History of Viruses

Embed Size (px)

Citation preview

  • 8/6/2019 History of Viruses

    1/22

    The History and Details of

    Computer Viruses

    With Chuck Easttom

    http://[email protected]

  • 8/6/2019 History of Viruses

    2/22

    Terms

    What is a virus

    What is a worm

    What is a Trojan horse

  • 8/6/2019 History of Viruses

    3/22

    1981Apple Viruses 1, 2, & 3

    1980s Fred Cohen

    1987 Lehigh Virus1988 The first anti virus software

    1990 The first polymorphic viruses

    1991 Symantec releases Norton Anti Virus1992 The Michelangelo Virus

    1994 Kaos4 virus spreads via adult websites.

    1996The Concept virus

    The History of Computer Viruses

  • 8/6/2019 History of Viruses

    4/22

    The History of Computer Viruses II

    1999 The Melissa Virus

    2000 The I Love You Virus

    2001 The Code Red Worm2003 The Slammer Worm.

    2004 MyDoom

  • 8/6/2019 History of Viruses

    5/22

    The History of Computer Viruses -

    Details1981 Apple Viruses 1, 2, and 3 are some of the

    first viruses "in the wild" or public domain.

    Found on the Apple II operating system, the

    viruses spread through Texas A&M via piratedcomputer games.

  • 8/6/2019 History of Viruses

    6/22

    The History of Computer Viruses -

    Details1980s In the early 1980s, Fred Cohen did

    extensive theoretical research, as well as setting

    up and performing numerous practical

    experiments, regarding viral type programs. Hisdissertation was presented in 1986 as part of the

    requirements for a doctorate in electrical

    engineering from the University of Southern

    California. This work is foundational, and any

    serious student of viral programs disregards it athis own risk Dr. Cohen's definition of a

    computer virus as "a program that can 'infect'

    other programs by modifying them to include a

    version of itself

  • 8/6/2019 History of Viruses

    7/22

    The History of Computer Viruses -

    Details1987 In November, the Lehigh virus was

    discovered at Lehigh University in the U.S. It

    was the first "memory resident file infector". A

    file-infecting virus attacks executable files. Itgets control when the file is opened. The Lehigh

    virus attacked a file called COMMAND.COM.

    When the file was run (usually by booting from

    an infected disk), the virus stayed in the resident

    memory.

  • 8/6/2019 History of Viruses

    8/22

    The History of Computer Viruses -

    Details1988 In March, the first anti-virus software was

    written. It was designed to detect and remove

    the Brain virus and immunized disks against

    Brain infection.

  • 8/6/2019 History of Viruses

    9/22

    The History of Computer Viruses -

    Details1990 Viruses combining various characteristics

    spring up. They includedPolymorphism

    (involves encrypted viruses where the

    decryption routine code is variable),Armoring(used to prevent anti-virus researchers from

    dissembling a virus) and Multipartite (can infect

    both programs and boot sectors).

  • 8/6/2019 History of Viruses

    10/22

    The History of Computer Viruses -

    Details1991 Symantec releases Norton Anti-Virus

    software.

    1992 Media mayhem greeted the virus

    Michaelangelo in March. Predictions ofmassive disruptions were made and anti-virus

    software sales soared. As it turned out, the cases

    of the virus were far and few between.

  • 8/6/2019 History of Viruses

    11/22

    The History of Computer Viruses -

    Details1994A virus called Kaos4 was posted on a

    pornography news group file. It was encoded as

    text and downloaded by a number of users.

    1996Concept, a macro-virus, becomes the most

    common virus in the world.

    1998 - The "RedTeam" virus infects Windows

    executables dispatches the infected files throughEudora e-mail.

  • 8/6/2019 History of Viruses

    12/22

    The History of Computer Viruses -

    Details1998: The emergence of the sensational

    "BackOrifice" ("Backdoor.BO") - utility of that

    allowed hackers management of remote

    computers and networks.

    1999 The Melissa virus, a macro, appears. It

    uses Microsoft Word to infect computers and is

    passed on to others through Microsoft Outlook

    and Outlook Express e-mail programs.

  • 8/6/2019 History of Viruses

    13/22

    The History of Computer Viruses -

    Details2000 The "I Love You Virus" wreaks havoc around the

    world. It is transmitted by e-mail and when opened, is

    automatically sent to everyone in the user's address book

    July 2001: The Code Red worm infects tens of thousands of

    systems running Microsoft Windows NT and Windows 2000

    server software, causing an estimated $2 billion in damages.

    The worm is programmed to use the power of all infected

    machines against the White House Web site at apredetermined date. In an ad hoc partnership with virus

    hunters and technology companies, the White House

    deciphers the virus's code and blocks traffic as the worm

    begins its attack.

    .

  • 8/6/2019 History of Viruses

    14/22

    The History of Computer Viruses -

    Details2002: Melissa virus author David L. Smith, 33,

    is sentenced to 20 months in federal prison

    Jan. 2003: The "Slammer" worm infectshundreds of thousands of computers in less than

    three hours. The fastest-spreading worm ever

    wreaks havoc on businesses worldwide,

    knocking cash machines offline and delaying

    airline flights.

  • 8/6/2019 History of Viruses

    15/22

    The History of Computer Viruses -

    Details2004: The "MyDoom" worm becomes the

    fastest-spreading e-mail worm as it causes

    headaches -- but very little damage -- almost a

    year to the day after Slammer ran rampant inlate January 2003. MyDoom uses "social

    engineering," or low-tech psychological tricks,

    to persuade people to open the e-mail

    attachment that contains the virus. It claims to

    be a notification that an e-mail message sentearlier has failed, and prompts the user to open

    the attachment to see what the message text

    originally said. Many people fall for it.

  • 8/6/2019 History of Viruses

    16/22

    The History of Computer Viruses -

    Details2007: A new virus called "Storm Worm." is

    released. This fast-spreading email spammer

    disguises itself as a news email and asks you to

    download film. The "Storm Worm" gathersinfected computers into a botnet, which it uses

    to infect other machines. It was first identified

    on Jan. 17 and within 13 days had infected 1.7

    million computers

  • 8/6/2019 History of Viruses

    17/22

    The History of Computer Viruses -

    Details2009 9 million computers running on Windows

    operating system were hit with "Conficker"

    worm. The malware spread via the Internet and

    the main tools that helped the worm spreadwere unpatched corporate networks and USB

    memory sticks. First discovered last October, it

    loads itself on to a computer by exploiting a

    weakness in Windows servers. Once it has

    infected a machine, the software also tries toconnect to up to 250 different domains with

    random names every day.

  • 8/6/2019 History of Viruses

    18/22

    The mechanics of Viruses

    Delivery

    a. Via email

    b. Copying over a networkc. Direct communication with exposed ports.

    Payload

    Types of VirusesMacro virus

    Script Virus

    Executable Virus

  • 8/6/2019 History of Viruses

    19/22

    How Anti Virus Software Works

    Scanning for known files

    Scanning for worm infection vectors

    Heuristic scanning

  • 8/6/2019 History of Viruses

    20/22

    Current Active Viruses

    As of13 November 2005

    Sober.S first noticed October13, 2005

    Bagle variant started September19, 2005

    Zotob-D August 16th, 2005

  • 8/6/2019 History of Viruses

    21/22

    Rules for preventing viruses

    Keep operating system and all software updated/patched

    Use a virus scanner. McAffee and Norton are the two most widely

    accepted and used virus scanners. It costs about $30 a year to keep

    your virus scanner updated. Do it.If you are not sure about an attachment, dont open it.

    You might even exchange a code word with friends and colleagues.

    Tell them that if they wish to send you an attachment, to put the

    code word in the title of the message. Without seeing the code

    word, you will not open any attachment.

    Dont believe security alerts that you are sent. Microsoft does

    not send out things in this manner. Go check the Microsoft website

    regularly, as well as one of the anti-virus websites previously

    mentioned.

  • 8/6/2019 History of Viruses

    22/22

    http://www.f-secure.com/virus-info/virus-news/

    http://www.cert.org/nav/index_red.htmlhttp://securityresponse.symantec.com/

    Anti Virus Information Web Sites