in the start up
   directory
  upon reboot Bubbleboy executes
Worms
How Bubbleboy works
  changes the registered owner/organization
    HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentV
     ersionRegisteredOwner = “Bubble Boy”
    HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentV
     ersionRegisteredOrganization = “Vandalay Industry”
  using the Outlook MAPI address book it sends itself to
   each entry
  marks itself in the registry
       HKEY_LOCAL_MACHINESoftwareOutlook.bubbleboy =
        “OUTLOOK.Bubbleboy1.0 by Zulu”
Macro
Specific to certain applications
Comprise a high percentage of the viruses
Usually made in WordBasic and Visual
 Basic for Applications (VBA)
Microsoft shipped “Concept”, the first
 macro virus, on a CD ROM called "Windows
 95 Software Compatibility Test" in 1995
Macro
Melissa
    Discovery Date: 3/26/1999
    Origin:    Newsgroup Posting
    Length:     varies depending on variant
    Type:       Macro/Worm
    Subtype:    Macro
    Risk Assessment: High
    Category:   Companion
Macro
Melissa
  requires WSL, Outlook or Outlook Express Word
   97 SR1 or Office 2000
  105 lines of code (original variant)
  received either as an infected template or email
   attachment
  lowers computer defenses to future macro virus
   attacks
  may cause DoS
  infects template files with it’s own macro code
  80% of of the 150 Fortune 1000 companies
   were affected
Macro
How Melissa works
  the virus is activated through a MS word document
  document displays reference to pornographic websites
   while macro runs
  1st lowers the macro protection security setting for
   future attacks
  checks to see is it has run in current session before
       HKEY_LOCAL_MACHINESoftwareMicrosoftOfficeMelissa =
        “by Kwyjibo”
  propagates itself using the Outlook MAPI address
   book (emails sent to the first 50 addresses)
Macro
How Melissa works
  infects the Normal.dot template file with it’s own code
  Lastly if the minutes of the hour match up to the date
   the macro inserts a quote by Bart Simpson into the
   current document
       “Twenty two points, plus triple word score, plus fifty points for
        using all my letters. Game’s over. I’m outta here.”
Protection/Prevention
Knowledge
Proper configurations
Run only necessary programs
Anti-virus software
Conclusion
You know know more about virus and how:
  viruses work through your system
  to make a better virus
Have seen how viruses show us a loophole in
 popular software
Most viruses show that they can cause great
 damage due to loopholes in programming

More Related Content

What's hot

1311782 634629102605888750
1311782 6346291026058887501311782 634629102605888750
1311782 634629102605888750bhagatsigh
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. AllwoodStavia
 
My Doom Worm
My Doom WormMy Doom Worm
My Doom WormJeradeB
 
As computer virus
As computer virusAs computer virus
As computer virusachal bisht
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventionsPrem Kumar Bonam
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..Sid1256
 

What's hot (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
1311782 634629102605888750
1311782 6346291026058887501311782 634629102605888750
1311782 634629102605888750
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Virus slides
Virus slidesVirus slides
Virus slides
 
Virus and worms analysis
Virus and worms analysisVirus and worms analysis
Virus and worms analysis
 
My Doom Worm
My Doom WormMy Doom Worm
My Doom Worm
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Mydoom virus
Mydoom virusMydoom virus
Mydoom virus
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
 

Similar to Computer virus (20)

Computer virus
Computer virusComputer virus
Computer virus
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Malware
MalwareMalware
Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses
VirusesViruses
Viruses
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Types of viruses
Types of virusesTypes of viruses
Types of viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSES
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Data loss causes and its threats
Data loss causes and its threatsData loss causes and its threats
Data loss causes and its threats
 
Ransomware
RansomwareRansomware
Ransomware
 

Recently uploaded

Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

Computer virus

  • 1.
  • 2. Introduction Computer virus have become today’s headline news With the increasing use of the Internet, it has become easier for virus to spread Virus show us loopholes in software Most virus are targeted at the MS Windows OS
  • 3. Definition Virus : A true virus is capable of self replication on a machine. It may spread between files or disks, but the defining character is that it can recreate itself on it’s own with out traveling to a new host
  • 5. Background There are estimated 30,000 computer viruses in existence Over 300 new ones are created each month First virus was created to show loopholes in software
  • 6. Virus Languages ANSI COBOL C/C++ Pascal VBA Unix Shell Scripts JavaScript Basically any language that works on the system that is the target
  • 7. Symptoms of Virus Attack  Computer runs slower then usual  Computer no longer boots up  Screen sometimes flicker  PC speaker beeps periodically  System crashes for no reason  Files/directories sometimes disappear  Denial of Service (DoS)
  • 8. Virus through the Internet Today almost 87% of all viruses are spread through the internet (source: ZDNet) Transmission time to a new host is relatively low, on the order of hours to days “Latent virus”
  • 9. Classifying Virus - General Virus Information Discovery Date: Origin: Length: Type: SubType: Risk Assessment: Category:
  • 10. Classifying Virus - Categories Stealth Polymorphic Companion Armored
  • 11. Classifying Virus - Types Trojan Horse Worm Macro
  • 13. Trojan Horse Back Orifice Discovery Date: 10/15/1998 Origin: Pro-hacker Website Length: 124,928 Type: Trojan SubType: Remote Access Risk Assessment: Low Category: Stealth
  • 14. Trojan Horse About Back Orifice requires Windows to work distributed by “Cult of the Dead Cow” similar to PC Anywhere, Carbon Copy software allows remote access and control of other computers install a reference in the registry once infected, runs in the background by default uses UDP port 54320 TCP port 54321 In Australia 72% of 92 ISP surveyed were infected with Back Orifice
  • 15. Trojan Horse  Features of Back Orifice pings and query servers reboot or lock up the system list cached and screen saver password display system information logs keystrokes edit registry server control receive and send files display a message box
  • 16. Worms Spread over network connection Worms replicate First worm released on the Internet was called Morris worm, it was released on Nov 2, 1988.
  • 17. Worms Bubbleboy Discovery Date: 11/8/1999 Origin: Argentina (?) Length: 4992 Type: Worm/Macro SubType: VbScript Risk Assessment: Low Category: Stealth/Companion
  • 18. Worms Bubbleboy requires WSL (windows scripting language), Outlook or Outlook Express, and IE5 Does not work in Windows NT Effects Spanish and English version of Windows 2 variants have been identified Is a “latent virus” on a Unix or Linux system May cause DoS
  • 19. Worms How Bubbleboy works Bubbleboy is embedded within an email message of HTML format. a VbScript while the user views a HTML page a file named “Update.hta” is placed in the start up directory upon reboot Bubbleboy executes
  • 20. Worms How Bubbleboy works changes the registered owner/organization  HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentV ersionRegisteredOwner = “Bubble Boy”  HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentV ersionRegisteredOrganization = “Vandalay Industry” using the Outlook MAPI address book it sends itself to each entry marks itself in the registry  HKEY_LOCAL_MACHINESoftwareOutlook.bubbleboy = “OUTLOOK.Bubbleboy1.0 by Zulu”
  • 21. Macro Specific to certain applications Comprise a high percentage of the viruses Usually made in WordBasic and Visual Basic for Applications (VBA) Microsoft shipped “Concept”, the first macro virus, on a CD ROM called "Windows 95 Software Compatibility Test" in 1995
  • 22. Macro Melissa Discovery Date: 3/26/1999 Origin: Newsgroup Posting Length: varies depending on variant Type: Macro/Worm Subtype: Macro Risk Assessment: High Category: Companion
  • 23. Macro Melissa requires WSL, Outlook or Outlook Express Word 97 SR1 or Office 2000 105 lines of code (original variant) received either as an infected template or email attachment lowers computer defenses to future macro virus attacks may cause DoS infects template files with it’s own macro code 80% of of the 150 Fortune 1000 companies were affected
  • 24. Macro How Melissa works the virus is activated through a MS word document document displays reference to pornographic websites while macro runs 1st lowers the macro protection security setting for future attacks checks to see is it has run in current session before  HKEY_LOCAL_MACHINESoftwareMicrosoftOfficeMelissa = “by Kwyjibo” propagates itself using the Outlook MAPI address book (emails sent to the first 50 addresses)
  • 25. Macro How Melissa works infects the Normal.dot template file with it’s own code Lastly if the minutes of the hour match up to the date the macro inserts a quote by Bart Simpson into the current document  “Twenty two points, plus triple word score, plus fifty points for using all my letters. Game’s over. I’m outta here.”
  • 27. Conclusion You know know more about virus and how: viruses work through your system to make a better virus Have seen how viruses show us a loophole in popular software Most viruses show that they can cause great damage due to loopholes in programming