310 likes | 1.09k Views
SEMINAR ON COMPUTER VIRUSES. Presented By: Sritam Maikap Roll No -101056 CSE-1,Group-3. Guided By: Er.Syed Amidul Islam Er.Prasanta Ku Dash. Introduction. Computer virus have become today’s headline news With the increasing use of the Internet, it has become easier for virus to spread
E N D
SEMINAR ONCOMPUTERVIRUSES Presented By: Sritam MaikapRoll No -101056CSE-1,Group-3 Guided By:Er.SyedAmidul IslamEr.Prasanta Ku Dash
Introduction • Computer virus have become today’s headline news • With the increasing use of the Internet, it has become easier for virus to spread • Virus show us loopholes in software • Most virus are targeted at the MS Windows OS
Definition of Virus • A virus is a small piece of software that piggybacks on real programs in order to get executed • Once it’s running, it spreads by inserting copies of itself into other executable code or documents
Computer Virus Timeline • 1949:- Theories for first replicating program • 1999 The Melissa Virus • 2003 The Slammer Worm. • 2012:Trojan.Flame.A (May) • 1981:-Apple Viruses 1, 2, & 3 • 2000 The I Love You Virus • 2004 MyDoom • 2012:Rootkit.Sirefef.Gen (Nov)
Virus Languages • ANSI COBOL • C/C++ • VBA • Unix Shell Scripts • JavaScript • Basically any language that works on the system that is the target
Symptoms of Virus Attack • Display a message • Computer runs slower than usual • Computer no longer boots up • Screen sometimes flicker • PC speaker beeps periodically • System crashes for no reason • Files/directories sometimes disappear • Many viruses do nothing obvious at all except spread!
Classification of Virus • Trojan Horse • Worms • Boot sector virus • Macro Virus • Memory Resident Virus • Logic/Time Bombs
Trojan Horse • Appearance of having useful & desired Function • Neither replicates nor copies itself • Damage computer / Data destruction • Compromises the security of the computer • Gain access by another computer • Bypassing normal access control Example: • W32/Fesber.worm.gen!DE3D23CE2E52 • Trojan.Flame.A(May 28,2012)
WORMS • Makes and facilitates distribution of copies itself • From one disk drive to another • Spread through Email & Networks • First worm (Morris Worm) released on Nov 2, 1988 by Robert Tappan Morris • Eg:-Bubbleboy • Mapson • Lovgate Protection : Install an update version of antivirus
MACRO • uses computer networks and security holes to replicate itself • copies itself to the new machine using the security hole • to exploit the file transmission capabilities • hide in documents that are shared via e-mail or networks • avoid opening e-mails from unknown senders • Examples: Relax, Melissa.A
Boot Sector Viruses • Traditional Virus • infect the boot sector on floppy disks and hard disks • By putting its code in the boot sector, a virus can guarantee it gets executed • load itself into memory immediately, and it is able to run whenever the computer is on
Executable Viruses • Traditional Viruses • pieces of code attached to a legitimate program • run when the legitimate program gets executed • loads itself into memory and looks around to see if it can find any other programs on the disk
E-mail Viruses • Moves around in e-mail messages • Replicates itself by automatically mailing itself to dozens of people in the victim’s e-mail address book • Example: Melissa virus, ILOVEYOU virus
Virus Lifecycle Modification Birth Release Proliferation Elimination Trigger Activation Detection
CURRENT ACTIVE VIRUSES Rootkit.Sirefef.Gen Spreading : MediumDamage : HighSymptoms:->Presence of unwanted popups on the infected machine->Control Handled By the AttackerTechnical Description:>kernel mode rootkit>achieved by loading a clean copy of the FlashPlayer installer>Windows Firewall is turned OffTry to disable a series of security subsystem like Windows Defender Service Windows Security Center Service Proxy Auto Discovery Service Removal Tool: http://download.bitdefender.com/removal_tools/RemovalToolUnifiedLauncher_sirefef.exe
Trojan.Flame.A Spreading: Medium Damage: Very High • Multi Component Malware • able to spy, leak data, download/execute other components You can also download theremoval tool: • http://labs.bitdefender.com/2012/05/cyber-espionage-reaches-new-levels-with-flamer/ • Symptoms:Presence of the following files%windir%\\system32\\commgr32.dll%windir%\\system32\\comspol32.dll%windir%\\system32\\comspol32.ocx%windir%\\system32\\indsvc32.dll%windir%\\system32\\indsvc32.ocx%windir%\\system32\\modevga.com%windir%\\system32\\mssui.drv%windir%\\system32\\scaud32.exe%windir%\\system32\\sdclt32.exe%windir%\\system32\\watchxb.sys%windir%\\system32\\winconf32.ocx • Presence of this directory:%COMMONPROGRAMFILES%\\Microsoft Shared\\MSSecurityMgr\\
Trojan.Ransom.IcePol • Spreading : Medium • Damage : Medium • Symptoms>desktop is locked by a message claiming to be from the local law enforcement agency.>The same message demands that the user pays a fine via uKash. • The presence of the following files:%USERPROFILE%\\Start Menu\\Programs\\Startup\\<reveton_filename>.dll.lnk (Windows XP)%USERPROFILE%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\<reveton_filename>dll.lnk (Windows 7) • Download the Removal Toolhttp://download.bitdefender.com/removal_tools/BDRemoval_Trojan_Ransom_IcePol.exe
Ways computer viruses are spread • Email attachments • Rogue websites • Networks • Phishing Schemes • Infected Software • Hackers • Instant Messaging • Fake Anti Virus Software • Friends & Relatives
Ways to Prevent Computer Viruses • Knowledge • Install a reliable Anti-virus Program • Install Anti-spyware • Avoid Suspicious Web Sites • Install a Firewall • Stay away from cracked Software • Keep operating system and all software updated/patched • Don’t believe “SECURITY ALLERTS” that you are sent • Don’t open an attachment if you are not sure
REFERENCES • http://www.bitdefender.com/resourcecenter/virus-encyclopedia/ • http://home.mcafee.com/virusinfo/threat-activity • http://antivirus-software.topchoicereviews.com/types-of-viruses.html • http://www.mapcon.com/timeline-of-computer-viruses
FUNNY VIRUS PROGRAMS • Lets develop some Funny and Dangerous Virus Programs Using BATCH file • Fore More virus Programs You can Visit My Web Sitewww.chintu.comuf.com
CONCLUSION • Computer viruses are not evil • programmers have a right to create them, posses them and experiment with them • we should never support those people who writing viruses with destructive nature • If you do create a virus, though, be careful with ityou may wipe out your own. system by accident