Types of Computer Virus
Types of Computer Virus
A key characteristic of a virus is its ability to replicate and spread to other devices. It often does
so without the knowledge or consent of the user, making it particularly dangerous. In some cases,
the virus may disguise itself as legitimate software or rely on social engineering techniques to
trick users into downloading or executing the infected file. Once the virus infiltrates a system, it
can modify other programs by injecting its code, effectively taking control of the affected device.
The damage caused by a computer virus can range from minor disruptions, such as slowing
down the system, to more severe consequences like data theft, system crashes, or even the
installation of additional malware. Viruses can spread through various methods, including
infected email attachments, downloads from untrusted websites, or via external storage devices
like USB drives.
In essence, a computer virus is a malicious entity that compromises the integrity and security of a
device, causing significant harm while evading detection by masquerading as legitimate
software.
Computer viruses are malicious programs designed to disrupt, damage, or gain unauthorized
access to computer systems. They often replicate themselves and spread to other systems. Below
are the nine major categories of computer viruses, expanded with detailed explanations and
relevant examples.
A boot sector virus targets the master boot record (MBR) of a hard drive or removable storage
device. The MBR contains critical information that helps the computer locate and load the
operating system during the boot process. By infecting the boot sector, the virus gains control
over the system before the operating system loads, making it difficult to detect and remove.
How It Spreads:
Impact:
Examples:
Stoned Virus (1987): Displayed the message "Your PC is now stoned!" and infected the
boot sector of floppy disks and hard drives.
Web scripting viruses exploit vulnerabilities in web browsers and web applications by injecting
malicious code (usually JavaScript) into web pages. When users visit an infected page, the script
executes in their browser, potentially stealing data, modifying web content, or redirecting to
malicious sites.
How It Spreads:
Compromised websites
Impact:
Theft of sensitive information (cookies, session tokens)
Examples:
Samy Worm (2005): A cross-site scripting worm that propagated on MySpace, adding
Samy Kamkar as a friend to infected profiles.
3. Browser Hijacker
Browser hijackers modify web browser settings without user consent. They change the
homepage, default search engine, and new tab page, redirecting users to unwanted or malicious
websites. Often bundled with freeware or shareware, they generate revenue through increased
website traffic or by displaying ads.
How It Spreads
Phishing emails
Impact:
Examples:
CoolWebSearch: Redirected browsers to its own search engine and displayed unwanted
pop-up ads.
Babylon Toolbar: Changed search settings and homepages to Babylon's own search
engine.
4. Resident Virus
Resident viruses load into a computer's memory and remain active even after the host application
is closed. They can infect other files and programs running on the system. Because they reside in
memory, they can evade detection and are challenging to remove.
How It Spreads:
Email attachments
Impact:
Examples:
CMJ Virus: Infected .COM and .EXE files, spreading whenever these files were
accessed.
Direct action viruses, also known as non-resident viruses, act immediately upon execution. They
infect files in specific directories or types and then stop functioning unless the infected files are
executed again. They do not remain in the system's memory after execution.
How It Spreads:
Impact:
Examples:
Vienna Virus (1987): Infected .COM files and sometimes corrupted them, leading to
program malfunctions.
Cascade Virus: Caused characters to fall and pile up at the bottom of the screen, while
infecting executable files.
6. Polymorphic Virus
Polymorphic viruses can change their underlying code each time they infect a new system or file,
without altering their basic functionalities. This mutation makes them difficult for antivirus
programs to detect using signature-based methods.
How It Spreads:
Email attachments
Network sharing
Impact:
Examples:
Storm Worm (2007): Spread via email attachments, changing its code to avoid
detection.
File infector viruses attach themselves to executable files like .EXE and .COM files. When the
infected file is run, the virus activates, potentially spreading to other executable files and
performing malicious activities.
How It Spreads:
Email attachments
Impact:
Examples:
Jerusalem Virus (1987): Deleted programs on every Friday the 13th and slowed down
system performance.
Cascade Virus: Not only a direct action virus but also a file infector that targeted
executable files.
8. Multipartite Virus
Multipartite viruses infect multiple parts of a system simultaneously, such as the boot sector and
executable files. This dual infection method makes them versatile and challenging to eradicate,
as removing them from one area might not eliminate them entirely.
How It Spreads:
Removable media
Impact:
Examples:
One_Half Virus: Encrypted hard drive sectors and decrypted them on the fly, infecting
both boot sectors and files.
Junkie Virus: Infected both .EXE files and the boot sector, making removal difficult.
9. Macro Virus
Macro viruses are written in the macro programming languages of applications like Microsoft
Word or Excel. They embed malicious code within documents and spreadsheets. When the
document is opened, the macro runs automatically, executing the virus.
How It Spreads:
Downloaded documents
Impact:
Examples:
Melissa Virus (1999): Spread via email by sending itself to the top 50 contacts in the
user's Outlook address book.
Concept Virus (1995): One of the first widely spread macro viruses, it demonstrated the
potential for macros to carry malware.
Computer viruses are standard programs; instead of offering useful resources, these programs
can damage your device. Computer viruses are typically crafted by hackers with various
intentions, like stealing sensitive data to causing chaos in systems. Some hackers create these
malicious programs for fun or as a challenge, while others have more sinister motives like
financial gain or cyber warfare.
Hackers may exploit weak points in an operating system or app to acquire unapproved access
and power over a user’s machine to achieve their goals.
Ego-driven: Some virus authors seek fame within the hacker community by creating
destructive or widespread viruses that garner media attention.
Cybercrime: Hackers often use computer viruses as tools for ransomware attacks,
identity theft, and other forms of online fraud.
For a threat actor to execute a virus on your machine, you must initiate execution. Sometimes, an
attacker can execute malicious code through your browser or remotely from another network
computer. Modern browsers have defenses against local machine code execution, but third-party
software installed on the browser could have vulnerabilities that allow viruses to run locally.
The delivery of a computer virus can happen in several ways. One common method is via
a phishing email. Another technique is hosting malware on a server that promises to provide a
legitimate program. It can be delivered using macros or by injecting malicious code into
legitimate software files.
Computer Worm
A computer worm is a type of malware designed to replicate itself to spread to other computers.
Unlike computer viruses, worms do not require a host program to spread and self-replicate.
Instead, they often use a computer network to spread themselves, relying on security failures on
the target computer to access it.
Once a worm infects a computer, it uses that device as a host to scan and infect other computers.
When these new worm-infested computers are compromised, the worm continues to scan and
infect other computers using these computers as hosts. Worms operate by consuming heavy
memory and bandwidth loads, resulting in overloaded servers, systems, and networks.
While overlapping in intention and meaning, malware and viruses are two distinct terms that are
often used interchangeably.
Malware is a general term for any type of malicious software, while a virus is a specific type of
malware that self-replicates by inserting its code into other programs. While viruses are a type of
malware, not all malware is a virus.
Malware can take many forms, including viruses, worms, trojans, spyware, adware, and
ransomware, and it can be distributed through infected websites, flash drives, emails, and other
means. A virus requires a host program to run and attaches itself to legitimate files and programs.
It causes a host of malicious effects, such as deleting or encrypting files, modifying applications,
or disabling system functions.
Malware authors write code that is undetectable until the payload is delivered. However, like any
software program, bugs could present issues while the virus runs. Signs that you have a computer
virus include:
Popup windows, including ads (adware) or links to malicious websites.
Your web browser home page changes, and you did not change it.
Outbound emails to your contact list or people on your contact list alert you to strange
messages sent by your account.
The computer crashes often, runs out of memory with few active programs or displays
the blue screen of death in Windows.
Slow computer performance even when running few programs or the computer was
recently booted.
Unknown programs start when the computer boots or when you open specific programs.
Frequent error messages arise with basic functions like opening or using programs.
Removing a computer virus can be a challenging task, but there are several steps you can take to
get rid of it. Common steps to remove a computer virus include:
1. Download and install antivirus software: Assuming you don’t already have antivirus
software installed, download and install a real-time and on-demand solution, if possible.
A real-time malware scanner scans for viruses in the background while you use the
computer. You must start the on-demand scanner whenever you want to scan your
device.
2. Disconnect from the internet: Some computer viruses use the internet connection to
spread, so it’s best to disconnect from the internet when removing a virus from your PC
to prevent further damage.
3. Delete any temporary files: Depending on the type of virus, deleting temporary files can
also delete the virus, as some viruses are designed to initiate when your computer boots
up.
4. Reboot your computer into safe mode: To help mitigate damages to your computer
while you remove a virus, reboot your device in ‘Safe Mode.’ This will inhibit the virus
from running and allow you to remove it more effectively.
5. Run a virus scan: Run a full scan using your antivirus software, opting for the most
thorough or complete scanning option available. If possible, cover all your hard drive
letters during the scan.
6. Delete or quarantine the virus: Once the virus is detected, your antivirus software will
give you the option to delete or quarantine the virus. Quarantining the virus will isolate it
from the rest of your computer to prevent it from causing further damage.
7. Reboot your computer: Assuming you’ve effectively removed the virus, your computer
can be rebooted. Simply turn on the device as you would do so normally without
initiating the “Safe Mode” option.
8. Update your browser and operating system: To complete the virus removal process,
update your operating system and web browser to the latest version possible. Browser
and OS Updates often contain fixes for particular vulnerabilities and exploits.
Given the general nature of this process, the outcome may vary from virus to virus and device to
device. If you are unsure if you’ve effectively removed a virus from your computer, contact an
IT or computer professional for assistance.
Computer viruses can damage your PC, send sensitive data to attackers, and cause downtime
until the system is repaired. You can avoid becoming the next computer virus victim by
following a few best practices:
Install antivirus software: Antivirus should run on any device connected to the network.
It’s your first defense against viruses. Antivirus software stops malware executables from
running on your local device.
Keep your operating system updated: Developers for all major operating systems
release patches to remediate common bugs and security vulnerabilities. Always keep your
operating system updated and stop using end-of-life versions (e.g., Windows 7 or
Windows XP).
Avoid questionable websites: Older browsers are vulnerable to exploits used when just
browsing a website. You should always keep your browser updated with the latest
patches and avoid these sites to prevent drive-by downloads or redirecting you to sites
that host malware.
Don’t use pirated software: Free pirated software might be tempting, but it’s often
packaged with malware. Download vendor software only from the official source and
avoid using software pirated and shared software.
Use strong passwords: Make sure your passwords are highly secure and difficult to
guess. Avoid using the same password across multiple accounts and change them
regularly to mitigate vulnerabilities and prevent hackers from stealing them.
Remain vigilant: Always be cautious when downloading files or software from the
internet or opening suspicious email attachments. Turn off file sharing and never share
access to your computer with someone you don’t know. Also, avoid keeping sensitive or
private information stored on your computer
Conclusion
Computer viruses remain a significant threat to digital systems, with their ability to self-replicate,
spread, and execute malicious actions. These viruses come in various forms, each posing unique
risks, such as boot sector viruses, web scripting viruses, and polymorphic viruses. The damage
caused by viruses can range from data loss and system disruptions to unauthorized access and
identity theft. The rise of sophisticated types of viruses, like file infectors and multipartite
viruses, has further complicated detection and removal efforts. However, with the advent of
advanced antivirus software, combined with safe browsing practices, regular updates, and
vigilance, it is possible to minimize the risk of infection. As hackers continually develop more
complex viruses, staying informed and proactive in virus prevention is essential for safeguarding
computer systems.
REFERENCES