Computer Virus
Computer Virus
7.1 Introduction
A computer virus is a software program attached to a legitimate program that is destructive in nature
and infects other programs in the system by replicating and attaching itself to other healthy
programs. These harm the computer in many ways such as:
Corrupt and delete the data or files.
Effect the functionality of software applications.
Effect the Hard Disk by erasing everything.
Use e-mail to infect the other computers.
The processing of the computer is also affected.
The virus also spread through the files downloaded on Internet.
The virus cannot infect write protected disks or written documents, already
compressed file and computer hardware, it only infects software.
7.2 Objectives
At the end of the Unit, the student should be able to understand:
To define computer virus and its evolution
To differentiate between the Computer Virus and Biological Virus
To identify the different types of virus with their names and area of infection To explain the damage
done by the virus to computer
The process of virus infection
The effects of virus on the Operating System To apply virus preventive measures
The computer is infected by this virus only if the virus is used to boot up the system. After
completing the booting of the system and running the OS, the virus cannot infect the system.
Examples of boot viruses include: Polyboot.B, Joshi, Gravity, AntiEXE and Cbrain virus.
An email virus is a virus which is attached to email communications or sent with it. Many different
types of email viruses work in different ways, there are also a variety of methods used to counteract such
challenging cyber attacks.
Email viruses also vary in many ways. In some cases the sender of an email virus may be unknown
to a user, or a subject line may be filled with silly text. In some other cases, a hacker may cleverly disguise
the email as being from a known and trusted sender.
Logic bombs and time bombs are small malicious programs to cause harm at a certain point of
time but they do not replicate. They are not even programs in their own right but rather
camouflaged segments of other programs. A logic bomb may be implemented by someone trying to sabotage
a database when they are fairly certain they won’t be present to experience the effects, such as full
database deletion. In these instances, logic bombs are programmed to exact revenge or sabotage work.
For example, a programmer could delete the critical sections of code by establishing a logic bomb if
he/she is terminated from the company. Logic bombs are most commonly installed by the insiders who
have the access to the system.
A MAC or Macro Virus is a virus which spreads to other computers through software programs that utilize
macros. These viruses infect the files created using some applications or programs that contain macros
such as doc, pps, xls and mdb.
For example, Microsoft Word and Microsoft Excel are two popular and widely used programs
which have the capability of executing macros. The macro virus is initially embedded in one
document or a few documents, but it can spread to other documents within the same computer, as
well reaching out to other computers through shared documents and infect the other files,
templates and documents also. They automatically infect the files, templates and documents with
macros that are contained in the file. They hide in documents shared through e-mail and
networks.
They usually fix themselves inside the computer memory and get activated during the start of OS and end up
infecting other opened files. They are hidden in RAM.
7.5.6. Cross-Site Scripting Virus
It is called Cross-site scripting (XSS). It is an injection attack which is carried out on Web
applications that accept input, but do not properly separate data and executable code before the
input is delivered back to a user’s browser. It mostly uses the vulnerable website as a vehicle to
deliver a malicious script to the victim’s browser. During the page loading, the malicious script
execute making the user unable to avoid the attack. The best example of XSS is Java-Script.
7.5.7. Worm
The Worm is very similar to a virus and has the ability to self-replicate itself and infect the
computer also. They travel longer distances by storing themselves in critical areas of the disk
from where they get loaded and have with them sufficient code to transfer themselves outward
from the infected system. Worms have been known to damage and infect the entire LANs.
It does not modify a program like a virus; however, it replicates so much that it consumes the resources of
the computer and makes it slow. Worms are independent programs while viruses attach themselves to
another program.
Examples of Worm: Lovgate.F, Sobig.D, Trile.C, PSWBugbear.B, Mapson, Code Red, Nimda.
It is similar to virus. Trojan horse is a hidden malicious code that could alter or delete the
information of client computer or perform any other unauthorized function. Trojan horses
contain programs that corrupt the data or damage the files. It can also corrupt the software
applications. Trojans can illegally trace important login details of users online - for example E-
Banking.
Trojan horse does not replicate themselves like viruses and do not infect other software. The
difference between bombs and Trojans is that, the bombs are insider jobs, Trojans are brought in from
outside by unsuspecting users through other programs.
Computer Virus can slow down your computer performance and become inefficient or
run slowly.
It tends to fill up the computer with useless data. Virus can corrupt the system files.
Viruses can also wipe out the Boot Sector creating problems when you boot into the
windows, which contain system information.
It can make the changes in the data of the programs or files and cause erratic results.
It might steal important information from your computer and send the same to some other
person.
It might reset or reboot a computer by sending the required codes.
It might format a disk by sending the formatting command to the system thereby causing
to lose everything on the disk.
The computer gets restarted frequently by itself.
If the virus deletes the entire keyboard definition; the computer would not be able to
respond to any keyboard inputs.
The virus might scramble the File Allocation Table (FAT) which contains the
information for the operating system. Any mishappening to the FAT will cause data to be irrecoverably
lost.
7.7 The Vulnerability of Operating Systems to Virus
There are many Operating systems in the market such as Mac, Windows, Linux, UNIX, DOS etc. which
are being used by billions of professional and personal users. Before selecting any operating system,
there is always a question: “Which Operating System is efficient enough to prevent virus”? Viruses are
not restricted to DOS or Windows. A virus has the capability of infecting any type of computer,
irrespective of the Operating System it runs.Virus writers are like other software developers in their desire
to develop for the biggest market. It depends on the users how long he or she can keep it off of viruses.
Practice Questions
4. What is the difference between the computer virus and biological virus?
5. What are the various types of viruses? Outline the net effect of each.
6. What precautionary measures should be taken in order to keep your computer safe from
the virus?
7. What is the difference between Trojan Horses and Virus?
11. What is meant by Anti-Virus software? Name few popular anti-virus software.