Types of Virus
Types of Virus
A computer virus is one type of malware that inserts its virus code to multiply
itself by altering the programs and applications. The computer gets infected
through the replication of malicious code. Computer viruses are pieces of
malicious computer coding that can be spread from one device to another. They
didn't necessarily start out with the intent to damage a computer or steal data,
though. Today, they are big business for the people behind them - giving them
access to confidential data and costing individuals and companies who fall victim
millions of dollars.
Viruses, just like viruses that can enter the human body, take on all sorts of shapes
and sizes. A computer virus is a piece of software that can 'infect' a computer,
install itself and copy itself to other computers, without the users knowledge or
permission. It usually attaches itself to other computer programs, data files, or the
boot sector of a Hard drive.
There are thousands of varieties of computer viruses so it's not possible to create an
inclusive list of every virus. But, let's put together a list of the most common types
of viruses and how they function.
3. Browser hijacker
This type of virus “hijacks” certain web browser functions, and you may be
automatically directed to an unintended website.
4. Resident virus
This is a general term for any virus that inserts itself in a computer system’s
memory. A resident virus can execute anytime when an operating system loads. It
is difficult to identify the virus and it is even difficult to remove a resident virus.
The resident viruses are troublesome due to the reason they can run unnoticed by
antivirus and antimalware software by hiding in the system’s RAM.
5. Direct action virus
This type of virus comes into action when you execute a file containing a virus.
Otherwise, it remains dormant. This is also called non-resident virus, it gets
installed or stays hidden in the computer memory. It stays attached to the specific
type of files that it infect. It does not affect the user experience and system’s
performance.
6. Polymorphic virus
A polymorphic virus changes its code each time an infected file is executed. It does
this to evade antivirus programs.
8. Multipartite virus
This kind of virus infects and spreads in multiple ways. It infects both the boot
sector and executable files at the same time.
9. Macro virus
Macro viruses are written in the same macro language used for software
applications. The macro virus disguises itself as coding language in word
processing and spreadsheets. It comes along in things like word processing and
spreadsheet programs and is written in the same macro language those programs
use for their legitimate processes. This virus, embedded in a Microsoft Word
document, for example, will cause the program involved to perform a series of
unintended actions immediately when the program opens. Microsoft quickly
retaliated by adding a new feature in Office 2016. The feature enables security
managers to selectively enable macro use.
10. Overwrite Virus – This type of virus deletes all the files that it infects. The
only possible mechanism to remove is to delete the infected files and the end-user
has to lose all the contents in it. Identifying the overwrite virus is difficult as it
spreads through emails.
11. Spacefiller Virus – This is also called “Cavity Viruses”. This is called so as
they fill up the empty spaces between the code and hence does not cause any
damage to the file.
How to Be safe
Always scan the external devices pen drives,CD’s before opening them
Always scan the attachments which come via mail
Do not download unknown software from internet
Make sure Windows Firewall is enabled while accessing Internet
Use a light weight antivirus software like malware bytes, adwcleaner.
Don’t use very heavy weight antivirus software as they may cause the CPU
slow.
Call the computer engineer if the problem persists.
Run a full scan of the system once in a month at least.
Keep deleting the temporary files over a period of 3 months.
Some Terms
The Threat
The computer systems may become a victim of virus, worm, hacking etc types of
attacks. The computer systems may crash, sensitive data can be stolen and misused
or driver problems may arise in few cases
Who may do it
It is the Hacker: someone who seeks and exploits weaknesses in a computer
system or computer network. They are the malicious programmers. They have
excellent programming skills and design a bug which gets embedded in the pc
and cause it to malfunction.
Types of Infections:
There are many types of infections that may affect a pc performance and
functionality. Some of the major infections are:
Worm: A self-replicating program
The major difference between a virus and a worm is that worm does not
attach itself to other existing program as viruses do .
Worms spread across networks due to poor security of the infected
computers.
This type of infection runs by itself it can have devastating impacts.
Worm Viruses Include: lovgate.F, sobig.D ,trile. C
Trojan Horses: Allow the hackers to gain remote access of a target system.
Once a Trojan horse has been installed on a target computer system, the
hacker can access it remotely and perform various operations.
Trojans can illegally trace important login details of users online
E-Banking is very common among users, therefore, vulnerability of tracing user’s
login details, if the system is infected with Trojan Horse
Malware: stands for malicious software
Malware is a broad term that refers to a variety of malicious programs.
Software that can be used to compromise computer functions, steal data,
bypass access controls, or otherwise cause harm to the host computer.
Adware: Advertisement-supported software
They are generally spread through download of a software from an untrusted
source from Internet
It is any software package that automatically delivers advertisements
Common examples of adware include pop-up ads on websites and
advertisements that are displayed by software. Often times software and
applications offer “free” versions that come bundled with adware.
Spyware: The spy inside your PC