Nis MP
Nis MP
A STUDY ON
Certificate
Place: Dhule
Date: / 04 / 2024
Institute
PART A- MICRO PROJECT PROPOSAL
In this project we are going to introduce Virus and worms, virus is a computer program
that can copy itself and infect a computer without permission or knowledge of the user. A
virus might corrupt or delete data on a computer, use e-mail programs to spread itself to other
computers, or even erase everything on a hard disk.
A worm is a type of malware or malicious software that can replicate rapidly and spread
across devices within a network. As it spreads, a worm consumes bandwidth, overloading
infected systems and making them unreliable or unavailable. Worms can also change and
delete files or introduce other malware.
Computer viruses and network worms have evolved through a continuous series of
innovations, leading to the recent wave of fast-spreading and dangerous worms. A review of
their historical development and recent outbreaks leads to a number of observations. First,
while viruses were more common than worms initially, worms have become the predominant
threat in recent years, coinciding with the growth of computer networking. Second, despite
widespread use of firewalls and other network security equipment, worm outbreaks still occur
and will likely continue to be a threat for the near future. Third, recent worms are appearing
as a series of quick successive variants. Unlike the independent efforts of early viruses, these
variants suggest an increasing level of coordination among worm creators. Fourth, recent
worms have shown capabilities to spread faster and exploit more infection vectors. This trend
implies a more urgent need for automated, coordinated protection measures. Finally, more
dangerous payloads are becoming commonplace. This suggests that worm creators are using
worms for other objectives than simply infection, such as data theft and setting up denial of
service networks.
2.0 Aim of the Micro-Project
The aim of micro project is understanding the concept about the virus and worms and this
project is help to clear the concept of the virus and worm what is it, why is it harmful to our
computer , laptop etc
3.0 Course Outcomes
A study on viruses and worms typically involves a literature review to understand their
characteristics and historical incidents. Clear objectives are defined, focusing on analyzing
propagation patterns and evaluating mitigation strategies. Experiments are conducted using
malware samples and network simulations to observe behavior and assess defense
mechanisms. Data collected is analyzed to identify patterns and trends, leading to insights for
improving cybersecurity practices. Results are documented in a research paper for publication,
contributing to the advancement of malware detection and mitigation techniques.
1.0Rationale
Studying viruses and worms is crucial due to their significant impact on computer systems and
networks. These malicious programs pose serious threats, causing data breaches, system
malfunctions, and financial losses for individuals and organizations. Understanding their
behavior, propagation methods, and evasion techniques is essential for developing effective
detection and mitigation strategies. By conducting research in this area, we can enhance
cybersecurity practices, improve threat intelligence, and ultimately strengthen the resilience of
computer systems and networks against malicious attacks. This study aims to contribute to the
ongoing efforts to combat malware threats and safeguard digital assets and infrastructure.
1) https://www.geeksforgeeks.org/difference-between-worms-andvirus
2) https://study.com/academy/lesson/types-of-computer-viruses-functions-
examples.html#:~:text=Computer%20viruses%20are%20classified%20into,cavity%2
0viruses%2C%20and%20polymorphic%20viruses.
3) https://logixconsulting.com/2021/12/23/breaking-four-the-4-phases-of-a-computer-
virus/
4) https://www.geeksforgeeks.org/types-of-virus/
Phases of Viruses: -
When most people think of malware, they envision viruses. Viruses are one of the most
common types of malwares. They consist of malicious software that can self-replicate while
spreading to other computers and devices. Different viruses work in different ways. Most of
them, however, use an infection cycle that’s comprised of the four following phases.
1) Dormant :-Viruses typically don’t self-replicate or otherwise cause harm upon infection.
Rather, they remain dormant. The first phase in a virus’s infection cycle is the dormant phase.
The virus won’t self-replicate, nor will it delete, capture or modify data on the infected
computer. The dormant phase lives up to its namesake by keeping the virus dormant and
inactive.
3) Trigger:-The third phase in a virus’s infection cycle is the trigger phase. The trigger phase
involves activation. Viruses aren’t considered active until they enter the trigger phase. Upon
entering the trigger phase, viruses will initiate their malicious activities.
Viruses can be programmed to activate in response to different triggers. A trigger
might be a minimum of self-replications, such as 100. Once the virus has self-replicated 100
times, it will enter the trigger phase. Alternatively, the trigger may consist of the passage of
time, such as 48 hours. After 48 hours have passed, the virus will enter the trigger phase.
Regardless, viruses have a trigger that causes them to activate and, thus, initiate their
malicious activities.
4) Execution:-The fourth and final phase of a virus’s infection is the execution phase. The
execution phase involves the release of a payload. Viruses have a payload. The payload is the
malicious code that’s designed to harm or otherwise negatively affect the targeted computer.
Some payloads can delete data. Others can cause unwanted pop-ups or advertisements
1. Boot Sector Virus – It is a type of virus that infects the boot sector of floppy disks or
the Master Boot Record (MBR) of hard disks. The Boot sector comprises all the files
which are required to start the Operating system of the computer. The virus either
overwrites the existing program or copies itself to another part of the disk.
Fig Boot Sector Virus
Direct Action Virus – When a virus attaches itself directly to a .exe or .com file and enters
the device while its execution is called a Direct Action Virus. If it gets installed in the memory,
it keeps itself hidden. It is also known as Non-Resident Virus.
Resident Virus – A virus which saves itself in the memory of the computer and then infects
other files and programs when its originating program is no longer working. This virus can
easily infect other files because it is hidden in the memory and is hard to be removed from
the system.
Multipartite Virus – A virus which can attack both, the boot sector and the executable files
of an already infected computer is called a multipartite virus. If a multipartite virus attacks
your system, you are at risk of cyber threat.
Overwrite Virus – One of the most harmful viruses, the overwrite virus can completely
remove the existing program and replace it with the malicious code by overwriting it.
Gradually it can completely replace the host’s programming code with the harmful code.
Polymorphic Virus – Spread through spam and infected websites, the polymorphic virus are
file infectors which are complex and are tough to detect. They create a modified or morphed
version of the existing program and infect the system and retain the original code.
File Infector Virus – As the name suggests, it first infects a single file and then later spreads
itself to other executable files and programs. The main source of this virus are games and
word processors.
Spacefiller Virus – It is a rare type of virus which fills in the empty spaces of a file with
viruses. It is known as cavity virus. It will neither affect the size of the file nor can be detected
easily.
Macro Virus – A virus written in the same macro language as used in the software program
and infects the computer if a word processor file is opened. Mainly the source of such viruses
is via emails.
Worms
A worm is a type of malware or malicious software that can replicate rapidly and spread
across devices within a network. As it spreads, a worm consumes bandwidth, overloading
infected systems and making them unreliable or unavailable. Worms can also change and
delete files or introduce other malware.
A computer worm duplicates itself to spread to uninfected computers. It often does this by
exploiting parts of an operating system that are automatic and invisible to the user.
Typically, a user only notices a worm when its uncontrolled replication consumes system
resources and slows or halts other tasks. A computer worm is not to be confused with WORM,
or write once, read many
.
How do computer worms work?
Computer worms often rely on vulnerabilities in networking protocols, such as File Transfer
Protocol, to propagate.
After a computer worm loads and begins running on a newly infected system, it will typically
follow its prime directive: to remain active on an infected system for as long as possible and
spread to as many other vulnerable systems as possible.
For example, the WannaCry ransomware worm exploited a vulnerability in the first version
of the Windows Server Message Block (SMBv1) resource sharing protocol.
Once active on a newly infected computer, the WannaCry malware initiates a network search
for new potential victims: systems that respond to SMBv1 requests made by the worm. The
worm then continues to propagate within a network through these clients.
Malicious attackers can disguise a worm as a nonthreatening resource -- such as a work file
or link, which a user clicks on or downloads -- that's only later revealed as a worm. Worms
can contain malicious attachments, or payloads, that can delete files or let bad actors remotely
control users' computers.
As defined in the "Security of the Internet" report released in 1996 by the CERT Division of
the Software Engineering Institute at Carnegie Mellon University, computer worms are "self-
replicating programs that spread with no human intervention after they are started." In
contrast, the report noted that computer viruses are also "self-replicating programs, but
usually require some action on the part of the user to spread inadvertently to other programs
or systems."
What types of computer worms exist?
Email worms
Email worms work by creating and sending outbound messages to all the addresses in a user's
contact list. The messages include a malicious executable file that infects the new system
when the recipient opens it.
Successful email worms usually employ social engineering and phishing techniques to
encourage users to open the attached file.
File-sharing worms
File-sharing worms copy themselves into shared folders and spread through peer-to-peer file-
sharing networks. Worm authors often disguise these malicious programs as media files.
Stuxnet, one of the most notorious computer worms to date, consists of two components: a
worm to propagate malware through USB devices infected with the host file, and malware
that targets supervisory control and data acquisition systems.
File-sharing worms often target industrial environments, including power utilities, water
supply services and sewage plants.
Cryptoworms
Cryptoworms work by encrypting data on the victim's system. Perpetrators can use this type
of worm in ransomware attacks, where they follow up with the victim and demand payment
in exchange for a key to decrypt the files.
Internet worms
Some computer worms specifically target popular websites with poor security. If they can
infect the site, they can infect a computer accessing the site.
From there, internet worms spread to other devices that the infected computer connects to
through the internet and private network connections.
Like email worms, instant messaging worms are masked by attachments or links, which the
worm continues to spread to the infected user's contact list. The only difference is that instead
of arriving in an email, it comes as an instant message on a chat service.
If the worm hasn't had time to replicate itself onto the computer, the user can change their
password on the chat service account to prevent its spread.
Before the widespread use of networks, computer worms spread through infected storage
media, such as floppy disks, which, when mounted on a system, would infect other storage
devices connected to the victim system.
Today, USB drives are a common vector for computer worms, as are internet activities such
as email, chat and web surfing.
Computer worm examples
Worms have existed since the beginning of the internet. Several notable cases spread so far
that they caused major network and business disruptions.
The Morris worm was released in 1988 and is widely considered the first computer worm.
However, it is better characterized as the first worm to propagate widely on the then-nascent
internet.
The Morris worm was the work of Robert Tappan Morris Jr., a Cornell graduate student who
was reportedly attempting to enumerate all the systems connected to the internet precursor
network, ARPANET.
Targeting vulnerabilities in several different Unix programs, the Morris worm was capable
of infecting a system more than once, making it difficult to eradicate before it produced a
denial-of-service condition on the infected host. The worm affected as many as 10% of the
60,000 systems believed to be connected to ARPANET.
Stuxnet
Stuxnet, first identified in 2010, spreads through file-sharing services. Security researchers
determined that U.S. and Israeli intelligence agencies created the worm to interfere with
Iranian nuclear weapons production.
Stuxnet was introduced via USB drives and took advantage of flaws in the Windows
operating system to spread, ultimately causing nuclear centrifuges to malfunction.
WannaCry
WannaCry ransomware uses a worm to infect Windows computers and encrypt files on PC
hard drives. It began spreading in May 2017 and affected hundreds of thousands of computers
in up to 150 countries worldwide. Targets included large corporations such as FedEx, banks
and hospitals. Once the worm locked a PC's files, hackers contacted the owner demanding
payment for a key to decrypt the files. However, even after payment, only a few victims were
given the key.
Security researchers connected the hack to the Lazarus Group, a nation-state group affiliated
with North Korea. While WannaCry caused a significant financial loss for targeted victims,
security researcher Marcus Hutchins halted its spread after discovering a kill switch that
prevented it from propagating further.
Although some worms do nothing more than propagate to new victim systems, most worms
are associated with computer viruses, rootkits or other malicious software that can cause
additional damage and risk.
When beginning an incident response, security teams should use a known safe computer to
download any required updates or programs to an external storage device and install them on
the affected machine.
If it is possible to identify the computer worm infecting the system, specific instructions or
tools might be available to remove it without having to wipe the system entirely.
Disconnect the system from the internet or any wired or wireless network before attempting
to remove the computer worm. Also, remove nonpermanent storage devices, such as a USB
or external hard drive, and scan them separately for infection.
3. Use the antivirus software to remove any malware, malicious code and worms it
finds, and clean infected files.
4. Confirm that the operating system and all applications are up to date and patched.
Organizations must protect their computer systems from worms because these programs can
damage systems and compromise sensitive information. Security teams can regularly update
antivirus software, use firewalls and encrypt sensitive information to reduce their
organizations' worm infection risk. In addition, business leaders can train employees on
security best practices to create a human firewall.
.
5.0 Actual Resources Used
Sr. Name of
No. Specifications Qty Remarks
Resource/Material
1. Hardware computer system Desktop-PRH 45k9(i5), 1
RAM
8.00GB And (usable
7.74GB)
2. Operating System 64-bit Operating system,
Windows11, 1
Windows Office
Studying viruses and worms is crucial for enhancing cybersecurity. It informs the development
of better defense mechanisms, aids threat intelligence efforts, guides network security
practices, and shapes incident response protocols and policies. This research also supports
cybersecurity education, ultimately reducing the impact of malicious software on digital
systems and networks.