Computer viruses © 2007 Abonyi-Tóth Zsolt, SZIE ÁOTK How do they formed? Expert programmers Not so expert programmers modify the existing viruses – or somebody downloads a virus generator from the internet Computers don’t write viruses on their own! Forget Darvin and evolution! Why people write PC viruses? Looking for some attention… Joking To try: am I able to do it? Terrorist activities Punishment of illegal software usage Marketplace for virus-killers (!) Money (!!!) (spam) Collecting information – passwords, names, addresses, shopping habit The definition of computer viruses Programs, which are able to spread – they send their own copies to other computers (without telling it to the owner of the computers) – Several phenomenon from annoying messages to deleted hard drives Groups of viruses Groups (not exhaustive) Trojan Virus Backdoor Logical bomb time bomb Hardware virus (built-in) False virus (bug) User S. User Hoax Chain letter Spam Tasks of viruses Spreading Destructing Spreading Spreading Program virus Boot virus Macro virus Boot sector virus Partition table virus MBR virus Attachment Script E-mail User Web Picture (jpg) Open port Security hole Spreading Spreading Spreading 2 Spreading 2 What to infect? Windows PCs (more frequently) Linux PCs, MAC OS computers will be more frequent, as the usage of them will be more frequent Smart phones (bluetooth) PDA – may be infected when synchronized with a PC. Fridge? Dangerous things E-mail – attachment or script Internet – downloaded programs – warez, porn sites!!! – just being connected – false sites (phising) Programs (incl. screen savers) Documents, tables Floppies, CDs – boot Pictures (?) E-mail Attachment Just reading (script) – M$ programs – download security updates frequently!!! – Good old Netscape… World Wide Web ActiveX – digital signature may protect, but it can be very dangerous VBS script – may be dangerous Warez sites Porno sites False servers (phising) Back door (e.g. Back Orifice) Cookie – remembers your habit Destruction Asks to send a postcard to a Swedish girl Plays some music at 5 PM Modifies data in Excel Doesn’t allow to save the Word document Deletes or rewrites files Formats the hard disk Destroys hardware Overloads the network Fills the hard disk Sends thousands of advertisements in e-mail (using thousands of PCs in a remote controlled zombie network) Recognizing the infection Unusual behavior – It can be anything, avoid false alarm! Change in the length or other attributes of files Programs start or run slower Something tries to write to a writeprotected device Recognizing the infection Less memory, bad sectors on HDD Missing files Automatic reboot Unusual things on the screen (Previously) error-free programs don’t start or freeze Unusual network activity, rebounding emails, mail client starts automatically Protection No sure protection!!! Information (e.g. www.antivirus.com) Use frequently updated virus-killer Use firewall Use ad-aware removal tool Create backup copies Use a virtual PC Shouldn’t answer suspicious mails (what is your password, account number, etc.) Shouldn’t unsubscribe from suspicious mailing lists. Protection Save to RTF (TXT) and CSV format Shouldn’t use unknown program Forward the warnings to your system admin only Windows Scripting Host should be switched off (Extension vbs should be unknown) Check for the security updates Shouldn’t allow the PC to boot from floppy or CD Floppy, pen drive should be write protected if you insert to an unfamiliar PC Back up your data frequently Programs which protect Virus scanner – On-demand – On-access – Check-sum, heuristic search, sandbox Firewall Adware and trojan remover Virtual PC Hardware: broadband router (firewall or simply NAT) Reduce of injury Backup copies of important programs and data – Far away, several copies When the user infects Hoax Pyramid scheme, chain letter Hoax Warning – new, very dangerous virus! You shouldn’t read the letter with subject... The warning is originated from an ISP (e.g. AOL), corporation (Microsoft, IBM) or government service (Pentagon, FCC) Technological terminology like expressions (e.g. n-order infinite loop) You should forward this letter... – Overload – May become true (Good Times) Hoax2 Blood is needed for a child! Give blood! The child will get USD 1 from AOL for all forwarded e-mails Puppies will be killed! Adopt them! You will get a laptop or new mobile phone... Chain letter Send it for 20 friends to be lucky, other ways you will lose everything... The Matchu Pitchu is a product of aliens, see the picture... Tell it everyone... What a beautiful flowers/girls/men/cars/ hills/puppies/... are in this presentation The best jokes of the world... Phising False letter from your bank – log in, type your name, password, account number... Banks, ISPs NEVER send such e-mails! The link is false, it points to a server, which copies the looking of the original Just type your data... Money transfer will be started from your account on the real server in a few minutes! The URL of the bank should be typed always! No link, no bookmark!!! (A problem with the DNS server may be still dangerous) Phising2 Similar, but they ask for your e-mail login name and password Do you want to allow others to send advertisements or pornographic pictures from your account? Firewalls and IE7 (other browsers?) try to protect Social engineering Similar to phising! You have a phone call. A sexy voice tells, she is an administrator in your bank and needs your account number and password to check something... Do you trust people? You shouldn’t!!!