Thursday 31 July 2014

Computer Viruses and Worms

Worms


Mail worms

A worm is by definition similar to a virus but more independent. The first wave of worms was seen when Internet mail became a standard way to communicate. An email client, and especially address books and mailing lists, provide a powerful way to reach a large number of recipients worldwide with very little effort. Modern, advanced email programs also provide this functionality through APIs that make it possible for computer programs to automatically send messages. All this together provides an environment that enables mail worms to spread much
faster than viruses. A mail worm is carried by an email message, usually as an attachment but there have been some cases where the worm is located in the message body. The recipient must open or execute the attachment before the worm can activate. The attachment may be a document with the worm attached in a virus-like manner, or it may be an independent file. The worm may very well remain undetected by the user if it is attached to a
document. The document is opened normally and the user’s attention is probably focused on
the document contents when the worm activates. Independent worm files usually fake an error
message or perform some similar action to avoid detection.

Pure worms

A worm is a replicating program that works independently without a host file and without user intervention. Pure worms meet all these requirements, whereas mail worms represent an intermediate form that resembles both viruses and worms. Pure worms have the potential to spread very quickly because they are not dependent on any human actions

Trojan horses

The name Trojan horse is borrowed from Greek mythology. In the computer world the term refers to a program that contains hidden malicious functions. The program may look like something funny or useful such as a game or utility, but harms the system when executed. Many Trojans contain activation criteria that enable the Trojan to work for a while. The user is convinced that the program is safe and useful, and forwards it to other users before the malicious code strikes. Trojans lack a replication routine and thus are not viruses by definition. A Trojan is spread to other computers only through deliberate transfer by the users.
The motives of most virus writers remain unknown. There are however some motives that can be identified by examining virus samples or talking to known or anonymous virus authors.
Challenge and curiosity. There are no courses or good books about how to write viruses. Many programmers want to see if they can do it, and do not necessarily realize that the virus may cause significant damage.
Fame and power. Even if the author remains anonymous, it probably gives a kick to read about the virus in headlines. The virus, and possibly the damage it has caused makes other people work and react in some way.
Protest and anarchy. A virus is quite a powerful way to cause intentional damage. There have
been cases where a virus is intended to harm a school’s network.
Proof of concept. Someone may for example want to prove that a certain replication technique works. This type of virus may also appear on new platforms or applications capable of hosting
viruses.
Political motives. A virus may be used to spread a political message. This may, for example, be protests against totalitarian governments, multinational corporations etc. Organized political parties do not use viruses.

No comments:

Post a Comment