Page 1459 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1459

execute them. For Windows-based systems, the names of these files

               end with .exe and .com extensions. The propagation routines of file
               infector viruses may slightly alter the code of an executable program,
               thereby implanting the technology the virus needs to replicate and
               damage the system. In some cases, the virus might actually replace the
               entire file with an infected version. Standard file infector viruses that
               do not use cloaking techniques such as stealth or encryption (see the
               section “Virus Technologies” later in this chapter) are often easily

               detected by comparing file characteristics (such as size and
               modification date) before and after infection or by comparing hash
               values. The section “Antivirus Mechanisms” provides technical details
               of these techniques.

               A variation of the file infector virus is the companion virus. These
               viruses are self-contained executable files that escape detection by
               using a filename similar to, but slightly different from, a legitimate
               operating system file. They rely on the default filename extensions that

               Windows-based operating systems append to commands when
               executing program files (.com, .exe, and .bat, in that order). For
               example, if you had a program on your hard disk named game.exe, a
               companion virus might use the name game.com. If you then open a
               Command tool and simply type GAME, the operating system would

               execute the virus file, game.com, instead of the file you actually
               intended to execute, game.exe. This is a very good reason to avoid
               shortcuts and fully specify the name of the file you want to execute.

               Macro Viruses Many common software applications implement
               some sort of scripting functionality to assist with the automation of
               repetitive tasks. These functionalities often use simple, yet powerful
               programming languages such as Visual Basic for Applications (VBA).

               Although macros do indeed offer great productivity-enhancing
               opportunities to computer users, they also expose systems to yet
               another avenue of infection—macro viruses.

               Macro viruses first appeared on the scene in the mid-1990s, utilizing
               crude technologies to infect documents created in the popular
               Microsoft Word environment. Although they were relatively
               unsophisticated, these viruses spread rapidly because the antivirus

               community didn’t anticipate them, and therefore antivirus
   1454   1455   1456   1457   1458   1459   1460   1461   1462   1463   1464