0% found this document useful (0 votes)
118 views16 pages

ComSci I STE 7 Q1 M3

This document discusses a module that aims to teach students about computer viruses and malware. The module has two lessons - the first is about malware in general, and the second focuses specifically on computer viruses. It defines malware as malicious software that can damage systems, steal data, and circumvent controls. It also lists and describes several common types of malware, including viruses, worms, trojans, ransomware, spyware, adware, and rootkits.

Uploaded by

pangalan ko
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
118 views16 pages

ComSci I STE 7 Q1 M3

This document discusses a module that aims to teach students about computer viruses and malware. The module has two lessons - the first is about malware in general, and the second focuses specifically on computer viruses. It defines malware as malicious software that can damage systems, steal data, and circumvent controls. It also lists and describes several common types of malware, including viruses, worms, trojans, ransomware, spyware, adware, and rootkits.

Uploaded by

pangalan ko
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Goals to Unlock

After going through this module, you are expected to:


• Demonstrate skills in preventing viruses and other malicious code that effects computers
o Describe a computer virus.
o Determine some virus symptoms.
o Differentiate and give examples of viruses.
o Familiarize with the use of anti-virus software.

The module is divided into two lessons, namely:


• LESSON 1: The Malware
• LESSON 2: The Computer Virus

Tip of the Pen

DIRECTIONS: Reflect on these questions. Use a minimum of three (3) sentences and a maximum
of five (5) sentences.
1. With the current pandemic, how the COVID-19 affects our education system, businesses
and economy?

__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________

2. What do you think are the similarities and differences of a biological virus to a computer
virus?
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
The
Malware

Malware is a parable term used to refer to several aggressive or invasive code types,
and it is the short name of malicious software. Cybercriminals develop malware that
negatively impacts system security, steals data, circumvents controls, and damages the host
computer, software, and information.

Unboxing Knowledge

ACTIVITY 1: Something is Malicious!

DIRECTIONS: A malware attacked the words causing them to be jumbled and cluttered.
Arrange the letters to complete a word related to malware. The first one is already answered
for you.

ADWARE
1. __________________________________ 5. __________________________________

2. __________________________________ 6. __________________________________
3. __________________________________ 7. __________________________________

4. __________________________________ 8. __________________________________
Point It Out

Malware is the collective name for several malicious software variants, including viruses,
ransomware and spyware. Shorthand for malicious software, malware typically consists of
code developed by cyberattackers, designed to cause extensive damage to data and
systems or to gain unauthorized access to a network. Malware is typically delivered in the form
of a link or file over email and requires the user to click on the link or open the file to execute
the malware.
Malware has been a threat to individuals and organizations since the early 1970s when
the Creeper virus first appeared. Since then, the world has been under attack from hundreds
of thousands of different malware variants, all with the intent of causing the most disruption
and damage as possible.
SPREADING OF MALWARE
Each type of malware has its own unique way of causing havoc, and most rely on user
action of some kind. Some strains are delivered over email via a link or executable file. Others
are delivered via instant messaging or social media. Even mobile phones are vulnerable to
attack. It is essential that organizations are aware of all vulnerabilities so they can lay down an
effective line of defense.
TYPES OF MALWARES

The most important and popular forms of malware are given as follows:
1. Spyware

Spyware is often used by people wishing to test their loved ones’


computer activities. Of course, hackers can use spyware in targeted
attacks to record victims’ keystrokes and access passwords or intellectual
property. Adware and spyware are typically the simplest to uninstall
because they are not nearly as nasty as other malware programs. Check
and stop the malicious executable –you’re finished.

The method used for using the device or client, whether it’s social engineering,
unpatched code, or a dozen other root causes, is much more important than actual adware
or spyware. This is because while the purposes of a spyware or adware program are not that
malicious as a trojan with remote backdoor access, all of them use the same breakdown
methods. The existence of a spyware program should be a warning against a kind of
vulnerability in the system or client before really bad things occur.
2. Adware

Adware is a type of software to view advertisements on your


computer, forward search requests to websites for ads, and collect
marketing data on your computer. For example, adware normally gathers information about
the types of websites you visit to display custom ads.

Some feel that adware collecting information is malicious adware without your
permission. Another example of malicious adware is intrusive pop-up advertising for pretended
fixes for computer viruses or bad results.
3. Computer Virus
A computer virus is mainly characterized by malicious software that
cybercriminals replicate. Typically, it targets and infects existing files on the
target system. For performing malicious activities on the targeted system,
viruses should run to target every file the program can run. Since the advent
of computers, viruses have been around, at least in theory.
John von Neumann made his first academic study on machine theory in 1949. In the ‘
70s, the first examples are live viruses. We use system resources and the robbing and corrupting
of data, such as making the host network useless or inefficient. Another common feature of
viruses is their release, which makes them difficult to identify. Viruses are uninvited, hide in
anonymity, replicate when they are executed, and generally work in obscurity by infecting
other documents.
4. Worm
Worms were even longer than computer viruses before mainframe
days. Email took them into the model in the late 1990s, and computer
security practitioners were hit by malicious worms that came as email
attachments for almost a decade. One individual would open a wormed e-
mail, and the whole company would be easily contaminated. The odd
characteristic of the worm is that it replicates itself.
Take Iloveyou’s infamous worm: When it left, almost every email client in the world was
hit, telephone systems overwhelmed (with the text being fraudulently sent), TV networks
downed, and even the daily paper I had for half a day was postponed. Several other worms,
including SQL Slammer and MS Blaster, provided the worm with its place in the history of
software security. The successful worm makes its capacity to propagate without end-user
interference so devastating. In comparison, viruses need an end-user to begin it, at least
before attempting to infect other innocent files and users. Worms use other dirty work files and
software.
5. Trojan

A Trojan is a malicious program that seems useful to itself.


Cybercriminals supply trojans with regular code, which persuades a victim to
download it. The word comes from the ancient Greek history of the wooden
horse used by ambush to conquer the city of Troy. Trojan horses on machines
are just as attacking. The payload may be anything other than a backdoor
that allows attackers to access the affected device unauthorized. Trojans
often give cybercriminals access to IP addresses, passwords and bank details
to personal information from a client. It is often used by keyloggers to quickly capture account
and password names or credit card information and divulge the malware actor’s details.

Many ransomware attacks are performed with a Trojan horse by inside a seemly
harmless piece of data the malicious software is stored. Security experts consider that Trojans
today are among the most dangerous malware types, particularly Trojans intended to rob
users of financial data. Some insidious forms of trojans claim to kill viruses but add viruses
instead.

6. Ransomware
Malware programs that encrypt the information and retain it as a
recovery waiting for a payoff in the cryptocurrency have been a large
percentage of malware in recent years, and the percentage is still that.
Additionally, Ransomware has crippled businesses, hospitals, police, and
even whole cities. Most freelance systems are Trojans, which means that
some kind of social engineering must expand them. After it’s executed, the
majority of users are checking and encrypting files within several minutes.
If the client is searching for a few hours before the encryption routine is set up, the
malware manager will determine exactly how much the victim can afford and also ensure
that other supposedly safe backups are removed or encrypted. Like any other malware type,
Ransomware can be avoided, but once executed, the damage may be difficult to reverse
without a strong, checked backup. Several reports have shown that around a third of the
victims are still paying their ransoms, and around 30% of the victims are still not disclosing their
records. Whatever the case, it needs other devices, decryption keys and more than a little
chance to open the encrypted files, if possible.
7. Rootkit
A rootkit is a usually malicious collection of software tools, which offers
unauthorized access to a computer by unauthorized users. After installing
the rootkit, the rootkit controller can execute files remotely and change
system settings on the host machine.

Most malware programs today are known as rootkits or rootkits.


Malware programs simply try to change the underlying operating system to
monitor the software effectively and conceal it from antimalware.
8. Phishing and Spear Phishing
Phishing is one of the cybercrimes that occurs when an e-mail,
telephone or text message is contacted to entice a victim to provide
sensitive data, such as personal identification, bank and credit card details
and passwords, by someone posing as a legitimate entity. Phishing is not a
malware type, technologically speaking, but a delivery method that
criminals use to spread other malware forms. Because of its importance
and how it operates, we have included it here in malware forms.
An attack sometimes lures a person to click on a malicious URL to fool the user to believe
that he or she visits an online payment gateway or another online service. The malicious site
then records the name and password of the user and any other personal or financial
information. Spear Phishing is a type of attack targeted at a particular person or group of
people like a corporation’s CFO to access confidential financial information.

Tell Me More

ACTIVITY 2: My Protection
DIRECTIONS: Reflect on these questions. Use a minimum of three (3) sentences and a
maximum of five (5) sentences.
1. What can you do to avoid the listed malwares above? What precautionary measures you
can do to stay away from getting these malwares?
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________

2. In your own opinion and experiences, what computer or online activities you commonly do
that will possibly cause you from getting malwares?

__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________

3. What are the things or data that might be stolen to you if you have a malware-infected
computer? How can you secure your phone and computer from getting malwares?
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
The Computer
Virus
A computer virus is malicious code that replicates by copying itself to another program,
computer boot sector or document and changes how a computer works. A virus spreads
between systems after some type of human intervention. Viruses replicate by creating their
own files on an infected system, attaching themselves to a legitimate program, infecting a
computer's boot process or infecting user documents. The virus requires someone to spread
the infection knowingly or unknowingly.

Unboxing Knowledge

ACTIVITY 3: Virus Acrostic

DIRECTIONS: Create an acrostic for the word VIRUS. You can include preventive measures or
activities that are prone in getting a computer virus. Each letter must have at least 2-3
sentences. Write your answers in the space provided.

V
I
R
U
S
Point It Out

A computer virus is a self-spreading piece of software. The viruses disrupt the normal
functioning of a computer, damaging its software or stealing its data. The first computer virus
was created in 1971 to test whether computer software could self-replicate. Interestingly, its
design was inspired by nature itself. To put the dangers of computer viruses into perspective,
let’s consider their biological predecessors.
As you may know, a biological virus is a tiny parasite relying on living cells for survival.
Viruses live at the expense of the host, which can be an animal, plant, or bacteria. As soon as
it has infected a host cell, a virus starts reproducing, invading other cells, and spreading
disease.

In the same vein, a computer virus shows up on your device uninvited and starts
reproducing itself. If left unchecked, it can cause a lot of damage.
Unable to function without a host, this type of malware travels from computer to
computer, program to program, file to file. The dependence on a host and its self-replication
capabilities makes a computer virus different from other types of malwares.

SYMPTOMS OF A COMPUTER VIRUS


Keep your eye on the following 10 symptoms of computer viruses:
1. Intrusive pop-ups 6. Missing files
2. Slow performance 7. Increased network traffic
3. Frequent crashes 8. Browser homepage change
4. Unknown login items 9. Hijacked email
5. Storage space shortage 10. Disabled antivirus
FOUR STAGES OF VIRUS INFECTION

While some computer virus symptoms are instantly recognizable, others can go
unnoticed for a long time. This is often the case as viruses do not announce their presence on
infected devices right away. Usually, they go through the following four stages of infection:

1. Dormancy
When a virus first infects a computer, it may remain ‘asleep’ for a while to avoid
detection. Some viruses ‘wake up’ after an infected program has been opened a certain
number of times, while other viruses wait until a predetermined date. Either way, it’s hard to
detect the effects of a computer virus during the dormancy period.

2. Replication
After a virus ‘wakes up’, it starts reproducing itself, assembling the army to implement its
mission. The signs of a computer virus are barely noticeable during the replication stage.
However, if the virus starts spreading to other computers by sending infected files to everyone
in your contacts list, your computer may run slower than usual.

3. Trigger event
A trigger event gives the virus a signal to act and bring the hacker’s malicious intent to
life. Depending on the virus type, anything can be a trigger, including a certain number of
virus copies or a particular date.
4. Execution

This is the phase when the virus implements its mission. This can be anything from
changing your browser homepage to stealing your passwords. During this stage, you may start
noticing the damaging effects of a computer virus.

WHAT DOES A COMPUTER VIRUS DO?


At this point, you might be
wondering what kind of damage
can computer viruses do? It all
depends on the hacker’s
intentions, which may range from
the desire to show off skills to
terrorism. Viruses can delete
programs, manipulate
keyboards, allow access to
sensitive information, or flood a
network with traffic, making it
impossible to do anything online.
Can a virus destroy your
computer? Yes.
Nevertheless, in most cases, a computer virus is usually no more than a nuisance you
can easily fix. But in some cases, viruses can lead to much more serious consequences.

For example, the ILOVEYOU virus sent itself to 50 million users worldwide and added a
password-stealing program to Internet Explorer, causing damage of up to $15 billion. And the
Sobig.F virus stopped computer traffic in Washington DC, causing $37 billion in damages.
But are all computer viruses harmful? You may be pleasantly surprised to hear there is
some sunshine among these dark clouds of evil intentions.

The case in point is the Cruncher virus that can free up hard drive space by compressing
every file it infects. There’s also the Linux.Wifatch virus that functions as an antivirus. But
unfortunately, ‘good’ viruses are only a small subset of this software type.
EFFECTS OF COMPUTER VIRUSES
Computer viruses are wholly dependent on their hosts. Just like their biological siblings,
a virus doesn’t alert you upon infection. Rather, it tries to remain unnoticed for as long as
possible. So, what does a computer virus look like in terms of symptoms? Below are the most
common signs.
1. Slower operating speed
Programs running in the background slow down a computer’s speed. Since viruses are
designed to run in the background and perform multiple actions, a performance slump is
inevitable. If your device takes ages to start or open apps, then you might have caught a virus.
2. Issues with programs and files

Among the numerous hazards of computer viruses are data deletion and modification.
Are there missing files? Are you unable to open certain apps? Do unknown programs start
when you turn on your computer? Or, have new files, folders, or apps appeared on your hard
drive out of nowhere? If so, chances are malware has taken over your device.
Not unlike its biological brethren, a computer virus exists at the expense of a host,
attaching itself to files and apps. Therefore, there’s little surprise that a computer virus causes
their noticeable modification.

The most common targets of viruses are system files. Without them, a computer system
might not function correctly or even at all. Thus, by infecting these files, a hacker behind a
virus can target the entire system in a bid to control your computer remotely.

3. Weird behavior
Just like the causes of a computer virus, its effects are only limited by the hacker’s
creativity. For example, after infecting the user’s computer, the Elk Cloner virus displays a
poem threatening to ‘stick to you like glue’. And the Ika-Tako virus replaces all files, programs,
and documents with pictures of cuddly squids.

If your mouse pointer starts jumping around the screen, don’t blame it on a mischievous
poltergeist. Most likely, it’s either a drop of water on your touchpad or a computer virus.
4. Other effects

Certainly, poor performance, issues with programs and files, and weird behavior are not
the only symptoms of infection by computer viruses. If people from your contacts list start
receiving strange messages with attachments or links from you, it’s probably the sign of a virus
at work. If this does happen, then immediately change your passwords and ask everyone to
delete those messages.

Another warning sign to look for is high network traffic, which often spikes during the self-
replication stage of virus infection. Here’s how to check your network traffic.

Other signs of a virus include random browser redirects, a sudden lack of hard drive
space, system freezes, or an unexplained battery drain.
TYPES OF COMPUTER VIRUSES

Photo sourced from searchsecurity.techtarget.com

1. File Infectors
Some file infector viruses attach themselves to program files, usually selected COM or
EXE files. Others can infect any program for which execution is requested, including SYS, OVL,
PRG and MNU files. When the infected program is loaded, the virus is loaded as well. Other file
infector viruses arrive as wholly contained programs or scripts sent as an attachment to an
email note.
2. Macro Viruses
These viruses specifically target macro language commands in applications such as
Microsoft Word and other programs. In Word, macros are saved sequences for commands or
keystrokes that are embedded in the documents. Macro viruses, or scripting viruses, can add
their malicious code to the legitimate macro sequences in a Word file. Microsoft disabled
macros by default in more recent versions of Word; as a result, hackers have used social
engineering schemes to convince targeted users to enable macros and launch the virus.
3. Overwrite Viruses
Some viruses are designed specifically to destroy a file or application's data. After
infecting a system, an overwrite virus begins overwriting files with its own code. These viruses
can target specific files or applications or systematically overwrite all files on an infected
device. An overwrite virus can install new code in files and applications that programs them
to spread the virus to additional files, applications and systems.
4. Polymorphic Viruses
A polymorphic virus is a type of malware that has the ability to change or apply updates
to its underlying code without changing its basic functions or features. This process helps a virus
evade detection from many antimalware and threat detection products that rely on
identifying signatures of malware; once a polymorphic virus's signature is identified by a
security product, the virus can then alter itself so it will no longer be detected using that
signature.
5. Resident Viruses
This type of virus embeds itself in the memory of a system. The original virus program isn't
needed to infect new files or applications. Even if the original virus is deleted, the version stored
in memory can be activated when the operating system (OS) loads a specific application or
service. Resident viruses are problematic because they can evade antivirus and antimalware
software by hiding in the system's random-access memory (RAM).
6. Rootkit Viruses

A rootkit virus is a type of malware that installs an unauthorized rootkit on an infected


system, giving attackers full control of the system with the ability to fundamentally modify or
disable functions and programs. Rootkit viruses were designed to bypass antivirus software,
which typically scanned only applications and files. More recent versions of major antivirus
and antimalware programs include rootkit scanning to identify and mitigate these types of
viruses.
7. System or Boot Sector Viruses
These viruses infect executable code found in certain system areas on a disk. They
attach to the disk OS (DOS) boot sector on diskettes and USB thumb drives or the master boot
record (MBR) on hard disks. In a typical attack scenario, the victim receives a storage device
that contains a boot disk virus. When the victim's OS is running, files on the external storage
device can infect the system; rebooting the system will trigger the boot disk virus. An infected
storage device connected to a computer can modify or even replace the existing boot code
on the infected system so that, when the system is booted next, the virus will be loaded and
run immediately as part of the MBR. Boot viruses are less common now as today's devices rely
less on physical storage media.
HOW DO YOU PREVENT COMPUTER VIRUSES?
The following measures can help you prevent a virus infection:

1. Install current antivirus and antispyware software and keep it up to date.


2. Run daily scans of antivirus software.
3. Disable autorun to prevent viruses from propagating to any media connected to the
system.
4. Regularly patch the OS and applications installed on the computer.
5. Don't click on web links sent via email from unknown senders.
6. Don't download files from the internet or email from unknown senders.
7. Install a hardware-based firewall.
Tell Me More

ACTIVITY 4: Know the Virus

DIRECTIONS: Reflect on these questions. Use a minimum of three (3) sentences and a maximum
of five (5) sentences.
1. How can you say that a computer or any device is infected with a virus? What are the
symptoms will you look for?
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________

2. What are the possible danger or harm a computer virus can bring?
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________

Show and Tell

ACTIVITY 5: Versus

DIRECTIONS: Reflect on this question. Use a minimum of three (3) sentences and a maximum
of five (5) sentences.
1. What are the differences of malwares and computer viruses?

__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
References

Websites

• https://www.educba.com/types-of-malware/

• https://searchsecurity.techtarget.com/definition/virus

• https://clario.co/blog/computer-virus-symptoms-effects/

You might also like