26.12.2014 Views

Absolute PC Security and Privacy.pdf

Absolute PC Security and Privacy.pdf

Absolute PC Security and Privacy.pdf

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

DrawBringInFrOut, InsertPBreak, <strong>and</strong> ToolsRepaginat. However, after Word is infected,<br />

these macros are copied to the Normal template <strong>and</strong> renamed to StartOfDoc, AutoOpen,<br />

InsertPageBreak, <strong>and</strong> FileSave.<br />

Melissa Perhaps the most widespread macro virus, Melissa was destructive enough to bring<br />

down several large international corporations for several days in March of 1999. Melissa is<br />

coded into a Microsoft Word document; when the document is opened, Melissa opens<br />

Microsoft Outlook <strong>and</strong> sends e-mail copies of itself to the first fifty names it finds in the<br />

user’s Address Book. The subject of the e-mail is typically Important Message From ,<br />

with the user’s name inserted—although some variants of this virus send messages with blank<br />

subject lines. The text of the message is as follows:<br />

Here is that document you asked for … don’t show anyone else :-)<br />

An infected DOC file is attached to the e-mail; the initial file was named list.doc, but<br />

variations to this have appeared over time. Melissa infects the user’s normal.dot file, <strong>and</strong> if<br />

the minute of the hour matches the day of the month (for example, 3:31 on March 31st),<br />

inserts the following message into the current Word document:<br />

Twenty-two points, plus triple-word-score, plus fifty points for using<br />

all my letters. Game’s over. I’m outta here.<br />

Melissa’s destructive power was not in its payload, however, but rather in the huge amount of<br />

e-mail traffic it generated—enough to equate to a denial of service attack on some servers. In<br />

this aspect, Melissa was a very effective worm.<br />

Note A worm is a very specific type of malicious file. Learn more about worms in Chapter 6,<br />

“Trojan Horses <strong>and</strong> Worms.”<br />

Nuclear Also known as Winword.Nuclear, Wordmacro-Nuclear, <strong>and</strong> Wordmacro-Alert, this<br />

virus infects both DOC <strong>and</strong> DOT files, as well as certain COM <strong>and</strong> EXE files. This is because<br />

Nuclear is both a macro virus <strong>and</strong> a file infector virus. It loads the following macros, which<br />

can be viewed in Word’s Macros dialog box: InsertPayload, Payload, DropSurviv, AutoOpen,<br />

AutoExec, FileExit, FilePrint, FilePrintDefault, <strong>and</strong> FileSaveAs. Fortunately, Nuclear is a<br />

relatively innocuous virus; its primary payload is to insert the following line at the end of<br />

every twelfth printed document:<br />

And finally I would like to say: STOP ALL FRENCH NUCLEAR TESTING IN THE<br />

PACIFIC!<br />

The virus also attempts to delete key system files on April 5th of each year, but does so<br />

ineffectively.<br />

PPoint.Attach Also known as PowerPoint.Attach, this virus attacks PPT-format PowerPoint<br />

presentation files. It’s a nondestructive virus, whose main goal appears to be simply to infect<br />

other PPT files.<br />

Current Risk

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!