Page 318 - Introduction to Electronic Commerce and Social Commerce
P. 318

10.3  Technical Malware Attack Methods: From Viruses to Denial of Service                       305

           Figure 10.4  How a computer
           virus can spread
































             Worms                                            code. Users are tricked into executing an infected file, where it
                                                              attacks the host, anywhere from inserting pop-up windows to
           Unlike a virus, a worm can replicate itself automatically (as a  damaging the host by deleting files, spreading malware, and so
           “standalone”—without any host or human activation). Worms  forth. The name is derived from the Trojan horse in Greek
           use networks to propagate and infect a computer or handheld  mythology. Legend has it that during the Trojan War, the city
           device and can even spread via instant messages or e-mail. In  of Troy was presented with a large wooden horse as a gift to
           addition, unlike viruses that generally are confined within a  the goddess Athena. The Trojans hauled the horse inside the
           target computer, a worm can infect many devices in a network  city gates. During the night, Greek soldiers who were hiding in
           as well as degrade the network’s performance. According to  the hollow horse opened the gates of Troy and let in the Greek
           Cisco, “worms either exploit a vulnerability on the target sys-  army. The army was able to take the city and win the war.
           tem or use some kind of social engineering to trick users into   Trojans spread only by user interaction (e.g., such as
           executing them.” Because worms spread much more rapidly  opening an under the guise of an e-mail allegedly sent by
           than viruses, they may be more dangerous.          Verizon), and there are many variants of Trojans (e.g., Zeus,
                                                              W32).
           Macro Viruses and Microworms
           A  macro virus (macro worm) is a malware code that is  Example 1: Trojan-Phisher-Rebery
           attached to a data file rather than to an executable program  In 2006, a variant of a Trojan horse program named Trojan-
           (e.g., a Word file). According to Microsoft, macro viruses can  Phisher-Rebery was used to steal tens of thousands of identities
           attack Word files as well as any other application that uses a  from people in 125 different countries. The Rebery malicious
           programming language.  When the document is opened or  software is an example of a banking Trojan, which is pro-
           closed, the virus can spread to other documents on the com-  grammed to create damage when users visit certain online
           puter’s system. For information about Word macro viruses, see  banking or e-commerce sites. For an infographic describing the
           Microsoft Support at support.microsoft.com/kb/187243/en.  state of financial Trojans see Symantec (2014).
           Computer programs that are very similar to viruses are worms
           and Trojan horses.                                 Example 2: The DDOS Attacks on WordPress
                                                              In March 2014, hackers used a botnet to attack more than
           Trojan Horse                                       162,000 WordPress sites. Given that WordPress powers about
           A Trojan horse is a program that seems to be harmless or  17% of the world’s blogging websites, any attack can be
           even looks useful but actually contains a hidden malicious  devastating.
   313   314   315   316   317   318   319   320   321   322   323