You are on page 1of 3

Tutor.JUNE.

NEW 14/05/01 8:21 PM Page 2

tutor
TYPES OF VIRUS

KNOW YOUR
ENEMY
Viruses can send annoying emails to your friends or wipe out your system. Knowing
more about the enemy may spare hours of lost time and the hea rt a che of losing data.
Here we show you how you can protect yourself and keep your PC virus-free.

echnological old timers – that is to stand how to detect and disarm malware and machine.

T say, those of us who were comput-


ing before the advent of the Internet
– remember when getting your sys-
tem infected by malicious software, or “mal-
spot the telltale signs of hoaxes. The sections
that follow describe the most common types of
malware and how to avoid each.
A few boot sector viruses have somewhat dra-
matic payloads. The MS-DOS virus Cascade, for
example, makes the characters on your display
appear to fall to the bottom in a heap. Others,
ware,” was actually relatively difficult. Back then, A MALWARE BESTIARY such as the Stoned virus, systematically degrade
you’d most often get a virus by booting your Malware is usually classified according to two performance. Still others have no obvious pay-
machine from an infected floppy disk or by traits: where it hides and how it spreads. Because load and seem to exist only to propagate.
downloading and running programs from a the terminology was created before the age of Some boot sector viruses are also file infec-
computer bulletin board system (BBS). the Internet, though, malware doesn’t always fit tors (though not all file infectors are boot sector
For better or worse, those days are gone for- cleanly into any one classification within these viruses). File infectors modify the programs you
ever. Now that connectivity is cheap and e-mail two categories (hence David Smith’s embedded use, inserting code that runs when you execute
is ubiquitous, the Internet has become the pri- message in Melissa, the virus he authored: the altered programs. Other files on your hard
mary means by which malware spreads. One “Worm? Macro Virus? Word 97 Virus? Word 2000 drive can then become infected, as can floppy
careless click can wipe out valuable files, clog Virus? You Decide!...it’s a new age!”). Nonethe- disk boot sectors and files. File infectors can leap
your company’s servers, render your computer less, understanding the traditional categories of across a network to manipulate shared files and
unable to boot, or broadcast material of ques- malicious software is useful. can deliver a payload. To avoid arousing suspi-
tionable taste to friends, relatives, and business cion and, as a result, enjoy more opportunities
contacts – with your name on the From line. BOOT SECTOR VIRUSES AND FILE to propagate, such viruses generally permit
When malware interferes with your work, INFECTORS infected files to run.
damages or disables your system, or does any- Before the Internet was open to the general pub- To avoid both boot sector viruses and file infec-
thing other than propagate itself, this nasty behav- lic, booting from an infected floppy disk was tors, run a commercial antivirus program. Near-
iour is called a payload. Sometimes, as in the the most common way to introduce a virus into ly all do an excellent job of detecting and pre-
case of the Michelangelo and Chernobyl virus- your machine. This would unleash a boot sec- venting the spread of such viruses. You should
es, the payload is not released immediately but tor virus – malicious code contained in the flop- also enable any antiviral feature in your system’s
on a pre-programmed date in the future. This py disk’s boot sector (the area that stores the bios that prevents programs from writing to boot
gives the malware time to propagate before instructions that tell the computer how to load sectors. Some file infectors can propagate in the
making its presence known and before disabling the operating system). The virus would copy same way as worms and Trojan horses (which
the host. itself to the hard drive’s boot sector, then to every we cover below), so taking the measures rec-
To avoid these hazards, you’ll need to under- write-enabled floppy disk inserted into the ommended for these categories also pays.

112 June 2001 www.DITnet.co.ae ■ www.pcmag-mideast.com


Tutor.JUNE.NEW 14/05/01 8:21 PM Page 3

types of virus | know what you’re up against

MACRO VIRUSES example: the Anna Kournikova Tro j a n care to avoid running a program that can work
Documents created by many productivity appli- horse/worm program, which arrived in users’ its will on their machines. This means scrutin-
cations can contain programs called macros that electronic mailboxes appearing to be a picture ising all email attachments and downloading
start when a document is opened, when they are of the attractive Russian tennis star. programs from trusted sources only. Antivirus
selected from a menu, or when a combination Although some malware can propagate with- software can identify well known or wide-
of keys is pressed. A macro virus is a file infec- out user intervention, most of the malware to spread Trojan horses, but versions of malware
tor that hides inside such documents. Microsoft which Internet and email users are likely to be that are modified in only minor ways can often
Word files are the most frequent carriers, but exposed takes the form of a Trojan horse in at slip through. What’s more, antivirus vendors
Excel spreadsheets and other document types least one phase of its life cycle. Note that Tro- can be slow to provide patterns for the latest
are also targets. Microsoft has taken a few mea- jan horses can’t do their dirty work unless acti- Trojan horses, sometimes taking up to ten days
sures, in recent versions of its Office suite, to vated by the user. It is therefore vitally impor- to make new pattern files available for down-
make such viruses harder to write. But millions tant that you know exactly what you are run- load. So it is extremely useful to install heuris-
of people still use older, unprotected versions, ning, launching or opening – especially when tic filters (that is, filters that identify and quar-
and virus writers have taken on the challenge it comes as an attachment to email. antine suspicious email according to a set of
of bypassing newer safeguards with gusto. In many cases, a Trojan horse will attempt to rules) on one’s mail server. (If you rely on your
To avoid macro viruses, set whatever securi- conceal its true nature by arriving as a file with ISP’s mail server, encourage your provider to
ty features the application has to High, or dis- multiple extensions – for example, do this.) Such filters require some technical
able macros altogether. Be wary of opening AnnaKournikova.jpg.vbs. This type of filename expertise to set up and should be installed by
documents that arrive unexpectedly – even if exploits the fact that Windows, like many Win- a network administrator.
they appear to come from someone you know. dows email programs, uses the last extension at
(Many macro viruses, including Melissa, spread the end of the filename to choose an icon to WORMS
like Trojan horses or worms, mailing themselves represent the file. The name is then displayed, A worm is malware that propagates from
to everyone in a victim’s address book without minus the final extension and the period that machine to machine without human interven-
that person’s knowledge.) Again, use and reg- precedes it, next to the icon. tion. The most famous program of this ilk was
ularly update antivirus software. Finally, ask Such a multiple-extension exploit is a dead unleashed by Robert Tappan Morris, Jr., the son
your ISP or company network administrator giveaway that an attachment is malicious. of a noted computer security expert, in 1988.
whether incoming email messages can be Recipients of the Anna Kournikova program Taking advantage of known security holes in
scanned for potentially dangerous attachments who use Outlook or Outlook Express see the commonly used software, it used the comput-
before hitting your mailbox. attached file containing the worm as an icon ing power of each infected machine to break
with a scroll in it. Next to the icon is the name into others, spreading like wildfire between sys-
TROJAN HORSES AnnaKournikova.jpg. The script icon, which tems made by Digital Equipment and Sun.
Like the wooden horse that figured so promi- contains an image of a scroll, looks at first While the “Morris worm” didn’t intentionally
nently in Homer’s Iliad, a Trojan horse program glance as if it might represent some type of pack a harmful payload, it had a bug in the part
masquerades as something it is not, to persuade photographic film, and the displayed name of code that was supposed to limit its repro-
a user to let it into the system. In the BBS era, makes the file appear to be a jpeg image. So, ductive zeal. As a result, its overeager attempts
such programs often impersonated new ver- many users clicked on the icon expecting to see to spread itself consumed most of an infected
sions of commonly used programs, such as the a picture. machine’s resources, crippling a substantial frac-
PKZIP file compression utility. A more recent To avoid Trojan horses, users must take great tion of the computers on the Internet. (Surpris-

www.DITnet.co.ae ■ www.pcmag-mideast.com June 2001 113


Tutor.JUNE.NEW 14/05/01 8:21 PM Page 4

tutor
TYPES OF VIRUS
ingly, despite this rude wake-up call, few seri- three open-source versions of BSD Unix – glance to be a self-extracting archive file. It is
ous security measures were taken on the Inter- FreeBSD, NetBSD and OpenBSD) reduces the actually a copy of the worm.
net until years later.) likelihood that a worm will be able to get in ExploreZip is effective because the Subject:
Today, only a few true worms exist in the and wreak mischief. header of the automatic response matches that
wild on the Internet. One of these, called Kak- of a recently sent message and the From:
worm, was said to be instrumental in a break- MONGREL MALWARE address is that of the person to whom it was
in at Microsoft that may have allowed hackers Recently, malware has surfaced that combines sent. Unless the correspondent is on guard or
access to Windows source code. Exploiting the traits of viruses, worms, and Trojan horses. has an up-to-date virus checker, he or she is
security holes in Outlook Express, Internet Most of the pesky programs spreading through- likely to believe that the automatically generated
Explorer and ActiveX, it infects a machine when out the Net these days can be classified as Tro- message is part of an ongoing conversation and
you read email – without requiring that you jan worms – a hybrid between Trojan horses trustingly run the attachment. Unfortunately,
click on an attachment. Other security holes in and worms. A Trojan worm requires a user to this particular worm carries a nasty payload: it
Outlook and Outlook Express may make it fea- activate it, as does a Trojan horse, before it can destroys files not only on the victim’s hard disk
sible to create even more virulent worms of this infect a computer. But once this is done, it takes but on any shared drives or directories to which
type, but fortunately none are widespread yet. control of the machine and sends itself – via e- that victim has access.
Another worm, called Ramen, spre a d s mail, Internet Relay Chat, or other means – to
between machines running widely used ver- other systems without further intervention. INTERNET PEST CONTROL
sions of Red Hat Linux. Although this worm Trojan worms resort to all sorts of unusual In general, you can keep most Internet pests in
was initially easy to find and get rid of, new and clever tactics to persuade users to activate check by being observant, maintaining a healthy
versions have surfaced that employ a rootkit – them. The Hybris Trojan worm promises recip- skepticism about what you receive via email,
a series of programs designed to hide the ients a ribald tale involving Snow White and and employing proper tools. Whatever else you
w o rm’s presence and make it difficult to the seven dwarfs. One common type of Trojan do, using a good antivirus program with up-
remove. The new mutations also can infect worm, often called a Friends and Family virus to-date patterns is essential. You would also be
some systems that were not susceptible to the after MCI’s famous marketing program for long- wise to install – or use an ISP that has installed
original. distance services, disguises messages bearing – tools that scan email for suspicious content
Alas, because they do not require user inter- the worm so that they appear to have been sent before it arrives on your machine. (This may
action, worms can’t be caught by an alert user. by someone familiar. While Melissa, I Love You, be the only effective defense against “true
But antivirus software and firewalls can detect and many other Trojan worms use this trick, worms” that spread via e-mail without user
many such programs, and heuristic e-mail filters ExploreZip is perhaps the most subtle. It oper- intervention.) Backups are also vital, since some
can provide an extra layer of protection. Dis- ates as an email auto-responder, replying imme- malware destroys valuable files irretrievably.
abling risky features, such as the Windows diately to incoming mail with a message that Of course, even if you take all of these precau-
Scripting Host and ActiveX, may reduce your reads: “I received your email, and I shall send tions, you may still fall victim to malware that
system’s susceptibility to worms. you a reply ASAP. Till then, take a look at the unexpectedly penetrates your defenses. But if
Finally, using operating systems and software attached zipped docs.” Attached to the mes- you’re on your guard, the odds of serious dam-
with a proven security track record (such as the sage is an executable file that appears at first age will be greatly reduced.

MALICIOUS MESSAGES
mail can also contain security Because an image incorporated in HTML damage or install other malware.

E exploits that, while they don’t


propagate themselves as viruses
or worms do, may compromise
mail is usually retrieved via HTTP (the Hyper-
text Transfer Protocol), the server may also
be able to place a cookie on your system.
A hostile script embedded in email can also
“take control” of your machine by opening
an advertising or pornographic Web page in
your privacy or make your computer unus- (Note that the most popular email clients use your browser. It can then prevent you from
able. For example, an HTML message con- browser software to render mail. Outlook, closing the window or shifting the focus. A
taining an image tag will cause most email Outlook Express, and AOL use Microsoft Inter- malicious script can freeze the browser or the
programs to retrieve the image automatically net Explorer; Netscape Communicator uses entire machine. A message with intentional for-
when the mail is read. If your email address Netscape Navigator; Opera uses its own inter- matting errors may crash some vulnerable
(or any other information that uniquely iden- nal HTML rendering software, and Eudora uses email software, too.
tifies you) is included in the image tag (for Internet Explorer unless explicitly configured Fortunately, this genre of malware is still in
example, <img src=”http://images.spam- not to do so.) And you may not know that any its infancy, but it’s sure to become more com-
mer.com/picture.jpg?innocent@user.com”>), invasion of privacy has taken place, especial- mon as the techniques for creating it become
a spammer can determine from his or her ly if the image is tiny or invisible (a clear GIF or better known. The best way to avoid email
Web server logs that the address is valid and Web bug). An email message may also contain exploits that use image tags or active content
that you’ve opened the spam. You’ll then be “active content exploits”—calls to suscepti- is to employ a filter that disables them before
tagged as a live prospect for more spam. This ble ActiveX controls on Windows machines. the message reaches you. Such filters are
sort of identifying image tag is sometimes Such security holes can be used to extract per- already available for use on mail servers run
called a mail bug. sonal information from your computer, do by ISPs and companies.

114 June 2001 www.DITnet.co.ae ■ www.pcmag-mideast.com

You might also like