Malware

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 29: Line 29:
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]
-
The most famous example of this type would have to be the [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus]. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document could execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.
+
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document could execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.
=====Hidden=====
=====Hidden=====

Revision as of 22:03, 12 April 2009

Malicious software (malware) encompasses a broad range of software typically designed to covertly operate and deceive users to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally, software such as viruses, worms, spyware, and botnets. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss, or it could have no real purpose at all.

Partial source code from a malware example.

Contents

History

Before computers were accessible to the general public, malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as ARPANET, gaining popularity into the 1980's with the explosion of person computers. Early malware was typically less of a threat, created by programmers who were trying to prank other users, rather than the typical malware created for todays society.

Purpose

There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under.

Obtaining sensitive information

Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting mobile computers, such as smart phones, because of the amount of sensitive information contained within them.

Obtaining financial returns

Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user.

Cause harm or data loss

The most common use of all, malware can be used to cause damage to a computer system in one way or another.

No real purpose

Sometimes malware authors create software that has no intended purpose what so ever.

Types with examples

Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:

Infectious

Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:

The melissa virus falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document could execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.

Hidden

Hidden malware's key feature is its ability to hide itself within a computer system, without the consent or notice to the user.

The Sony BMG CD copy protection scandal revolves around a rootkit, designed by Sony, to interfere with the normal playback of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes.

Deceptive

The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others.

  • Adware
  • Spyware

Prevention

References

See also

External links

Personal tools