28
SEMINAR ON COMPUTER VIRUS PREPARED BY Harsh dhruv sreejit

SEMINAR ON COMPUTER VIRUS

Embed Size (px)

DESCRIPTION

SEMINAR ON COMPUTER VIRUS. PREPARED BY Harsh dhruv sreejit. Introduction of Virus. Len Adleman – Give the name “Virus” Definition Two types of Virus : Computer Virus Mobile Virus. Virus. A virus is a small piece of software that piggybacks on real programs. - PowerPoint PPT Presentation

Citation preview

SEMINAR

ON

COMPUTER VIRUS

PREPARED BYHarsh dhruv sreejit

2

Introduction of Virus

Len Adleman – Give the name “Virus”

DefinitionTwo types of Virus :

Computer VirusMobile Virus

3

Virus

• A virus is a small piece of software that piggybacks on real

programs

4

E-mail viruses

• An e-mail virus moves around in e-mail messages, and

usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book.

EXAMPLE• I Love You Virus in 4-May,2000

5

Worms

• A worm is a small piece of software that uses computer networks and security holes to replicate itself.

• Example Code Red in 19 july ,2000• It Slows Down the internet traffic

while replicate itself

6

Trojan horses

• A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.

• Examples: Net Bus and Back Orifice, Sub seven

7

Boot Sector Viruses

• The boot sector is a small program that is the first part of the operating system that the computer loads.

• The boot sector contains a tiny program that tells the computer how to load the rest of the operating system.

8

Program viruses

• These infect executable program files, such as those with extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS

Multipartite viruses

•A hybrid of Boot and Program viruses

• Examples: Invader, Flip, and Tequila

9

Stealth viruses

• These viruses use certain techniques to avoid detection

• Examples: Frodo, Joshi, Whale

Polymorphic viruses • These viruses are more difficult to

detect.Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101

10

Macro Viruses

• A macro virus is a new type of computer virus that infects the macros within a document or template. When you open a word processing or spreadsheet document, the macro virus is activated and it infects the Normal template (Normal. dot)-a general purpose file that stores default document formatting settings.

11

List Of Different Viruses

• 1981-First Virus in the wild• 1983-First Documental virus• 1986-Brain,PC-Write Trojan & Virden• 1987-File Infectors,Lehigh,Christmas

worm• 1988-MacMag,Scores,Internet Worm• 1989-AIDS Trojan• 1990-VX BBS,Little Black Book• 1991-Tequila• 1992-Michelangelo,DAME

12

List Of Different Viruses

• 1995-Year Of Hacker• 1996-Boza,Laroux,Stog• 1998-Strange Brew, Back Orifice• 1999-

Melissa,Corner,Tristate,Bubbleboy• 2000-DDos,Love

Letter,Timofonica,Liberty• 2001-Gnuman,LogoLogic-A and many

more…• 2002-LFM-926,Sharp-A,SQL spider etc..• 2003-Sobig,Lovegate,Fizzer,Blaster• Trojan.Xombe,MP3Concept,Symb/

Cabir-A and many more

13

2003,Slammer,sobig,Lovgate,Fizzer,Blaster/ Welchia/mimail

• A Worm that carried its own SMTP mail program and used windows network shares to spread started year.

• South Korea was eliminating from the network

14

2004-Trojan.Xombe,Randex,Bizex,Mp3Concept,Sasser

,Mac Os X,W64.Rugrat.3344,Symb/Cabir-A,WCE/Duts,W32/Amus-A,Jpeg Weakness

• Trojan.Xombe was sent out to a wide audience. It posed as a message from Microsoft Windows Update asking you to run the attached revision to XP Service Pack 1.

• MP3Concept turned out to be nothing more than a bad proof-of-concept that never made it into the wild.

15

2004

• The proof-of-concept Worm W64.Rugrat.3344 showed up the end of May. This is claimed to be the first malware that specifically attacks 64-bit Windows files only

• Symb/Cabir-A appeared to infect Nokia Series 60 mobile phones

• Microsoft common .DLL file that processes the image file type and has a buffer overrun error that could allow someone to add malicious code to a JPEG image which can then open holes in an attacked system

16

Execution Of Virus

• Code attached to a common Program• Run when legitimate program gets

executed• Infection phase –

Replication,Floppy,Specific date• Compromise or Loss of Data• Loss of Productivity• Denial of Service• Data Manipulation• Loss of Credibility• Loss of Revenue• Embarrassment

17

Impact and Effects

• Nuisance• Spoofing• Denial of Service• Overwriting and Data diddling• Destruction• Psychological• “Netspionage”• Siphoning data• Exposing vulnerabilities• Compromise or Loss of Data• Loss of Productivity• Denial of Service• Data Manipulation• Loss of Credibility• Loss of Revenue• Embarrassment

18

Protection Against Virus

• Operating System – UNIX• Virus Protection Software• Macro Virus Protection• Précising use of Internet, Email-

attachment

19

WAP Threats

• The use of WAP-enabled mobile phones is booming. Cellular phones with support for WAP (Wireless Application Protocol) allow users to access a wide variety of services.

• WAP enables users to do on-line banking, monitor stock markets, use email, access the Internet – all from their mobile phones

20

CABIR

• First Mobile phone Virus• Discovered by French Arm of Jaspers

Labs• Developed by Global group “No Technology is reliable and safe

from their attack”• Nokia,Siemens,Sony Erickson

21

CABIR

• How it works? Symbian OS Caribe.sys Bluetooth No harmful Effect

22

Motives

• Curiosity• Challenge• To gain wide attention

23

Virus Action

• Three Logical Components of WAP Networka.The WAP Client(Mobile Terminal)b.The WAP Gatewayc.The Origin Server

• More Functionality means more risk•Making phone calls•Accessing & Modifying Phone Book

Data•Sending SMS•Restart phones

24

Protection Against Virus

• Antivirus Software : F-Secure Web Site

• Nokia 6670 – First mobile with Virus Protection• Estimated Retail Price $613• Two Tri-Band • Optimized for GAM Networks in the EMEA

• Pricing plan for F-Secure Antivirus Protection• Protection License - $3.62 per month

• Nokia offer additional Security•VPN & SSL

25

Protection Against Virus

• Shutting the Stable Door•Gateway Level Solution•WML Script Scanner

•Detect and Remove malicious code

•Requiring no client software

26

Some Information Resources

• Anti-virus vendors• NIPC and other CERTS

http://www.nipc.gov http://www.cert.org http://www.fedcirc.govhttp://www.sans.org

• Virus Bulletinhttp://www.virusbtn.com

• The Wildlist Organizationhttp://www.wildlist.org

• Virus Hoax Web Sitehttp://www.vmyths.com

• European Institute for Computer Anti-Virus Research (EICAR)http://www.eicar.org

• Anti-Virus Information Exchange Network (AVIEN)http://www.avien.net

27

Additional Resources

• “The Generic Virus Writer” and other papers by Sarah Gordonhttp://www.badguys.org/

• Short Course on Computer Viruses, 2nd Edition by Fred Cohen

• “Free Macro Protection Techniques” by Chengi Jimmy Kuo, Network Associateshttp://download.nai.com/products/media/vil/pdf/free_AV_tips_techniques.pdf

• Computer Viruses Demystifiedhttp://www.sophos.com/sophos/docs/eng/refguide/viru_ben.pdf

• Viruses Revealed by Robert Slade, David Harley, et al.

28

End of Presentation

THANK YOU