Content of the lesson:
You can also use another term for a computer virus - Malware = Malign Software = harmful software.
It is a computer program which is distributed without the consciousness of a user and its task is to damage a computer. Every computer virus can be defined in this way.
Why is harmful software called as a virus? Because of the similarity with biological viruses. Computer viruses also spread quietly, reproduce other viruses and move them to other computers.
We can take a look at often signs of computer viruses. These signs do not have to mean that a computer was attacked, usually more signs are combined. However, it can be a small technical fault of a computer.
Note: the order is individual; all actions do not have to be done
Other parts are not compulsory:
Classical viruses are rather a history. We will not deal with them in details, we will make a short summary.
A classical computer virus attacked a concrete program of file where it settled and masked itself. It attacked executable files, system areas of disks or files which cannot be created straight but only using specific applications (Word documents, Visual Basic scripts etc.). The virus was then activated after launching the file because the file also launched the virus.
The name of this harmful software is derived from mythology. We all know the story how Greeks broke to Troy using a trick with huge wooden horse. When Trojans saw that the Greeks were leaving, they ran out of their city and found a massive wooden horse and one Greek who told them that it is a gift for goddess Athena. The horse was so huge that it did not fit into the gate so Trojans destroyed part of walls and moved the horse inside the city. When the night came, Greek ships returned to shores of Troy and gave a sign on the ground. Hidden Greeks ran out of the horse and together with the others from ships captured Troy.
A computer Trojan horse uses the same principle - it uses human curiosity and stupidity. Users are easily tempted to open a program of a file. Trojan horses do not distribute themselves as other classical viruses. The only way how to heal your computer is to delete all Trojan horses hidden in files.
Spyware is not a thread but rather an inconvenience. It sends data from your computer but this data is used for statistics only. It can find out the number of visited websites, number and type of installed programs etc. Unfortunately, this information is being misused for targeted advertisement which should be attractive for the concrete user. Spyware is fully legal so far and is often a part of program examples. However, it is still a malware which runs without the consciousness of user and can cause slowdown of programs or the whole system.
This group contains programs which contain advertisement. User usually agrees with this when installing such a program. However, Adware can also bring pop-up advertising windows when browsing the Internet. It also forces you to change your default pages for browsers etc. In most cases you are not interested in that website at all.
An interesting variant of harmful software. In fact, it is not harmful software but only a false message, journalism duck or nonsense. Such a message should alarm users. Usually used topics are connected with dangers for example a threat of an attack which can cause your hard drive to rotate in the other direction and explode. Then you can get warnings from organizations, false help requests, fraudulent emails (mostly from Niger) and more. One of the most known hoax is the message that the Mars will be visible at night sky as well as the Moon because it is closer to the Earth and this situation can be seen once in many years. This message has been sent around the Internet for many years and several people still believe it.
More about hoax: www.hoax.cz
A thing from the past. It was used when the internet connection used a fixed line. This Trojan horse forwarded your call for example to so called yellow pages where the price for loading a page was not 1 Kč, but 60 Kč for example. You could get this virus when visiting a pornographic website or because of a security hole in your browser. Favorite technology of this virus was the element ActiveX.
A typical example is that you get an e-mail which contains all requirements of your bank (logo, colors, appearance). There is a message telling you about a regular maintenance and you will be prompted to send your username, password and sometimes also the pin. Otherwise your account will be blocked or removed. You fill everything, click on the link and send data... and you have just sent your account details to a foreign person. Even though the website looked like the website of your bank. As you probably suspect at this moment, these e-mails are fraudulent and try to get sensitive information from you - this procedure is called social engineering.
It is closely connected to phishing and is even more insidious. The difference is that an owner of a bank account enters the address "www.mojebanka.cz" into his browser, enters the right category and logs in to his account. The procedure is fully correct but the attacker changed so called DNS record. This means that you enter the address www.mojebanka.cz and a DNS server translates the IP address of that computer and redirects you to that machine. However, it can happen that DNS records were changed and you will be redirected to another IP address - a pre-prepared one which contains the same appearance of website as the real bank. Because of this reason banks usually require a combined way of logging in and confirming payments. This means that you log into your account using the right username and password but you also have to enter a certificate which was sent to your mobile phone. This can prevent your account to be misused.
Year 1986. The first virus (boot virus). It was designed for system MS-DOS. It was not meant to damage computers but it was designed as a protection (advertisement) against copying a medical program which was created by brothers Alvi in Pakistan. Virus was not destructive, only contained contact details but these made the life of many users unpleasant.
Virus Brian (source: www.lupa.cz)
Year 1987. This was the first network epidemic. Virus displayed an image of Christmas tree and also sent his copies to all network users. It was spread inside university networks, concretely the Bitnet network in western Germany from which it spread to European academic institute and then to IBM. This virus was followed by more viruses (Jerusalem and Morris).
Virus Christmas Tree (source: nakedsecurity.sophos.com)
Year 1988. Morris worm, sometimes also called as the Internet worm, was one of the first worms which used the Internet to spread. His author was Robert Tappan Morris who created it in 23 at university in Cornelloě during his scientific work. This worm worked on systems based on Unix. When experimenting with this program it started spreading in the whole network and attacking other computers without control. The original intention was not to damage anything but to find out the number of users connected to the Internet. However, the virus contained a mistake which allowed it to attack one computer more times and then this machine was damaged so much that working on it was not possible.
Moris was the first person who was accused of violating the law. He was released on a condition and had to work several hours in the streets. Nowadays this author is an associate professor at the Massachussest Institute of Technology where he focuses on computer networks and their security.
Year 1992. This virus caused especially a huge media buzz. It waited for the date 6. March inside all computers - this is the birthday of the artist Michelangelo - and then it rewrote a part of hard drive using random characters. There were worries that data in millions of computers were destroyed but this was a clever move of antivirus companies which earned money for their programs. The real number of infected computers was around 10-20 thousand.
This is one half.
Press any key to continue...
Year 1994. This virus came from Slovakia and was also called as "plague from Košice". It could completely modify his copies what made the process of revealing it very difficult (that means it was a polymorphous virus). It infected executable files with extensions .exe and .com (while launching, opening, renaming) but also the boot sector (that means it was a hybrid virus) and managed to hide his presence in a computer (it used stealth techniques).
It was a destructive virus which encrypted a part of your hard drive. In case that you remove the virus, you lose the encryption key. To prevent the loss of data, you have to leave the virus inside a computer and backup everything on another medium. There was also a program which was able to decrypt the data because the virus saved his encryption key inside the partition table.
Year 1998. The real name was Win95.CIH. Virus was created by a Taiwan programmer Chen Ing-Hau (CIH) who sent it to a local conference. This virus is activated every year on the anniversary of nuclear plant fault in Chernobyl - on the 26. April. It was designed for Windows 95 and Windows 98. It was insidious because it could delete Flash BIOS which meant destruction of the whole motherboard in several cases. This means it was able to damage the hardware of a computer.
Year 2000. This was a macrovirus which used programs from Microsoft (Word, Outlook). It was spread very quickly using the Internet, users got an e-mail with attached file "List.doc". After opening this file the virus was launched. Then it sent itself to first 50 contacts saved in Outlook. Gradually all other Word documents inside the computer were infected. The author was finally traced by FBI.
Virus Mellisa (source: tn.nova.cz)
May 2000. This was a famous e-mail worm created in Visual Basic. It was released on 4. May 2000 on Philippines and is considered as one of the most destructive viruses. It simply sent an e-mail with infected attachment. The whole email looked correctly and there was one file attached to the email ("love-letter-for-you.txt"). User who thought that it is a text file opened the attachment and launched the virus. The real name was: "love-letter-for-you.txt.vbs". The operating system hides extensions of known files so this attachment looked like a simple text file. We can use the term "social engineering" with means manipulating with people for this virus. The target is to force people to do a particular action or to get information from them.
Virus I Love You (source: www.f-secure.com)
Year 2001. Quickly spreading virus, it was not destructive. This virus was generated using a virus generator. Users got an image named anna-kournikova.jpg in an e-mail (the real name was anna-kournikova.jpg.vbs of course). User was lured to open a photo of the famous tennis player and launched the virus after opening the file. Then this virus was sent to all his contacts.
Virus Anna Kurnikovova (source: www.cnews.cz)
July 2001. Example of the strength of worms. During 14 hours more than 359 000 computers using randomly selected IP addresses were infected. It was not destructive, did not steal any data or modify anything. It attacked Microsoft IIS web server and displayed the following message: "HELLO! Welcome to http://www.worm.com! Hacked By Chinese!". His spread stopped at midnight because it was programmed to do so. Users could remove it by restart and then had to patch the vulnerable place.
Virus Code Red (source: www.pooh.cz)
Year 2003. Widespread virus which used a security hole in Microsoft systems. It was not destructive, only pointed on weak parts of systems Windows 2000 and Windows XP. User got a warning message (see the following image) and then his computer was restarted. The virus probably also contained a message to Bill Gates that he only earns money but cannot secure his own software.
Virus Blaster (source: www.viry.cz)
This virus used a security hole (Local Security Authority Subsystem Service) to display a warning and then restarted the computer.
Virus Sasser (source: www.viry.cz)
Virus Sasser (source: www.viry.cz)
Year 2004. This virus was spread using e-mails and lured users to open an infected attachment. It was a so called backdoor which opened ports for remote access into a computer. The attacker could take control over any infected computer.
Year 2007. This virus also used e-mails to spread and lured users to open an infected attachment. In case that someone opened it, his computer was infected. This virus masked itself using a rootkit which hid his presence in a computer. Then it took control over the computer and connected to peer-to-peer network (this virus managed to use one of the largest networks in the world to connect computers). Then it sent copies to other computers of course. This virus was very variable, there were several variants, it changed his programming techniques, methods of infection and procedures of social engineering.