virus

Which type of virus can change its own code and then cipher itself multiple times as it replicates?

Which type of virus can change its own code and then cipher itself multiple times as it replicates?

Option 1 : Cavity virus
Option 2 : Tunneling virus
Option 3 : Stealth virus
Option 4 : Encryption virus
1 . Cavity virus

A Spacefiller (Cavity) virus tries to attack devices by filling the empty spaces present in various files. That’s why this rare sort of bug is additionally addressed as a Cavity Virus. Its working strategy involves using the empty sections of a file to deal with an epidemic , without altering its actual size. This also makes its detection quite impossible.
Lehigh is one among the foremost popular samples of this deadly virus. Spacefiller virus was first detected in 1998 and infected multiple Windows versions including 95.98 and ME.
Its malicious effects can range from infecting devices with malicious code, overwriting of knowledge stored on your device, and tampering with the device BIOS.

2. Tunneling virus

A tunneling virus is any virus that gets installed before an antivirus can detect it. It executes without alerting the sensors of the OS (OS) to avoid antivirus detection.
A tunneling virus disables a computer’s interception programs. While some antivirus solutions can detect the malicious code, they can’t stop this sort of viruses from getting installed. More advanced antivirus programs that employ tunneling strategies could also be the sole ones capable of detecting and preventing the execution of a tunneling virus.
You can compare a tunneling virus to thieves entering an institution via the sewage system , in order that they don’t need to affect alarms.

3. Stealth virus

A stealth virus may be a sort of virus malware that contains sophisticated means of avoiding detection by antivirus software. After it manages to urge into the now-infected machine a stealth viruses hides itself by continually renaming and moving itself round the disc.
Like other viruses, a stealth virus can take hold of the many parts of one’s PC. When taking control of the PC and performing tasks, antivirus programs can detect it, but a stealth virus sees that coming and can rename then copy itself to a special drive or area on the disc, before the antivirus software. Once moved and renamed a stealth virus will usually replace the detected ‘infected’ file with a clean file that doesn’t trigger anti-virus detection. It’s a never-ending game of cat and mouse.
The intelligent architecture of this sort of virus about guarantees it’s impossible to completely rid oneself of it once infected. One would need to completely wipe the pc and rebuild it from scratch to completely eradicate the presence of a stealth virus. Using regularly-updated antivirus software can reduce risk, but, as we all know, antivirus software is additionally caught in an endless cycle of finding new threats and protecting against them.

4. Encryption virus

Encryption viruses could also be one among the scarier viruses out there. For those of you unacquainted how they work, an encryption virus gets onto your system and starts encrypting documents and files. This renders the files unreadable by the applications that created them. and therefore the only thanks to unencrypt the files is to possess access to the encryption key utilized in the encryption process. An encryption virus is sensible enough to go away your system files alone. It just wants your data – documents, pictures, and anything that’s important to you. It then spreads to other computers on your network doing an equivalent thing. within the end you’re left with an infected computer, data you’ll not access, and a ransom message telling you to ante up or kiss your data goodbye. The virus, once discovered, isn’t all that tricky to get rid of . the matter is that the majority users discover the virus too late – usually once they realize they suddenly can’t access their files. And once your files are encrypted it’s not really feasible to decrypt them. Crypto attacks are tending to focus on larger companies that have more at stake, for instance hospitals where data is important to operations. The rationale is straightforward to know – a hospital may be a bigger payday than one person or maybe a little business. However don’t be fooled by this alteration in strategy by crypto thieves. they’re still out there, and that we are still seeing clients with encrypted computers.

Learn CEH & Think like hacker


This Blog Article is posted by

Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092

Contact us – www.info-savvy.com

https://g.co/kgs/ttqPpZ

Leave a Comment