Computer Viruses, their Effects and Preventions

 There are several types of computer viruses, and each can affect your computer differently.

In this article, we are going to talk about various types of computer viruses and the ways they can affect your computer.

Definition of a computer virus

A computer virus is a malicious application or authored code used to perform destructive activity on a device or local network. 

The code’s malicious activity could damage the local file system, steal data, interrupt services, download additional malware, or any other actions coded into the program by the malware author. 

Many viruses pretend to be legitimate programs to trick users into executing them on their devices, delivering the computer virus payload.

Types of Computer Viruses.


Types of Computer Viruses


Every virus has a payload that performs an action. The threat actor can code any malicious activity into the virus payload, including simple, innocuous pranks that don’t do any harm. 

While a few viruses have harmless payloads, most of them cause damage to the system and its data

There are nine main virus types, some of which could be packaged with other malware to increase the chance of infection and damage.

Some of the major types of computer viruses are

  • Boot Sector
  • Web Scripting Virus
  • Browser Hijacker
  • Resident Virus
  • Direct Action Virus
  • Polymorphic Virus
  • File Injector Virus
  • Multipartite Virus
  • Macro Virus
  • Overwrite Virus
  • Space Filler Fills Virus
  • Rootkit Virus
  • Creeper Virus
  • Elk Cloner Virus
  • Code Red Virus
  • Slammer Virus
  • COMM Warrior Virus

Boot Sector Virus

The boot sector virus affects the master boot record, and it is a difficult and tough task to remove the virus and frequently requires the computer to be formatted. It is generally spread through removable disks. 

Your computer drive has a sector solely responsible for pointing to the operating system so that it can boot into the interface. 

A boot sector virus damages or controls the boot sector on the drive, rendering the machine unusable. 

Attackers will usually spread this type of virus using a malicious USB device. The virus is activated when users plug in the USB device and boot their machine.

Web Scripting Virus

Most browsers have defenses against malicious web scripts, but older, unsupported browsers have vulnerabilities that allow an attacker to run code on the local device.

Browser Hijacker Virus

A virus that can change the settings on your browser will hijack browser favorites, the home page URL, and your search preferences and redirect you to a malicious site. 

The site could be a phishing site, or an adware page used to steal data or make money for the attacker.

Resident Virus

A virus that can access computer memory and sit dormant until a payload is delivered is considered a resident virus. This malware may stay dormant until a specific date, or time, or a user performs an action. 

The resident virus is installed on the system, and it is very difficult to find it and eradicate the computer virus from the system. It gets stocked to computer memory and can affect the performance of the system. 

The resident viruses are bothersome due to the reason they can run unnoticed by antivirus software by hiding in the system’s RAM. 

After the original virus is erased, the version saved in memory storage can be enabled. It happens when the computer operating system boots certain applications or functions.

Direct Action Virus

Direct action virus is installed in hidden or retrieved hidden under the computer memory, and it is also called a non-resident virus. 

It acts as a parasitic and is attached to a considerable file that wants to be affected. But it does not disturb the experience of the user and the performance of the system. 

When a user executes a seemingly harmless file attached to malicious code, direct-action viruses deliver a payload immediately. 

These viruses can also remain dormant until a specific action is taken, or a timeframe passes.

Polymorphic Virus

Malware authors can use polymorphic code to change the program’s footprint to avoid detection. Polymorphic viruses make it more difficult for an antivirus to detect and remove them. 

Polymorphic virus alters their signature patterns wherever it gets duplicated, and it is difficult to find the affected process. 

It can convert its attribute into the underlying code without converting the fundamental functions. When a user tends to detect the virus, it can change its modification, and the user can no longer find the presence of a virus.

File Infector Virus

File infector virus spreads through program files and affects the program whenever it is executed as a file type. When the file is loaded, the viruses also load along with it. 

It is also executed whenever the script is loaded. To persist on a system, a threat actor uses file infector viruses to inject malicious code into critical files that run the operating system or important programs. 

When the system boots or the program runs, the virus is activated.

Multipartite Virus

These malicious programs spread across a network or other systems by copying themselves or injecting code into critical computer resources. 

The multipartite virus can be spread in numerous ways and simultaneously affect the computer’s boot system and executable files.

Macro Virus

The macro viruses focus on language commands in Microsoft word. Similar comments are applied to other programs. The macros are keywords that are deployed on sequences for commands. 

The macro viruses are built to add their malicious code to the macro sequence in a word document. Cyber attackers use social engineering to target the user. 

The user can enable macros to load the virus. The word document error is overcome in version Office 2016. It can be accessed for trusted work and blocked if required across the company. 

Microsoft Office files can run macros, and these macros can be used to download additional malware or run malicious code. These macro viruses deliver a payload when the file is opened, and the macro runs.

Overwrite Virus

Overwrite virus deletes the infected file, and it is possible to remove and delete the corrupted files, and the user loses all his sensational data. 

It is mainly spread through emails, and it is mostly designed to damage the file system or an entire application. 

As the name portrays, it affects the system by overwriting the files with its code and damaging the system’s performance. 

On the opposite side, additional files are also executed to affect the other file system and data.

Space Filler Files Virus

Space Filler virus fills the space which occurs between the codes and doesn’t affect the file. It is called a cavity virus.

Rootkit Virus

The rootkit virus is secretly installed as an illegal rootkit on an affected process which opens the gate for hackers and accesses the complete system. 

The hacker can disable or modify the functions. Unlike other viruses, it is designed to surpass antivirus software. The updated version of vital antivirus involves rootkit scanning. 

The boot-record infectors affect the code found in a particular system area on a disk. It is attached to USB and DOS boot or MBR on hard disks. 

But these viruses are not common these days since it relies on physical storage media.

Creeper Virus

Creeper is not a dangerous virus but its self-replication. Once it affects the system, it creates a pop-up message, like catch me if you can.

Elk Cloner Virus

Elk Cloner is a boot virus that attacked the Apple system and leaves a poem that the hacker writes3. ILOVEYOU

ILOVEYOU is a virus that caused huge financial damage. 

The email is disguised as a love letter to anyone in the contact book, and if the user prompts to open it, the virus gets injected into their system. 

This is popular, which affected fifty million systems in just nine days.

Code Red Virus

The Code red virus attacked Microsoft servers and caused many server-related issues as it degraded all the information technology systems. 

Ninda is a window virus that is injected through multiple methods. It is spread via emails, web browsers, attachments, and different means of portable devices.

Slammer Virus

Slammer is an extremely rapid-spreading virus affecting billions of systems in a fraction of a second. 

A single-bit code that corrupts the entire program later is a type of virus that occurs when there is a program error, but the user receives lots of worthless media with a quote, for example 'Bill gates' Stop Making money'. 

Welchia 

This is a type of virus that affects the computer, then deletes itself. It is also known as the 'Nachi worm'. It is designed as what could be called an 'antivirus' virus. 

Welchia virus takes advantage of the vulnerability of the Microsoft remote procedure call (RPC) service similar to the Blaster worm.

COMM Warrior Virus

COMM Warrior is an advanced form of a virus that attacked smartphones through text messages. It is a new variety of viruses in the beginning stage, so the security is made firm to prevent the user data. 

The user has to safeguard his device with a strong firewall and antivirus software to prevent the system from any virus attack. 

The user should cross-check twice before installing a program, clicking on spam emails, downloading a suspicious file, and inserting any hard disk into the system.

How to prevent Computer Viruses

Computer viruses can damage your pc, send sensitive data to attackers, and cause downtime until the system is repaired. 

You can avoid becoming the next computer virus victim by following a few practices.

  • Install Antivirus Software
  • Do not open executable email attachments.
  • Keep your operating system updated.
  • Avoid Questionable Websites.
  • Last but not least, avoid using pirated software. 

Visit our websites for more related content. mamacasharena

Comments

Popular Posts