COMPUTER VIRUSES Prepared by:- Nitin dhiman
Introduction Computer virus have become today’s headline news With the increasing use of the Internet, it has become easier for virus to spread  Virus show us loopholes in software Most virus are targeted at the MS Windows OS
Definition of Virus A virus is a small piece of software that piggybacks on real programs in order to get executed Once it ’ s running, it spreads by inserting copies of itself into other executable code or documents
Overview Background  Symptoms Working of virus Classifying Viruses  Examples Protection/Prevention Conclusion
Background There are estimated 30,000 computer viruses in existence Over 300 new ones are created each month First virus was created to show loopholes in software
Virus Languages ANSI COBOL  C/C++ Pascal VBA Unix Shell Scripts JavaScript Basically any language that works on the system that is the target
Symptoms of Virus Attack Computer runs slower then usual Computer no longer boots up Screen sometimes flicker PC speaker beeps periodically System crashes for no reason Files/directories sometimes disappear Denial of Service (DoS)
Virus through the Internet Today almost 87% of all viruses are spread through the internet  (source: ZDNet) Transmission time to a new host is relatively low, on the order of hours to days “ Latent virus”
How Does a Virus Work??? Trouble Prepender Virus Program Start End
How Does a Virus Work??? Appender PE Infector Overwriter
Classifying Virus - General Virus Information Discovery Date: Origin: Length: Type: SubType: Risk Assessment: Category:
Classifying Virus - Categories Stealth Polymorphic Companion Armored
Classifying Virus - Types Trojan Horse Worm  Macro
Trojan Horse Covert Leaks information Usually does not reproduce
Trojan Horse  Back Orifice   Discovery Date:   10/15/1998  Origin: Pro-hacker Website  Length: 124,928  Type:   Trojan  SubType: Remote Access  Risk Assessment:   Low Category:     Stealth
Trojan Horse About Back Orifice requires Windows to work  distributed by “Cult of the Dead Cow” similar to PC Anywhere, Carbon Copy software allows remote access and control of other computers install a reference in the registry once infected, runs in the background by default uses  UDP port 54320 TCP port 54321 In Australia 72% of 92 ISP surveyed were infected with Back Orifice
Trojan Horse Features of Back Orifice pings and query servers reboot or lock up the system list cached and screen saver password display system information logs keystrokes edit registry server control receive and send files display a message box
Worms Spread over network connection Worms replicate First worm released on the Internet was called Morris worm, it was released on Nov 2, 1988.
Worms Bubbleboy   Discovery Date: 11/8/1999 Origin: Argentina (?)  Length: 4992  Type: Worm/Macro SubType: VbScript Risk Assessment:   Low Category:     Stealth/Companion
Worms Bubbleboy requires  WSL (windows scripting language), Outlook or Outlook Express, and IE5 Does not work in Windows NT Effects Spanish and English version of Windows 2 variants have been identified Is a “latent virus” on a Unix or Linux system May cause DoS
Worms How Bubbleboy works Bubbleboy is embedded within an email message of HTML format. a VbScript while the user views a HTML page a file named “Update.hta” is placed in the start up directory upon reboot Bubbleboy executes
Worms How Bubbleboy works changes the registered owner/organization HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RegisteredOwner = “Bubble Boy” HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RegisteredOrganization = “Vandalay Industry” using the Outlook MAPI address book it sends itself to each entry marks itself in the registry  HKEY_LOCAL_MACHINE\Software\Outlook.bubbleboy = “OUTLOOK.Bubbleboy1.0 by Zulu”
Macro Specific to certain applications  Comprise a high percentage of the viruses Usually made in WordBasic and Visual Basic for Applications (VBA)  Microsoft shipped “Concept”, the first macro virus, on a CD ROM called "Windows 95 Software Compatibility Test" in 1995
Macro Melissa Discovery Date: 3/26/1999 Origin: Newsgroup Posting Length: varies depending on variant Type: Macro/Worm Subtype: Macro Risk Assessment: High Category: Companion
Macro Melissa  requires WSL, Outlook or Outlook Express Word 97 SR1 or Office 2000 105 lines of code (original variant) received either as an infected template or email attachment lowers computer defenses to future macro virus attacks may cause DoS infects template files with it’s own macro code 80% of  of the 150 Fortune 1000 companies were affected
Macro How Melissa works the virus is activated through a MS word document document displays reference to pornographic websites while macro runs 1st lowers the macro protection security setting for future attacks checks to see is it has run in current session before HKEY_LOCAL_MACHINE\Software\Microsoft\Office\Melissa = “by Kwyjibo” propagates itself using the Outlook MAPI address book (emails sent to the first 50 addresses)
Macro How Melissa works infects  the Normal.dot template file with it’s own code Lastly if the minutes of the hour match up to the date the macro inserts a quote by Bart Simpson into the current document “ Twenty two points, plus triple word score, plus fifty points for using all my letters. Game’s over. I’m outta here.”
Protection/Prevention Knowledge Proper configurations Run only necessary programs Anti-virus software
~Computer Virus~ How To Scan?
~Computer Virus~ Anti-Virus Is Scanning
~Computer Virus~ Finding Out A Virus
Conclusion You know know more about virus and how: viruses work through your system  to make a better virus Have seen how viruses show us a loophole in popular software Most viruses show that they  can  cause great damage due to loopholes in programming
Questions? [email_address] Copies of the latest lovebug virus code are available…in print

Virus

  • 1.
    COMPUTER VIRUSES Preparedby:- Nitin dhiman
  • 2.
    Introduction Computer virushave become today’s headline news With the increasing use of the Internet, it has become easier for virus to spread Virus show us loopholes in software Most virus are targeted at the MS Windows OS
  • 3.
    Definition of VirusA virus is a small piece of software that piggybacks on real programs in order to get executed Once it ’ s running, it spreads by inserting copies of itself into other executable code or documents
  • 4.
    Overview Background Symptoms Working of virus Classifying Viruses Examples Protection/Prevention Conclusion
  • 5.
    Background There areestimated 30,000 computer viruses in existence Over 300 new ones are created each month First virus was created to show loopholes in software
  • 6.
    Virus Languages ANSICOBOL C/C++ Pascal VBA Unix Shell Scripts JavaScript Basically any language that works on the system that is the target
  • 7.
    Symptoms of VirusAttack Computer runs slower then usual Computer no longer boots up Screen sometimes flicker PC speaker beeps periodically System crashes for no reason Files/directories sometimes disappear Denial of Service (DoS)
  • 8.
    Virus through theInternet Today almost 87% of all viruses are spread through the internet (source: ZDNet) Transmission time to a new host is relatively low, on the order of hours to days “ Latent virus”
  • 9.
    How Does aVirus Work??? Trouble Prepender Virus Program Start End
  • 10.
    How Does aVirus Work??? Appender PE Infector Overwriter
  • 11.
    Classifying Virus -General Virus Information Discovery Date: Origin: Length: Type: SubType: Risk Assessment: Category:
  • 12.
    Classifying Virus -Categories Stealth Polymorphic Companion Armored
  • 13.
    Classifying Virus -Types Trojan Horse Worm Macro
  • 14.
    Trojan Horse CovertLeaks information Usually does not reproduce
  • 15.
    Trojan Horse Back Orifice Discovery Date: 10/15/1998 Origin: Pro-hacker Website Length: 124,928 Type: Trojan SubType: Remote Access Risk Assessment: Low Category: Stealth
  • 16.
    Trojan Horse AboutBack Orifice requires Windows to work distributed by “Cult of the Dead Cow” similar to PC Anywhere, Carbon Copy software allows remote access and control of other computers install a reference in the registry once infected, runs in the background by default uses UDP port 54320 TCP port 54321 In Australia 72% of 92 ISP surveyed were infected with Back Orifice
  • 17.
    Trojan Horse Featuresof Back Orifice pings and query servers reboot or lock up the system list cached and screen saver password display system information logs keystrokes edit registry server control receive and send files display a message box
  • 18.
    Worms Spread overnetwork connection Worms replicate First worm released on the Internet was called Morris worm, it was released on Nov 2, 1988.
  • 19.
    Worms Bubbleboy Discovery Date: 11/8/1999 Origin: Argentina (?) Length: 4992 Type: Worm/Macro SubType: VbScript Risk Assessment: Low Category: Stealth/Companion
  • 20.
    Worms Bubbleboy requires WSL (windows scripting language), Outlook or Outlook Express, and IE5 Does not work in Windows NT Effects Spanish and English version of Windows 2 variants have been identified Is a “latent virus” on a Unix or Linux system May cause DoS
  • 21.
    Worms How Bubbleboyworks Bubbleboy is embedded within an email message of HTML format. a VbScript while the user views a HTML page a file named “Update.hta” is placed in the start up directory upon reboot Bubbleboy executes
  • 22.
    Worms How Bubbleboyworks changes the registered owner/organization HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RegisteredOwner = “Bubble Boy” HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RegisteredOrganization = “Vandalay Industry” using the Outlook MAPI address book it sends itself to each entry marks itself in the registry HKEY_LOCAL_MACHINE\Software\Outlook.bubbleboy = “OUTLOOK.Bubbleboy1.0 by Zulu”
  • 23.
    Macro Specific tocertain applications Comprise a high percentage of the viruses Usually made in WordBasic and Visual Basic for Applications (VBA) Microsoft shipped “Concept”, the first macro virus, on a CD ROM called "Windows 95 Software Compatibility Test" in 1995
  • 24.
    Macro Melissa DiscoveryDate: 3/26/1999 Origin: Newsgroup Posting Length: varies depending on variant Type: Macro/Worm Subtype: Macro Risk Assessment: High Category: Companion
  • 25.
    Macro Melissa requires WSL, Outlook or Outlook Express Word 97 SR1 or Office 2000 105 lines of code (original variant) received either as an infected template or email attachment lowers computer defenses to future macro virus attacks may cause DoS infects template files with it’s own macro code 80% of of the 150 Fortune 1000 companies were affected
  • 26.
    Macro How Melissaworks the virus is activated through a MS word document document displays reference to pornographic websites while macro runs 1st lowers the macro protection security setting for future attacks checks to see is it has run in current session before HKEY_LOCAL_MACHINE\Software\Microsoft\Office\Melissa = “by Kwyjibo” propagates itself using the Outlook MAPI address book (emails sent to the first 50 addresses)
  • 27.
    Macro How Melissaworks infects the Normal.dot template file with it’s own code Lastly if the minutes of the hour match up to the date the macro inserts a quote by Bart Simpson into the current document “ Twenty two points, plus triple word score, plus fifty points for using all my letters. Game’s over. I’m outta here.”
  • 28.
    Protection/Prevention Knowledge Properconfigurations Run only necessary programs Anti-virus software
  • 29.
  • 30.
  • 31.
  • 32.
    Conclusion You knowknow more about virus and how: viruses work through your system to make a better virus Have seen how viruses show us a loophole in popular software Most viruses show that they can cause great damage due to loopholes in programming
  • 33.
    Questions? [email_address] Copiesof the latest lovebug virus code are available…in print

Editor's Notes

  • #10 So, how does a virus work? There are some exceptions, or variations, but essentially you start with a clean program. By running an infected program in the same environment, you launch a virus. The virus then finds a suitable host (program) and attaches itself to the program. From now on, when you run the infected program, the virus gets to run first, and then the program runs. The virus is likely to attach itself to many of your programs. If you share an infected file you’ll share your virus. This is a very simple explanation of how a virus works. The example above is how a virus that we call a prepender works. Prepending viruses add their code to the beginning of a file. This makes the file larger than it was before it got infected. If a file increases in size it might be an indication of a virus, but it not always. One of the important things to realize about a virus is that is must execute to infect. If I copy an infected file onto my hard drive it dopes not mean my computer is infected. If I run the program my computer may then become infected.
  • #11 There are also other ways that viruses infect files. The diagram on the left shows an appender. The virus has to have some code at the beginning of the file to gain control when the file is run, but the bulk of its code is appended to the end of the file. The middle diagram shows how a PE (portable executable) file is infected by viruses such as CIH. The portable executable file format has empty spaces in it. A virus is able to use these empty spaces for its code so that no change in file size occurs. Frequently when a virus infects a file there is a change in the size of the infected files. This isn’t always the case when a portable executable is infected. Many Windows files are of the PE file format. The final diagram shows an over-writer. Over-writing viruses will over-write some or all of the file with the virus code. These viruses tend to do a lot of damage, but don’t tend to get very far. Anytime a virus immediately destroys its host, it tends to get noticed and dealt with. To be successful a virus must be able to be covert for a long time. This allows it to infect more files and spread farther before it is noticed. The form virus is a simple boot sector infector. There has been detection for it for several years, yet it stayed on the list of most prevalent viruses for a very long time. Why? Form only makes its presence known one day a month by causing the keyboard to make a clicking noise each time a key is pressed. If the user isn’t at the computer that specific day, they don’t notice it. If they are at their computer, but are too busy to do something about it, the next day the problem is gone and they either blame Microsoft for a bug in the OS, or simply forget it.