SlideShare a Scribd company logo
Viruses and
Worms
 It is a replicating program.
 Can produce a copy of itself by attaching itself to another program
 For example Software that piggybacks on real programs. Every
time MS Word runs, virus runs too. Virus reproduces (by
attaching copies of itself to other programs & files)
 Typical transmission via:
 File Downloads
 Infected Disks / USB / Flash drives
 Email Attachments
What is a Virus
 Some Viruses will affect computers as soon as there code is
executed.
 Others will remain dormant until pre-determined logical
circumstances are met.
Types & Growth
 Design
 Virus code developed using a program language or a virus construction kit.
 Replication
 The virus replicated itself within the target system over a period of time.
 Launch
 Virus is activated when the user performs a certain action such as running a
program.
 Detection
 A new virus has been identified typically after data corruption, system
malfunctioning and damage has taken place.
 Incorporation.
 Antivirus software developers assemble defence against the virus
 Elimination
 Antivirus defence is deployed as an update
Virus Life Stages
• Inflict damage to competitors
• Research projects
• Prank / Vandalism
• Targeted attack of specific company (Stuxnet)
• Distribute a political message (Injustice)
• Identity theft, Spyware (CoolWebSearch)
• Financial Gain
• Cryptoviral extortion (Gpcode)
– This is a Trojan that encrypts files with certain extensions on local and remote
drives and then asks a user to contact its author to buy a decryption solution.
Motivations in Virus Creation
• Programs taking longer to load
• Hard Drive available capacity falling without
usage
• Drive usage even when unused
• Unknown files appearing on your system
• Unexpected graphic displays
• File name changes
• Program size keeps changing
• High Memory usage & system slows down
Indications of Virus infection
• File downloads without verifying the source
• Virus infected files sent via mail with the aim of getting
the recipient to open the mail and / or execute the virus.
• Virus is incorporated onto popular software programs and
the infected software is uploaded onto websites intended
for software downloads.
• Failing to install / update security patches
• Failing to use latest versions of antivirus signature files.
• Social engineering, where the attacker tricks the end-user
to go to an innocent looking webpage containing malware.
(Discuss Spear-phishing also)
• Compromised legitimate websites
• Fake antivirus software
Infection methods
Types of Virus
 Email virus:
 Moves around in email messages. Replicates by auto mailing itself
to people on victim’s email address book
 Worm:
 Software that uses computer networks & security holes to replicate
itself. Copy of worm scans network for other computer with a
specific security hole & replicates there as well…
 Trojan horse:
 Program that claims to do one thing (e.g. game) `but instead does
damage when you run it (e.g. erase hard disk). Do not auto replicate
How they spread
Some More Types
• Encryption Virus
• Polymorphic Virus
• Metamorphic Virus
• File extension Virus
• Macro Virus
Encryption Virus
• Consists of a encrypted copy of the virus
• Also contains a decryption module remains
consistent
• Different Keys used for encryption
• Attached decryption module contains the Key to
decrypt the virus.
• Virus signature keeps changing
• Virus scanners must determine the Signature of
the decrypting module instead
Polymorphic Virus
• Modify their code each time they replicate
• They change their encryption module on
replication.
• Virus signature keeps changing
• Mutation Engine used by the Virus to
change is also used by the antivirus
software for detection.
• Can be difficult to detect
Metamorphic Virus
• Virus that rewrite itself
• Original algorithm remains intact but the
code changes to avoid detection.
• Complex to code
• Better than Polymorphic at avoiding
detection.
File extension Virus
• Used to trick the end-user into opening what
looks to be a valid file
• If the end-user file extension view is turned
off a file such as BAD.TXT.VBS will be
visible as BAD.TXT
Macro Virus
• Word or similar applications infected with this type of
virus.
• Typically written in a macro language such as VBA Visual
Basic for Applications.
• Typically spread via Email
• The line between data files and applications becoming
blurred.
• Files such as Word, Excel, PowerPoint and windows help,
PDF files can contain exploit macrocode.
Mydoom (Norvarg) Worm/Email Virus:
 Infected 250,000 computers in single day in 2004. Windows PCs only.
 When users click on email attachment, it runs the virus
 Used double extension to fool user (name.txt.exe)
 Targeted SCO and Microsoft with HTTP requests from infected hosts.
 Distributed Denial of Service (DDOS)
 Also floods computers with mass emailing
 20% to 30% of all Email traffic at its peak
Melissa Macro Virus:
 1999. Infects machines with MS Word 97. Propagated by user opening
an infected Word doc. Infects Normal.dot & hence all Word files. Virus
then creates an email message containing an infected Word doc as
attachment. Doc contains references to pornographic web sites.
 Virus propagated if macros enabled on the PC
Examples of Famous Viruses
ILOVEU virus :
 May 2000. Comes in an email with “I LOVE YOU” in
subject line an attachment. When attachment opened,
sends message to everyone in MS Outlook address book.
 Also deletes all JPEG, MP3, & certain other files on
your hard disk!
 Reached 45 million users in one day.
 Some large companies had to shut down email
completely.
 VBS
 $15 billion to remove the worm
More Famous Viruses
Bubble Boy Virus
• Not harmful
• Worm executes as soon as the message is
viewed in the preview pane
• Changes user name and company name to
“BubbleBoy”
• Opens Outlook through ActiveX and mails
itself to everyone in the address book
Blaster
• Worm
• August 2003
• Xp & 2000, 2003 server
• Opens a remote command shell that listens on
TCP port 4444
• sleeps for 20-second intervals and awakens to look
for new machines to infect
• Worm starts a TCP SYN Flood attack on
windowsupdate.com
• Mblast.exe
THE CONFICKER WORM
• One of the most notorious worms that has been
unleashed on the internet in recent times
• Speculation is that the worm was let loose by one
or more government organizations to test its
power to propagate
• Worm infected a large number of machines
around the world
• Infected only Windows machines
THE CONFICKER WORM
• Symptoms
– could also lock out certain user accounts
– disabled the Automatic Updates feature
– impossible for the infected machine to carry out
DNS lookup for the hostnames that correspond
to anti-virus software vendors
– modifications to the Windows registry
Infection method
• On the older Windows platforms, a machine would be infected with the worm by any
machine sending it a specially crafted packet disguised as an RPC (Remote Procedure
Call).
• On newer Windows platforms, the infecting packet had to be received from a user who
could be authenticated by the victim machine
• First discovered in October 2008
• The worm infection spread by exploiting a vulnerability in the executable svchost.exe
on a Windows machine
svchost.exe
• The job of the always-running process that executes the svchost.exe file is to facilitate
the execution of the dynamically-linkable libraries (DLLs) that the different applications
reside in or use.
• The Svchost process does by replicating itself for each DLL that needs to be executed.
So we could say that any DLL that needs to be executed must “attach” itself to the
svchost process
• The svchost process checks the services part of the registry to construct a list of services
(meaning a list of DLLs) it must load.
Infection method
• A machine running a pre-patched version of the Windows Server Service svchost.exe
could be infected because of a vulnerability with regard to how it handled remote code
execution needed by the RPC requests coming in through port 445.
• So if a machine allowed for remote code execution in a network perhaps because it
made some resources available to clients it would be open to infection through this
mechanism.
• Once a machine was infected, the worm could drop a copy of itself in the hard disks on
the other machines mapped in the previously infected machine (Network Shares) If it
needed a password in order to drop a copy of itself at these other locations, the worm
came equipped with a list of 240 commonly used passwords. If it succeeded, the worm
created a new folder at the root of these other disks where it placed a copy of itself.
• The worm could also drop a copy of itself as the autorun.inf file in USB media such as
memory sticks. This allowed the worm copy to execute when the drive was accessed (if
Autorun was enabled).
Detection
• The worm prevented an automatic download of the latest virus signatures from the anti-virus
software vendors by altering the DNS software on the infected machine. When a machine could not
be disinfected through automatic methods, you had to resort to a more manual intervention consisting
of downloading the anti-virus tool on a separate clean machine, possibly burning a CD with it, and,
finally, installing and running the tool on the infected machine.
• Since the worm was capable of resetting the system restore points that rendered this approach
impossible for system recovery.
• For the next step, as worm instructs the firewall to open a randomly selected high-numbered port to
the internet. It then uses this port to reach out to the network in order to infect other machines. In
order to succeed with propagation, the worm must become aware of the IP address of the host on
which it currently resides. This it accomplishes by reaching out to a web site like
http://checkip.dyndns.com
Problems it caused
• A French Navy computer network, was infected with Conficker on 15 January 2009.
The network was subsequently quarantined, forcing aircraft at several airbases to be
grounded because their flight plans could not be downloaded
• The United Kingdom Ministry of Defence reported that some of its major systems and
desktops were infected. The virus had spread across administrative offices, NavyStar/N*
desktops aboard various Royal Navy warships and Royal Navy submarines, and
hospitals across the city of Sheffield reported infection of over 800 computers.
Stuxnet Worm
• Discovered in 2010
• The first publicly known intentional act of
cyberwarfare to be implemented
• Stuxnet reportedly ruined almost one-fifth
of Iran's nuclear centrifuges
• Stuxnet is typically introduced to the target
environment by an infected USB flash drive
Spyware:
 Collects personal info about users without their
consent.
 Record personal info through logging
keystrokes, recording web browser history, or
scanning hard disk docs.
 Purposes include criminal intent, advertising, or
just to be annoying
 Identity theft, stealing credit card numbers, etc
Other unwanted software
What is Anti-Virus Software?
 Program that searches hard drive (& other
drives) for any known or potential viruses or
malware.
 Works in 2 ways:
 1. Scan files for viruses contained in virus
dictionary (DAT file)
 2. Identify suspicious behaviour (e.g. data
capture, monitoring)
Anti-Virus Software
• Very similar products.
 For home & home-office use
 Enterprise edition for corporate environments
 Integrates anti-virus, firewall, & anti-spyware
 Performance hits?
 Live updates.
 Pricing usually based on subscription (1 year).
 Get program updates for free, but pay for virus updates!
McAfee VirusScan & Norton AntiVirus
Virus Protection
 Install after Service Packs
 Anti-virus software runs as a process
 Schedule to run at specific times (e.g. every day)
 Specify which disks to scan
 Run each time computer boots up?
 Config for auto updates (DAT files) from web
 Anti-Virus Software:
 McAfee, Norton
Install/Config Anti-Virus Software

More Related Content

What's hot

Antivirus software
Antivirus softwareAntivirus software
Antivirus software
Shreya Singireddy
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
culltdueet65
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
G Prachi
 
Computer virus
Computer virusComputer virus
Computer virus
Aarya Khanal
 
Computer virus
Computer virusComputer virus
Computer virus
Kaushik Vemani Venkata
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System ThreatsReddhi Basu
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
Information Technology
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
Maryam Malik
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Ransomware
RansomwareRansomware
Ransomware
Chaitali Sharma
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
pratikpandya18
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
Gerard Lamusse
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Sowjanya Sampathkumar
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
Hamza Muhammad
 

What's hot (20)

Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Ransomware
RansomwareRansomware
Ransomware
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 

Similar to Virus and Worms

Malicious software
Malicious softwareMalicious software
Malicious software
Dr.Florence Dayana
 
Viruses worms
Viruses wormsViruses worms
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
vivek pratap singh
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
SridharChowdary10
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
Jose Manuel Acosta
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
Dr. Mazin Mohamed alkathiri
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
Adeel Rasheed
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
SreelekshmiAS11
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
Virus.pptx
Virus.pptxVirus.pptx
Virus.pptx
EimerejDlcrz
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_wargames12
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
shubhamverma2711
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
jenniel143
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
Saud G
 
Computer virus
Computer virusComputer virus
Computer virus
Sarhad Baez
 

Similar to Virus and Worms (20)

Malicious software
Malicious softwareMalicious software
Malicious software
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus.pptx
Virus.pptxVirus.pptx
Virus.pptx
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Computer virus
Computer virusComputer virus
Computer virus
 

More from GrittyCC

Copyright Protection
Copyright ProtectionCopyright Protection
Copyright Protection
GrittyCC
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
GrittyCC
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
GrittyCC
 
Passwords
PasswordsPasswords
Passwords
GrittyCC
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
GrittyCC
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)
GrittyCC
 
International Cybercrime (Part 3)
International Cybercrime (Part 3)International Cybercrime (Part 3)
International Cybercrime (Part 3)
GrittyCC
 
Computer Evidence/Computer Misuse Act 1990 cases
Computer Evidence/Computer Misuse Act 1990 casesComputer Evidence/Computer Misuse Act 1990 cases
Computer Evidence/Computer Misuse Act 1990 cases
GrittyCC
 

More from GrittyCC (8)

Copyright Protection
Copyright ProtectionCopyright Protection
Copyright Protection
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
Passwords
PasswordsPasswords
Passwords
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)
 
International Cybercrime (Part 3)
International Cybercrime (Part 3)International Cybercrime (Part 3)
International Cybercrime (Part 3)
 
Computer Evidence/Computer Misuse Act 1990 cases
Computer Evidence/Computer Misuse Act 1990 casesComputer Evidence/Computer Misuse Act 1990 cases
Computer Evidence/Computer Misuse Act 1990 cases
 

Recently uploaded

Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 

Recently uploaded (20)

Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 

Virus and Worms

  • 2.  It is a replicating program.  Can produce a copy of itself by attaching itself to another program  For example Software that piggybacks on real programs. Every time MS Word runs, virus runs too. Virus reproduces (by attaching copies of itself to other programs & files)  Typical transmission via:  File Downloads  Infected Disks / USB / Flash drives  Email Attachments What is a Virus
  • 3.  Some Viruses will affect computers as soon as there code is executed.  Others will remain dormant until pre-determined logical circumstances are met. Types & Growth
  • 4.  Design  Virus code developed using a program language or a virus construction kit.  Replication  The virus replicated itself within the target system over a period of time.  Launch  Virus is activated when the user performs a certain action such as running a program.  Detection  A new virus has been identified typically after data corruption, system malfunctioning and damage has taken place.  Incorporation.  Antivirus software developers assemble defence against the virus  Elimination  Antivirus defence is deployed as an update Virus Life Stages
  • 5. • Inflict damage to competitors • Research projects • Prank / Vandalism • Targeted attack of specific company (Stuxnet) • Distribute a political message (Injustice) • Identity theft, Spyware (CoolWebSearch) • Financial Gain • Cryptoviral extortion (Gpcode) – This is a Trojan that encrypts files with certain extensions on local and remote drives and then asks a user to contact its author to buy a decryption solution. Motivations in Virus Creation
  • 6. • Programs taking longer to load • Hard Drive available capacity falling without usage • Drive usage even when unused • Unknown files appearing on your system • Unexpected graphic displays • File name changes • Program size keeps changing • High Memory usage & system slows down Indications of Virus infection
  • 7. • File downloads without verifying the source • Virus infected files sent via mail with the aim of getting the recipient to open the mail and / or execute the virus. • Virus is incorporated onto popular software programs and the infected software is uploaded onto websites intended for software downloads. • Failing to install / update security patches • Failing to use latest versions of antivirus signature files. • Social engineering, where the attacker tricks the end-user to go to an innocent looking webpage containing malware. (Discuss Spear-phishing also) • Compromised legitimate websites • Fake antivirus software Infection methods
  • 8. Types of Virus  Email virus:  Moves around in email messages. Replicates by auto mailing itself to people on victim’s email address book  Worm:  Software that uses computer networks & security holes to replicate itself. Copy of worm scans network for other computer with a specific security hole & replicates there as well…  Trojan horse:  Program that claims to do one thing (e.g. game) `but instead does damage when you run it (e.g. erase hard disk). Do not auto replicate How they spread
  • 9. Some More Types • Encryption Virus • Polymorphic Virus • Metamorphic Virus • File extension Virus • Macro Virus
  • 10. Encryption Virus • Consists of a encrypted copy of the virus • Also contains a decryption module remains consistent • Different Keys used for encryption • Attached decryption module contains the Key to decrypt the virus. • Virus signature keeps changing • Virus scanners must determine the Signature of the decrypting module instead
  • 11. Polymorphic Virus • Modify their code each time they replicate • They change their encryption module on replication. • Virus signature keeps changing • Mutation Engine used by the Virus to change is also used by the antivirus software for detection. • Can be difficult to detect
  • 12. Metamorphic Virus • Virus that rewrite itself • Original algorithm remains intact but the code changes to avoid detection. • Complex to code • Better than Polymorphic at avoiding detection.
  • 13. File extension Virus • Used to trick the end-user into opening what looks to be a valid file • If the end-user file extension view is turned off a file such as BAD.TXT.VBS will be visible as BAD.TXT
  • 14. Macro Virus • Word or similar applications infected with this type of virus. • Typically written in a macro language such as VBA Visual Basic for Applications. • Typically spread via Email • The line between data files and applications becoming blurred. • Files such as Word, Excel, PowerPoint and windows help, PDF files can contain exploit macrocode.
  • 15. Mydoom (Norvarg) Worm/Email Virus:  Infected 250,000 computers in single day in 2004. Windows PCs only.  When users click on email attachment, it runs the virus  Used double extension to fool user (name.txt.exe)  Targeted SCO and Microsoft with HTTP requests from infected hosts.  Distributed Denial of Service (DDOS)  Also floods computers with mass emailing  20% to 30% of all Email traffic at its peak Melissa Macro Virus:  1999. Infects machines with MS Word 97. Propagated by user opening an infected Word doc. Infects Normal.dot & hence all Word files. Virus then creates an email message containing an infected Word doc as attachment. Doc contains references to pornographic web sites.  Virus propagated if macros enabled on the PC Examples of Famous Viruses
  • 16. ILOVEU virus :  May 2000. Comes in an email with “I LOVE YOU” in subject line an attachment. When attachment opened, sends message to everyone in MS Outlook address book.  Also deletes all JPEG, MP3, & certain other files on your hard disk!  Reached 45 million users in one day.  Some large companies had to shut down email completely.  VBS  $15 billion to remove the worm More Famous Viruses
  • 17. Bubble Boy Virus • Not harmful • Worm executes as soon as the message is viewed in the preview pane • Changes user name and company name to “BubbleBoy” • Opens Outlook through ActiveX and mails itself to everyone in the address book
  • 18. Blaster • Worm • August 2003 • Xp & 2000, 2003 server • Opens a remote command shell that listens on TCP port 4444 • sleeps for 20-second intervals and awakens to look for new machines to infect • Worm starts a TCP SYN Flood attack on windowsupdate.com • Mblast.exe
  • 19. THE CONFICKER WORM • One of the most notorious worms that has been unleashed on the internet in recent times • Speculation is that the worm was let loose by one or more government organizations to test its power to propagate • Worm infected a large number of machines around the world • Infected only Windows machines
  • 20. THE CONFICKER WORM • Symptoms – could also lock out certain user accounts – disabled the Automatic Updates feature – impossible for the infected machine to carry out DNS lookup for the hostnames that correspond to anti-virus software vendors – modifications to the Windows registry
  • 21. Infection method • On the older Windows platforms, a machine would be infected with the worm by any machine sending it a specially crafted packet disguised as an RPC (Remote Procedure Call). • On newer Windows platforms, the infecting packet had to be received from a user who could be authenticated by the victim machine • First discovered in October 2008 • The worm infection spread by exploiting a vulnerability in the executable svchost.exe on a Windows machine
  • 22. svchost.exe • The job of the always-running process that executes the svchost.exe file is to facilitate the execution of the dynamically-linkable libraries (DLLs) that the different applications reside in or use. • The Svchost process does by replicating itself for each DLL that needs to be executed. So we could say that any DLL that needs to be executed must “attach” itself to the svchost process • The svchost process checks the services part of the registry to construct a list of services (meaning a list of DLLs) it must load.
  • 23. Infection method • A machine running a pre-patched version of the Windows Server Service svchost.exe could be infected because of a vulnerability with regard to how it handled remote code execution needed by the RPC requests coming in through port 445. • So if a machine allowed for remote code execution in a network perhaps because it made some resources available to clients it would be open to infection through this mechanism. • Once a machine was infected, the worm could drop a copy of itself in the hard disks on the other machines mapped in the previously infected machine (Network Shares) If it needed a password in order to drop a copy of itself at these other locations, the worm came equipped with a list of 240 commonly used passwords. If it succeeded, the worm created a new folder at the root of these other disks where it placed a copy of itself. • The worm could also drop a copy of itself as the autorun.inf file in USB media such as memory sticks. This allowed the worm copy to execute when the drive was accessed (if Autorun was enabled).
  • 24. Detection • The worm prevented an automatic download of the latest virus signatures from the anti-virus software vendors by altering the DNS software on the infected machine. When a machine could not be disinfected through automatic methods, you had to resort to a more manual intervention consisting of downloading the anti-virus tool on a separate clean machine, possibly burning a CD with it, and, finally, installing and running the tool on the infected machine. • Since the worm was capable of resetting the system restore points that rendered this approach impossible for system recovery. • For the next step, as worm instructs the firewall to open a randomly selected high-numbered port to the internet. It then uses this port to reach out to the network in order to infect other machines. In order to succeed with propagation, the worm must become aware of the IP address of the host on which it currently resides. This it accomplishes by reaching out to a web site like http://checkip.dyndns.com
  • 25. Problems it caused • A French Navy computer network, was infected with Conficker on 15 January 2009. The network was subsequently quarantined, forcing aircraft at several airbases to be grounded because their flight plans could not be downloaded • The United Kingdom Ministry of Defence reported that some of its major systems and desktops were infected. The virus had spread across administrative offices, NavyStar/N* desktops aboard various Royal Navy warships and Royal Navy submarines, and hospitals across the city of Sheffield reported infection of over 800 computers.
  • 26. Stuxnet Worm • Discovered in 2010 • The first publicly known intentional act of cyberwarfare to be implemented • Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges • Stuxnet is typically introduced to the target environment by an infected USB flash drive
  • 27. Spyware:  Collects personal info about users without their consent.  Record personal info through logging keystrokes, recording web browser history, or scanning hard disk docs.  Purposes include criminal intent, advertising, or just to be annoying  Identity theft, stealing credit card numbers, etc Other unwanted software
  • 28. What is Anti-Virus Software?  Program that searches hard drive (& other drives) for any known or potential viruses or malware.  Works in 2 ways:  1. Scan files for viruses contained in virus dictionary (DAT file)  2. Identify suspicious behaviour (e.g. data capture, monitoring) Anti-Virus Software
  • 29. • Very similar products.  For home & home-office use  Enterprise edition for corporate environments  Integrates anti-virus, firewall, & anti-spyware  Performance hits?  Live updates.  Pricing usually based on subscription (1 year).  Get program updates for free, but pay for virus updates! McAfee VirusScan & Norton AntiVirus
  • 30. Virus Protection  Install after Service Packs  Anti-virus software runs as a process  Schedule to run at specific times (e.g. every day)  Specify which disks to scan  Run each time computer boots up?  Config for auto updates (DAT files) from web  Anti-Virus Software:  McAfee, Norton Install/Config Anti-Virus Software