It seems
like over half the time I am called out on a client site to remove a virus from
someone's computer, I get asked the universal question, "Where do viruses
come from?" Or "Why do viruses
even exist?" I'll explain what I
tell them.
Viruses
don't occur in cyber space naturally like biological viruses do, of
course. A programmer has to create
them. So, we are at fault for all of the
headaches we deal with when trying to prevent or remove viruses infected on our
systems. So why do we do it? Or maybe I should say, "Why do THEY do
it." Here are a few reasons why:
- Identity Theft/Restricted Data Theft
- Bragging Rights
- To Gain Remote Control of Your PC
- To damage organizations or competing business
entities
I'll
explain a bit more in detail.
Identity
Theft/Restricted Data Theft
In this
scenario your computer has been infected with a virus that records information
from your computer and transmits that information back to the virus creator or
host machine. In many cases the virus
doesn't actually seek out data on your computer but rather sits and monitors
your activity on the internet and data you send to the internet like for
example; credit card information, passwords, or personal identity
information. Then the virus transmits
that information to the host computer.
Bragging
Rights
In some
cases viruses are created and distributed purely for the satisfaction of the
programmer that created it. The more
computers that get infected by the particular virus the more sense of
accomplishment the programmer can claim.
Many times these types of viruses don't even pose much of a threat as
much as they cause annoying pop ups or difficulties with using the computer's
operating system.
To Gain
Remote Control of Your PC
In the
case of viruses that provide remote access to your computer, this may not
necessarily be full access to your computer but rather can slave your computer
to the host machine which may send your computer commands to perform actions
that benefit the virus programmer in some way.
Computers that have become infected may assist the host machine by
finding restricted data from the slave computer's local network, or another
action would be to simply send a stream of unnecessary data from the slave
computer to a 3rd party website or network.
In the event that there are hundreds or even thousands of computers
infected and they are all sending junk data to a 3rd party, this causes the 3rd
party site to become flooded and no longer functions normally. So the programmer of the virus may be a
member or a competing organization with the 3rd party and since their virus is
infected on several various unrelated workstations there is virtually no way to
tie the flooding of the website or network to the programmer who created the
virus.
To Damage
Organizations or Competing Business Entities
Now there
are viruses that actually damage your computer or are created to spread from
computer to computer over a network and once in place, they search out the
operating system and corrupt or delete specific files. These types of viruses are usually created by
a programmer with an opposite agenda then the organization the programmer has
infected with the virus. Again the virus
can perform an array of functions but the basic idea is that it disrupts the
organization's function. These kinds of
viruses spread very well over email since most organizations send lots of
emails internally, but in such scenarios this can infect computers even outside
the organization and so individuals who were not even targeted become
collateral damage.
In any
case viruses for the time being are here to stay. At least until we can put a
stop to smart people willing to benefit themselves at the expense of others.
This Paper is relly useful!!!
ReplyDeleteCheck it out guys!