Page 1459 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1459
execute them. For Windows-based systems, the names of these files
end with .exe and .com extensions. The propagation routines of file
infector viruses may slightly alter the code of an executable program,
thereby implanting the technology the virus needs to replicate and
damage the system. In some cases, the virus might actually replace the
entire file with an infected version. Standard file infector viruses that
do not use cloaking techniques such as stealth or encryption (see the
section “Virus Technologies” later in this chapter) are often easily
detected by comparing file characteristics (such as size and
modification date) before and after infection or by comparing hash
values. The section “Antivirus Mechanisms” provides technical details
of these techniques.
A variation of the file infector virus is the companion virus. These
viruses are self-contained executable files that escape detection by
using a filename similar to, but slightly different from, a legitimate
operating system file. They rely on the default filename extensions that
Windows-based operating systems append to commands when
executing program files (.com, .exe, and .bat, in that order). For
example, if you had a program on your hard disk named game.exe, a
companion virus might use the name game.com. If you then open a
Command tool and simply type GAME, the operating system would
execute the virus file, game.com, instead of the file you actually
intended to execute, game.exe. This is a very good reason to avoid
shortcuts and fully specify the name of the file you want to execute.
Macro Viruses Many common software applications implement
some sort of scripting functionality to assist with the automation of
repetitive tasks. These functionalities often use simple, yet powerful
programming languages such as Visual Basic for Applications (VBA).
Although macros do indeed offer great productivity-enhancing
opportunities to computer users, they also expose systems to yet
another avenue of infection—macro viruses.
Macro viruses first appeared on the scene in the mid-1990s, utilizing
crude technologies to infect documents created in the popular
Microsoft Word environment. Although they were relatively
unsophisticated, these viruses spread rapidly because the antivirus
community didn’t anticipate them, and therefore antivirus

