MALICIOUS CODE

What Is Malicious Code?

Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. Malicious code is an application security threat that cannot be efficiently controlled by conventional antivirus software alone. Malicious code describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, backdoors and malicious active content.

Malicious code can take the form of:

ü  Java Applets

ü  ActiveX Controls

ü  Scripting languages

ü  Browser plug-ins

ü  Pushed content

Once inside your environment, malicious code can enter network drives and propagate. Malicious code can also cause network and mail server overload by sending email messages; stealing data and passwords; deleting document files, email files or passwords; and even reformatting hard drives.

Malicious Code Threatens Enterprise Security

Malicious code can give a user remote access to a computer. This is known as an application backdoor. Backdoors may be created with malicious intent, to gain access to confidential company or customer information. But they can also be created by a programmer who wants quick access to an application for troubleshooting purposes. They can even be created inadvertently through programming errors. Regardless of their origin, all backdoors and malicious code can become a security threat if they are found and exploited by hackers or unauthorized users. As applications today tend to be built more and more often with reusable components from a variety of sources with varying levels of security, malicious code can pose a significant operational risk to the enterprise. That's why so many enterprises today are turning to Veracode to secure their applications.

How to Avoid Malicious Code

One way to avoid malicious code in your applications is to add static analysis (also called “white-box” testing) to your software development lifecycle to review your code for the presence of malicious code. Veracode’s static code analysis looks at applications in non-runtime environment. This method of security testing has distinct advantages in that it can evaluate both web and non-web applications and, through advanced modeling, can detect malicious code in the software’s inputs and outputs that cannot be seen through other testing methodologies.

Test for Malicious Code With Veracode

Veracode has the ability to detect applications for malicious code threats that include time bombs, hardcoded cryptographic constants and credentials, deliberate information and data leakage, rootkits and anti-debugging techniques. These targeted malicious code threats are hidden in software and mask their presence to evade detection by traditional security technologies. Veracode's detection capabilities provide comprehensive support to combat against backdoors and malicious code.

Veracode Detection Tool Tests for Backdoors, Malicious Code, Functionality, and More

In addition to backdoors and malicious code detection, Veracode finds flaws in software that may lead to vulnerabilities. A Veracode scan may turn up an instance of inadequate authentication, for example, that could possibly be a risk to enterprise security

Types of Virus & Malicious Code and Protective Measures

1.     Computer Virus

A computer virus is a program or a piece of code that is specifically designed to spread from computer systems to another computer and to interfere with computer operation without the knowledge of the victim. A computer virus is a self replicating computer program which can attach itself to other files/programs, and can execute secretly when the host program/file is activated. When the virus is executed, it can perform a number of tasks, such as erasing your files/hard disk, displaying nuisance information, attaching to other files.

 Hackers use these virus codes to corrupt or delete data from the victim's computer or use email to spread to other computers or networks. These viruses often get spread via email attachments or Instant Messaging (IM). Viruses can be disguised as images, audio, software, videos or other attachments. The technique of making a disguise of these viruses and hiding them behind other files is called 'Binding'. As a hacker, you should know what binding is. Binding the virus behind other daily usable files makes normal users unaware of the fact that they are unknowingly triggering the virus and infecting themselves. Some viruses wreak their effects as their codes get executed. Other types of viruses stay dormant until they get a suitable digital environment for execution. There is also another deadly type of viruses which stay dormant during their whole life cycle and keeps sending the victim's information to its owner/creator. Even a simple virus can be dangerous as it will quickly capture the memory and bring the system to a halt. A virus which replicates itself to other computers without being attached to any files is called 'Worms'.

Means of the traversal of virus

ü  Viruses travel through flash drives, CD drives, pen drives, Internet, etc.

ü  Virus code gets replicate when copied by users.

ü  Even documents (like Word, Excel, Notepad) do carry virus when these files get affected

Computer virus life cycle

The life cycle of viruses in general, through four stages:

Ø  dormant phase (Phase Rest / Sleep)

In this phase the virus is not active. The virus is idle. The virus will be activated by certain conditions, such as: the date specified, the presence of another program / execution of other programs. Not all of the virus through this phase.

Ø  Propagation phase (Phase Distribution)

In this phase, the virus will replicate itself to a program or to a place of storage media (both hard drives, RAM). The virus places an identical copy of itself into other programs or into certain system areas on the disk. Every program that is infected will be the result of "cloning" of the virus (depending on how the virus replication).

Ø  Triggering phase (Phase Active)

In this phase the virus becomes active and it is also spurred by several conditions such as in the dormant phase. The Virus is activated to perform the function for which it was intended. Caused by a variety of system events.

Ø  Execution phase (Execution Phase)In this phase of active virus which has been going to perform their functions. Such as deleting files, display messages. The virus function is performed.

Type of virus

ü  Memory-Resident Virus

This type will reside in main system memory. Whenever the operating system executes a file, the virus will infect a file if it is a suitable target, for example, a program file.

ü  Polymorphic Virus

These viruses encrypt themselves differently every time these virus attack host computer. Since they use different encryption algorithm and change their format every time they affect the victim, they became untraceable and difficult by antivirus to detect them using signatures or string searches. Examples are Marburg, satan bug. The virus itself can change form using various polymorphism techniques.

ü  Boot Sector Virus

are a special type of viruses that target the boot sector or master boot record (MBR) of the victim's hard drive or removable flash drives This type will infect the system area of a disk, when the disk is accessed initially or booted.

ü  Stealth Virus

A virus which uses various stealth techniques in order to hide itself from detection by anti-virus software.

ü  Macro Virus

Unlike other virus types, these viruses attack data files instead of executable files. This infect those files that are created using some programs that contain some macros within .doc, .ppt, .mdb, etc. This virus automatically detects the macros and templates within a file and infect them in the host's computer and hides the document or shared it through email. Examples of such types are: Melissa.A, relax, bablas. Unlike other virus types, these viruses attack data files instead of executable files.

Macro viruses are particularly common due to the fact that:

Ø  They attach to documents and files, which are platform independent.

Ø  The document is sent to other computers by, for example, email or file exchange. Recipients are receiving the infected document from a "trusted" sender.

 

 

 

 

 

ü  Memory Resident Virus

This fix them inside the host computer's memory and gets activated every time the OS runs and infects those files that are opened for use. These viruses usually hide in RAM (Random Access Memory). Examples are meve, randex,

How to prevent computer virus

a)     Keep your computer up to date:  We encourage our clients to enable automatic updates on their Windows computers in addition to running updates for programs such as Adobe and Java.  Many of these updates include security patches that will fill security holes in the Windows system.  We know that updates are a bit of a pain.  They always seem to come up at the wrong time.  Just when you are about to leave the coffee shop, it has to update.  We understand the inconvenience.  Just remember that it’s even more inconvenient to get a virus on your computer.

 

b)     Don’t use Internet Explorer:  We live in an exciting time.  We have so many browsers to choose from.  Whether you prefer Chrome, Firefox or Opera, they will all be safer than Internet Explorer.  While the newer versions of Internet Explorer are an improvement over the past versions, they are still a far cry from the quality of Chrome or Firefox.

 

c)     Back up your computer:  This should be obvious, but it’s not obvious to everyone.  If you have a quality backup strategy, a virus will not be as much of a problem for you.  There are times when a virus removal will cause damage to the operating system.  At these times, we might suggest a re-install of the operating system.  If you have your data backed up, it makes the process quicker and more affordable.

 

d)     Anti-virus basics:  It’s important to have a quality anti-virus installed on your Windows computer.  While a good anti-virus is important, having more than one is a very bad idea.  Anti-virus applications are only effective when they have up-to-date definitions of what a virus is.  For this reason, be sure your anti-virus program updates automatically and at a reasonable time (not 3am on Wednesday nights…. not likely that your computer will be turned on during that time).

 

e)     Avoid suspicious web sites:  There are over a trillion web pages out there right now.  We spend lots of time ‘researching’ information on the web.  Be careful.  Sometimes it’s impossible to know whether a photo will contain malicious content.  Be sure to notice the url of the web site.  For example: microsoft.tisur.com is not microsoft.com.

 

f)      Always scan email attachments:  Some people send viruses to their friends and not even know that they did it.  At Altitude Integrations, we encounter many situations where our clients have had their email accounts hacked.  Once hacked, the hacker will sometimes use that account to send malicious content to the entire address book list.

 

g)     Use a malware scanner:  Malware scanners are different than anti-virus programs.  Many of these applications are free to use.  Just like anti-virus, it’s recommended that you schedule the scans to happen weekly.

2.     Worms

A worm is a self-replicating program that does not need to attach to a host program/file. Unlike viruses, worms can execute themselves. Worms have the ability to spread over a network and can initiate massive and destructive attacks in a short period of time. Worms have been around even longer than computer viruses, all the way back to mainframe days. Email brought them into fashion in the late 1990s, and for nearly a decade, computer security pros were besieged by malicious worms that arrived as message attachments. One person would open a wormed email and the entire company would be infected in short order. The distinctive trait of the worm is that it's self-replicating. When it went off, it hit nearly every email user in the world, overloaded phone systems (with fraudulently sent texts), brought down  networks, and even delayed my daily afternoon paper for half a day. Several other worms, including SQL Slammer and MS Blaster, ensured the worm's place in computer security history. What makes an effective worm so devastating is its ability to spread without end-user action. Viruses, by contrast, require that an end-user at least kick it off, before it can try to infect other innocent files and users. Worms exploit other files and programs to do the dirty work. For example, the SQL Slammer worm used a (patched) vulnerability in Microsoft SQL to incur buffer overflows on nearly every unpatched SQL server connected to the internet in about 10 minutes, a speed record that still stands today.

One typical example of a massive attack is the "SQL Sapphire Slammer (Sapphire)" that occurred on 25 January 2003. The Sapphire exploited an MS SQL Server or MSDE 2000 database engine vulnerability. The weakness lays in an underlying indexing service that Microsoft had released a patch in 2002. It doubled in size every 8.5 seconds, and infected more than 90 percent of vulnerable hosts within 10 minutes. It eventually infected at least 75,000 hosts and caused network outages that resulted in:

Symptoms of a Computer Worm

ü  Slow computer performance

ü  Freezing/crashing

ü  Programs opening and running automatically

ü  Irregular web browser performance

ü  Unusual computer behavior (messages, images, sounds, etc)

ü  Firewall warnings

ü  Missing/modified files

ü  Appearance of strange/unintended desktop files or icons

ü  Operating system errors and system error messages

ü  Emails sent to contacts without the user’s knowledge

While other issues can cause these symptoms, the appearance of multiple symptoms from this list or the repeated occurrence of certain symptoms usually indicates that the computer has been infected with a worm

Protecting yourself from Computer Worms

       i.          Update your operating system, browsers, and plugins. If there’s an update to your computer waiting in queue, don’t let it linger. Updates to operating systems, browsers, and plugins are often released to patch any security vulnerabilities discovered. So while you leave those programs alone, cybercriminals can find their way in through the vulnerabilities. To protect against security flaws in mobile phones, be sure your mobile phone software is updated regularly. Don’t ignore those “New software update” pop-ups, even if your storage is full or your battery is low.

     ii.          Avoid opening emails that you don’t recognize or expect, as many computer worms spread via email.

   iii.          Refrain from opening attachments and clicking on links from untrusted/unfamiliar sources.

   iv.          Run a firewall and antivirus software to be further protected from computer worms. Software firewalls will keep the computer protected from unauthorized access. Choose an antivirus program that includes download scanning functionality (to detect malicious content in email and web downloads) as well as malware removal tools.

 

3.     Trojan Horses

A Trojan is also known as Trojan horse. It is a type of malicious software developed by hackers to disguise as legitimate software to gain access to target users' systems. Users are typically tricked by some attractive social media adds who then directed to malicious website thereby loading and executing Trojans on their systems. Cyber-criminals use Trojans to spy on the victim user, gain illegal access to the system to extract sensitive data. These actions can include: deletes data, copies data, modifies data, blocks data

Disrupts the performance of the target computers or networks

A Trojan horse is a non-replicating program that appears legitimate, but actually performs malicious and illicit activities when executed. Attackers use Trojan horses to steal a user's password information, or they may simply destroy programs or data on the hard disk. A Trojan horse is hard to detect as it is designed to conceal its presence by performing its functions properly.. Trojans masquerade as legitimate programs, but they contain malicious instructions. They've been around forever, even longer than computer viruses, but have taken hold of current computers more than any other type of malware.

A Trojan must be executed by its victim to do its work. Trojans usually arrive via email or are pushed on users when they visit infected websites. The most popular Trojan type is the fake antivirus program, which pops up and claims you're infected, then instructs you to run a program to clean your PC. Users swallow the bait and the Trojan takes root.

Trojans are hard to defend against for two reasons: They're easy to write (cyber criminals routinely produce and hawk Trojan-building kits) and spread by tricking end-users which a patch, firewall, and other traditional defense cannot stop. Malware writers pump out Trojans by the millions each month. Antimalware vendors try their best to fight Trojans, but there are too many signatures to keep up with.

Some recent examples are:

ü  Trojan horses embedded into online game plug-ins which will help online gamer to advance their game characters; however, the online game account and password are also stolen. The gamer's cyber assets are therefore stolen.

ü  Trojan horses are embedded into popular commercial packages and uploaded to network websites for free download or to be shared across peer-to-peer download networks.

Trojan horses are particularly dangerous due to the fact that they can also open a back door into a system and allow an attacker install further malicious programs on your computer. Back Orifice and SubSeven are two well-known remote access Trojan horses that allow attackers to take control of a victim's computer.

TYPES OF TROJAN

a.      Trojan-Downloader: is a type of virus that downloads and installs other malware.

b.     Trojan-Droppers are complex programs used by cyber criminals to install malware. Most antivirus programs do not detect droppers as malicious, and hence it is used to install viruses.

c.      Ransomware - It is a type of Trojan (Trojan - ransom) that can encrypt the data on your computer/device. The cyber criminals who control this ransomware would demand a ransom for providing the decryption key. It is very difficult to recover the data without the decryption key.

d.     Trojan-Banker malware programs steal account-related information related to card payments and online banking.

e.      Trojan-Rootkits prevent detection of malware and malicious activities on the computer. These are sophisticated malware that provides control of the victim's device. Rootkits are also used to enroll the victim's device as part of a botnet.

f.      Trojan-Backdoor is a popular type of Trojan. It creates a backdoor to allow cyber criminals to access the computer later on from remote using a remote access tool (RAT). As this Trojan provides complete control over the computer, it is a dangerous but commonly used Trojan.

HOW DO TROJANS HORSE VIRUS INFECT THE SYSTEM

       i.          Backdoor

A backdoor Trojan gives the hackers malicious access to take remote control over the infected computer. They entitle the malicious hacker to work on the infected computer as per the malicious intentions. They can send, receive, delete and launch files, display data and reboot the computer. Backdoor Trojans are mostly used by hackers to exploit a group of infected computers to form a zombie network or malicious botnet that can be used for criminal purposes.

 

     ii.          Exploit

Exploit is a type of Trojan that contains a malicious code or data to attack a vulnerable software or application that runs on an infected computer.

   iii.          Rootkits

Rootkits are developed by malware authors to gain access to the victim’s system, while they conceal their presence or their malicious activities from being detected to extend their presence to run and execute on the infected computer.

   iv.          Trojan-Banker

This is a type of trojan developed to extract user's account data, debit or credit card data through online banking systems, e-payment gateway.

     v.          Trojan-DDoS

These programs are developed to perform Denial of Service (DOS) attacks so as to infect the victim's web address. the malware program sends multiple from the victim's infected computer and forms a network with several other infected computers –to strongly enforce an attack against the target address causing a denial of service.

   vi.          Trojan-Downloader

Trojan-Downloaders as the name suggests, it is developed by hackers to download and install new versions of malicious programs onto the target victim's computer.

  vii.          Trojan-Dropper

These programs are developed by malware authors to install Trojans/viruses and escape the detection of malicious programs. Most of the traditional antivirus programs are inefficient to scan all the components this Trojan.

viii.          Trojan-FakeAV

Trojan-FakeAV programs pretend to operate like an antivirus software. They are developed by cyber thieves to obtain money from the target user – in return, in order to detect and remove threats, despite the threats that they report are non-existent in real-time.

   ix.          Trojan-GameThief

The main targets for Trojan-Game Thief are online gamers and their prime motive is to steal the user account information.

     x.          Trojan-IM

Trojan-IM programs primarily extract users' logins and passwords of Skype, Facebook Messenger, ICQ, MSN Messenger, Yahoo Pager, AOL, and many more.

   xi.          Trojan-Ransom

Trojan-Ransom is developed to alter data on the victim's computer – so that the system doesn’t perform its function correctly and also it does not let the user, use certain data. The criminal would demand a ransom to be paid by the victim to unblock the restricted access to the data and restore the computer’s performance.

 

 

  xii.          Trojan-SMS

Trojan-SMS programs send text messages from the victim's mobile device to other phone numbers.

xiii.          Trojan-Spy

Trojan-Spy programs, as the name suggests, can spy on how the victim is using the computer – for example, tracking data, taking screen shots or extracting a list of running applications.

xiv.          Trojan-Mailfinder

These programs are developed by hackers to extract email addresses from the victim's computer.

ways to prevent Trojan infection

 

v Remove software you don’t use (especially legacy programs). So, you’re still running Windows XP or Windows 7/8.1? Microsoft discontinued releasing software patches for Windows XP in 2015, and Windows 8 and 10 are only under extended support. Using them without support or the ability to patch will leave you wide open to exploit attacks. Take a look at other legacy apps on your computer, such as Adobe Reader or older versions of media players. If you’re not using them, best to remove.

 

v Read emails with an eagle eye. Phishing is a cybercrime mainstay, and it’s successful only when readers don’t pay attention or know what to look for. Check the sender’s address. Is it from the actual company he or she claims? Hover over links provided in the body of the email. Is the URL legit? Read the language of the email carefully. Are there weird line breaks? Awkwardly-constructed sentences that sound foreign? And finally, know the typical methods of communication for important organizations. For example, the IRS will never contact you via email. When in doubt, call your healthcare, bank, or other potentially-spoofed organization directly. Cybercriminals love spoofing banks via SMS/text message or fake bank apps. Do not confirm personal data via text, especially social security numbers. Again, when in doubt, contact your bank directly.

 

v Do not call fake tech support numbers. there tech support scams. The bane of our existence. These often involve pop-ups from fake companies offering to help you with a malware infection. How do you know if they’re fake? A real security company would never market to you via pop-up saying they believe your computer is infected. They would especially not serve up a (bogus) 1-800 number and charge money to fix it. If you have security software that detects malware, it will show such a detection in your scan, and it will not encourage you to call and shell out money to remove the infection. That’s a scam trying to infect you. Don’t take the bait.

 

v Do not believe the cold callers. On the flip side, there are those who may pick up the phone and try to bamboozle you the good old-fashioned way. Tech support scammers love to call up and pretend to be from Microsoft. They’ve detected an infection, they say. Don’t believe it. Others may claim to have found credit card fraud or a loan overdue. Ask questions if something feels sketchy. Does the person have info on you that seems outdated, such as old addresses or maiden names? Don’t confirm or update the info provided by these callers. Ask about where that person is calling from, if you can call back, and then hang up and check in with credit agencies, loan companies, and banks directly to be sure there isn’t a problem. You can block calls until pigs fly, but there will always be a scammer ready with a new number (especially one that looks similar in area code and first three digits to yours). Many cybersecurity programs for Android and iPhone can put the bulk of those calls to rest, meaning an unidentified number needn’t stress you out as much. Of course, when in doubt, screen your calls.

Practice safe browsing

There’s such a thing as good Internet hygiene. These are the things you should be doing to protect against external and internal threats, whether you’ve lost your device and need to retrieve it or want to stay protected when you shop online.

“While many of the threats you hear about on the news make it seem like there is no way to protect yourself online these days, the reality is that by following some basic tips and maintaining good habits while online, you will evade infection from over 95 percent of the attacks targeting you,” says Adam Kujawa, Head of Intelligence for Malwarebytes. “For that last 5 percent, read articles, keep up with what the actual security people are saying, and follow their advice to protect yourself.”

v Use strong passwords and/or password managers. A strong password is unique, is not written down anywhere, is changed often, and isn’t tied to easily found personal information, like a birthday. It’s also not repeated for different logins. Admittedly, that’s a tough cookie to chew on. If you don’t want to worry about remembering 5,462 different rotating passwords, you may want to look into a password manager, which collects, remembers, and encrypts passwords for your computer.

v Make sure you’re on a secure connection. Look for the proper padlock icon to the left of the URL. If it’s there, then that means the information passed between a website’s server and your browser remains private. In addition, the URL should read “https” and not just “http.”

v Log out of websites after you’re done. Did you log into your healthcare provider’s site using your super-strong password? You could still be leaving yourself vulnerable if you don’t log out, especially if you’re using a public computer. It’s not enough to just close the browser tab or window. A person with enough technical prowess could access login information from session cookies and sign into a site as you.

 

v Use firewall, anti-malware, anti-ransomware, and anti-exploit technology. Your firewall can detect and block some of the known bad guys. Meanwhile, Malwarebytes products use multiple layers of tech to fend off sophisticated attacks from unknown agents, stopping malware and ransomware infection in real time and shielding vulnerable programs from exploit attack.

 

Generally malicious code is the kind of harmful computer code or web script designed to create system vulnerabilities leading to back doors, security breaches, information and data theft, and other potential damages to files and computing systems. It's a type of threat that may not be blocked by antivirus software on its own. According to Kaspersky Lab, not all antivirus protection can treat certain infections caused by malicious code, which is different from malware. Malware specifically refers to malicious software, but malicious code includes website scripts that can exploit vulnerabilities in order to upload malware.

It is an auto-executable application that can activate itself and take on various forms, including Java Applets, ActiveX controls, pushed content, plug-ins, scripting languages or other programming languages that are designed to enhance Web pages and email.

The code gives a cybercriminal unauthorized remote access to the attacked system  called an application back door  which then exposes sensitive company data. By unleashing it, cybercriminals can even wipe out a computer's data or install spyware. These threats can reach a

 

Post a Comment

Previous Post Next Post