Title: Multipartite Viruses
1Multipartite Viruses
2General Information
Activation
Payload
Removal
Transmission
Hidden
3General Information
- A computer virus is defined as a program or piece
of code that is loaded onto your computer without
your knowledge and runs against your wishes. - http//www.webopedia.com/TERM/v/virus.html
4Viral Facts
- Viruses can replicate.
- All computer viruses are manmade.
- Can infect other programs.
- Viruses do not infect plain text files.
- Viruses take up memory after replicating.
- Viruses can not exist without a host.
5Types of Viruses
- Macros
- Worms
- Network and Multipartite viruses
- Trojans and Stealth
- Boot Sector
- File
6Network Viruses
- Infect networks by making extensive use of
network protocols. - Network viruses are able to transfer code to a
remote server or workstation. - Reference http//www.viruslist.com/eng/viruslistbo
oks.html?id24
7Network Virus Facts
- Called an octopus when it has one main segment
that coordinates with what the other segments are
doing. - Can steal password info and send it to a
malicious source.
- Separated into several segments that each run on
a part of the network. - Use automated functions such as email to
replicate. - Use programming built into the macros to spread
themselves.
http//www.kaspersky.com/news.asp?tnews0nview1
id157page0
8Multipartite Viruses
A multipartite virus is defined as a virus that
infects your boot sector as well as files.
9Boot Sector
The area of the hard drive that is accessed when
the computer is first turned on.
Back to Show
10Multipartite Facts
- Can infect floppy disks.
- Hardest virus to clean.
- Are memory resident viruses.
- Harder to spread across networks but isnt
impossible. - To spread across a network, the server must be
infected and an infected program must be accessed.
http//www.faqs.org/faqs/computer-virus/alt-faq/pa
rt1/
11Viral Payload
Payload is defined as the action the virus
performs on the computer.
http//www.antivirus.com/pc-cillin/vinfo/virusenc
yclo/glossary.asppayload
12Possible Payloads
- Hangs the system during rebooting
- Modifies available memory
- Modify available resources
- Corrupts the hard disk
- Create files
- Delete files
- Modify files
- Formats the hard drive
http//www.antivirus.com/pc-cillin/vinfo/virusency
clo/
13Activation or Trigger
- Refers to the condition or date in which the
payload of the virus will occur. - Computer can be infected for months or years
before the payload occurs.
- Holidays are the most popular trigger date.
- http//www.antivirus.com/pc-cillin/vinfo/virusency
clo/glossary.asptrigger_condition_or_date
14Hidden Dangers
- Decrease the size of memory in BIOS, cut the last
MCB (memory control block), and replicate in the
free space left by the MCB - Disguise the virus as part of a downloadable
shareware package
- Interrupting the DOS language just enough to
hook a viral code onto existing language
(hooking) until a floppy disk can be infected. - Hooking on to the debugger.
http//www.virusbtn.com/VirusInformation/natas.htm
l
15From here to there
- Floppy disks
- CD-ROMs
- Shareware
- New software
- Network server
- Email attachments
- Hackers
- Downloading material from the Internet
http//www.cuyamaca.net/rachael.holloway/ppt/virus
.ppt
16Disposal
- Run anti-viral software
- Quarantine the virus (if possible)
- Replace the MBR (master boot record)
- Reboot computer from a clean disk then run
anti-viral software - Reformat the hard drive through DOS
- Costliest method, purchase a new memory chip
17Payload
General Information
Activation
Click Here!
Transmission
Hidden
Removal
18Anthrax
- Writes its viral code to the last sector of the
hard drive while overwriting data there. - Memory resident
- DOS platform
- Infects .COM, .EXE, MBR, and floppy boot sectors
- Multipartite
- Uses 1024 bytes (files) and 512 bytes (MBR)
http//www.symantec.com/avcenter/vinfodb.html
19Clisti 1025 and Clisti 1025 (b)
- No aliases
- Memory resident
- Uses encryption
- Wild (
- Can be transmitted through networks
- Infects .COM, floppy boot sector, hard disk boot
sector - Mainly, transmitted through emails
http//www.symantec.com/avcenter/vinfodb.html
20One Half Boot
- Infects .COM, .EXE, MBR
- Memory resident
- Slowly encrypts the hard drive
- Uses 3155 bytes (files) and 512 bytes (MBR)
- Multipartite, stealthing, and polymorphic
- Transmitted through emails
- All encrypted data is lost when virus is removed
http//www.symantec.com/avcenter/vinfodb.html
21Is your computer a ticking time bomb?