Viruses Worms and Other Malaware
Viruses Worms and Other Malaware
WHAT IS VIRUS?
• Computer viruses are small software programs that are designed to spread from one computer to
another and to interfere with computer operation.
• A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to
other computers, or even erase everything on your hard disk.
• Viruses are most easily spread by attachments in e-mail messages or instant messaging messages.
That is why it is essential that you never open e-mail attachments unless you know who it's from
and you are expecting it.
• Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.
Viruses also spread through downloads on the Internet. They can be hidden in illicit software or
other files or programs you might download.
• To help avoid viruses, it's essential that you keep your computer current with the latest updates
and antivirus tools , stay informed about recent threats , and that you follow a few basic rules
when you surf the Internet, download files, and open attachments.
• Once a virus is on your computer, its type or the method it used to get there is not as important as
removing it and preventing further infection
Computer Network Security
Viruses
Host
Independent
Program
Logic Trojan
Trapdoors Bombs Horses Viruses Bacteria Worms
Start End
Prepended virus
(.COM)
Start End
„
Appended virus … ƒ
(.COM & .EXE)
‚
Jump End = virus code
= program flow
• A Trojan Horse is a program that does something else that the user thought it
would do. It is mostly done to someone on purpose. The Trojan Horses are
usually masked so that they look interesting, for example a saxophone.Wav
file that interests a person collecting sound samples of instruments. A Trojan
Horse differs from a destructive virus in that it doesn't reproduce. There has
been a password trojan out in AOL land (the American On Line).
Password30 and Pasword50 which some people thought were wav. files, but
they were disguised and people did not know that they had the trojan in their
systems until they tried to change their passwords.
• According to an administrator of AOL, the Trojan steals passwords and
sends an E-mail to the hackers fake name and then the hacker has your
account in his hands.
• Back Orifice
• Back Orifice 2000 (BO2K)
• NetBus
• WinVNC (Virtual Network Computing)
• SubSeven
• Ease
• write and launch once
• many acquisitions
• continually working
• Pervasiveness
• weeds out weakest targets
• penetrates difficult networks
• Reconnaissance
• Specific Attacks
• Command Interface
• Communication Mechanisms
• Intelligence Capabilities
• Unused and Non-attack Capabilities
• Information transfer
• Protocols
• Stealth concerns
• Back-Chaining Propagation
• The Cheese worm is an example of this type of
propagation where the attacking computer initiates a file
transfer to the victim computer. After initiation, the
attacking computer can then send files and any payload
over to the victim without intervention. Then the victim
becomes the attacking computer in the next cycle with a
new victim. This method of propagation is more reliable
then central source because central source data can be cut
off.
Computer Network Security .
Worm Propagation
• Autonomous Propagation
• Autonomous worms attack the victim computer and
insert the attack instructions directly into the processing
space of the victim computer which results in the next
attack cycle to initiate without any additional file
transfer. Code Red is an example of this type of worm.
The original Morris worm of 1988 was of this nature as
well.
• Autonomous Propagation
• Autonomous worms attack the victim computer and
insert the attack instructions directly into the processing
space of the victim computer which results in the next
attack cycle to initiate without any additional file
transfer. Code Red is an example of this type of worm.
The original Morris worm of 1988 was of this nature as
well.
• Code Red
• Nimda
• Limited capabilities
• Growth and traffic patterns
• Network structure
• Intelligence Database
Encryption/Obfuscation/Polymorphism
“Andy Warhole”
• Flash Worms
• Faster, more accurate spread
• Complete spread of all possible targets in 5-20 minutes
• Very low false positive rate
• Too fast to analyze/disseminate information
Computer Network Security .
The Future of Worms
Intelligent Worms
• Worms meet AI
• Worm infected hosts communicating in a p2p method
• Exchanging information on targeting, propagation, or
new infection methods
• Agent-like behavior
Computer Network Security .
The Future of Worms
Intelligent Worms
• Intelligence Database
• Knowledge of other nodes
• Concrete vs. abstract
• Complete vs. incomplete
Bigger Scope
• Multi-Platform / OS Worms
• Multi-OS shell code
• Attacking multiple different vulnerabilities on multiple
platforms
• Single worm code, large attackable base
Computer Network Security .
Other Malawares
Bacteria
• Bacteria, also known as rabbits, are programs
that do not directly damage the system. Instead
they replicate themselves until they
monopolize CPU, memory or disk space. This
constitutes a denial of service attack.
• http://en.wikipedia.org/wiki/Computer_viru
s
• http://windows.microsoft.com/en-my/windo
ws7/how-do-i-remove-a-computer-virus