Wednesday, November 20, 2013

Look Who's Talking Now



Recently, a computer security researcher from Vancouver, Dragos Ruiu, made a very interesting (and alarming) claim. He had begun to notice a high pitched whine in his house. Originally, he thought it was the result of electrical noise from his home wiring, but soon found a different origin. It seemed that his macbook was transmitting the whine, and so he immediately tried to figure out why and for what.

He realized that ever since he started hearing the whine, his computers had started doing weird things. Not malicious things, but just random running of programs or executions. Ruiu was even more interested when he realized that these things were still happening even when the computer was unplugged and the wi-fi was turned off.

This is all a theory, but given the source (a computer security researcher) and the investigation it has set in motion in the computer security community, this new realm of virus, by using sound to transmit and command, is potentially problematic. This could be a dangerous tool if perfected, allowing incredible secure networks to be more vulnerable.

Are we going to start having to disable our microphones on our phones or computers to prevent these kind of viruses? It seems crazy, but might could be commonplace in just a few years.


source: http://www.newscientist.com/article/dn24582-can-a-computer-virus-communicate-via-your-speakers.html#.UozjJpFTQng
image source: http://www.illustrationsource.com/stock/image/31334/computer-heads-talking-to-each-other/?&results_per_page=1&detail=TRUE&page=10

Tuesday, November 19, 2013

TGIF: Happy Hour Virus

Imagine this. Its Friday afternoon, a beautiful day outside, and you can think of a million other things you would rather be doing than be at work. What can you do to skip out early?

How about create a fake virus?

Say hello to the "Happy Hour Virus". A handy site that will in fact, create a fake technological disaster giving you the excuse to say your computer is on the fritz and you cannot complete your work. How great is this? You can even customize your "virus". Do you want a blue screen panic, simple broken monitor, or an alarming message like the following...


Boom. Work day done.


Sources:
http://laughingsquid.com/happy-hour-virus-a-tool-that-fakes-computer-problems-so-you-can-leave-work-early/
http://newsfeed.time.com/2013/11/15/leave-work-early-today-thanks-to-this-handy-fake-computer-virus/

Friday, November 15, 2013

The Code

This post will elaborate on the topic of computer viruses as tools for cyber attack, such as the case of Stuxnet worm in a previous post. Viruses of the like of Stuxnet are becoming more and more a threat to cyber peace of the world. Developers of these malwares, either an individual, an organization, or even a government, do not seek a massive and random population to attack anymore. The target is of extreme value and well selected. The two incidents below will best help us see this.

"Flame" virus in Iranian government

This virus was detected last year inside Iranian government computers. Iran has long been a target of computer viruses, supposedly released by other countries; however, Flame has been the most complex one ever found. It is "one of the most potent cyber weapons ever spotted" and "marks a new milestone in the escalating digital espionage battle."
It was believed Flame had been in successful operation for at least two years. Flame's resume is impressive: it captures what's
 on the user's screen, turns on microphone to record audio, identifies network users, steals passwords, transfers files to a destined server, and so on.
Many Iranians said Flame was a product of the U.S. or Israel just like Stuxnet or Duqu worm. Maybe. Maybe not. The bigger and more frightening picture is that weaponized virus like Flame is being developed more often, and it can be "reverse-engineered." What it means is that Flame, Stuxnet, Duqu, and their like all carry codes; these codes can be learnt, recreated by targeted countries like Iran, and turned against its attackers. The U.S. government has been called upon to beware of the inevitability of a "code war."



Attack on Saudi Aramco


Saudi Aramco is a Saudi Arabian government-owned exporter of crude oil, the world's largest exporter of crude oil, to be more precise. The virus arrived through email on August 15, 2012 and affected 30,000 computers of Aramco. Soon after the attack, the company's system was shut down and isolated for a period of time for cleansing and avoiding further attacks. On September 10, 2012, the entire system was announced to be back to normal operation.
The attack aimed to disrupt Aramco's oil production, but it failed ultimately. This incident raised serious concerns for future security any how.
Circumstantial evidence was pointing toward Iranian government; however, no conclusion was ever spoken.

Source: http://money.cnn.com/2012/05/30/technology/flame-virus/
            http://www.bloomberg.com/news/2012-12-09/saudi-arabia-says-aramco-cyberattack-came-from-foreign-states.html
            https://www.google.com/search?q=stuxnet&source=lnms&tbm=isch&sa=X&ei=ffaGUqT5DrXC4APk3YDwDg&ved=0CAcQ_AUoAQ&biw=1092&bih=522#q=code+war&tbm=isch&facrc=_&imgdii=_&imgrc=iVVxbNNj2SzzdM%3A%3BG8pFRCwcmFvryM%3Bhttp%253A%252F%252Fflair13.net46.net%252Fimages%252Fcode-war.jpg%3Bhttp%253A%252F%252Fflair13.net46.net%252F%3B2850%3B1900

Wednesday, November 13, 2013

How to Reinstall Your Computer's Windows?

Life can be full of frustration: underpaying jobs, bad grades, struggling relationships, gloomy weather, 20-mph traffic,... The list goes on. The Internet is where we head onto to relax and unwind. However, by just a wrong click at "You've been chosen to win an Ipad, because you're awesome," your computer is infected by virus. And my dear fellows, isn't that just !@#$!

Source: https://www.revolutionarylife.org/wp-content/uploads/2011/01/Punch-Computer21.jpgAdd caption

Now, you are faced with two options: removing the viruses or reinstalling your Windows. Several criteria can be considered to make the decision:

1. Types of damage done: are you looking at just a few evolved copies of a program generated by the virus, or a massive loss of data? Reinstalling Windows is recommended for the latter case.
2. Have you backed up your files? Snap! I got you there, right? Not only you have to back your system up, you have to do it to the most recent date. If you have backed it up, hurray, the freedom to choose either alternative is yours. If you forgot to back up and you cared about your files, you'd have to try your best to remove the virus. If you forgot to back up and you did not care about your files, go right ahead and join the New Windows Club.

Let's look at some of the advantages and disadvantages of each alternative:

Reinstalling OP: you can be certain that all viruses are eliminated afterwards, and it can end up being quite time-saving. On the flip side, this is not the most basic task on a computer, so you may not know how to do it! You need all necessary softwares to perform a good reinstallment of your OS.

Removing virus: you can find virus removal kit online to help when not enough softwares are there to reinstall OS. However, there are many downsides of this selection. The most significant one is you can never be sure your system is completely clean. Your action of removing virus could be actually just a "cute" attempt.

Source: http://www.mediastinger.com/wp-content/uploads/2013/02/Jack-the-Giant-Slayer-after-credits-large.jpg

How to reinstall Windows OS: Windows is the most common OS on computers, and I herein choose Windows 7 to base the instruction on:
1. Control Panel -} Advanced recovery method. This is a recovery tool provided by Microsoft to its authentic Windows products. You will be guided step by step through the reinstallment process. If you didn't use an authentic Windows (no judgement:D), this tool might not work. Sometimes, Windows still doesn't run after Advanced Recovery Method is performed. Either way, you'll then have to take step 2.
2. Formatting the hard disk and reinstalling Windows from installation discs/USB:
a) When computer is on, insert Windows 7 installation disc or USB (make sure you have the product key).
b) Restart computer.
c) When prompted, press any key and follow sequential instructions to get on Install Windows page.
d) On Install Windows page, choose your language -} Next -} Click I accept the license terms -} Next
e) Click Custom for Which type of installation do you want?
f) Click Drive options (advanced) for Where do you want to install Windows?
g) Change the partition you want and select your preferred formatting option; then again, follow instructions.

At this point, you basically have finished the formatting process. Next stage is finishing up installing Windows, which is made very simple through step-by-step instructions, such as naming your computer and creating a starting user account.

If you have read our post up to this point, we want to thank you for your time. Hope this information will have chance to serve you in some way. Any questions, any at all, please do not hesitate to let us know!

Source: http://windows.microsoft.com/en-us/windows7/installing-and-reinstalling-windows-7
             http://www.oit.umn.edu/safe-computing/personal-computer/reinstall-removal/

Sunday, November 10, 2013

Why do people write computer viruses?

Why do people write viruses to begin with? This group has talked about several destructive virus outbreaks, the anatomy and types of viruses, and how to protect yourself... but that still leaves the most fundamental question, why?

But I suppose before we answer the question why we should first ask who it is that writes viruses. Some people may have the impression that it's just teenage kids who are tech savvy and judgment lacking, but that's not really the case.

The truth is that, while that may have been more the case in the beginnings of the internet, nowadays the virus writers of the world are driven by the motivator that seems to drive much of our lives, good and bad… money. Virus writers are increasingly working with those cyber-criminals that are further up on the “hierarchy”, spammers and hackers, in order to reap financial benefits from their work.


Pictured: Spam (if nobody fell for it we wouldn't still see it…)


The spammers are also reaping the rewards from this pairing, due to the fact that their job has become much harder with the implementation of spam blockers and mail filters. The virus writers provide a way for the spammers to be able to have infected computers spread their spam mails without the knowledge of the computer’s owner, and without intervention on the part of the spammer. The Sobig virus was an example of a virus that aided in spamming other computers with email, which allowed it to spread much farther and faster than if it was a lone spammer sending out emails from his computer.

Of course, while the criminal element of virus writing is more prevalent nowadays, as well as the increasing presence of organized crime syndicates in the virus business. There are still plenty of groups of people that just write viruses because they can. These people belong to internet groups and write viruses largely to impress their fellow peers, or just to prove to themselves that they can. They also do it to “make their mark” in the cyber world, much in the same way that a graffiti tagger or a vandal might think that what they’re doing is “making a mark”.

Some of the virus writers that fall into the latter group make the claims that virus writing is a form of artistic expression and that it is protected speech as well. What do you think? Is the computer virus going to become the web’s “street art”? Is there a virus writer that will someday become the Internet’s Banksy?





Saturday, November 9, 2013

Governments and Viruses: the Stuxnet Worm

Governments and Viruses: the Stuxnet Worm

                While many of the computer viruses that circulate through the web can be explained as the work of scammers or lone individuals looking for profit, some viruses are used to by governments to achieve political ends. One virus that is believed to be more than just a random attack on random computers was Stuxnet. The Stuxnet virus was uncovered in 2010 and, while it was by definition just another Internet worm,  it is believed to have had a very specific target, industrial facilities in Iran, and more specifically the virus “could disrupt the centrifuges used to enrich uranium”.


A uranium centrifuge

When Stuxnet was analyzed after being identified, it was found to be a sophisticated and targeted piece of malware that was likely written by one or more nation states for the purposes of targeting the Iranian nuclear program. The worm would infect the systems,the system in this case being an industrial control software by Siemens, and it would also make a note of the name and location of the computer, as well as a time-stamp of when the computer was infected. The analysis discovered that five “industrial processing facilities” in Iran were the computers that ere infected and then spread the virus for the majority of reported Stuxnet infections.

The virus went through numerous variations and had repeatedly infected several of the facilities, with a different variation of the virus in each infection. The virus was found to have been inserted into the system less than 24 hours after being written, and was found in systems that weren't connected to the Internet, thus meaning that the probable method of infection was via USB drive from someone inside the facility.

While some portions of the virus weren't all that advanced, it did exploit several holes in the windows operating system that, before Stuxnet’s discovery, were completely unknown and thus unpatched, and as a whole, was a rather sophisticated piece of malware

This case brings up the questions of whether a government should be able to release a virus geared toward a specific set of goals, or whether computer viruses should be a method of espionage at all. It also raises the question of whether they fully understand what a virus like that could do if one of those systems was connected to the Internet and spread the virus to many corporate systems of that type, thereby possibly crippling some very important industries.



Wednesday, October 30, 2013

Virus-related Terms for Dummies (or college students)


In our tech-savvy world, we all generally like to think that we are in the know about technological innovations, uses, and lingo, but sometimes we get stumped when we really think about what certain things mean or don't mean.

This blog is mainly about viruses, but is it solely about that? Maybe not. It's hard to talk about viruses and not mention other words such as "worms" and "trojan horses," for example. What do these three things mean? I think a lot of us, myself included, might be tempted to say that they are one in the same. Although we might not be too far off, there are a couple specific differences that this blog will address. These definitions and explanations will be good to know, especially as knowing what exactly each term means can allow us to protect ourselves better on the web.

So, here we go:


  • Viruses: The most common, this term is basically describing what we think of when we refer to different malware terms. The easiest way to identify a virus is seeing if it lines up with 2 main criteria, according to the source used for this article (Symantec Corp.):
    1. It must execute itself. It will often place its own code in the path of execution of another program.
    2. It must replicate itself. For example, it may replace other executable files with a copy of the virus infected file. 
An example of this is in the previously blogged about "ILOVEYOU" virus. It executed itself when clicked on, with users thinking they were opening a .txt file, and once it did, it replicated itself by overwriting music and media files. 

  • Trojan Horse: these, explaining their name, are basically impostors. Trojan's disguise themselves as a desirable file, but are in fact very malicious. They contain malicious code that, when triggered, attacks and steals data. 
    • The difference between Trojans and Viruses: unlike viruses, Trojans DO NOT replicate themselves, they just attack when executed, and don't necessarily linger.
  • Worms: often, this term is used interchangeably with the term "Viruses," and the reason is because they aren't extremely different. Worms ARE programs that replicate themselves from system to system. The DIFFERENCE is that they don't technically use a host file, but travel in one that the worms themselves release. 
    • Worms generally travel in commonly used files like Word or Excel, and what they do is they themselves (the worms) release one of these files with the worm already inside it. This file will then travel computer to computer without the knowledge of the infected. 


Was this helpful? Did it clear up any thoughts or questions? Which of the three worry you most? Let us know!

Source:
  • http://www.symantec.com/business/support/index?page=content&id=TECH98539