SLIDE 2 2005-10-12 Datavetenskap, Karlstads universitet 2
7
DAV C19 – Applied Security 2005-10-12 Karlstads universitet Datavetenskap
Program Virus
- Infects executable programs on the computer by
appending itself to the code
8
DAV C19 – Applied Security 2005-10-12 Karlstads universitet Datavetenskap
Example: Chernobyl/CIH (1998)
- Destroys flash BIOS
- Makes data on hard drive unreadable
- Was triggered on every 26th of April
– “Logical bomb” functionality
9
DAV C19 – Applied Security 2005-10-12 Karlstads universitet Datavetenskap
Macro Virus
- Set of macro commands for a specific application
which automatically executes and spreads to that applications documents
- Normally spread via Office applications (Visual
Basic macros in Word, Excel, etc)
- Macros are spread via e-mail attachments
1011011 010 10
DAV C19 – Applied Security 2005-10-12 Karlstads universitet Datavetenskap
Auto Executing Macros in Word
1. Command macro
- If a macro stored in a global macro file, or attached to a document,
has the same name as an existing Word command (e.g. “Save file”), the macro is executed whenever a user performs that command
2. Autoexecute
- A macro named “AutoExec” in template “normal.dot” or in global
template in Words startup directory is always executed when Word is started
3. Automacro
- An “automacro” is executed when a specific event occurs, e.g.
- pening a document or quitting Word
11
DAV C19 – Applied Security 2005-10-12 Karlstads universitet Datavetenskap
Example: Concept Virus
- When infected document is opened
– If not already existing, creates the macro “FileSaveAs” in the “NORMAL.DOT” template in Word – Also creates macro that contains message:
- When user chooses “Save As” in
the menu, the macro FileSaveAs always executes
– User cannot specify which drive to save to and cannot specify file type
Sub MAIN REM That's enough to prove my point End Sub 12
DAV C19 – Applied Security 2005-10-12 Karlstads universitet Datavetenskap
Malicious Scripts
- Malicious scripts written in JavaScript, VBScript,
Active X controls, etc.
- Hidden in e-mails or web sites. Can also be part
- f viruses or worms
- Cross-site scripting
vulnerabilities let scripts execute in user’s browser