Malicious Code (Sometimes Called Malware) Is A Type of Software Designed To Take Over or
Malicious Code (Sometimes Called Malware) Is A Type of Software Designed To Take Over or
damage a computer, without the user's knowledge or approval. Common malware examples are
listed in the following table.
Attack
Characteristics
Virus
A phage virus rewrites programs and infects all the files associated with
that program. Its objective is usually to delete or destroy every program it
infects.
Worm
Trojan horse
Zombie
A zombie is a computer that is infected with malware that allows remote software
updates and control by a command and control center called a zombie master. A
zombie is:
Commonly uses Internet Relay Chat (IRC) channels (also known as chat
rooms) to communicate with the zombie master.
Used to commit click fraud. The Internet uses a form of advertising, called
pay per click, in which the developers of a Web site places clickable links
for advertisers on their Web site, and each time the link is clicked on, a
charge is generated. Zombie computers can be used to commit click fraud
by imitating a legitimate user clicking on an ad to generate fraudulent
revenue.
Botnet
Rootkit
Often replaces operating system files with alternate versions that allow
hidden access.
Logic bomb A logic bomb is designed to execute only under predefined conditions, and lays
dormant until the predefined condition is met. A logic bomb:
Uses a trigger activity such as a specific date and time, the launching of a
specific program, or the processing of a specific type of activity.
Spyware
Adware monitors actions that denote personal preferences, and then sends pop-ups
and ads that match those preferences. Adware:
Adware
Is usually passive.
Ransomware Ransomware denies access to a computer system until the user pays a ransom.
Scareware
Crimeware
Scareware is a scam to fool users into thinking they have some form of malware
on their system. The intent of the scam is to sell the user fake antivirus software to
remove malware they don't have.
Crimeware is designed to perpetrate identity theft to allow access to online
accounts at financial services, such as banks and online retailers. Crimeware can:
passwords.
There is a wide spectrum of names and terms used to define individuals who engage in
exploiting software and system vulnerabilities. The most common of these terms are defined in
the following table:
Term
Description
A hacker originally referred to those who are computer enthusiasts; however, the term
has changed over time to refer to those that commit computer and cyber crimes by
gaining unauthorized access to computer systems. There are three types of hackers:
Hacker
White hat hackers are ethical people who have the ability to find
vulnerabilities in computer systems.
Black hat hackers are people who unethically test or exploit the vulnerabilities
of computer systems.
Crackers pose the greatest threat to information resources and computer networks
because they are actively engaged in the following malicious activities:
Cracker
Script
Script kiddy is a term used to refer to the less-skilled (usually younger) generation of
hackers. A script kiddy usually relies on automated tools or scripts written by crackers
to scan systems at random to find and exploit weaknesses. Such attacks can usually
be prevented by disabling unnecessary services and updating security patches.
kiddy
Click kiddy is a term used to refer to script kiddies who use GUI-based point and
click software instead of scripts.
Phreaker
The amount of computer malware has increased exponentially over time and the nature of
malware has grown increasingly malignant and powerful. You should be familiar with the
following historic malware events:
Malicious Act
Description
Stoned
The 1987 Stoned virus was one of the very first viruses, and was very
common and widespread in the early 1990s. The virus infects the master boot
record of a hard drive and floppy disks.
Michelangelo
The 1991 Michelangelo virus was designed to infect MS-DOS systems and
remain dormant until March 6, the birthday of Renaissance artist
Michelangelo. The virus infects the master boot record of a hard drive. Once a
system became infected, any floppy disk inserted into the system becomes
immediately infected as well.
The 1999 Chernobyl virus was the first computer virus that affected computer
CIH/Chernobyl hardware. It infected executable files, then spread after the file was executed.
Virus
After it was initiated, CIH would continue until the entire hard drive was
erased, then it would overwrite the system BIOS causing machines to crash.
Melissa
The 1999 Melissa worm was the first widely distributed macro virus which
was propagated in the form of an e-mail message containing an infected Word
document as an attachment.
I Love You
Code Red
The 2001 Code Red worm was designed to attack and exploit vulnerabilities
within Microsoft Web IIS servers. It replicated from port to port with
remarkable speed; infecting over 250,000 systems in under 9 hours.
Nimda
The 2001 Nimda worm took advantage of weaknesses found in the Windows
platform and propagated itself in several ways, including e-mail, infected Web
sites, and network shares. It also left multiple backdoors to allow for
additional attacks.
Klez