Computer Viruses
Computer Viruses
1 Introduction
A computer virus is a malicious software program that is designed to
replicate itself and spread to other computers. It can cause damage to data,
software, and hardware, and can be used to steal confidential information
and spread malicious messages.
Computer viruses come in many different forms, and they can have
different effects on a system. Some of the most common types of
computer viruses are boot sector viruses, file infectors, macro viruses, and
worms.
1
Computer viruses are usually spread through email attachments,
downloads, or by visiting infected websites. They can also be spread
through removable storage media such as USB drives or disks, which is
why it is important to be careful when downloading files from unknown
sources.
Boot sector viruses infect the master boot record of a computer, while file
infectors infect executable files. Macro viruses, on the other hand, are
written in macro languages and can infect documents and spreadsheets.
1.4.1 My Doom
MyDoom became the fastest spreading email worm in January 2004. It
could create a backdoor in the computer operating system letting
unauthorized users access your system. It could also spoof emails so that
it becomes very difficult to track the source.
Like other viruses, MyDoom searches for email contact in the address
book, plus it also sends the request to all search engines and uses email
addresses found in search engines. In 2004, the most popular search
3
engine, Google starts receiving millions of search requests from corrupted
systems which slowed down the search engine service and even caused
some servers to crash. According to the MessageLabs, at that time, every
12th email carried this virus.
1.4.2 Sobig
Sobig was a Trojan horse that infected millions of internet-connected
Microsoft Windows computers in August 2003. It had a total of 6 variants
named Sobig.A, B, C, D, E and F. The last one i.e. Sobig.F was the most
widespread worm among all variants.
4
All these emails consist of attachment files of extension .pif. After
downloading, it copies itself to the Windows folder as Winmgm32.exe
which allows your operating system to be used as a backdoor for
spammers.
The creator of the worm is unknown. Also, Microsoft announced that they
will pay $250,000 for information leading to capture the worm’s creator.
It estimated damage costs (till now) is $37 Billion.
1.4.3 Klez
Just like other viruses, it makes copies of itself and distributes it to your
contacts. It can also modify the sender’s field, which is known as spoofing
5
where the email appears to come from an authorized source, but in reality,
it is coming from an anonymous sender.
It can infect the computer just by previewing the infected mail i.e. without
even downloading or executing the attachment. It has 3 variants; Klez.D,
Klez.E, Klez.H. The virus is not completely dead yet, that’s why it is
highly recommended to be careful what you are downloading from the
internet and not to use old browser version and expired antivirus software.
It estimated damage costs (till now) is $19 Billion.
1.4.4 ILOVEYOU
6
overwrote image files and send the copies to all email address specified
in Windows address book.
1.4.5 Conficker
Also known as Kido, Downup, and Downadup, Conficker is a computer
worm first appeared on November 2008. It targeted Microsoft Windows
bug while forming a botnet. Conficker was using many advanced malware
techniques which is why it was difficult to track and destroy these
programs. It changed its propagation and updated methods from version
to version.
7
This worm exploited the vulnerability of Windows 2000 and Windows
NT system. It was a buffer overflow problem i.e. when the operating
system gets more data than its buffers can handle, it simply starts
overwriting adjacent memory. All computers affected by Code Red tried
to contact White House web servers at the same time, overloading the
servers. As a result, it successfully brought down the
Whitehouse.gov along with other government agencies websites.
A few weeks later, Microsoft released software set to fill the voids present
in Windows 2000 and NT. However, they were unable to remove the virus
from infected systems. Affected users (more than 2 million) had to format
the hard drive and start fresh. It estimate damage is $2.7 Billion.
1.4.8 Melissa
In 1999, a man named David L. Smith developed a virus called Melissa
for Windows platform based on Microsoft Word macro. The program
8
automatically spreads itself through an email attachment. Once the
attachment (named list.doc) is open in MS Word or Outlook, it resends
itself to first 50 contacts present in address book along with the message
“Here is the document you asked for.. don’t show it to anyone else”.
It didn’t destroy any personal files or data present in hard drive but was
strong enough to hang the entire network. The virus spread quickly and it
forced Microsoft corporation to shut down incoming email service. Intel
and other companies were affected too. For creating Melissa,
David received 20 months jail sentence and $5000 fine. It estimated
damage costs is $1 Billion.
1.4.9 Sircam
It also propagated via open share network. It simply scanned the network
with share drives and copied itself to the machine with non-password
protected/opened drive. Fortunately, the virus was limited as many people
9
upgraded their internet security. But still, Sircam did the damage for what
it was designed to. It estimated damage costs is $1 Billion.
The virus spread quickly and affected more than 75,000 users within 10
minutes. It was not written in the SQL language. It exploited the buffer
overflow problem in Microsoft SQL Server and Desktop Engine Database
products.
1.4.13 Nimda
10
Nimda is the file infector and computer worm which was released on 18th
September 2001. The name comes from the reverse spelling of “admin”.
It utilized numerous types of propagation technique including email,
network share, and web browsing. That is why it became the most
widespread virus on the internet within 22 minutes after its release.
It affected both workstations and servers running on Windows NT, 95, 98,
2000, XP, Me. The worm created a backdoor in the operating system
which allowed the attacker to access all functions of logged-in users. That
means, if you are logged in as admin and your computer has been affected
by Nimda, attackers could perform all admin tasks. It estimated damage
costs is $630 Million.
1.4.14 Blaster
Also known as MSBlast and Lovesan, Blaster is a computer worm first
detected on 11th August 2003. It was targeting Microsoft Windows XP
and Windows 2000 operating system. Blaster was taking advantage of
buffer overflow bug and spreading through spamming itself to a large
number of IP addresses. Once a giant network was infected, it spread
quickly because the firewalls did not prevent internal machines from
using a specific port.
Few of its versions fool the users to download the program through fake
links to news and videos. The attackers often change the subject to current
events so that it looks legitimate. Once you click on the innocent looking
link, a small software containing worm will start downloading
automatically. This was the worst worm of 2007 which infected around 10
million PCs.
1.5 Symptoms
Computers can get a virus in many ways. The most common ones are:
And other ways, then the computer (PC) may have a virus, look for these
the following telltale signs or symptoms:
12
o Unremembered installation/creation of new desktop icons or apps
o Applications running without your permission
o Programs that end without your permission
o Modifications to your security settings
o Unusual emails or social media posts made to a big audience without
your consent.
o Without your intervention, your default search engine was modified.
o Browser links lead to the wrong web page.
o Slow performance.
o Unfamiliar programs or browser extensions.
o Your browser sending you to unwanted sites or search engines.
o Frequent crashes.
o Recurring error messages.
o Excessive pop-ups.
o Problems with computer security programs
o Missing files
o Spam messages being sent from your email or social media accounts
o Increased number of pop-ups on seemingly normal websites
1.9 Anti-Virus
An anti-virus is software that is designed to identify, prevent, and remove
malicious software, also known as malware. It is one of the most
important tools to protect your computer from malicious attacks.
15
Norton AntiVirus Plus provides comprehensive protection against viruses
and malware. It includes a firewall and anti-spam protection, as well as
automatic scans, real-time protection, and the latest virus definitions.
Norton AntiVirus Plus also offers cloud backup, allowing you to store
your data securely in the cloud and access it from any device.
Bitdefender Antivirus Plus also offers cloud backup, allowing you to store
your data securely in the cloud and access it from any device.
AVG AntiVirus Free also offers cloud backup, allowing you to store your
data securely in the cloud and access it from any device.
Avast Free Antivirus also offers cloud backup, allowing you to store your
data securely in the cloud and access it from any device.
16
McAfee AntiVirus Plus is a comprehensive suite of anti-virus solutions
that offers real-time protection against viruses and malware. It includes a
firewall and anti-spam protection, as well as automatic scans, real-time
protection, and the latest virus definitions.
McAfee AntiVirus Plus also offers cloud backup, allowing you to store
your data securely in the cloud and access it from any device.
1.14 Conclusion
Computer viruses are malicious codes or software that can cause damage
to your computer's data, applications, or operating system. It is important
to take steps to protect your computer from infection, such as installing
and regularly updating antivirus software, being mindful when
downloading files or opening emails from unknown sources, and keeping
your operating system and applications up to date.
17
Computer viruses can be divided into several different types, including
boot sector viruses, file infectors, macro viruses, and polymorphic viruses.
Boot sector viruses infect the boot sector of a computer's hard drive, while
file infectors infect executable files. Macro viruses infect documents that
contain macros, while polymorphic viruses are able to change their code
in order to evade detection.
Each type of virus has its own unique characteristics, and can cause
different levels of damage. It is important to be aware of the different
types of viruses, and to take the necessary steps to protect your computer
from infection.
There are several signs that may indicate that your computer has been
infected with a virus. These include unexpected pop-up windows, slow
computer performance, and changes to your computer's settings or files.
Your computer may also crash unexpectedly, or start running programs
without your permission.
18
Reference
https://en.wikipedia.org/wiki/Computer_virus
https://uniserveit.com/blog/what-are-the-different-types-
of-computer-viruses
https://www.rankred.com/worst-computer-viruses/
https://www.asurion.com/connect/tech-tips/how-to-
remove-a-virus-from-your-mac-or-pc/
https://www.javatpoint.com/advantages-and-
disadvantages-of-virus
https://www.chtips.com/computer-
fundamentals/advantages-and-disadvantages-of-antivirus-
software/
19