26.12.2014 Views

Absolute PC Security and Privacy.pdf

Absolute PC Security and Privacy.pdf

Absolute PC Security and Privacy.pdf

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Common File Infector Viruses<br />

File infectors are among the most common forms of computer viruses. Any time you receive<br />

an executable file (EXE, COM, etc.) from another user (or from the Internet), it’s possible that<br />

that file carries a file infector virus.<br />

Because of this, there are a large number of potentially destructive file infector viruses<br />

circulating in the wild. The most common of these viruses are listed here.<br />

CASPER CASPER is an encrypting file infector virus from the early 1990s. It infects COM<br />

files, including comm<strong>and</strong>.com. On April 1, when an infected file is executed, CASPER<br />

overwrites the first track of the drive where the infected file is stored. When the drive is<br />

subsequently accessed, Sector not found errors occur.<br />

Chernobyl This virus, also known as W95/CIH, is named after the nuclear plant accident of<br />

the same name—<strong>and</strong> is programmed to trigger on the same day of the month as the Chernobyl<br />

accident. On the 26th of each month, the Chernobyl virus attempts to overwrite the host<br />

computer’s flash BIOS, which will then prevent the computer from booting. At the same time,<br />

the virus overwrites the entire hard disk with garbage files. (Some variations of this virus<br />

trigger only once a year, on April 26—the anniversary of the Chernobyl nuclear accident.)<br />

The Chernobyl virus was extremely destructive in late 1998 <strong>and</strong> on into 1999, but has since<br />

been fairly effectively defended against by all major antivirus programs.<br />

CRUNCHER CRUNCHER infects COM files—although not comm<strong>and</strong>.com. It compresses<br />

the files that it infects; as a result, all infected files are decreased in size.<br />

Die-Hard 2 This virus, alias DH2, is a symbiotic, memory-resident file infector. It’s very<br />

stealthy <strong>and</strong> infects both COM <strong>and</strong> EXE files. Infected files increase in size by 4000 bytes,<br />

while system memory decreases by 4000 bytes.<br />

Fun Love The Fun Love virus infects all EXE, SCR, <strong>and</strong> OCX files in both Windows 9x <strong>and</strong><br />

Windows NT. It searches for shared network folders with write access <strong>and</strong> then infects the<br />

files within; it can also infect files in the Program folder (<strong>and</strong> subfolders) on the host machine.<br />

One unique feature of this virus is that it infected several file downloads (called Hotfixes) on<br />

Microsoft’s technical support Web site; users downloading these Hotfixes found their systems<br />

infected. (Fortunately, this particular problem has since been caught <strong>and</strong> dealt with.)<br />

Jerusalem Jerusalem is a notorious virus from the late 1980s, still active today, whose bark<br />

was worse than its bite. There have been many variants of this virus over the years, under<br />

many pseudonyms. The virus infects COM, EXE, SYS, BIN, PIF, <strong>and</strong> OVL files—<strong>and</strong> can<br />

reinfect the same file multiple times. A half hour after the first infection, the infected system<br />

will slow down by a factor of ten. It typically executes on a Friday the 13th, <strong>and</strong> then deletes<br />

any program you try to run.<br />

Junkie Junkie (also known as Junkie-Boot) is a multipartite virus, which infects COM <strong>and</strong><br />

EXE files, corrupts COM files, <strong>and</strong> infects the boot sector on floppy disks <strong>and</strong> the MBR on<br />

hard disks.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!