Malacious Software
Malacious Software
Malicious code is the term used to describe any code in any part of a software
system or script that is intended to cause undesired effects, security breaches
or damage to a system.
Software that fulfills the deliberately harmful intent of an attacker when run is
called malicious code. For example, viruses, worms, and Trojan horses are
malicious code.
Any programs (including macros and scripts) which are deliberately coded to
cause an unexpected or unwanted event on a user's PC or network come under
the definition of malicious code.
Malware (or malicious software) targets text files such as batch files and
postscript files and the source code which contains commands that can be
executed by another program when run.
Multipartite viruses
Stealth viruses
Polymorphic viruses
Macro viruses
File infectors
File infectors, also called parasitic viruses are the most common and
the most discussed, they attach themselves to executable files.
Such a virus typically resides in memory and waits there for the user
to run another program, using such an event as a trigger to infect that
program as well.
There are many different types of file infectors, but the concept is
similar in all of them.
Boot Sector viruses
Mainly boot sector viruses infect only the DOS (Disk Operating
System) boot sector, but there is a subtype called the MBR virus
which infects the master boot record.
Because both of these areas of the hard disk are read during the boot
process, the virus uses this opportunity to get loaded into the memory.
Boot Sector viruses
Boot Sector
Boot Sector
They then move to the boot sector of the hard drive, and
infect executable files stored on the hard drive from there
and spread across the filesystem.
Stealth viruses
Stealth viruses are not new: the first known virus for PCs,
Brain which was reportedly created by software developers as
an anti-piracy measure, was a stealth virus that infected the
boot sector of the storage device.
Polymorphic viruses
It does not work on any other versions of Word, nor can it mass-mail
itself via any other e-mail client such as Outlook Express or Windows
Mail (Outlook Express version in Windows Vista).
Melissa Macro Virus
When the document infected by Melissa virus is opened for the first
time, the virus starts executing and checks whether the user's computer
is installed with MS Outlook.
If Outlook is there then the virus sends email to first 50 mail addresses
found in the user’s address book, and then infects a central file called
NORMAL.DOT so that any files saved later would also contain the
virus.
After the mail is sent, or if the virus is not able to get any way to
spread due to lack of an Internet connection or Outlook, it spreads
itself by infecting other Word documents on the computer.
Then the worm's activation routine inserts quotes from the animated
television program ‘The Simpsons’ into other documents when the
minutes of the time of the computer's clock match the day of the
month (e.g., 7:09 on the 9th day of the month).
Melissa Macro Virus
For example, the virus could insert the Bart Simpson quotation, "Twenty-two
points, plus triple-word-score, plus fifty points for using all my letters.
Game's over. I'm outta here" into a user's active document.
Melissa Macro Virus
The Melissa virus took advantage of features of the VBA (or Visual
Basic for Applications) programming language which is built into
Microsoft Word.
Many other people turn off this protection mechanism. So even in the
presence of safeguards the virus gets spread.
Melissa Macro Virus
Solution for Macro Viruses: train all of your users about macro
viruses and encourage them to disable macros in Word or any product
that contains a macro language as this sort of problem is not limited to
Microsoft Word.
Filter network traffic: Reports to CERT/CC indicate that viruses use TCP
ports in the range 3127-3198. Depending on their network requirements Site
owners should block both inbound and outbound traffic to these ports, at the
host or the network level.
Stay informed: Keep up to date with the latest news about viruses.
How to Prevent Computer Virus
Back up your files. back up your files on a regular basis. This can
save your valuable time that might be wasted while recovering your
lost data because of a virus problem.
Get help. If you a receive a doubtful email that you believe contains a
virus, or think your machine may already be infected with a virus,
contact some ITS Help Desk number or ITS Help Desk Web site.
Antivirus Scanners
Since 1987, when first virus appeared and infected ARPANET, many antivirus
programs have become available. Anti-virus programs are used to periodically
check your computer system for the best-known types of viruses and prevent
any later infection.
Once a worm reaches a network one copy of the worm scans the
network for another machine that has a specific security hole and if it
finds one It copies itself to the new machine using that security hole,
and then starts replicating itself from there.
Computer Worms
Worms can also exist on a stand alone computer, in which case they will copy
themselves to various hard disk locations.
Recent examples of worms included the Sasser worm and the Blaster worm.
These two can make your computer reboot.
Blaster Worm
If your computer has started rebooting itself again and again, you may have
the W32.Blaster.Worm in case you are running Windows 2000 or Windows
XP.
The main symptom is that your computer keeps rebooting itself after every
60 seconds.
Sasser Worm
Sasser was first noticed in April 30, 2004 and started spreading on
computers by exploiting a buffer overflow in the component known as
LSASS (Local Security Authority Subsystem Service) on the affected
operating systems and therefore is known as Sasser.
Prior to the release of the worm, Microsoft already had patched the LSASS
vulnerability in the April 2004 installment of its monthly security packages.
It is speculated that the worm writers had reverse-engineered the patch and
discover this vulnerability, and planned to attack millions of computers whose
operating system had not been upgraded with the security update.
The worm makes the LSASS.EXE to crash and by default such system will start rebooting
after the crash. And the following Window gets displayed:
Sasser Worm
Morris Worm
Code Red 2
It included a backdoor which was installed to allow
remote control for the attacker.
Nimda
This worm used multiple infection mechanisms such
as: email, shares, web client, IIS, Code Red 2
backdoor.
Trojan Horses
They are most commonly used to create a back door in the system for
the intruders to access and then use your computer for their malicious
purposes.
Trojan horses don’t replicate on their own, but they use a dangerous
file transfer capability so that it would become easier for an attacker to
upload other viruses on the infected computer.
Trojan Horses
Once this seemingly harmless program is run, the Trojan horse will
write some malicious lines of code to the startup routine of the
computer so that it is loaded whenever the computer is booted up.
Sub7 was originally created for Windows, where the Windows client
can only control the Windows version of the server.
The attacker can take control of a TCP session between two hosts
and replace one of the hosts (by disconnecting) and continue
communication with the other host as being one of the original
party to the session.
Other Types of Malicious Software
Attacks
Port scanning attacks are often the first step taken by hacker to
determine where system vulnerability exists.
Other Types of Malicious Software
Attacks
IP Spoofing attack:
Replay attack:
Password Attack:
Often this mechanism survives after the initial intrusion has been
discovered and resolved.
Botnets
A botnet is a collection of
compromised computers
(bots), under the control of a
single entity, usually through
the mechanism of a single
command and control server
(a botnet controller).
Examples : Conficker,Kraken,Srizbi…
Most spam is sent from bots
Most worms and viruses today are being used to
put bot software on end-user computers.
Most denial of service attacks are originated from
bots.
Bots can be used as proxies for almost any kind of
malicious activity on the Internet, providing a
buffer between the miscreant and the action.
Denial of Service
sessions.
Disruption of physical network components.
Denial of service attack: