Computer viruses

Carding

Professional
Messages
2,871
Reaction score
2,467
Points
113
Computer viruses are a type of malicious programs that can be embedded in the code of other applications and reproduced by copying themselves. They are also capable of distributing their copies through various communication channels.

A computer virus is created in order to reduce the functionality of the hardware and software structures of computing devices: delete files, damage data, block the user's work. The impact of infections can be not only destructive but also annoying, as they slow down the operating system, lead to crashes and sudden reboots, and reduce free memory space. The authors of such viruses were often researchers or computer hooligans with no selfish intent.

Users often use the term "computer viruses" to refer to the variety of malicious programs, but this is not entirely true. Nowadays, computer viruses that infect files are very rare - unlike, for example, Trojans or backdoors.

Classification of computer viruses

Computer viruses can be systematized by the platforms they target and for which operating systems they are written (Microsoft Windows, Linux, etc.), as well as by the objects of infection (boot, file, script), by the technologies used, by the programming languages.

Viruses can also be classified according to their mode of action:
  • Rewriters. Such infections write themselves instead of the original program code without changing the file name. As a result, the infected application simply stops working and the malware is executed instead.
  • Parasitic. These viruses inscribe their code anywhere in the executable file. The infected program works in whole or in part.
  • Companion viruses. After self-copying, they rename or move the original file. As a result, the legitimate program works, but only after the virus code has been executed.
  • Link viruses. Such malicious code changes the location of the software to its own. Thus, it forces the operating system to run it without any changes to the code of other applications.
  • Destructive viruses. This can include malicious objects that simply damage the original code of the program or its components in order to disable them.

Object of influence

Any computer can be the target of damage, but most viruses target the Windows platform. New computer viruses capable of replicating and infecting executable files are rare today. The peak of their distribution came at the end of the 90s of the XX century. With the spread of computer networks and the Internet, file viruses began to rapidly lose their relevance, as simpler ways of spreading malicious programs appeared.

Source of threat

There are several main ways of infecting computer systems with file viruses.
1. Removable media. These can be pre-prepared floppy disks, optical disks, USB PayPals. Floppy disks are not relevant today, but mobile phones and smartphones, digital cameras, camcorders and players have joined the ranks of carriers of dangerous information.
2. Through local networks. Once on a file server, a virus spreads quickly to other computers.

Risk analysis

Any user's computer can become a victim of viruses. The damage done ranges from simply slowing down the system to complete failure of the machine and damage to files. Every year there are new types of viruses that can bypass the usual methods of protection. For example, in Russia, a fileless virus was seen interfering with ATMs. This is described in the article "Carders invented a new way to empty ATMs."

To protect computer systems, it is necessary to use antivirus programs and regularly update them, do not download or run programs from unreliable sources, scan removable media for viruses, ignore suspicious letters and messages. It is recommended that you back up important information.
 
We completely clean the system from viruses

Let's get started:

1. Dr. Web CureIt is an excellent tool for treating your PC from viruses and unwanted programs.
2. Malwarebytes is an antivirus program that finds and removes malware very efficiently.
3. ESET this antivirus is best used as the main one. It is paid, but you can easily find merged keys on the Internet.

Also, to improve the effectiveness of the scan, scan the system in safe mode. And to avoid viruses taking over your computer in the future, scan your OS for malware before installing any program.
 
Hello, novice hackers and carders, future cyberstalkers! Hello, random member. Today in the program we have another letter from the alphabet of the shadow-cyberstalker. The letter "B" is a virus.

Computer viruses - special programs that are created by intruders to obtain any benefits. The principle of their operation can be different: they either steal information, or encourage the user to perform some actions for the benefit of intruders, for example, to top up the account or send money.

Today, there are many different viruses. The main ones will be discussed in this article:

Types of computer viruses

Worm – a malicious program that aims to fill your computer with all sorts of garbage in order to make it slow and clumsy. The worm can reproduce itself, but it can't be part of the program. Most often, infection with this virus occurs through emails.

Trojan program (Trojan, Trojan Horse) – this program fully justifies its name. It gets into other programs and hides there until the host program is launched. Before the host program starts, the virus cannot cause any harm. Most often, a Trojan horse is used to delete, modify, or steal data. The Trojan can't reproduce on its own.

Spyware programs - these Shtirlitsy are engaged in collecting information about the user and his actions. Most often, they steal confidential information: passwords, addresses, card/account numbers, etc.

Zombie - this name is given to malicious programs because they actually turn a computer into a" weak-willed " machine that obeys intruders. Simply put, bad people can control someone's computer through these malicious programs. Most often, the user does not even know that his computer is no longer just his own.

Ad blocker program (banner) - these programs block access to the operating system. When you turn on your computer, the user sees a pop-up window that usually accuses them of something: copyright infringement or downloading pirated software. Then there are threats to completely delete all information from your computer. To avoid this, the user must add funds to the account of a specific phone number or send an SMS. Only here, even if the user performs all these operations, the banner with threats will not go anywhere.

Boot viruses - infect the boot sector of the hard drive. Their goal is to significantly slow down the process of loading the operating system. After prolonged exposure to these viruses on your computer, there is a high probability of not loading the operating system at all.

Exploits are special programs that are used by attackers to break into the operating system through its vulnerable, unprotected places. They are used to infiltrate programs that steal information necessary to obtain access rights to the computer.

Pharming is a malicious program that takes control of the user's browser and directs them to fake malicious sites. These parasites get into the "insides" of the browser using Trojans and worms. Only fake sites will be displayed, even if the address was entered correctly.

Phishing – this is the name of actions when an attacker sends emails to his victims. Emails usually contain a request to confirm your personal information: full names, passwords, PIN codes, etc. Thus, a hacker can impersonate another person and, for example, withdraw all the money from their account.

Spyware – programs that send user data to third parties without their knowledge. Spies are engaged in studying the user's behavior and favorite places on the Internet, and then show ads that will definitely be of interest to them.

Rootkits are software tools that allow an attacker to easily get into the victim's software, and then completely hide all traces of their presence.

Polymorphic viruses are viruses that disguise themselves and reincarnate. They can change their own code while they work. Therefore, they are very difficult to detect.

Software virus – a program that attaches itself to other programs and disrupts their operation. Unlike a Trojan, a computer virus can multiply, and unlike a worm, it needs a program to successfully work to which it can "stick".

Thus, we can say that malicious program (Malware) – this is any program that was created to provide access to a computer and the information stored in it without the permission of the owner of this computer itself. The purpose of such actions is to cause harm or steal any information. The term "Malicious program"is generalized for all existing viruses. It is worth remembering that the program that was affected by the virus will no longer work correctly. So you need to delete it and then install it again. (There are still of course methods, but quite hemorrhoid)

In general, friends, I will sum up. Today you will briefly get acquainted with the main types and types of viruses. You may have to save yourself from some of them, and you will use some of them yourself in the future. In any case, this article is useful for all of us.
 
Top