Viruses and other infections

 

Overview of Malicious Software

Malware, or malicious software, is any type of programming intended to cause harm. Viruses, worms, spyware, and Trojan horses are the most common examples of malware. Among other things, a malware infection can: corrupt files, alter or delete data, distribute confidential data, disable hardware, deny legitimate user access, and cause a hard drive to crash. Frequently, malware is also designed to send itself from your e-mail account to all the friends and colleagues in your address book. The results of malware infection include wasted resources, compromised systems, lack of regulatory compliance, lost or stolen data, and the loss of user and client confidence.

 

Common types of malware:

  • Viruses self-replicate within computers and across networks and alter files or data. They usually require some action on the user's part to start, most often just clicking an executable file attachment on an e-mail (although embedded programming in an e-mail message can execute a virus program). Typically, people think that the file came to them from a trusted source or is something they want to see.

  • Worms are a virus variant that can infect a computer without any user interaction. A worm doesn't alter files, but resides in active memory and duplicates itself. Worms use parts of an operating system that are automatic and usually invisible to the user. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks.

  • Trojans are malicious coding hidden in within innocuous programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. A Trojan horse may be widely redistributed along with a virus.

  • Spyware is programming that is put into your computer to secretly gather information and relay it to advertisers or other interested parties. Spyware can get in a computer as a software virus or as the result of installing a new program. Although not malicious in intent, spyware is often installed without your consent and even without your knowledge, as a drive-by download or as the result of clicking some option in a deceptive pop-up window. By the same token, adware, which usually includes spyware components, can also be considered malware.

  • Adware, are files made by publishers that allow them to snoop on your browsing activity, see what you purchase and send you 'pop-up' ads.  They can slow down your PC, cause it to crash, record your credit card numbers and worse.  If you're like most Internet users, chances are you're probably infected with these files.  Simply surfing the Internet, reading email, downloading music or other files can infect your PC without you knowing it.

  • Browser hijackers are programs that alter your computer's browser settings so that you are redirected to Web sites you had no intention of visiting. Most browser hijackers alter default home pages and search pages to those of their customers, who pay for that service because of the traffic it generates. More virulent versions often: add bookmarks for pornographic Web sites to the users own bookmark collection; generate pornographic pop-up windows faster than the user can click them shut; and redirect users to pornographic sites when they inadvertently mistype a URL or enter a URL without the www. preface. Poorly coded browser hijackers -  which, unsurprisingly, are common - may also slow your computer down and cause browser crashes.

Although each type of malware has defining characteristics, the distinctions between them are becoming blurred because blended threats are becoming increasingly common. Blended threats combine characteristics of more than one type of malware to maximize the damage they cause and the speed of contagion

How malware is distributed?
Typically, malware is distributed in one of three methods: by e-mail, either through a virus-laden attachment or code embedded in the message body; in an infected application; or through infected code on a Web site. Originally, removable media - typically a floppy diskette - was the vehicle most malware took to get to your computer, but now the vast majority of malware is distributed electronically. According to various reports, the percentage of viruses currently transmitted by e-mail is from 87-93%. Some frightening Statistics.

A new worrying trend in malware attacks comes in the form of Backdoor Trojan horses on instant messaging packages that allow sharing and access of files etc for example AOL messenger, Msn messenger and Yahoo messenger. People using these facilities are advised to be aware of the need for an extensive firewall, and not to allow access to anything they are requested for through the messenger service.

   

ECCP resources to protect against Malicious Attacks

 

We have put in place several security measures to protect ourselves against malicious attacks and Software. As follows,

 

  • Voluntary code of Practice This is a set of rules defining the rules of the ECCP network, including the rules governing the download of programs, and the sharing of files.

  • Protocol restrictions. The systems are setup so that file and printer sharing is not available on the TCP/IP protocol, only on NETBEUI, which is not routable. Additionally, the local TCP/IP network is the restricted network address 192.168.0.x, which is not available for direct addressing on the web. The router, which does have a real address, runs its own firewall to prevent many attacks.

  • Virus scanner. All machines have Norton Anti virus protection installed. This protection consists of an online Guard which will check any file you open for known Viruses, whether it be on local transportable media such as Diskette or CD, or on a website. Additionally, an email guard will check any email and attachments you receive. Any problems found you will be warned and the file will be quarantined if required. The list of virus's are automatically updated each time you logon. Virus scanners only check files and emails for viruses. They do not prevent other attacks. Additionally, many files, such as text files, and macros in documents may slit through the net as there is no direct executable to indicate a virus. Similarly, it will not prevent you downloading a piece of malicious software that is not a virus. You make that choice.

  • Ad-aware. This software is available on all machines to check for Adware and spyware attacks. Many of these attacks will be direct to the registry or in the form of *.cls or cookie files. We do not have the full version of Adware so we have no automatic guard running. Our copy of this software can only be used to remove attacks that have already taken place.

  • Firewall.  Each machine runs a firewall called Zonealarm. This will inform you of any non-HTTP access you attempt either from your machine or to your machine. You will then be given an option to allow or deny the access attempt.