🔥 Breaking
MobiKwik IPO Attracts Record-Breaking Demand with 119.38x SubscriptionExploring New Horizons: Unleashing the Potential of Terahertz (THz) Emission Spectroscopy in Scientific DiscoveryARY ZAP: Unleashing the Power of Live Streaming and On-Demand EnthrallmentPGA TOUR, DP World Tour, and PIF Forge the “World Golf Federation”Humanitarian Food Aid Shipment Reaches Gaza Amid Crisishimaev’s Reign Begins: UFC 319 Results, Surprises, and What’s NextHulk Hogan News—Wrestling Legend Passes Away at 71Bangladesh vs Pakistan 2nd T20I: Bangladesh Clinch Series Win with Historic VictoryDiddy Not Guilty in Major Charges, Faces Jail for Lesser OffensesIndia vs England 2nd Test Day 1 Live: Jaiswal Anchors India After Lunch at Edgbaston🔥 Idaho Firefighters Shot in Coeur d’Alene Ambush: Situation Still DevelopingIndia Women vs England Women: Mandhana’s Century Powers Massive WinMobiKwik IPO Attracts Record-Breaking Demand with 119.38x SubscriptionExploring New Horizons: Unleashing the Potential of Terahertz (THz) Emission Spectroscopy in Scientific DiscoveryARY ZAP: Unleashing the Power of Live Streaming and On-Demand EnthrallmentPGA TOUR, DP World Tour, and PIF Forge the “World Golf Federation”Humanitarian Food Aid Shipment Reaches Gaza Amid Crisishimaev’s Reign Begins: UFC 319 Results, Surprises, and What’s NextHulk Hogan News—Wrestling Legend Passes Away at 71Bangladesh vs Pakistan 2nd T20I: Bangladesh Clinch Series Win with Historic VictoryDiddy Not Guilty in Major Charges, Faces Jail for Lesser OffensesIndia vs England 2nd Test Day 1 Live: Jaiswal Anchors India After Lunch at Edgbaston🔥 Idaho Firefighters Shot in Coeur d’Alene Ambush: Situation Still DevelopingIndia Women vs England Women: Mandhana’s Century Powers Massive Win

Different Types of Computer Virus

Ad Placement — ad_in_content

What Is a Computer Virus?

Definition:

A computer virus is a malicious application or authored code used to perform destructive activity on a device or local network. The code’s malicious activity could damage the local file system, steal data, interrupt services, download additional malware, or any other actions coded into the program by the malware author. Many viruses pretend to be legitimate programs to trick users into executing them on their device, delivering the computer virus payload.

Types of Computer Viruses:

Every virus has a payload that performs an action. The threat actor can code any malicious activity into the virus payload, including simple, innocuous pranks that don’t do any harm. While a few viruses have harmless payloads, most of them cause damage to the system and its data. There are nine main virus types, some of which could be packaged with other malware to increase the chance of infection and damage. The nine major categories for viruses are:

  1. Boot Sector Virus:

Your computer drive has a sector solely responsible for pointing to the operating system so that it can boot into the interface. A boot sector virus damages or controls the boot sector on the drive, rendering the machine unusable. Attackers will usually spread this virus type using a malicious USB device. The virus is activated when users plug in the USB device and boot their machine.

  1. Web Scripting Virus:

Most browsers have defences against malicious web scripts, but older, unsupported browsers have vulnerabilities that allow an attacker to run code on the local device.

  1. Browser Hijacker:

A virus that can change the settings on your browser will hijack browser favourites, the home page URL, and your search preferences and redirect you to a malicious site. The site could be a phishing site or an adware page used to steal data or make money for the attacker.

  1. Resident Virus:

A virus that can access computer memory and sit dormant until a payload is delivered is considered a resident virus. This malware may stay dormant until a specific date, time, or a user performs an action.

  1. Direct Action Virus:

When a user executes a seemingly harmless file attached with malicious code, direct action viruses deliver a payload immediately. These viruses can also remain dormant until a specific action is taken or a timeframe passes.

  1. Polymorphic Virus:

Malware authors can use polymorphic code to change the program’s footprint to avoid detection. Polymorphic viruses make it more difficult for an antivirus to detect and remove them.

  1. File Infector Virus:

To persist on a system, a threat actor uses file infector viruses to inject malicious code into critical files that run the operating system or important programs. When the system boots or the program runs, the virus is activated.

  1. Multipartite Virus:

These malicious programs spread across a network or other systems by copying themselves or injecting code into critical computer resources.

  1. Macro Virus:

Microsoft Office files can run macros, and these macros can be used to download additional malware or run malicious code. Macro viruses deliver a payload when the file is opened, and the macro runs.

Share:
Ad Placement — ad_after_post

Techiebhaiya

Tech Writer & Educator

1 Comment

  1. From Linux Scripts to Written Scripts:Debasis Gouda

    […] Different Type of Virus […]

Leave a Comment

Your email address will not be published. Required fields are marked *