Preview

Summary Report on a Malicious Code Attack: The CiH Virus

Satisfactory Essays
Open Document
Open Document
418 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Summary Report on a Malicious Code Attack: The CiH Virus
Summary Report on a Malicious Code Attack: The CiH Virus

CiH Virus Summary
Description of CIH Virus
The CIH Virus, also known as the Chernobyl Virus, was directed towards Microsoft Windows platforms. It became known as the Chernobyl Virus because the triggered payload date is April 26th, the same date as the Chernobyl disaster (this is purely coincidental). The name of the virus is derived from the virus’s creator, Chen Ing-Hau.
Payload is defined as the malicious activity that is a result of the activation of a computer virus. The CIH virus was designed to overwrite the machine’s BIOS program code, while still leaving it fully intact. The BIOS code is fundamental because it directly accesses hardware to test system memory and disk drives whenever the computer is booted. This is how the local disk is able to load the operating system at boot, and generally most [newer Windows OSs] will store the BIOS on write-able RAM memory to allow updates when available – hence a more secure network. CIH also disabled Font Removal and created conflict problems in the computer’s TCP/IP protocol.
What the CIH virus did was temporarily disable the BIOS’s functionality. Without the BIOS initiated, a Windows machine simply will not boot. Users would try and reboot the machine from an .iso file placed on a floppy disk/CD/DVD/flash drive/etc. however once the damage is done, it can’t be reversed because the computer is designed to revert to the original BIOS code on the computer, not the correct BIOS from the outside source.
Users with advanced knowledge could take the BIOS chip from an identical second machine and switch them to fix the problem, however this takes extreme precision – the BIOS chip is physically soldered to the motherboard, and one mistake could render it unusable.
Originally, CIH affected the following Microsoft Operating Systems – Windows 95, Windows 98, and Windows ME. Over time, CIH also affected Windows NT, Windows 2000, XP, and Vista. In particular, XP

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Once the attacker had the administrator access the systems he/she was able to create BOTs and push to many student PCs located in various labs. The attacker then initiate a control attack by activating the BOT 's in order to form a BotNet (a.k.a. Zombie Network) with the goal of intentionally causing online services to become unusable to students (ICECC, 2009).…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 4

    • 804 Words
    • 4 Pages

    1. What test does startup BIOS perform when you first turn on a computer to verify it can…

    • 804 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    week2 lab#4

    • 258 Words
    • 2 Pages

    5. MS04-022: Microsoft Windows Task Scheduler Remote Overflow (841873), MS04-012: Cumulative Update for Microsoft RPC/DCOM (828741), MS03-043: Buffer Overrun in Messenger Service (828035), MS06-035: Vulnerability in Server Service Could Allow Remote Code Execution (917159), MS06-040: Vulnerability in Server Service Could Allow Remote Code Execution (921883), MS09-001: Microsoft Windows SMB Vulnerabilities Remote Code Execution (958687), MS03-039: Microsoft RPC Interface Buffer Overrun (824146), MS04-011: Security Update for Microsoft Windows (835732), MS04-007: ASN.1 Vulnerability Could Allow Code Execution (828028), MS05-027: Vulnerability in SMB Could Allow Remote Code Execution (896422), MS05-043: Vulnerability in Printer Spooler Service Could Allow Remote Code Execution (896423), MS03-026: Microsoft RPC Interface Buffer Overrun (823980), MS08-067: Microsoft Windows Server Service Crafted RPC Request Handling Remote Code Execution (958644), MS02-045: Microsoft Windows SMB Protocol SMB_COM_TRANSACTION Packet Remote Overflow DoS (326830), MS08-067 is a security vulnerability that allows an attacker to take advantage of an exploit that allows a computer worm to remotely run code without user intervention. (Zero day exploit). The patch titled kb958644 fixes the vulnerability.…

    • 258 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft® Windows…

    • 454 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Unit 2 Assignment 2

    • 340 Words
    • 2 Pages

    975497 CVE-2009-3103: Vulnerabilities in SMB could allow remote code execution. Windows Vista Service Pack 1 and 2…

    • 340 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    These threats have changed the face of Internet security. These vulnerabilities allow attackers to install malicious files on a vulnerable computer when a user visits a website hosting an exploit. To carry out this attack, an attacker must exploit an arbitrary vulnerability that bypasses Internet Explorer security settings. The attacker can then execute malicious files installed by the initial security weakness. Also, an attacker can exploit this vulnerability by enticing a victim to open a malicious Web page. A…

    • 347 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a computer or system without the owner’s knowledge or consent. There are much exploitation of vulnerabilities, like viruses, worms, Trojan horses, spyware, adware, and rootkits. Malicious code describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, backdoors, and malicious active content. Malicious code is an application security threat that cannot be efficiently controlled by conventional antivirus software alone. Malicious code can either activate itself or activate after a user perform an action, such as clicking on something or opening an email attachment.…

    • 735 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Bot-infected computers - Bots allow for a wide range of functionality and most can be updated to assume increased functionality by downloading new code and features. Attackers can use bots to perform a variety of tasks, such as setting up denial-of-service (DoS) attacks against an organization’s website, distributing spam and phishing attacks, distributing spyware and adware, propagating malicious code, and harvesting confidential information that may be used in identity theft from compromised computers—all of which can lead to serious financial and legal consequences. Attackers favor bot-infected computers with a decentralized C&C model because they are difficult to disable and allow the attackers to hide in plain sight among the massive amounts of unrelated traffic occurring over the same…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Once released, the person who has released a computer virus has no control on how this virus will spread. It jumps from machine to machine, using the unpredictable patterns of software sharing among the users. Clearly, it can easily reach systems on which it is not wanted or on which it would be incompatible with the environment and would cause unintentional damage. It is not possible for the virus writer to predict on which systems the virus will run and therefore it is impossible to test the virus on all those systems for compatibility. Furthermore, during its spread, a computer virus could reach even a system that had not existed when that virus has been created—and therefore it had been impossible to test the virus for compatibility with this system.…

    • 628 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A Quiz And Answers

    • 1737 Words
    • 6 Pages

    When you are discussing the memory capacity of a memory module, the capacity is specified in…

    • 1737 Words
    • 6 Pages
    Good Essays
  • Good Essays

    ollie mullin

    • 866 Words
    • 4 Pages

    It cost $8.75 billion dollars and millions of computers were infected along with significant data loss. The LoveLetter infected millions of people worldwide and had caused the largest damage of any virus in history. The bug deleted files, changed home pages and messed with the Registry.…

    • 866 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Technology: There was something called a wiper agent named Dark Seoul, which overrates the master boot record (MBR). North Korea attacked the Chinese-written Gondad exploit kit, which attacked and infected PCs. This created a zombie computer and the attackers had access to any information.…

    • 380 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    I loveyouvirus

    • 828 Words
    • 3 Pages

    The deceptive name lead users to believe it was a harmless affection from someone in their address book instead of the payload it contained. When the virus ran it would replace all of the user’s JPG, JPEG, VBS, VBE, JS, JSE, CSS, WSH, SCT, DOC, HTA, MP2, and MP3 files with the virus, keeping their name and appending the .vbs extension in a hidden fashion as before. The virus would then add itself to the victim’s system startup and email itself to everyone in the user’s address book as well as friends in internet relay chat (IRC) clients.…

    • 828 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Related Literature

    • 13314 Words
    • 54 Pages

    Computer viruses before it, the Sasser worm didn’t spread through e-mail, but moved undetected across the Internet from computer to computer. It exploited a weakness in Microsoft Windows XP and Windows 2000 operating systems. By the first weekend in May, American Express, the Associated Press, the British Coast Guard, universities, and hospitals reported that the Sasser worm had swamped their systems. Computer troubles led Delta Airlines to cancel 40 flights and delay many others.…

    • 13314 Words
    • 54 Pages
    Powerful Essays