What is a computer virus?
A computer virus, much like a flu virus,
is designed to spread from host to host and has the ability to replicate
itself. Similarly, in the same way that viruses cannot reproduce without a host
cell, computer viruses cannot reproduce and spread without programming such as
a file or document.
In more technical terms, a computer
virus is a type of malicious code or program written to alter the way a
computer operates and that is designed to spread from one computer to another.
A virus operates by inserting or attaching itself to a legitimate program or
document that supports macros in order to execute its code. In the process a
virus has the potential to cause unexpected or damaging effects, such as
harming the system software by corrupting or destroying data.
How does a computer virus attack?
Once a virus has successfully
attached to a program, file, or document, the virus will lie dormant until
circumstances cause the computer or device to execute its code. In order for a
virus to infect your computer, you have to run the infected program, which in
turn causes the virus code to be executed. This means that a virus can remain
dormant on your computer, without showing major signs or symptoms. However,
once the virus infects your computer, the virus can infect other computers on
the same network. Stealing passwords or data, logging keystrokes, corrupting
files, spamming your email contacts, and even taking over your machine are just
some of the devastating and irritating things a virus can do.
While some viruses can be playful
in intent and effect, others can have profound and damaging effects, such as
erasing data or causing permanent damage to your hard disk, and worst yet, some
are even design with financial gains in mind.
How do computer viruses spread?
In today’s constantly connected
world you can contract a computer virus in many ways,
some more obvious than others. Viruses can be spread through email and text
message attachments, Internet file downloads, social media scam links, and even
your mobile devices and smartphones can become infected with mobile viruses
through shady App downloads. Viruses can hide disguised as attachments of
socially shareable content such as funny images, greeting cards, or audio and
video files.
To avoid contact with a virus it’s
important to exercise caution when surfing the web, downloading files, and
opening links or attachments. As a best practice, never download text or email
attachments that you’re not expecting, or files from websites you don’t trust.
Operation and function:
Infection
mechanism
Infection mechanism (also called 'infection
vector'), is how the virus spreads or propagates. A virus typically has a
search routine, which locates new files or new disks for infection.
Trigger
The trigger, which is also known
as logic bomb, is the compiled version that could be activated
any time an executable file with the virus is run that determines the
event or condition for the malicious "payload" to be activated or
delivered such as a particular date, a particular time, particular
presence of another program, capacity of the disk exceeding some limit, or
a double-click that opens a particular file.
Payload
The "payload" is the
actual body or data that perform the actual malicious purpose of the virus.
Payload activity might be noticeable (e.g., because it causes the system to
slow down or "freeze"), as most of the time the "payload"
itself is the harmful activity, or sometimes non-destructive but
distributive, which is called Virus hoax.
Phases
Virus phases is the life cycle of
the computer virus, described by using an analogy to biology. This life
cycle can be divided into four phases:
Dormant phase
The virus program is idle during this stage.
The virus program has managed to access the target user's computer or software,
but during this stage, the virus does not take any action. The virus will
eventually be activated by the "trigger" which states which event
will execute the virus, such as a date, the presence of another program or
file, the capacity of the disk exceeding some limit or the user taking a
certain action (e.g., double-clicking on a certain icon, opening an e-mail,
etc.). Not all viruses have this stage.
Propagation
phase
The virus starts propagating, that is
multiplying and replicating itself. The virus places a copy of itself into
other programs or into certain system areas on the disk. The copy may not be
identical to the propagating version; viruses often "morph" or change
to evade detection by IT professionals and anti-virus software. Each infected
program will now contain a clone of the virus, which will itself
enter a propagation phase.
Triggering phase
A dormant virus moves into this phase when it
is activated, and will now perform the function for which it was intended. The
triggering phase can be caused by a variety of system events, including a count
of the number of times that this copy of the virus has made copies of itself.
Execution phase
This is the actual work of the virus, where
the "payload" will be released. It can be destructive such as
deleting files on disk, crashing the system, or corrupting files or relatively
harmless such as popping up humorous or political messages on screen
Types of
viruses:
Resident vs. non-resident viruses
A memory-resident virus (or
simply "resident virus") installs itself as part of
the operating system when executed, after which it remains
in RAM from the time the computer is booted up to when it is shut
down. Resident viruses overwrite interrupt handling code or
other functions, and when the operating system attempts to access the
target file or disk sector, the virus code intercepts the request and redirects
the control flow to the replication module, infecting the target.
Macro viruses
Many common applications, such
as Microsoft Outlook and Microsoft Word,
allow macro programs to be embedded in documents or emails, so that
the programs may be run automatically when the document is opened. A macro
virus (or "document virus") is a virus that is written in
a macro language, and embedded into these documents so that when users
open the file, the virus code is executed, and can infect the user's computer.
Boot sector viruses
Boot sector viruses specifically target
the boot sector and/or the Master Boot Record (MBR) of the
host's hard drive or removable storage media (flash
drives, floppy disks, etc.)
Email virus
Email virus – A virus that specifically,
rather than accidentally, uses the email system to spread. While virus infected
files may be accidentally sent as email attachments, email viruses are
aware of email system functions. They generally target a specific type of email
system (Microsoft’s Outlook is the most commonly used), harvest email addresses
from various sources, and may append copies of themselves to all email sent, or
may generate email messages containing copies of themselves as attachments.
How a virus does hides himself?
Stealth strategies:
In order to avoid detection
by users, some viruses employ different kinds of deception. Some old
viruses, especially on the MS-DOS platform, make sure that the
"last modified" date of a host file stays the same when the file is
infected by the virus. This approach does not fool antivirus software, some
viruses can infect files without increasing their sizes or damaging the files.
They accomplish this by overwriting unused areas of executable files.
Read request intercepts
A virus can hide by
intercepting the request to read the infected file, handling the request
itself, and returning an uninfected version of the file to the antivirus
software. The interception can occur by code injection of the
actual operating system files that would handle the read request. Thus, an
antivirus software attempting to detect the virus will either not be given permission
to read the infected file, or, the "read" request will be served with
the uninfected version of the same file
Why do we get viruses?
Software bugs
As software is often
designed with security features to prevent unauthorized use of system
resources, many viruses must exploit and manipulate security bugs,
which are security defects in a system or application
software, to spread themselves and infect other computers.
Social engineering and poor security practices
In order to replicate
itself, a virus must be permitted to execute code and write to memory. For this
reason, many viruses attach themselves to executable files that
may be part of legitimate programs. If a user attempts to launch an infected
program, the virus' code may be executed simultaneously.
Vulnerability of different operating systems
The vast majority of viruses
target systems running Microsoft Windows. This is due to
Microsoft's large market share of desktop computer users
Open-source operating systems such as Linux allow
users to choose from a variety of desktop environments, packaging
tools, etc., which means that malicious code targeting any of these systems
will only affect a subset of all users. Many Windows users are running the same
set of applications, enabling viruses to rapidly spread among Microsoft Windows
systems by targeting the same exploits on large numbers of hosts.
And how to protect yourself?
Antivirus software
Many users install antivirus
software that can detect and eliminate known viruses when the computer attempts
to download or run the executable file, some antivirus
software blocks known malicious websites that attempt to install malware.
Antivirus software does not change the underlying capability of hosts to
transmit viruses. Users must update their software regularly to patch security
vulnerabilities
Comments
Post a Comment