Type Of Computer Viruses|Shadow Cyber Security
type of computer viruses - Computer virus is a type of malware or malicious software, that spreads between computers and cause damage to software and data. This is cause major operational issues, result in data loss and leakage and aim to disrupt systems.
A key thing to know about computer viruses is that they are designed to spread across systems and programs. Computer viruses typically attach to an executable host file, which results in viral codes executing when a file is opened. The software it is attached to via drives, networks, file sharing programs or infected email attachments.
Signs of computer Viruses
sign of computer viruses - Computer virus will more than likely have an adverse effect on the device it resides on and discover able through common signs of performance loss, including:- Pop-up Windows, Speed of system, Programs self-executing, crashing of the Device, Accounts Being Logged Out, Mass Emails Being Sent from your Email Account etc.
In the early days of computers, viruses were spread between devices using floppy disks.Computer viruses can be spread via Email, with some even capable of hijacking Email software to spread themselves.A key feature of any computer virus it requires a victim to execute its payload or code, which means the host application should be running.In early days of computer, viruses were spread between devices using floppy disks.
Types of Computer Viruses
type of computer viruses -There are several types of computer viruses that can infect devices.Different types of computer viruses are as follows:-
1.Resident Virus
A resident virus achieves this by infecting applications as they are opened by a user.A non-resident virus is capable of infecting executable files when programs are not running.
2.Direct Action
This type of virus typically alters the performance of a system but is capable of destroying all data on the computers hard disk and USB device attached to it.A direct action virus accesses a computer's main memory and files, folders located in the auto-exec, but path, before deleting itself.
3. Multipartite Virus
Multipartite viruses can be avoided by not opening attachments from entrusted by installing trusted antivirus software.This results in performance lag and application memory running low.A multipartite virus uses multiple methods to spread across computers and method to infect.It will typically in the computers's memory to infect the hard disk, then spread through and infect more drives by altering the content of application.
4.Browser Hijacker
A browser hijacker manually changes the setting of web browsers, such as replacing the homepage, editing the new tab page.It can also contain adware that causes unwanted pop-ups and advertisements.
Browser hijacker typically attach to free software and malicious applications from unverified websites or app,only use trusted reliable antivirus software and trusted software,etc.
Types of Computer virus are as Follows:-
1. BOOT SECTOR VIRUS
Boot sector viruses infect the boot sector or the partition table of a disk.Once a computer is infected, boot sector virus usually attempt to infect every disk accessed on the infected system.The computer systems are typically infected by these viruses when started with infected floppy disks-the boot attempt does not have to be successful for the virus to infect the computer hard drive.
Boot sector Security news
- An Analysis of Azure managed identities within server-less Environments
-Trend micro cloud app security threat report 2021
-The Crypto monetized web: A forward looking thought experiment
-Ransomware spotlight
"Which virus infect boot sector files?" MBR infecting viruses don't require that media is left in the computer at boot time as true boot the sector viruses do.Three classes of viruses: boot record, system, file infects, and macro viruses.
"Who made boot sector virus?" The virus was written by two Pakistani brothers,Ahjad Farooq Alvi and Basit Farooq Alvi, these brothers over the years said the brain was not a virus but mechanism for them to protect medical software from privacy.
"How does boot sector virus spread?"These viruses are most commonly spread using physical media.USB drive connected to the computer will transfer when the drive's VBR is read, then modify or replace the existing boot code.
"Example of boot virus" A popular examples of boot virus sector is:Elk cloner,stoned, Brain, Parity virus , Angelina, Michelangelo.
2. WEB SCRIPTING VIRUS
Web scripting virus is malware that has the capacity to breach web browser security.This is malware spreads like any other computer virus.This is mainly spread with the help of infected web page ads that pop up in the web page.It also the capacity to send some spam mails and try to damage the data of the user.It can empower some dangerous attacks like DDOS attacks.The main target of the web scripting virus is social networking sites.That's also has capacity to send some spam mails and try to damage the data of the user.
Types of Web Scripting Virus:-
There are two types of Web Scripting virus are as Follows:-
-Persistent Web Scripting Virus
This virus has the capacity to impersonate the user and the cause a lot of damage.
-Non-Persistent Web Scripting Virus
This types of virus attacks the user, without getting noticed. The activity of this virus attacks place in the background and makes it not visible to the user.
Symptoms of the Web Scripting Virus:-
-The browser homepage getting changed automatically.
-Getting the redirected to malicious sites.
-The background of the desktop can get changed.
-The system getting shut down automatically.
Ways to prevent the Web Scripting virus:-
-Users should have an antivirus that has the capability to warm the user and protect the system.
-Users can reinstall the browser.
-Users can reset the browser.
-Use Chrome Anti malware program.
Function of Web Scripting virus:-
-It can also be used to create a malicious link, which could be sent as an attachments in an Email.
-It can also spread and effect the system of the user through ads pop-up on the webpage.
-It can also be used for sending spam emails.
-It breaches the web browser.
"Who create Web Scripting Virus" in January 1986, the first virus for windows based PCs was born, simply known as "Brain",it was written by two brothers, Ajam Frooq Alvi and Basit.
"How does a script virus work" a script virus is any type of malicious code that is executed after a user visits a page that has filed, advertisements or code running in the background that contains the malicious code.
3. BROWSER HIJACK
A browser hijacker is a malware program that modifies web browser setting without the user's permission and redirects the user to websites the user had not intended to visit.This is often called a browser redirect virus because it redirects the browser to other,usually malicious.
Browser can infect the devices through malicious email attachments,by visiting infecting websites or by downloading infected files.These are likely to be downloaded unintentionally by the user.The victim may also be fooled after being offered the option to declined the installation of the browser hijacker software,but the query is worded in a way that deliberately confuses the user into downloading the software.
Impacts of browser hijacking?
Impacts of browser hijacking are as follows:-
-A major increase in pop up ads that slow the computer down
-Unauthorised software is forced into the browser
-Web browser is redirecting to dangerous websites
-Changes made to a web browsing homepage, including mods to search engine preferences
-The addition of unwanted toolbars
-The software can then be used to spy on users, access accounts or harvest data.
How do you remove browser hijackers?
1.Automated tools Browser hijacker removal can be relatively straight forward.Different action to take include the following:can automatically delete browser hijacker associated files.
2.Use a program such as an antivirus or anti malware software that specialized in spyware removal and modification on the registry.
3.Clearing the system's DNS cache can also eliminate connections to malicious programs if the browser has been hijacked.
4. Use the browser setting tool to reset the browser homepage, some cases, simply resetting browser setting to the original defaults will remediate the attack.If not, the browser can be uninstalled and then reinstalled.
Prevention of Browser Hijacking
- Avoid clinking on suspicious links Don't click on emails, messages, pop up boxes,etc, that come from unknown sender.
- Carefully downloading software browser hijacking is software is bundled with legitimate software, so users should read all conditions and terms and end use licensing agreements before downloading any software.
-Stay current on operating system, the latest security features can help prevent hijacking attacks. Hijackers typically exploit known vulnerabilities in the operating system and browser.
-Antivirus Software,Installing good antivirus software and keeping it updated with the latest patches helps defend against browser hijacking.Some antivirus software enable the user to stop those changes from being made.
4. FILE INJECTOR VIRUS
A file injector virus overwrites code or inserts infected code into a executable file.This type of virus can infect a number of operating systems,including Unix, Windows and Macintosh.This also known as file injector.
This virus is one of the most common type of virus. It infects files with,exe or .com extension.when the inflected file is executed or accessed, it may be partially or completely overwritten by the virus.This virus can also completely reformat a hard drive. Win 32.Sality.BK is a popular file infecting virus that was among the top 10 malware infections in 2011 and 2012.
"Examples of file injector virus" these infect program files, such as games, application or utilities.They are often memory resident, once they have been executed they remain active in the computer's memory and can infect more programs.Examples are Cascade and jerusalem.
"What does file injector virus do?"Computer virus is a harmful that is designed ti insert unwanted code into another program or file.Each time the host file is run, the virus code in it will also run. That's insert more unwanted code,either into the same file or another file.
"How do we know it is a virus infected file?" Slow computer performance problems shutting down or restarting and missing files.
5. MULTIPARTITE VIRUS
A multipatite virus is a fast moving virus that uses file infectors or boot infectors to attack the boot sector.Most viruses either affect the boot sector, the program files and system.These virus can effect both the boot sector and the program files at the same time, thus causing more damage than any other kind of virus.Once the virus has been triggered destructive payloads are launched throughout the program files.
The effect of a multipatite virus can be damaging and far reaching to a computer system.It is paramount to disinfect a computer laden with a multipatite virus, but it is very difficult to do so in practice.This virus wi;; reproduce as it did when it originated within the system.Computer experts feel prevention is key in avoiding any type of virus.When the boot sector is infected, simply turning on the computer will trigger a boot sector virus because it latches on to the hard drive that contains the data that is needed to start the computer.
"Examples of multipatite virus" this virus uses multiple infection methods,typically infecting both boot and files sectors .Multipartite viruses combine the characteristics of file infector and boot sector viruses.Examples are Invader and flip.
"Cause of multipartite virus in computer"this virus spread when an infected computer is booted up, this characteristics is known as a "boot infector",and it's particularly troublesome since it targets essential areas of the computer's hard drive.
The first reported instance of a multipartite virus was in 1989.Ghostball was the name of this particular virus and it targeted the executable files and boot sectors of the computers it infected.Now with the around half of the global population active online,multipartite viruses pose a profound threat to businesses and persons alike.
6. POLYMORPHIC VIRUS
This is complex file infectors that can create modified versions of itself to avoid detection yet retain the same basic routines after every infection.This is vary their physical file makeup during each infection, polymorphic viruses encrypt their codes. That can be use different encryption keys every time.
Polymorphic viruses rely on mutation engines to alter their decryption routines every time they infect a machine.This way,traditional security solutions may not the easily catch them because they do not use a unchaging code.Complex mutation engines use generate billions of decryption routines make them even more difficult to detect.
"Who create polymorphic virus?"This virus written by Mark Washburn. The virus called 1260, was written in 1990. A better known polymorphic virus was created in 1992 by the hacker Dark Avenger as a means of avoiding pattern recognition from antivirus software.
"How does polymorphic virus spread"this are usually spread using standard cyber attack techniques including spam,infected websites, phishing emails and other malware. Some of the more notorious polymorphic viruses include ursnif,Vobfus, banking Trojan, windows worm,email,etc.
"How can prevent of polymorphic virus" a polymorphic virus is a complex computer virus that can adapt to the various defense you image.It can constantly create modified versions of itself to avoid detection but retain the same basic program after each infection.
"Polymorphic virus where originated?"The first known polymorphic virus, 1260, was written in the U.S. by Mark Washburn in 1990.
7. DIRECT ACTION VIRUS
Direct action virus - can be considered a malicious application that can destroy the files and data of your system and network.This viruses are known for attaching themselves directly to a file and getting installed in the memory.So we should have enough knowledge about direct action viruses.This virus may be a code authored and used for destructive activity on your system.
They can be damage the files and data of your computer or other computers connected through the same network, they cannot delete the files they infect.It was the basic detail the direct action virus.
A direct action virus's main property or characteristic is its link to the executable file.When you open and click executable file, your system or device will respond differently.
"How does direct action virus spread"these viruses are designed to "pass through" your computer,Generally spread around files of a specific type(generally,COM or EXE files),and when they are done,they delete themselves.
"How do i get rid of direct action virus?"unlike other computer viruses, a direct virus does not have the capability to delete the infected files or obstruct the overall device performance.The only make them inaccessible. In addition to this, that's detection is quite simple and can be easily removed with the help of powerful antivirus software.
"Which is the direct action virus usually found in a computer"this is also called non resident virus,it gets installed or stays hidden in the computer memory.Stays attached to the specific type of files that it infect.
8. RESIDENT VIRUS
A resident virus is a kind of computer virus that hides and stores itself within the computer memory, which then allows it to infect any file that is run by the computer, depending on the virus programming.That virus will load its replication module into memory so it does not need to be executed for it to infect other files, rather it activates whenever the operating system loads or operates a specific function.
Resident viruses are in contrast to non resident viruses, when are executable viruses meaning that they need to be executed before they can infect, unlike the resident virus that can execute whenever the loads. Fast infects do massive damage quickly, but are very easy to notice because of the effects , while slow infectors are able to spread more widely because they can go undeteched for much longer.
our company name - shadow cyber security
our service is :-
1. web-application-penetration testing
2. network penetration testing
3. mobile app penetration testing
4. latest security patches
5. customer cyber solutions
6. iot penetration testing
7. cloud testing security
8. system penetration testing
9. malware family threads protraction
10. social media security provide
11. social engineering security
12. website/app design and development
these time cyber attack increase every year all company regular basis
for any cyber security advise ya question plz contact
phone no 8700320447
website- http://shadowcybersecurity.com/
-----------Thanks for watching--------------
2 Comments
Nice👍
ReplyDelete👍👍👍
ReplyDeletePost a Comment