home - Safety
Computer viruses names and descriptions. What is a computer virus and when did it first appear?

The key word in defining a virus is “malicious.” The same programs that are called the first viruses did not cause any harm to the computer. It was, for example, computer game“Animal”, which consists of guessing animals and has gathered a countless number of fans. The author of the game was tired of endless requests from users to send them this game (and in 1974 this was not an easy task - it was necessary to record the game on magnetic tape and send it by mail). Therefore, he created a subroutine “Pervade”, which independently “traveled” from computer to computer and recorded the game “Animal” in each of them. It is unlikely that at least one computer suffered from this simple “surprise”.




To be able to run code on a system, you only need one of two conditions: either to take advantage of a vulnerability that allows the user, or that the user is executing the program. Hiding, Survival and Propagation: Malware needs to survive on a computer. For this purpose, it usually hides with known methods to make it difficult to detect, to install itself at some point in the system, to survive a reboot and, to a lesser extent, to spread it from the infected computer.

  • Operation and Execution: The malware must run live.
  • This is your basic prerequisite and basic condition for infection.
In the decade of the fifties, Joch von Neumann developed the concept of self-replicating programs, laying the technical foundations of programs and data.

Creeper, which appeared in the early 1970s, was a self-moving demonstration program: when a new copy of Creeper was launched on a new computer, the previous one would stop working. And her job was simply to display the message “I am a Creeper... catch me if you can” on the screen. Later, the Reaper program was written, which also moved from computer to computer and “hunted” for the Creeper, blocking it.

These programs fought with each other, taking up memory space, eliminating the opposite. The techniques used to reproduce programs in memory would lay the foundations for later viruses. This was the first concept of a worm type virus. A small programming error meant that this program was replicated without network-breaking controls, and that another program had to be developed to eliminate it, laying the foundations for the first antivirus. In Apartet you can also see similar programs, purely experimental, that were played on networks.

A little more annoying and similar to a real virus was the “Cookie monster”. This program displayed the phrase “Give me a cookie” on the terminal and blocked it until the operator entered the word “cookie”.

Real pioneer viruses

One of the real first viruses is considered to be Elk Cloner, written by a 15-year-old schoolboy for personal computers Apple II. It also did not affect the operation of the computer, but it could unintentionally damage disks containing a non-standard DOS image and overwrite backup tracks regardless of their contents. After every 50th download, the virus displayed a rhyme on the screen saying that Elk Cloner is a program with a personality that will “get into all your drives, get into all your chips, stick to you like glue, and change your RAM.”

Until this point, the threat had been concentrated on a handful of worms, which, strictly speaking, did not constitute viruses themselves. He was the first to use concealment techniques. Its popularity and usefulness encouraged other programmers, and infection became something relatively normal. Click on the following image to watch the video.

The first damage was caused by Lehi. Equipped with a counter, it rewrote random data onto the floppy disk every four executions. Considering its destructive ability to the system that housed it, it did not achieve excessive popularity. Friday the 13th was the first virus to live in memory. Cascade was the first encrypted virus. This, along with the funds mass media, shows that the press created around the virus threat only fueled the imagination of creators to create more and better computer viruses capable of spreading throughout the world and remaining undetected by these early antivirus prototypes.

Its contemporary, Virus 1,2,3, acted approximately the same way, although it appeared independently of Cloner. Both viruses were created in 1981.
Soon the era began for real harmful viruses, which were “masquerading” as useful programs and destroyed user data. Fred Cohen even wrote an article about file viruses - and this was the first academic study on this topic. It is Cohen who is generally considered to be the author of the term “virus,” although this term was proposed by his supervisor.

In the mid to late nineties, the Internet became popular and the reputation of previous viruses prompted many programmers to create their own virus, which received its fifteen minutes of fame. They found an opportunity in macro viruses that still coexist with traditional floppy disks.

This simple system gave it the opportunity to spread massively and was subsequently imitated by each of the subsequent viruses. They began converting infected systems into proxy servers, zombie computers, to attack other websites or disable certain programs so they would go undetected.

Computer virus- a type of malicious software that can create copies of itself and embed itself in the code of other programs, system memory areas, boot sectors, and also distribute its copies through various communication channels.

They installed themselves in one of the services and began to reproduce without the need to exploit the security issues of the email client or that the user had viewed or opened anything. They did not require human intervention, but only systems with specific port, where they could eavesdrop on a vulnerable server. As a rule, they usually do not need to be installed on an infected HDD, they simply remained in memory.

All this allowed for rapid and endemic expansion on the Internet. Consequently, classical preventative measures were insufficient or useless for these samples, for which the only preventive measure or antidote was a system update or, if this did not exist, a personal firewall that denied access to the systems. problem ports. Until then, there were about a thousand cataloged viruses detected by any antivirus program.

Even if the author of the virus has not programmed harmful effects, the virus can cause computer crashes due to errors and unaccounted for subtleties of interaction with the operating system and other programs. In addition, viruses, as a rule, take up space on storage devices and consume some other system resources.

Its client-server and formula " malware as a service” are triumphant. It is based on the use of a kit that allows you to create a personalized banking Trojan. This new generation of malware responds to characteristics that are significantly different from those of all its predecessors over the previous 20 years.

The spread of new malware variants has literally grown exponentially. Automatic methods are used to obfuscate variants and make it difficult to identify signatures. The current strategy is to use multiple variants instead of a single instance to attract less attention and hinder the antivirus community's ability to respond quickly. Using the Internet as a distribution platform. Economic gain is the only motivation.

  • Over the past 5 years, more malware has been created than in previous years.
  • You are not looking for perfection, but efficiency.
The Kaspersky brand is responsible for discovering much of the malware that defined this movement and demonstrated the power of this new concept.

In everyday life, all malicious software is called “viruses,” although in fact this is only one type of it.

The creation and distribution of malicious programs (including viruses) is prosecuted in Russia according to the Criminal Code of the Russian Federation ().

Only administrators who took the greatest precautions could avoid this threat. This meant perfect secure behavior, the dream of every malware creator. Specific Targets: Another characteristic of this type of malware is that it usually has a single target and prevents it from spreading outside that specific area. The Trojan gained access to the management database. Monitoring and data acquisition systems are important industrial manufacturing programs: they take highly sensitive data from plant sensors, for example, and send it to a central system to be monitored. Thus, it is malware targeting a very different profile of the “average” user. In particular, he attacked a very specific version that was being used in an Iranian nuclear plant and managed to paralyze it. Use of valid certificates and sophisticated cryptography. . All these qualities require large investments in research, programming and concealment.

Encyclopedic YouTube

Subtitles

Story

The foundations of the theory of self-replicating mechanisms were laid by an American of Hungarian origin, John von Neumann, who in 1951 proposed a method for creating such mechanisms. Working examples of such programs have been known since 1961.

Although there has likely never been official confirmation, they suggest that they were not only conceived by an organized mafia like the one that powers the current antivirus industry, but are part of a structure that appears to be affecting high-level areas .

It is a term that has recently emerged and describes advanced and persistent threats against a specific target. With a lot of previous information in your hand, an attacker waits for the exact moment to attack in a very specific way on the equipment you want to infect.

The first known viruses are Virus 1,2,3 and Elk Cloner for the Apple II PC, which appeared in 1981. In the winter of 1984, the first antivirus utilities- CHK4BOMB and BOMBSQAD by Andy Hopkins Andy Hopkins). In early 1985, Guy Wong Gee Wong) wrote the DPROTECT program - the first resident antivirus.

This usually occurs through a custom malware attack that, for example, may combine these characteristics. It is designed to be invisible to the specific security solutions used by the target company. It is sent to what is known as the weakest link in the internal network to launch an infection point. It is sent as a personalized message to infect the first system, and because it knows the internal network, it directly attacks the specific targets it wants. Once you gain control of the internal hardware you need, it remains hidden and remains undetected as long as the attacker deems it necessary to complete their task.

  • For example, less informed or technical users.
  • For example, software repositories.
Given that one of the goals of malware is to optimize infection levels, this is achieved by attacking the majority system used by the vast majority ordinary users, which also coincides with users with a lower technical level, by which the methods can be easily applied. social engineering.

The first viral epidemics date back to -1989: Brain.A (spread in boot sectors floppy disks, caused the largest epidemic), Jerusalem (appeared on Friday May 13, 1988, destroying programs when they were launched), Morris worm (over 6200 computers, most networks were out of order for up to five days), DATACRIME (about 100 thousand infected PCs only in the Netherlands).

Lack of diversification increases security risks and facilitates infections with less code diversification. He included a rudimentary antivirus in his system and changed its publicity. Depending on who visited it, malware was downloaded for a particular system.

Almost all known examples are proof of concept that barely escaped laboratories or closed environments. He exploited the vulnerability in June. If you take advantage of this flaw, an attacker could compromise the system.

At the same time, the main classes of binary viruses took shape: network worms (Morris worm, 1987), Trojan horses (AIDS, 1989), polymorphic viruses (Chameleon, 1990), stealth viruses (Frodo, Whale, 2nd half of 1990).

It was completely harmless and only affected files in the directory where it was executed, without any damage and without self-propagating to other systems. This was written directly in assembly language. It was also a rather primitive proof of concept, not optimized for its distribution, which had no disruptive effect.

In Spain it was so successful that the messages were adapted to Spanish. There are several reasons, but fundamentally Cell phones and tablets are nothing more than computers today, where they perform the same tasks as on a desktop and with permanent connection, in the same circumstances that allowed Internet malware to be hacked. Several factors have been given for this operating system to become the main target of malware.

At the same time, organized movements of both pro- and anti-virus orientation were taking shape: in 1990, a specialized BBS Virus Exchange, “The Little Black Book of Computer Viruses” by Mark Ludwig, and the first commercial antivirus Symantec Norton AntiVirus appeared.

In addition, monolithic viruses are largely giving way to complex malware with separation of roles and auxiliary tools (Trojans, downloaders/droppers, phishing sites, spambots and spiders). Social technologies - spam and phishing - are also flourishing as a means of infection that bypasses software security mechanisms.

The state of mobile malware is in its infancy, but it shows similarities to the beginnings of “traditional” malware. The most popular malware for mobile devices are those that use premium messages to quickly monetize the infection.

The consumer is strongly advised to have their infected computer enter their phone number. Once the attacker controls two devices, he can make transfers. An example of code entered into a browser to infect a phone. Another category would be "spyware" malware, which allows a third party to obtain information about a user's phone or activities.

At the beginning based Trojans, and with the development of p2p network technologies - and independently - the most modern type of viruses - botnet worms - is gaining momentum (Rustock, 2006, about 150 thousand bots; Conficker, 2008-2009, more than 7 million bots; Kraken, 2009, about . 500 thousand bots). Viruses, among other malware, are finally being formalized as a means of cybercrime.

Etymology of the name

The computer virus was named by analogy with biological viruses due to a similar mechanism of spread. Apparently, the word “virus” was first used in relation to a program by Gregory Benford in the science fiction story “The Scarred Man,” published in Venture magazine in May 1970.

The term “computer virus” was subsequently “discovered” and rediscovered more than once. Thus, the variable in the PERVADE() subroutine, the value of which determined whether the ANIMAL program would be distributed across the disk, was called VIRUS. Also, Joe Dellinger called his programs a virus, and this was probably what was first correctly labeled as a virus.

Formal definition

There is no generally accepted definition of a virus. In an academic environment, the term was used by Fred Cohen in his work “Experiments with Computer Viruses,” where he himself attributes the authorship of the term to Len Edleman.

Formally, the virus is defined by Fred Cohen with reference to the Turing machine as follows:

M: (S M , I M , O M: S M x I M > I M , N M: S M x I M > S M , D M: S M x I M > d)

with a given set of states S M, a set of input symbols I M and mappings (O M, N M, D M), which based on its current state s ∈ S M and input character i ∈ I M, read from a semi-infinite tape, determines: the output symbol o ∈ I M to write to tape, the next state of the machine s" ∈ S M and movements along the tape d ∈ (-1,0,1).

For this machine M, sequence of characters v: v i ∈ I M can be considered a virus if and only if the sequence is processed v at a point in time t, entails that at one of the following moments of time t, subsequence v′(not intersecting with v) exists on the tape, and this sequence v′ was recorded M at the point t′, lying between t And t″:

∀ C M ∀ t ∀ j: S M (t) = S M 0 ∧ P M (t) = j ∧ ( C M (t, j) … C M (t, j + |v| - 1)) = v ⇒ ∃ v" ∃ j" ∃ t" ∃ t": t< t" < t" ∧ {j" … j" +|v"|} ∩ {j … j + |v|} = ∅ ∧ { C M (t", j") … C M (t", j" + |v"| - 1)} = v" ∧ P M (t") ∈ { j" … j" + |v"| - 1 }

  • t ∈ N number of basic “movement” operations performed by the machine
  • P M ∈ N position number on the machine belt at a time t
  • S M 0 initial state of the machine
  • C M (t, c) cell contents c at a point in time t

This definition was given in the context of the viral set VS = (M, V)- a pair consisting of a Turing machine M and many character sequences V: v, v" ∈ V. From this definition It follows that the concept of a virus is inextricably linked with its interpretation in a given context, or environment.

It was shown by Fred Cohen that "any self-replicating sequence of symbols: singleton VS, according to which there are an infinite number VS, and not- VS, for which there are machines for which all sequences of characters are a virus, and machines for which no sequence of characters is a virus, makes it possible to understand when any finite sequence of characters is a virus for some machine.” He also provides evidence that in general the question of whether a given pair is (M, X) : X i ∈ I M virus, unsolvable (that is, there is no algorithm that could reliably identify all viruses), by the same means by which the unsolvability of the stopping problem is proven.

Other researchers have proven that there are types of viruses (viruses containing a copy of a program that catches viruses) that cannot be accurately identified by any algorithm.

Classification

Nowadays, there are many varieties of viruses, differing in the main method of distribution and functionality. If initially viruses were distributed on floppy disks and other media, now viruses spreading via the Internet dominate. The functionality of viruses, which they adopt from other types of programs, is also growing.

Does not currently exist unified system classification and naming of viruses (although an attempt to create a standard was made at the CARO meeting in 1991). It is customary to separate viruses:

Via the Internet, local networks and removable media.

Mechanism

Viruses spread by copying their body and ensuring its subsequent execution: introducing themselves into the executable code of other programs, replacing other programs, registering themselves in autorun, and more. A virus or its carrier can be not only programs containing machine code, but also any information containing automatically executed commands - for example, batch files and Microsoft Word and Excel documents containing macros. In addition, to penetrate a computer, a virus can use vulnerabilities in popular software (for example, Adobe Flash, Internet Explorer, Outlook), for which distributors inject it into ordinary data (pictures, texts, etc.) together with an exploit that uses vulnerability.

Channels

  • Floppy disks. The most common channel of infection in the 1980-1990s. Now practically absent due to the emergence of more common and efficient channels and the lack of floppy drives on many modern computers.
  • Flash drives (flash drives). Currently, USB flash drives are replacing floppy disks and repeating their fate - a large number of viruses are spread through removable drives, including digital cameras, digital video cameras, portable digital players, and since the 2000s, mobile phones, especially smartphones, have played an increasingly important role (mobile phones have appeared viruses). The use of this channel was previously primarily due to the ability to create a special file on the drive, autorun.inf, in which you can specify the program that Windows Explorer will launch when opening such a drive. In Windows 7, the ability to autorun files from portable media was disabled.
  • Email . Usually viruses are in letters Email disguised as harmless attachments: pictures, documents, music, links to websites. Some letters may actually only contain links, that is, the letters themselves may not contain malicious code, but if you open such a link, you can get to a specially created website containing virus code. Many email viruses, once on a user's computer, then use the address book from the installed mail clients like Outlook for sending yourself further.
  • Instant messaging systems. It is also common here to send links to supposedly photos, music or programs that are actually viruses via ICQ and other instant messaging programs.
  • Web pages. Infection through Internet pages is also possible due to the presence of various “active” content on World Wide Web pages: scripts, ActiveX components. In this case, vulnerabilities in the software installed on the user’s computer or vulnerabilities in the site owner’s software are used (which is more dangerous, since respectable sites with a large flow of visitors are exposed to infection), and unsuspecting users who access such a site risk infecting their computer .
  • Internet and local networks (worms). Worms are a type of virus that penetrates a victim computer without user intervention. Worms exploit so-called “holes” (vulnerabilities) in software operating systems to penetrate the computer. Vulnerabilities are errors and flaws in software that allow machine code to be downloaded and executed remotely, resulting in a worm virus entering the operating system and, as a rule, begins actions to infect other computers through local network or Internet. Attackers use infected user computers to send spam using code encryption and polymorphism. These techniques are often used together because in order to decrypt the encrypted part of the virus, the decryptor must be left unencrypted, allowing it to be detected by its signature. Therefore, to change the decryptor, polymorphism is used - a modification of the sequence of commands that does not change the actions performed. This is possible thanks to the very diverse and flexible command system of Intel processors, in which the same elementary action, for example, adding two numbers, can be performed by several sequences of commands.

    Prevention and treatment

    IN currently there are many antivirus programs, used to prevent viruses from entering the PC. However, there is no guarantee that they will be able to cope with the latest developments. Therefore, some precautions should be taken, in particular:

    1. Do not work under privileged accounts unless absolutely necessary. ( Account administrator on Windows)
    2. Do not run unfamiliar programs from dubious sources.
    3. Try to block the possibility of unauthorized changes to system files.
    4. Disable potentially dangerous system functionality (for example, autorun media in MS Windows, hiding files, their extensions, etc.).
    5. Do not go to suspicious sites, pay attention to the address in address bar browser.
    6. Use only trusted distributions.
    7. Constantly do backups important data, preferably on media that cannot be erased (for example, BD-R) and have a system image with all the settings for quick deployment.
    8. Perform regular updates to frequently used programs, especially those that ensure system security.


 


Read:



How to set your melody to the desired contact on a Nokia X2 smartphone with two SIM cards

How to set your melody to the desired contact on a Nokia X2 smartphone with two SIM cards

ibnlive.in.com How to set a melody on Nokia Lumia? People ask this question immediately after purchasing a phone. After all, usually, in all modern...

Free programs for Windows download for free

Free programs for Windows download for free

The Microsoft .NET Framework is designed for programs that run on the ".NET" architecture. Its first version was released in 2002 as an analog...

How to burn any ISO image to a USB flash drive

How to burn any ISO image to a USB flash drive

Hello, friends! Today we’ll talk again about creating a bootable USB flash drive. How to create a bootable USB device? For what purposes should it be used...

Calls from unknown numbers

Calls from unknown numbers

Recently in Russia, users have encountered a new type of “spam”, in which the subscriber is constantly called and dropped from unknown...

feed-image RSS