26.12.2014 Views

Absolute PC Security and Privacy.pdf

Absolute PC Security and Privacy.pdf

Absolute PC Security and Privacy.pdf

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

While boot sector viruses are relatively uncommon today, at one time they were among the<br />

most feared of all computer viruses. Of course, some boot sector viruses were more common<br />

than others; here’s a short list of the most frequently seen viruses of this type.<br />

Frankenstein Frankenstein is an encrypting memory-resident boot sector virus. It infects hard<br />

drive Master Boot Records <strong>and</strong> floppy disk boot sectors. As part of its payload, it deletes disk<br />

sectors on the infected disk.<br />

KILROY-B Also known as LUCIFER.BOOT, this virus overwrites the boot sector of the<br />

infected hard drive, on execution.<br />

Matthew The Matthew virus infects floppy boot sectors <strong>and</strong> hard disk Master Boot Records.<br />

It does not have a destructive payload; on infection, it displays r<strong>and</strong>om characters onscreen<br />

prior to the boot process.<br />

Michelangelo This virus, also known as Stoned.Michelangelo, Stoned.Daniela, <strong>and</strong> Daniela,<br />

gained worldwide attention in 1992, when it was feared that millions of computers would fall<br />

prey to its destructive payload. It infects floppy disk boot sectors <strong>and</strong> hard disk partition<br />

tables; the infection occurs when a <strong>PC</strong> is booted from a floppy disk infected with the virus.<br />

Once the virus is loaded into memory, it stays there—<strong>and</strong> then, on March 6th of each year,<br />

deletes all the files on the infected system. Although the risk of infection was high at the time,<br />

the actual infections were counted in the thous<strong>and</strong>s, not the millions.<br />

PARITY This relatively new virus infects the boot sectors of floppy disks <strong>and</strong> the partition<br />

tables of hard disks. Fortunately, it does not have a destructive payload; it displays, at r<strong>and</strong>om,<br />

the message PARITY CHECK, <strong>and</strong> forces a reboot of the infected system.<br />

Stoned The Stoned virus, also known as New Zeal<strong>and</strong>, Stoned.NearDark, <strong>and</strong> NearDark,<br />

infects <strong>PC</strong>s when the system is booted from an infected floppy disk. It infects floppy boot<br />

sectors <strong>and</strong> hard disk partition tables.<br />

Current Risk<br />

Since the mid-1990s the risk of becoming infected with a discrete boot sector virus has been<br />

small. Not that there haven’t been new boot sector viruses; there have, most noticeably the<br />

PARITY virus, developed in 2001. But it’s become increasingly difficult to catch a boot<br />

sector virus, as the use of bootable floppy disks (the most common means of transmitting a<br />

boot sector virus) has significantly declined. (About the only reason you’d boot from a floppy<br />

today is if you had a failure of your hard disk.)<br />

Detecting a Boot Sector Virus<br />

If your system has been infected by a boot sector virus, you will generally see obvious<br />

changes to the boot procedure. The typical boot sector virus will slow up the boot routine,<br />

often displaying unusual messages on the computer screen.<br />

An antivirus program can find boot sector viruses by scanning the boot sector or MBR code.<br />

Most viruses contain an identifying text string that wouldn’t otherwise be present in the boot<br />

sector or MBR. For example, the Stoned virus contains the following text string:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!