SlideShare a Scribd company logo
Computer Viruses




Presented by: Marcus Guidry, A+, Net+, Sec+, MCP
Network Analyst / Help Desk Engineer
Region 7 Officer – AITP Student Leadership Council
Table Of Contents

•   Introduction – What is a Virus?
•   History of the Virus
•   Variants and Forms of Malware
•   How to Defend Yourself
Intro – What is a Computer Virus?
• A computer virus is a small software
  program that spreads from one computer
  to another computer and that interferes
  with computer operation.
• A computer virus may corrupt or delete
  data on a computer, use an e-mail
  program to spread the virus to other
  computers, or even delete everything on
  the hard disk.
Some Examples of Viruses
• Melissa – considered the first email virus;
  released in 1999
• ILOVEU – sent passwords back over the
  network and infected machines; written by
  a Filipino student in 2000.
• Boot Sector – spread by floppy disks in the
  80s and 90s
• Klez – used emails and email address
  books to replicate and spread; released in
  2001
History of the Virus
• First Virus Created? – The
  Brain Virus
• The Brain Virus was:
   • created in 1986 by two
     Pakistani brothers, Amjad
     and Basit Farooq Alvi.
   • Was spread around by
     floppy disks
   • Infected boot records
     only (not the HDD)
   • Cluttered free space on a
     floppy making it unusable.
How The Brain Virus Was Spread
• According to a 1988 article in Time
  Magazine, a shop called “Brain Computer
  Services was selling brand-name
  computer programs, such as Lotus 1-2-3
  and WordStar ... for as little as $1.50
  each.” From 1986-87, many Americans
  stopped by their store, purchased these
  disks, and brought them back home..
More On “The Brain” Virus
• As Americans loaded these boot-legs programs
  from their floppy disk to their computers, “a
  snippet of computer code many consider to be
  the world's most sophisticated computer virus“
  was spread rapidly and infected over 100,000
  disks.

• Source: Time Magazine (1988) By Philip Elmer-
  DeWitt and Ross H. Munro/Lahore Monday,
  Sep. 26, 1988 “You Must Be Punished”
More About the “Melissa” Virus
• Written by David L. Smith
  in March 1999
• It infected countless
  thousands of PCs
  (estimated damage = $80
  million).
• Replicated by sending
  copies of itself to
  addresses in the Microsoft
  Outlook address book.
• Forced companies like
  Microsoft, Intel, and
  Lockheed Martin to shut
  down their email servers.
• The author is subsequently
  jailed for 20 months.
Many Variants of Malware
• Worms – malicious software programs designed
  to replicate themselves, find open ports on your
  computer, and bottleneck your computer.
• Trojan Horse – malicious software that is
  disguised as another application but causes
  harm to your computer. It hides itself and then
  add a backdoor which can be opened later to
  run denial of service (DoS) attacks.
• AdWare – spy programs installed that allows
  companies to track your activities on visited
  websites (usually without your consent).
Variants of Malware (Cont’d)
• Rootkits – malicious programs that are installed
  below the operating system (OS) level. These
  programs usually load up during the boot
  process (the kernel or “root” level), just before
  the OS is fully loaded.
• The “kits” part refers to the different tools
  hackers can use to maintain secret access to
  your machine once the rootkit is installed.
  • NOTE: Not all rootkits are detectable by antivirus or
    anti-rootkit programs. If you discover a rootkit on your
    machine, experts recommend reinstalling the OS!!
The First Worm?
   • Morris Worm
     • Written by Cornell student Robert
       Tappan Morris in 1988
     • Activated the worm from a
       computer at MIT
     • Found vulnerabilities in Unix and
       corrupted thousands of computers
       the first day released
     • Convicted under the 1986
       Computer Fraud and Abuse Act,
       sentenced to community service
     • Present role: Professor at MIT
Some Well-Known Worms
• Nimda - infected machines via email, web, IIS,
  network shares and backdoors; released in 2001
• MyDoom – massive email worm (created 2004)
• SoBig – email worm (variants A – F)
• Code Red and Code Red II – infected thousands
  of Windows NT/2000 servers, over $2 billion in
  damages
• SQL Slammer – shut down Microsoft’s Outlook
  and stopped databases nationwide (Bank of
  America to name one) in 2003
• Blaster Worm – a worm that generated buffer
  overflow attacks, causing havoc in 2003.
Are Viruses and Worms the Same?
• Viruses are dependent on other programs
  to help them spread. They “piggyback” off
  existing programs and then execute when
  opened by a user.
• Worms can replicate themselves and do
  not need to “piggyback” in order to
  execute.
The Trojan Horse




Image of the
Trojan Horse used
in the movie
“Troy” in 2004
The First Trojan Horse?
• PC-Write Trojan. According to Kylee Dickey of
  Smart Computing Magazine, the first Trojan
  horse, PC-Write Trojan, appeared back in 1986.
• It pretended to be version 2.72 of the shareware
  word processor, PC-Write. (Quicksoft, the
  company that made PC-Write, never released a
  version 2.72.)
• It performed two actions:
  1. It wiped out the FAT (file allocation table; system a
     PC uses to organize contents on the hard drive)
  2. It formatted the hard drive, deleting all saved data.
Some Other Well Known Trojans
• BackOfrice
• NetBus
• Sub Seven
• Liberty Trojan – In 2000, people thought
  that this program was a patch that allowed
  PDA users to play Nintendo Game Boy
  games on the Palm OS. Instead, it deleted
  personal files when opened.
• Storm – This nasty 2006 Trojan program
  infected millions, allowing hackers to turn
  infected machines into bots.
Adware and Rootkits
• Adware and rootkits can also cause major
  problems for computer users in different
  ways!!
AdWare Is A Big Problem
• Every day, thousands of advertisers track
  you on every website you visit (via cookies
  and other tools) and collect your personal
  data without your knowledge.
• Examples of Companies Tracking You:
  •   Google Analytics
  •   Omniture
  •   AddThis
  •   Quantcast
The First Rootkits?
• SunOS rootkit by Lane Davis and Steven
  Dake in 1990
• NTRootkit created by Greg Hoglund in
  1999
• Sony BMG’s Extended Rights Protection
  in 2005 – rootkit from CDs that limited
  users’ ability to access their music CDs
• Mebromi – considered the first BIOS
  rootkit in the wild
Dealing With Rootkits
• Here are some recommended anti-rootkit tools:
  •   RootkitRevealer
  •   Kaspersky TDSS Killer
  •   GMER
  •   Hitman Pro
  •   VICE
  •   Rkhunter (Linux based)
  •   Unhide and unhide.rb (Linux based)
• Recommended Rootkit Removal Guide:
  • See Computer Weekly’s Rootkit and Malware Guide:
    http://www.computerweekly.com/feature/Rootkit-and-
    malware-detection-and-removal-guide
• Again, if the rootkit can’t be completely
  removed, reinstall your OS
How to Defend Yourself?
• Use A Firewall – There are two types:
  1. Hardware – some examples are:
     • Cisco PIX
     • CheckPoint
  2. Software – some examples are:
     • Comodo
     • Zone Alarm
     • Windows Firewall
Using Antivirus Software
• Use Antivirus Software to protect your computer.
  • According to Microsoft, less than 30 percent
    of all users have up-to-date software on their
    machines (including security patches).
  • Some Recommended Antivirus Programs
     • AVG (by Grisoft)
     • Bitdefender
     • Avira
     • Norton
     • McAfee
     • TrendMicro
Use AntiSpyware Programs!
• Spyware is usually hidden in cookies and
  in the Windows registry. Some are
  dangerous and can hinder performance.
  Protect your OS against spyware.
• Some popular AntiSpyware Programs:
  •   Windows Defender
  •   Ad-Aware
  •   Spybot Search & Destroy
  •   Spyware Blaster
Use Ad Blockers!!
• Take control of your privacy. You can stop
  ad networks from snooping on you.
• Here are some adware blockers that are
  highly recommended.
   • DoNotTrackPlus by Abine
   • Adware Blocker
   • Ghostery
• Most web browsers also have a built-in anti-
  phishing tool that should be turned on.
Other Virus Prevention Tips
• Educate Yourselves!! – This sounds simple, but
  nothing is more important than educating people
  on the fundamentals of computer malware
  prevention!
• Update patches for third-party Applications
   • Third party apps like Adobe must be updated
     regularly to stop newly discovered exploits
• Update patches for the OS (MS and Linux)
   • Microsoft Security Updates (available on Patch
     Tuesday – second Tuesday each month)
Questions or Comments?

More Related Content

PPTX
Information security and privacy
PPT
list of Deception as well as detection techniques for maleware
PPTX
Computer virus 2
PDF
Free Libre Open Source Software Development
PPTX
Securing The Computer From Viruses ...
ODP
Computer Viruses & Management Strategies
PPTX
Case study cybersecurity industry birth and growth
PPT
Desktop Pc Computer Security
Information security and privacy
list of Deception as well as detection techniques for maleware
Computer virus 2
Free Libre Open Source Software Development
Securing The Computer From Viruses ...
Computer Viruses & Management Strategies
Case study cybersecurity industry birth and growth
Desktop Pc Computer Security

What's hot (20)

PPT
Computer virus_the_things_u_must_know_
PPT
Computer security: hackers and Viruses
PPT
Pc viruses
PPTX
Ite pc v40_chapter9_edited_h
PPT
anti_virus
PPT
6unit1 virus and their types
PPTX
News Bytes - May 2015
PDF
MR201501 Latest trends in Linux Malware
PPTX
How do antivirus works
PPTX
Hacking and virus presentation
PDF
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
PDF
PPTX
Virus
PPTX
Virus and antivirus
PPSX
Computer viruses
PPTX
Virus & Antivirus
PPTX
Antivirus PPt
TXT
Read me!
Computer virus_the_things_u_must_know_
Computer security: hackers and Viruses
Pc viruses
Ite pc v40_chapter9_edited_h
anti_virus
6unit1 virus and their types
News Bytes - May 2015
MR201501 Latest trends in Linux Malware
How do antivirus works
Hacking and virus presentation
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
Virus
Virus and antivirus
Computer viruses
Virus & Antivirus
Antivirus PPt
Read me!
Ad

Viewers also liked (10)

PPTX
Melissa Virus
DOCX
CRM, Technology and Fitness
PDF
File000145
PDF
ISSM APP IT1 FACIANE.PDF
PDF
Malwares
PDF
How would you find what you can't see?
DOCX
Introduction to trojans and backdoors
PPTX
Trojans and backdoors
PDF
Vulnerability Scanning or Penetration Testing?
PPT
Malware
Melissa Virus
CRM, Technology and Fitness
File000145
ISSM APP IT1 FACIANE.PDF
Malwares
How would you find what you can't see?
Introduction to trojans and backdoors
Trojans and backdoors
Vulnerability Scanning or Penetration Testing?
Malware
Ad

Similar to Computer Viruses (20)

PPT
Computer virus
PPTX
Computer Virus
PPT
computer virus with full detail
PPTX
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
PPT
Virus09
PPT
PPTX
Viruses & worms
PPTX
Computer Introduction (Computer Viruses )-Lecture04
PPTX
History of Computer Virus
PPTX
Computer Introduction-Lecture04
PPT
10-malware and online safety preacuations
DOCX
What is a computer virus
PPTX
Computer Virus
PPTX
Computer Viruses
PPT
PPT
Computer Virus
PPTX
Cruda, mayday pp tx 2
PPTX
Computer viruses
PDF
Protecting your computer_from_viruses
PPTX
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
Computer virus
Computer Virus
computer virus with full detail
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
Virus09
Viruses & worms
Computer Introduction (Computer Viruses )-Lecture04
History of Computer Virus
Computer Introduction-Lecture04
10-malware and online safety preacuations
What is a computer virus
Computer Virus
Computer Viruses
Computer Virus
Cruda, mayday pp tx 2
Computer viruses
Protecting your computer_from_viruses
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS

Computer Viruses

  • 1. Computer Viruses Presented by: Marcus Guidry, A+, Net+, Sec+, MCP Network Analyst / Help Desk Engineer Region 7 Officer – AITP Student Leadership Council
  • 2. Table Of Contents • Introduction – What is a Virus? • History of the Virus • Variants and Forms of Malware • How to Defend Yourself
  • 3. Intro – What is a Computer Virus? • A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. • A computer virus may corrupt or delete data on a computer, use an e-mail program to spread the virus to other computers, or even delete everything on the hard disk.
  • 4. Some Examples of Viruses • Melissa – considered the first email virus; released in 1999 • ILOVEU – sent passwords back over the network and infected machines; written by a Filipino student in 2000. • Boot Sector – spread by floppy disks in the 80s and 90s • Klez – used emails and email address books to replicate and spread; released in 2001
  • 5. History of the Virus • First Virus Created? – The Brain Virus • The Brain Virus was: • created in 1986 by two Pakistani brothers, Amjad and Basit Farooq Alvi. • Was spread around by floppy disks • Infected boot records only (not the HDD) • Cluttered free space on a floppy making it unusable.
  • 6. How The Brain Virus Was Spread • According to a 1988 article in Time Magazine, a shop called “Brain Computer Services was selling brand-name computer programs, such as Lotus 1-2-3 and WordStar ... for as little as $1.50 each.” From 1986-87, many Americans stopped by their store, purchased these disks, and brought them back home..
  • 7. More On “The Brain” Virus • As Americans loaded these boot-legs programs from their floppy disk to their computers, “a snippet of computer code many consider to be the world's most sophisticated computer virus“ was spread rapidly and infected over 100,000 disks. • Source: Time Magazine (1988) By Philip Elmer- DeWitt and Ross H. Munro/Lahore Monday, Sep. 26, 1988 “You Must Be Punished”
  • 8. More About the “Melissa” Virus • Written by David L. Smith in March 1999 • It infected countless thousands of PCs (estimated damage = $80 million). • Replicated by sending copies of itself to addresses in the Microsoft Outlook address book. • Forced companies like Microsoft, Intel, and Lockheed Martin to shut down their email servers. • The author is subsequently jailed for 20 months.
  • 9. Many Variants of Malware • Worms – malicious software programs designed to replicate themselves, find open ports on your computer, and bottleneck your computer. • Trojan Horse – malicious software that is disguised as another application but causes harm to your computer. It hides itself and then add a backdoor which can be opened later to run denial of service (DoS) attacks. • AdWare – spy programs installed that allows companies to track your activities on visited websites (usually without your consent).
  • 10. Variants of Malware (Cont’d) • Rootkits – malicious programs that are installed below the operating system (OS) level. These programs usually load up during the boot process (the kernel or “root” level), just before the OS is fully loaded. • The “kits” part refers to the different tools hackers can use to maintain secret access to your machine once the rootkit is installed. • NOTE: Not all rootkits are detectable by antivirus or anti-rootkit programs. If you discover a rootkit on your machine, experts recommend reinstalling the OS!!
  • 11. The First Worm? • Morris Worm • Written by Cornell student Robert Tappan Morris in 1988 • Activated the worm from a computer at MIT • Found vulnerabilities in Unix and corrupted thousands of computers the first day released • Convicted under the 1986 Computer Fraud and Abuse Act, sentenced to community service • Present role: Professor at MIT
  • 12. Some Well-Known Worms • Nimda - infected machines via email, web, IIS, network shares and backdoors; released in 2001 • MyDoom – massive email worm (created 2004) • SoBig – email worm (variants A – F) • Code Red and Code Red II – infected thousands of Windows NT/2000 servers, over $2 billion in damages • SQL Slammer – shut down Microsoft’s Outlook and stopped databases nationwide (Bank of America to name one) in 2003 • Blaster Worm – a worm that generated buffer overflow attacks, causing havoc in 2003.
  • 13. Are Viruses and Worms the Same? • Viruses are dependent on other programs to help them spread. They “piggyback” off existing programs and then execute when opened by a user. • Worms can replicate themselves and do not need to “piggyback” in order to execute.
  • 14. The Trojan Horse Image of the Trojan Horse used in the movie “Troy” in 2004
  • 15. The First Trojan Horse? • PC-Write Trojan. According to Kylee Dickey of Smart Computing Magazine, the first Trojan horse, PC-Write Trojan, appeared back in 1986. • It pretended to be version 2.72 of the shareware word processor, PC-Write. (Quicksoft, the company that made PC-Write, never released a version 2.72.) • It performed two actions: 1. It wiped out the FAT (file allocation table; system a PC uses to organize contents on the hard drive) 2. It formatted the hard drive, deleting all saved data.
  • 16. Some Other Well Known Trojans • BackOfrice • NetBus • Sub Seven • Liberty Trojan – In 2000, people thought that this program was a patch that allowed PDA users to play Nintendo Game Boy games on the Palm OS. Instead, it deleted personal files when opened. • Storm – This nasty 2006 Trojan program infected millions, allowing hackers to turn infected machines into bots.
  • 17. Adware and Rootkits • Adware and rootkits can also cause major problems for computer users in different ways!!
  • 18. AdWare Is A Big Problem • Every day, thousands of advertisers track you on every website you visit (via cookies and other tools) and collect your personal data without your knowledge. • Examples of Companies Tracking You: • Google Analytics • Omniture • AddThis • Quantcast
  • 19. The First Rootkits? • SunOS rootkit by Lane Davis and Steven Dake in 1990 • NTRootkit created by Greg Hoglund in 1999 • Sony BMG’s Extended Rights Protection in 2005 – rootkit from CDs that limited users’ ability to access their music CDs • Mebromi – considered the first BIOS rootkit in the wild
  • 20. Dealing With Rootkits • Here are some recommended anti-rootkit tools: • RootkitRevealer • Kaspersky TDSS Killer • GMER • Hitman Pro • VICE • Rkhunter (Linux based) • Unhide and unhide.rb (Linux based) • Recommended Rootkit Removal Guide: • See Computer Weekly’s Rootkit and Malware Guide: http://www.computerweekly.com/feature/Rootkit-and- malware-detection-and-removal-guide • Again, if the rootkit can’t be completely removed, reinstall your OS
  • 21. How to Defend Yourself? • Use A Firewall – There are two types: 1. Hardware – some examples are: • Cisco PIX • CheckPoint 2. Software – some examples are: • Comodo • Zone Alarm • Windows Firewall
  • 22. Using Antivirus Software • Use Antivirus Software to protect your computer. • According to Microsoft, less than 30 percent of all users have up-to-date software on their machines (including security patches). • Some Recommended Antivirus Programs • AVG (by Grisoft) • Bitdefender • Avira • Norton • McAfee • TrendMicro
  • 23. Use AntiSpyware Programs! • Spyware is usually hidden in cookies and in the Windows registry. Some are dangerous and can hinder performance. Protect your OS against spyware. • Some popular AntiSpyware Programs: • Windows Defender • Ad-Aware • Spybot Search & Destroy • Spyware Blaster
  • 24. Use Ad Blockers!! • Take control of your privacy. You can stop ad networks from snooping on you. • Here are some adware blockers that are highly recommended. • DoNotTrackPlus by Abine • Adware Blocker • Ghostery • Most web browsers also have a built-in anti- phishing tool that should be turned on.
  • 25. Other Virus Prevention Tips • Educate Yourselves!! – This sounds simple, but nothing is more important than educating people on the fundamentals of computer malware prevention! • Update patches for third-party Applications • Third party apps like Adobe must be updated regularly to stop newly discovered exploits • Update patches for the OS (MS and Linux) • Microsoft Security Updates (available on Patch Tuesday – second Tuesday each month)