Different Types of Computer Virus
What Is a Computer Virus?
Definition:
A computer virus is a malicious application or authored code
used to perform destructive activity on a device or local network. The code’s
malicious activity could damage the local file system, steal data, interrupt
services, download additional malware, or any other actions coded into the
program by the malware author. Many viruses pretend to be legitimate programs to
trick users into executing them on their device, delivering the computer virus
payload.
Types of Computer Viruses:
Every virus has a payload that performs an action. The
threat actor can code any malicious activity into the virus payload, including
simple, innocuous pranks that don’t do any harm. While a few viruses have
harmless payloads, most of them cause damage to the system and its data. There
are nine main virus types, some of which could be packaged with other malware
to increase the chance of infection and damage. The nine major categories for
viruses are:
1.
Boot Sector Virus:
Your computer drive has a sector solely
responsible for pointing to the operating system so that it can boot into the
interface. A boot sector virus damages or controls the boot sector on the
drive, rendering the machine unusable. Attackers will usually spread this virus
type using a malicious USB device. The virus is activated when users plug in
the USB device and boot their machine.
2.
Web Scripting Virus:
Most browsers have defences against
malicious web scripts, but older, unsupported browsers have vulnerabilities
that allow an attacker to run code on the local device.
3.
Browser Hijacker:
A virus that can change the settings on
your browser will hijack browser favourites, the home page URL, and your search
preferences and redirect you to a malicious site. The site could be a phishing
site or an adware page used to steal data or make money for the attacker.
4.
Resident Virus:
A virus that can access computer memory and
sit dormant until a payload is delivered is considered a resident virus. This
malware may stay dormant until a specific date, time, or a user performs an
action.
5.
Direct Action Virus:
When a user executes a seemingly harmless
file attached with malicious code, direct action viruses deliver a payload
immediately. These viruses can also remain dormant until a specific action is
taken or a timeframe passes.
6.
Polymorphic Virus:
Malware authors can use polymorphic code to
change the program’s footprint to avoid detection. Polymorphic viruses make it
more difficult for an antivirus to detect and remove them.
7.
File Infector Virus:
To persist on a system, a threat actor uses
file infector viruses to inject malicious code into critical files that run the
operating system or important programs. When the system boots or the program
runs, the virus is activated.
8.
Multipartite Virus:
These malicious programs spread across a
network or other systems by copying themselves or injecting code into critical
computer resources.
9.
Macro Virus:
Microsoft Office files can run macros, and
these macros can be used to download additional malware or run malicious code.
Macro viruses deliver a payload when the file is opened, and the macro runs.
Comments
Post a Comment