You are on page 1of 38

REPORT BY :

Genica Peye Alcaraz


Celine Fatima Japlit
Christine Antonette Rivera
Qahira Felize Vibar
What is a COMPUTER VIRUS?
 The general term computer virus usually covers
programs that modify how a computer works
(including damaging the computer) and can self-
replicate. A true computer virus requires a host
program to run properly.

 A computer program able to copy itself “replicate”


and infect other computer.
genica.qahira.tonet.celine 2
History
 David Gerrold

 First used the term “virus” in his novel “When HARLIE


was one” published in 1972, US.

 Harlie – (Human Analog Replication Lethe tic


Intelligence Engine ) a sentient computer that writes
viral software to retrieve damaging personal information
from other computers to blackmail the man who wants
to turn him off.

genica.qahira.tonet.celine 3
History
 Late 1960s – early 1970s

 “The rabbit” are programs which cloned themselves and occupied


system resources, thus lowering the productivity of the system.
Most probably mistakes or pranks by system programmers

 “Pervading animal” merged itself to the end of executable files

 First half of 1970s

 “The Creeper” was created under the Tenex OS and used global
computer networks to spread itself. It was capable of entering a
network by a modem and then transfer a copy of itself to remote
system.

genica.qahira.tonet.celine 4
History
 ““The Reeper” – first anti-virus program

 Elk Cloner” bootable virus epidemics started on Apple II


computers. It attached itself to the boot sector of diskettes to
which there were calls. It manifested itself through turned
over displays, blinking text displays and various messages

 1986 The first IBM PC virus “Brain” pandemic began. It


was also the first stealth virus – if there was an attempt to
read the infected sector, the virus substituted it with a
clean original one. It spread via floppy disks and only
infected boot records and not hard drives.

genica.qahira.tonet.celine 5
History
 1987 Ralph Burger published his book “Computer
Viruses: a High-tech Disease” which explained how
viruses are made, thus prompting creation of
thousands of viruses

 Late 1992 The first Windows virus appears, infecting


the OS executables

 February 1997 “Linux.Bliss” appeared as the first virus


for Linux (a Unix clone).

genica.qahira.tonet.celine 6
Malicious code/Malware
 Virus – a small piece of software that piggybacks on
real programs.

 Trojan horse – a computer program that claims to do


one thing but really do another.

 Worm – doesn't require a host program. It's an


application that can replicate itself and send itself
through computer networks.

genica.qahira.tonet.celine 7
genica.qahira.tonet.celine 8
 Adware – puts ads up on your screen

 Spyware – collects personal information on the pc user

 Hijacker – turn your machine into zombie computer

 Dialers – force your computer to make phone calls

genica.qahira.tonet.celine 9
Top 10 Worst Computer Viruses
 Top 10. Melissa Gotcha!
____________________________
 Spring, 1999
As if viruses, worms and Trojan
 Creator , David L. Smith horses weren't enough, we also
have to worry about virus
 Based on Microsoft Word Macro hoaxes. These are fake viruses --
they don't actually cause any
 First to spread over e-mail harm or replicate themselves.
Instead, the creators of these
viruses hope that people and
media companies treat the hoax
as if it were the real deal. Even
though these hoaxes aren't
immediately dangerous, they are
still a problem. Like the boy who
cried wolf, hoax viruses can
cause people to ignore warnings
about real threats.

genica.qahira.tonet.celine 10
Top 10 Worst Computer Viruses
 Top 9. ILOVEYOU
 Year 2000, Worm

 Creator , Reomel Ramones


and Onel de Guzman,
Philippines

 Based on Visual Basic


Scripting

 Spread over e-mail

 According to some estimates,


the ILOVEYOU virus caused
$10 billion in damages

genica.qahira.tonet.celine 11
THE DANGER OF ILOVEYOU VIRUS
 It copied itself several  It sent itself through
times and hid the copies in Internet Relay Chat clients
several folders on the as well as e-mail.
victim's hard drive.
 It downloaded a file called
 It added new files to the WIN-BUGSFIX.EXE from
victim's registry keys. the Internet and executed
it. Rather than fix bugs,
 It replaced several different
this program was a
kinds of files with copies of password-stealing
itself. application that e-mailed
secret information to the
hacker’s e-mail address.

genica.qahira.tonet.celine 12
Top 10 Worst Computer Viruses
 Top 8. The Klez Virus
 Late 2001
 The basic Klez worm infected a victim’s computer
through an e-mail message, it replicate itself and sent
itself to people in the victim’s address book.
 Klez virus could act like a normal computer virus, a
worm or a Trojan horse, depending on its version.
 It could even disable virus scanning software and pose as
a virus removal tool
 Spoofing e-mail address

genica.qahira.tonet.celine 13
Top 10 Worst Computer Viruses
 Top 7. Code Red and Code Red II
 Summer, 2001
 Exploit an operating system vulnerability that was found
in machines running Windows 2000 and Windows NT.
 Original Code Red worm initiated a distributed denial of
service (DDoS) attack on the White House.
 A Windows 2000 machine infected by Code Red II worm
no longer obeys the owner, the worm creates a backdoor
into the computer’s OS, allowing a remote user to access
and control the machine.

genica.qahira.tonet.celine 14
Top 10 Worst Computer Viruses
 Top 6. Nimda
 2001, Internet

 Nimda (admin spelled backwards)

 Internet servers are the primary target, real purpose was


to bring Internet traffic to a crawl.

 Nimda worm became a distributed denial of service


(DDoS) attack
genica.qahira.tonet.celine 15
Top 10 Worst Computer Viruses
 Top 5. SQL Slammer/Sapphire
 January 2003
 A web server virus that brought down several important
systems, such as :
 Bank of America’s ATM service crashed
 The City of Seattle suffered outages in 911 service
 Continental Airlines had to cancel several flights due to
electronic ticketing and check–in errors
Trivia!
One common term for a hacker
who sets out to create computer
viruses or compromise system
security is a black hat.
genica.qahira.tonet.celine 16
Top 10 Worst Computer Viruses
 Top 4. MyDoom
 Also known as Novarg virus, 2004
 A worm that creates a backdoor in the victim computer’s OS.
 It is a time triggered virus.
 First trigger caused the virus to begin denial of service (DoS)
starting Feb. 1, 2004
 Second trigger commanded the virus to stop distributing
itself on Feb. 12, 2004. Even though it stopped spreading, the
created backdoors remained active.
 MyDoom virus inspired politicians like U.S. Senator Chuck
Schumer to propose a National Virus Response Center

genica.qahira.tonet.celine 17
Top 10 Worst Computer Viruses
 Top 3. Sasser and Netsky
 Sven Jaschan , 17 years old, German
 Sasser Worm attacked computers through a Microsoft
Windows vulnerability
 It don’t spread through e-mail. Instead, once the virus
infected a computer, it looked for other vulnerable systems. It
contacted those systems and instructed them to download
the virus.
 It scan random IP address to find potential victims
 Alters the OS in a way that made it difficult to shut down the
computer without cutting off power to the system

genica.qahira.tonet.celine 18
Top 10 Worst Computer Viruses
 Top 3. Sasser and Netsky
 Netsky virus moves through e-mail and Windows
network
 It spoofs e-mail addresses and propagates through a
22,016-byte file attachment
 It can cause denial of service (DoS) attack
 Sven Jaschan, spent no time in jail; he received a
sentence of 1 year and 9 months probation because he
was under 19 he escaped being tried as adult in German
courts.

genica.qahira.tonet.celine 19
Top 10 Worst Computer Viruses
 Top 2. Leap-A/Oompa-A
 2006

 It uses the iChat instant messaging program to


propagate across vulnerable Mac computers. After the
virus infects a Mac, it searches through the iChat
contacts and sends a message to each person on the list.

 The message contains a corrupted file that appears to be


an innocent JPEG image.

genica.qahira.tonet.celine 20
Top 10 Worst Computer Viruses
 Top 1. Storm Worm
 Late 2006, called storm worm because one of the e-mail
carrying the virus had as its subject “230 Dead as Storm
batters Europe”.
 Trojan horse program
 Some version of the Storm Worm turn computers into
zombies or bots
 Many versions of the Storm Worm fool the victim into
downloading the application through fake links to news
stories or videos.

genica.qahira.tonet.celine 21
How does virus spread?
Many computer virus programs
attach themselves to other
programs, and get into the
operating system when you use the
program.

genica.qahira.tonet.celine 22
Things that expose you to virus:
 Using infected diskettes, cd’s or flash drives

 Loading a program bought at a computer store

 Buying a new computer (infected by the store


accidentally)

 Having your computer repaired (infected by the repair


shop accidentally)

genica.qahira.tonet.celine 23
Things that expose you to virus:
 Downloading a program from a local hobbyist or major BBS (a
computer that is running software that allows users to leave
messages and access information of general interest)

 Loading a program bought by mail order from manufacturer

 Spreading viruses through connectivity (computer to computer)

 Spreading viruses through Networks: WAN and LAN

 Spreading viruses through Software Piracy

genica.qahira.tonet.celine 24
Reasons for creating virus
The thrill they get in creating
destructive viruses.
The psychology of having to
do things because they can
Bragging rights
genica.qahira.tonet.celine 25
Things viruses can do
 Fill up your computer with garbage ware

 Mess up files

 Mess up the FAT (File Allocation Table)

 Mess up the Boot sector

 Display message and into printouts

 Reset a computer

genica.qahira.tonet.celine 26
Things viruses can do
 Slow things down

 Redefine keys and lock the key board

 Change data in programs or files

 Physically damage the hard drive or other parts of the


machine

 Copy data you have access to for another user who


shouldn’t have access
genica.qahira.tonet.celine 27
How to protect your computer
from viruses?
 Running a more secure operating system
 Buying a virus protection software
 Avoid programs from unknown resources
 Macro Virus Protection is enabled
 Never double-click on an e-mail attachment that
contains executables
 Keep back ups
 Be realistic

genica.qahira.tonet.celine 28
Counter-Measures
 Antivirus software – used to prevent, detect, and
remove malware, including viruses, worms, and Trojan
horse

 Signature based detection – most common method to


identify viruses and other malware, antivirus software
compares the contents of a file to a dictionary of virus
signatures.

genica.qahira.tonet.celine 29
Counter-Measures
 Heuristic-based detection – like malicious activity
detection, it can be used to identify unknown viruses

 File emulation – another heuristic approach. It


involves executing a program in a virtual environment
and logging what actions the program performs.
Depending on the actions logged, the antivirus
software can determine if the program is malicious or
not and then carry out the appropriate disinfection
actions.

genica.qahira.tonet.celine 30
Popular Antivirus Software
 AVG

 Avast

 Avira Antivir

 Norton

 Kaspersky

 ESET Nod32

genica.qahira.tonet.celine 31
Reference:
“A look at Major Computer viruses since 1982.” The Philippine Star 10 September 2007: C-5.

Cooper, James Arlin. Computer and Communications Security. Singapore: Intertext


publications, 1989.

Fites, Philip. The Computer Virus Crisis. New York: Van Nostrand Reinhold, 1992.

Slade, Robert. Guide to Computer Viruses. Canada: Impressions Book and Journal Services
Inc., 1996.

Strickland, Jonathan. "10 Worst Computer Viruses of All Time." howstuffworks.


<http://computer.howstuffworks.com/worst-computer-viruses10.htm>.

http://en.wikipedia.org/wiki/Computer _virus

http://www.virus-scan-software.com/virus-scan-help/answers/the-history-of-computer-
viruses.shtml

genica.qahira.tonet.celine 32
QUIZ
1. What does DDoS stand for?
A. Dangerous DOS open Security
B. Digital Default of Servers
C. Distributed Denial of Service
2. What’s another name for crackers – malicious hackers
who steal information or cause damage in secure
systems?
A. Black hats
B. Pirates
C. Digital rogues
genica.qahira.tonet.celine 33
QUIZ
3. What kind of malware is basically a computer program
that does something than it claims to do?
A. Worm
B. Trojan horse
C. Virus
4. What kind of malware does not require a host to
spread?
A. Worm
B. Trojan horse
C. Virus
genica.qahira.tonet.celine 34
QUIZ
5. What does BBS stand for?
A. Broadband system
B. Bandwidth Block system
C. Bulletin board system
6. What kind of malware typically resides in a larger,
innocent computer program?
A. Worm
B. Trojan horse
C. Virus

genica.qahira.tonet.celine 35
QUIZ
7. What is another term for a zombie computer army?
A. Backdoor army
B. Bots
C. Phishing pharm
8. What is the name of the virus created by Onel de
Guzman?
A. ILOVEYOU
B. Melissa
C. Sasser

genica.qahira.tonet.celine 36
QUIZ
9. What is the first anti-virus program?
A. The Creeper
B. The Reeper
C. The Cleaner
10. What is the name of the virus that attacks Mac
computers through iChat?
A. Nimda
B. Sapphire
C. Leap-A

genica.qahira.tonet.celine 37
QUIZ
11-15.
Give any 5 of popular anti-virus software discussed.

genica.qahira.tonet.celine 38

You might also like