0% found this document useful (0 votes)
34 views6 pages

Types of Virus

The document outlines various types of computer viruses, including boot sector, web scripting, and polymorphic viruses, detailing their methods of infection and effects on systems. It also provides guidance on recognizing signs of virus infection, protective measures, and the importance of antivirus software. Additionally, it explains other malware types such as worms, Trojans, and ransomware, emphasizing the need for vigilance against these threats.

Uploaded by

Prakesh Shrestha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views6 pages

Types of Virus

The document outlines various types of computer viruses, including boot sector, web scripting, and polymorphic viruses, detailing their methods of infection and effects on systems. It also provides guidance on recognizing signs of virus infection, protective measures, and the importance of antivirus software. Additionally, it explains other malware types such as worms, Trojans, and ransomware, emphasizing the need for vigilance against these threats.

Uploaded by

Prakesh Shrestha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

What are the different types of computer viruses?

A computer virus is one type of malware that inserts its virus code to multiply
itself by altering the programs and applications. The computer gets infected
through the replication of malicious code. Computer viruses are pieces of
malicious computer coding that can be spread from one device to another. They
didn't necessarily start out with the intent to damage a computer or steal data,
though. Today, they are big business for the people behind them - giving them
access to confidential data and costing individuals and companies who fall victim
millions of dollars.
Viruses, just like viruses that can enter the human body, take on all sorts of shapes
and sizes. A computer virus is a piece of software that can 'infect' a computer,
install itself and copy itself to other computers, without the users knowledge or
permission. It usually attaches itself to other computer programs, data files, or the
boot sector of a Hard drive.
There are thousands of varieties of computer viruses so it's not possible to create an
inclusive list of every virus. But, let's put together a list of the most common types
of viruses and how they function.

1. Boot sector virus


This type of virus can take control when you start — or boot — your computer.
One way it can spread is by plugging an infected USB drive into your computer.
This type of virus infects the master boot record and it is challenging and a
complex task to remove this virus and often requires the system to be formatted.
Mostly it spreads through removable media.

2. Web scripting virus


This type of virus exploits the code of web browsers and web pages. If you
access such a web page, the virus can infect your computer.

3. Browser hijacker
This type of virus “hijacks” certain web browser functions, and you may be
automatically directed to an unintended website.

4. Resident virus
This is a general term for any virus that inserts itself in a computer system’s
memory. A resident virus can execute anytime when an operating system loads. It
is difficult to identify the virus and it is even difficult to remove a resident virus.
The resident viruses are troublesome due to the reason they can run unnoticed by
antivirus and antimalware software by hiding in the system’s RAM.
5. Direct action virus
This type of virus comes into action when you execute a file containing a virus.
Otherwise, it remains dormant. This is also called non-resident virus, it gets
installed or stays hidden in the computer memory. It stays attached to the specific
type of files that it infect. It does not affect the user experience and system’s
performance.

6. Polymorphic virus
A polymorphic virus changes its code each time an infected file is executed. It does
this to evade antivirus programs.

7. File infector virus


This common virus inserts malicious code into executable files — files used to
perform certain functions or operations on a system. Few file infector viruses come
attached with program files, such as .com or .exe files. Some file infector viruses
infect any program for which execution is requested, including .sys, .ovl, .prg, and
.mnu files. Consequently, when the particular program is loaded, the virus is also
loaded. Besides these, the other file infector viruses come as a completely included
program or script sent in email attachments.

8. Multipartite virus
This kind of virus infects and spreads in multiple ways. It infects both the boot
sector and executable files at the same time.

9. Macro virus
Macro viruses are written in the same macro language used for software
applications. The macro virus disguises itself as coding language in word
processing and spreadsheets. It comes along in things like word processing and
spreadsheet programs and is written in the same macro language those programs
use for their legitimate processes. This virus, embedded in a Microsoft Word
document, for example, will cause the program involved to perform a series of
unintended actions immediately when the program opens. Microsoft quickly
retaliated by adding a new feature in Office 2016. The feature enables security
managers to selectively enable macro use.

10. Overwrite Virus – This type of virus deletes all the files that it infects. The
only possible mechanism to remove is to delete the infected files and the end-user
has to lose all the contents in it. Identifying the overwrite virus is difficult as it
spreads through emails.
11. Spacefiller Virus – This is also called “Cavity Viruses”. This is called so as
they fill up the empty spaces between the code and hence does not cause any
damage to the file.

13. Rootkit Viruses:


The rootkit virus is a malware type which secretly installs an illegal rootkit on an
infected system. This opens the door for attackers and gives them full control of
the system. The attacker will be able to fundamentally modify or disable functions
and programs. Like other sophisticated viruses, the rootkit virus is also created to
bypass antivirus software.
14. Program Virus
A program virus is launched when a program is installed or executed. They can
also be attached to CDs, removable media, or even email, but instead of infecting a
computer at start-up, they go to work when you open a program, even a seemingly
innocent one. These are sometimes referred to as ''trojan horse viruses,'' as they are
hidden from their unsuspecting victim.

How To Get Rid Of Computer Virus


Never the neglect to take action on a computer virus residing in your system. There
are chances that you might end up losing important files, programs, and folders. In
some cases, the virus damages the system hardware too. Thereby, it becomes
mandatory to have an effective anti-virus software installed on your computer to
steer clear of all such threats.

Signs of Virus Infection


It is vital for any computer user to be aware of these warning signs –
• Slower system performance
• Pop-ups bombarding the screen
• Programs running on their own
• Files multiplying/duplicating on their own
• New files or programs in the computer
• Files, folders or programs getting deleted or corrupted
• The sound of a hard drive
If you come across any of these above-mentioned signs then there are chances that
your computer is infected by a virus or malware. Not to delay, immediately stop all
the commands and download an antivirus software. If you are unsure what to do,
get the assistance of an authorized computer personnel
How Can a Computer Be Protected from Viruses?
 Install an anti-virus program and keep it up-to-date and regularly run scans.
 Install an anti-malware program to stop software installing without your
knowledge.
 Never download and install software from the Internet unless you are certain
it is from a trusted source.
 Don’t open e-mail attachments unless you have scanned them first, even a
picture can carry a virus.
 Don’t trust cracked or hacked software as they often contain malware,
Trojans.

How to Be safe
 Always scan the external devices pen drives,CD’s before opening them
 Always scan the attachments which come via mail
 Do not download unknown software from internet
 Make sure Windows Firewall is enabled while accessing Internet
 Use a light weight antivirus software like malware bytes, adwcleaner.
 Don’t use very heavy weight antivirus software as they may cause the CPU
slow.
 Call the computer engineer if the problem persists.
 Run a full scan of the system once in a month at least.
 Keep deleting the temporary files over a period of 3 months.

Some Terms
The Threat
The computer systems may become a victim of virus, worm, hacking etc types of
attacks. The computer systems may crash, sensitive data can be stolen and misused
or driver problems may arise in few cases

Who may do it
It is the Hacker: someone who seeks and exploits weaknesses in a computer
system or computer network. They are the malicious programmers. They have
excellent programming skills and design a bug which gets embedded in the pc
and cause it to malfunction.
Types of Infections:
There are many types of infections that may affect a pc performance and
functionality. Some of the major infections are:
Worm: A self-replicating program
 The major difference between a virus and a worm is that worm does not
attach itself to other existing program as viruses do .
 Worms spread across networks due to poor security of the infected
computers.
 This type of infection runs by itself it can have devastating impacts.
 Worm Viruses Include: lovgate.F, sobig.D ,trile. C
Trojan Horses: Allow the hackers to gain remote access of a target system.
 Once a Trojan horse has been installed on a target computer system, the
hacker can access it remotely and perform various operations.
 Trojans can illegally trace important login details of users online
E-Banking is very common among users, therefore, vulnerability of tracing user’s
login details, if the system is infected with Trojan Horse
Malware: stands for malicious software
 Malware is a broad term that refers to a variety of malicious programs.
 Software that can be used to compromise computer functions, steal data,
bypass access controls, or otherwise cause harm to the host computer.
Adware: Advertisement-supported software
 They are generally spread through download of a software from an untrusted
source from Internet
 It is any software package that automatically delivers advertisements
 Common examples of adware include pop-up ads on websites and
advertisements that are displayed by software. Often times software and
applications offer “free” versions that come bundled with adware.
Spyware: The spy inside your PC

 It is program that is put in someone’s computer to secretly gather


information about the user and relay it to advertisers or other interested
parties.
 Spyware can get in a computer as a software virus or as a result of installing
a new program.
Ransomware holds a computer system, or the data it contains, hostage
against its user by demanding a ransom for its restoration.
 It is considered a “scareware” as it forces users to pay a fee (or ransom) by
scaring or intimidating them
 Some ransomware encrypts files called “cryptolocker”.
 Ransomware can be downloaded by the unwitty users through some
websites. They may also arrive as a payload, either dropped or downloaded
by other malware. Some ransomware are delivered as attachments to
spammed email.
Shortcut virus: creates shortcut files everywhere in the pc, results in disk
space consumption.
RootKit :Activated each time your system boots up.
 Difficult to detect because they are activated before your system’s Operating
System has completely booted up.
Email Virus: Virus spread via an email.
 Such a virus hides in an email and the effect is seen when the recipient opens
the mail.
 Examples of email virus’s are the Melissa Virus, and the ILOVEYOU virus.
Browser Hijacker: Changes web browser’s home page and default search
provider to a different one without user’s permission.
 It infects certain browser functions especially in form of re-directing the user
automatically to certain sites.
Browser Hijackers Include sojou.com, ask toolbar, Conduit search
Bots: Sophisticated types of crimeware.
 They are similar to worms and Trojans
 They perform a wide variety of automated tasks on behalf of their master
(the cybercriminals) who are often safely located somewhere far across the
Internet.
Malware Detection
Here are some of the situations that one can use to identify whether the computer
system has been affected by malware or not:
 Increased CPU usage
 Slow computer or web browser speeds
 Frequent freezing or crashing
 Appearance of strange files, programs, or desktop icons
 Programs running, turning off, or reconfiguring themselves
 System not booting up
 Emails/messages being sent automatically and without user’s knowledge

You might also like