Threats FAQs

Threats FAQs
Threats Frequently Asked Questions

ORIENTATION...
Notes: Adware is NOT a separate category threat - adware is a Spyware category threat. Antispyware products do NOT remove antivirus category threats
such as viruses and worms. Antivirus products do NOT remove antispyware category threats such as adware and spyware threats. Rootkits are a SEPERATE
threat - though most antivirus companies have added anti-rootkit scanning in the antivirus product since the middle of the past decade (2000-2010). Traditionally and ongoing, there are many anti-rootkit scanners for detection and removal available.

A bot is the payload to infect computers into a botnet, and can also mean a single botnet infected computer. A botnet is made up of all the computers infected by the bot payload to perform its intentions - mass spam, infection, illegal software disgtribution, DDoS (Distributed Denial of Service) extortion, ID Thefts, more. These can infect with the world's best defense products in place - simply disabling them etc. There have been several break throughs in defenses such as original Symantec AntiBot. Botnet infection has replaced ALL threats as the worst plague to the internet and computer users currently since approximately year 2005-6. Their entry is common like clicking something warned against like virus attachments. The best defense is up to date antivirus and antispyware - as a bot payload can be built in pieces at a time as the system defense may be spied on by Botmaster / Botherder Command And Control employed for picking attacks against known weak products installed in the computer user machine. A botnet infection can be built by several installations secretly by viruses, worms, trojans and downloader trojans, rootkits, spyware kits, virus kits, backdoor threats, safe mode with networking, etc - and various other instant full payload infections via reverse engineering of many security devices/wares/appliances etc.
SEE Forensics
(reverse engineered malicious encapsulation example - full payload delivered instantly past top defense products).  


FIX
How can I reset the Hosts file back to the default?
http://support.microsoft.com/kb/972034
MICROSOFT FIX IT TOOL ***** HOSTS FILES….
How to reset Internet Protocol (TCP/IP)
http://support.microsoft.com/kb/299357

 
 
SPYWARE CATAGORY THREATS / Glossary
ThreatsGlossary
http://www.webroot.com/En_US/csc/resources-glossary.html
Emsisoft Malware Library
http://blog.emsisoft.com/2014/06/18/emsisoft-malware-library/

Spyware Encyclopedia
http://www3.ca.com/securityadvisor/pest/browse.aspx
a-squared Process List
http://www.hijackfree.com/en/processlist/
CA Spyware Encyclopedia
http://www3.ca.com/securityadvisor/pest/browse.aspx
F-Secure Malware Code Glossary
http://www.f-secure.com/en_EMEA/security/security-lab/learn-more/
Glossary of Malware
Security Threat Glossary
http://www.westcoastlabs.org/
The Difference Between Adware & Spyware
http://www.webopedia.com/DidYouKnow/Internet/2004/spyware.asp 

 
SPYWARE CATAGORY THREATS
(antispyware products used to detect/remove) 
 
Adware
http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci521293,00.html
Spyware
http://en.wikipedia.org/wiki/Spyware
Malware (malware means all)
http://en.wikipedia.org/wiki/Malware
http://www.bleepingcomputer.com/tutorials/tutorial41.html
Tracking cookies
http://www.f-secure.com/sw-desc/tracking_cookie.shtml
http://en.wikipedia.org/wiki/HTTP_cookie#Tracking
Browser Hijackers
http://en.wikipedia.org/wiki/Browser_hijacker
http://www.microsoft.com/protect/terms/hijacking.aspx
http://us.trendmicro.com/us/threats/enterprise/threats-summary/browser-hijackers/
Browser Hi-Jackers BHO
http://en.wikipedia.org/wiki/Browser_Helper_Object
Joke Programs
http://threatinfo.trendmicro.com/vinfo/
Spyware/Grayware
http://threatinfo.trendmicro.com/vinfo/
Page hijacking
http://en.wikipedia.org/wiki/Page_hijacking 
Malvertising
http://en.wikipedia.org/wiki/Malvertising 
Dialers
http://www.ca.com/us/securityadvisor/pest/browse.aspx?cat=Dialer
dialer
http://www.webroot.com/En_US/csc/resources-glossary.html
Keyloggers - Introduction to Spyware Keyloggers
http://www.securityfocus.com/infocus/1829
Scumware
http://www.cgmsystems.com/Resources/scumware.htm
data miner (spyware)
http://www.webopedia.com/TERM/D/data_miner.html
parasites (Computer)
http://www.yourdictionary.com/computer/parasite
Web bugs
http://news.cnet.com/2100-1017-243077.html
The Web Bug FAQ
http://w2.eff.org/Privacy/Marketing/web_bug.html
Web Bug Report
http://www.securityspace.com/s_survey/data/man.200102/webbug.html
Web beacon
http://en.wikipedia.org/wiki/Web_bug
E-mail web bugs
http://en.wikipedia.org/wiki/Web_bug
Web Beacons - Opt Out at Yahoo
http://info.yahoo.com/privacy/us/yahoo/webbeacons/details.html
Keyloggers defined
http://www.webopedia.com/TERM/K/keylogger.html 
Clickjacking
http://en.wikipedia.org/wiki/Clickjacking
Clickjacking is a malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on ...

RANSOMWARE

Ransomware
http://www.microsoft.com/security/portal/mmpc/shared/ransomware.aspx
What is ransomware?
http://www.2-spyware.com/ransomware-removal#parasites
Trend Micro Ransomware removal tool
http://esupport.trendmicro.com/en-us/home/pages/technical-support/1096206.aspx
How to rescue your PC from ransomware
http://www.pcworld.com/article/2084002/how-to-rescue-your-pc-from-ransomware.html

NOTE TROJANS ARE BLOCKED - DETECTED - REMOVED BY BOTH
ANTIVIRUS AND ANTISPYWARE PRODUCTS - both needed !
 
Trojan horse (computing)
From Wikipedia, the free encyclopedia
http://en.wikipedia.org/wiki/Trojan_horse_(computing)
Trojans - myths & facts
http://www.emsisoft.com/en/kb/articles/tec021007/
Backdoor Santas
http://www.bleepingcomputer.com/tutorials/tutorial41.html
Proxy Trojan
http://www.webopedia.com/TERM/P/Proxy_Trojan.html
http://inews.webopedia.com/TERM/P/Proxy_Trojan.html
Security software disabler Trojan
http://www.webopedia.com/TERM/S/security_software_disabler_Trojan.html
http://inews.webopedia.com/TERM/S/security_software_disabler_Trojan.html
FTP Trojan
http://www.webopedia.com/TERM/F/FTP_Trojan.html
Destructive Trojan
http://www.webopedia.com/TERM/D/Destructive_Trojan.html
Data Sending Trojan
http://www.webopedia.com/TERM/D/Data_Sending_Trojan.html
http://inews.webopedia.com/TERM/D/Data_Sending_Trojan.html
Remote Access Trojan
http://www.webopedia.com/TERM/R/Remote_Access_Trojan.html
How to Remove a Backdoor Trojan Computer Virus
http://www.ehow.com/how_5164888_remove-backdoor-trojan-computer-virus.html

Typical back door capabilities may allow a remote attacker to:
http://www.symantec.com/security_response/writeup.jsp?docid=2001-062614-1754-99

* Collect information (system and personal) from the computer and
any storage device attached to it
* Terminate tasks and processes
* Run tasks and processes
* Download additional files
* Upload files and other content
* Report on status
* Open remote command line shells
* Perform denial of service attacks on other computers
* Change computer settings
* Shut down or restart the computer

EXAMPLE
Backdoor.Trojan | Symantec
http://www.symantec.com/security_response/writeup.jsp?docid=2001-062614-1754-99

Trojan Downloader
Trojan Downloader Featured Articles
http://www.ehow.com/search.html?s=trojan+downloader&skin=corporate&t=all
EXAMPLE
Trojan-Downloader.Zlob.Media-Codec (fs) Information and Removal
http://www.sunbeltsecurity.com/ThreatDisplay.aspx?tid=44478&cs=D4312A93E13E09C94EB75A1F9E6481AC

List of Trojan Downloader Parasites:
http://www.enigmasoftware.com/threat-database/trojan-downloaders/?gclid=CPPBzdDerrACFQjf4Aodez8HTA
 
NEWER TERMS....
Detection deficit – Time it takes to discover a breach from the time of compromise.
RAM-scraping malware – Memory-scraping malware that helps attackers find sensitive data that isn’t available through other processes.
CVECommon Vulnerabilities and Exposures is a dictionary of publicly known information about security vulnerabilities and exposures.
CVSS – Common Vulnerability Scoring System is designed to provide an open and standardized method for rating IT vulnerabilities.
JBOH – Java-Script-Binding-Over-HTTP, which enables an attacker to execute code remotely on Android devices that have affected apps.
IDS or IPS – Intrusion Detection Systems or Intrusion Prevention Systems may come in the form of a software application or device used to monitor a specific system or network for signs of malicious activities.
VERIS – Vocabulary for Event Recording and Incident Sharing is a set of metrics designed to provide a common language for describing security incidents in a structured and repeatable manner.
POS intrusions – Point-of-sale intrusions are attacks that occur on the device transacting a sale. The device may be various forms of digital cash registers used across many industries.
Payment Card Skimmers – Malicious card readers that cybercriminals place on payment terminals, ATM’s or anywhere a credit card swipe occurs to copy the data from the magnetic strip on the card.
Web App Attack – A web-based cyberattack that can take various forms but is commonly defined by its use of the https or http protocol. The attack typically targets the website’s security or performance and, in some cases, can take the entire site down.
Cyberespionage – The act of stealing confidential information digitally stored on computers or networks within a government or organisation.


ARP spoofing
http://en.wikipedia.org/wiki/ARP_spoofing
TCP reset attack
http://en.wikipedia.org/wiki/TCP_reset_attack
Tunneling to circumvent firewall policy
http://en.wikipedia.org/wiki/Tunneling_protocol#Tunneling_to_circumvent_firewall_policy
What is script kiddie?
http://webopedia.com/TERM/S/script_kiddie.html
Toxic blogs: Uploading links to malicious Web sites, or when blogs support HTML or scripts, uploading malicious code or using iFrames.

Cross-site scripting
http://en.wikipedia.org/wiki/Cross-site_scripting
iFrames:
Invisible frames capable of executing malware.
http://www.techopedia.com/definition/13639/inline-frame-iframe
Pharming
http://www.techopedia.com/definition/4048/pharming
Pretexting
Pretending to be a legitimate entity to lure people to malicious sites.
Social engineering (security) / Pretexting
http://en.wikipedia.org/wiki/Social_engineering_(security)
 
"SEO Search Engine Poisening"
Search Engine Optimization (SEO)
http://en.wikipedia.org/wiki/Search_engine_optimization
Cyber criminals pump up search engines all ways they can to bump up their malicious sites to top results in search engines (SEO) for key phrases, news events, celebrity, etc etc etc.

 
Typosquatting
http://en.wikipedia.org/wiki/Typosquatting
Typosquatting is a form of cybersquatting which relies on mistakes such as typographical errors made by Internet users when inputting a website address into a web browser address bar or search engine for example. Should a user accidentally enter an incorrect website address, they may be led to that alternative website owned by a cybersquatter which may infect the computer or lead to ID Theft or capture passwords or any data typed at the site in forms etc.
EXAMPLE - instead of http : // MSN.Com -- the mistake = MSM.Com , which for the example is owned by cyber criminals. Logging into email, financial accounts, etc. would have been intercepted and abused by them.

Disposable email addresses
http://en.wikipedia.org/wiki/Disposable_email_address
A trick by spammers who when caught would only loose the free email account shut down by the email provider for violation of terms of service.

Disposable Domains
"Disposable Domians" use by spammers was born shortly after the "disposable email accounts" growth. Easy cheap website hosting was purchased which often include up to 200 free email accounts from the domain name. After the spamming campaign - which may include contact addresses elsewhere - the spammer/cyberthief would simply close the website, thus terminating the email addresses as well. Also, the website hosting may have terminated the website domain for violations of terms of services.
Spammers Step Up Use Of Disposable Domains
September 14, 2006 12:00 AM
http://www.windowsitpro.com/article/email/spammers-step-use-of-disposable-domains
"According to trend research conducted by security software vendor McAfee, spammers have increased the number of disposable domains that they use and are cycling through new domains faster than in the past. While this trend is certainly a boon for domain name registrars it is in fact a bain for recipients of email as well as mail system administrators. ....."

Cybersquatting
http://en.wikipedia.org/wiki/Cybersquatting
Cybersquatting (also known as domain squatting), according to the United States federal law known as the Anticybersquatting Consumer Protection Act, is registering, trafficking in, or using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. The cybersquatter then offers to sell the domain to the person or company who owns a trademark contained within the name at an inflated price

ADVANCED / FROM OUR FORENSICS PAGE

APPARENT ATTEMPT TO INFECT PLASMA SERVERS....
Optical buffer
http://en.wikipedia.org/wiki/Optical_buffer
NON Sample -
http://www.sun.com/customers/servers/pppl.xml
http://www.bluecollarpc.us/Forensics.html

There is incidence of data files or .DAT translated into media image files to hide by crimeware files. Infected Media Players....
NON SAMPLE
DAT file manipulation  
Reading and writing Isis image buffers. The objects defined below may be used to read and write images to and from two-dimensional DAT files. ...
http://web.media.mit.edu/~stefan/isis/software/dat-files.html

REFERENCE (Symantec above)
"....Blubster is a peer-to-peer filesharing client which is based on MP2P - a propietary UDP transport protocol...."

User Datagram Protocol
http://en.wikipedia.org/wiki/User_Datagram_Protocol
User Datagram Protocol (UDP) is one of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network without requiring prior communications to set up special transmission channels or data paths. UDP is sometimes called the Universal Datagram Protocol.

UDP uses a simple transmission model without implicit hand-shaking dialogues for guaranteeing reliability, ordering, or data integrity. Thus, UDP provides an unreliable service and datagrams may arrive out of order, appear duplicated, or go missing without notice. UDP assumes that error checking and correction is either not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
Time-sensitive applications often use UDP because dropping packets is preferable to waiting for delayed packets, which may not be an option
in a real-time system. If error correction facilities are needed at the network interface level, an application may use the Transmission Control Protocol (TCP) or Stream Control Transmission Protocol (SCTP) which are designed for this purpose.

 
NEW THREAT.....  'TABNAPPING"

BBB Consumer News and Opinion blog (Tab napping)
http://www.bbb.org/us/post/new-tab-napping-scam-targets-your-bank-information-3813
Tab napping is more sophisticated than phishing scams and it doesn’t rely on persuading you to click on a link to a scammers Web page. Instead it targets
internet users who open lots of tabs on their browser at the same time. How does it work? By replacing an inactive browser tab with a fake page set up
specifically to obtain your personal data - without you even realizing it has happened....

Mozilla warns of new phishing scam (Tab napping)
http://www.infosecurity-magazine.com/view/9769/mozilla-warns-of-new-phishing-scam/
Aza Raskin, a well-known US interface design expert and creative lead on Mozilla's Firefox browser software, has revealed a new type of phishing attack
known as `tab napping.' ....

Internet Explorer 8 helps protect against “tabnabbing”
Most of us know that we should keep our passwords and other credentials a secret. However, it’s easy for cybercriminals to create a "spoof", a copy of a familiar website. You might think you’re entering your credentials into your web-based email accounts, social networking sites, or bank websites, but you’re really typing them into a phishing website that was created to steal this information. Cybercriminals have been using this ploy on websites and in pop-up windows for some time, but there are reports of a new phishing technique that takes \advantage of the increased use of browser tabs.
Read more | Open in browser
http://blogs.msdn.com/b/securitytipstalk/archive/2010/06/08/internet-explorer-8-helps-protect-against-tabnabbing.aspx
 

SCAM, HOAX, CYBER URBAN LEGENDS ....
snopes.com: Urban Legends Reference Pages
The definitive Internet reference source for urban legends, folklore, myths, rumors, and misinformation.
http://www.snopes.com/
Scambusters.org
"Internet Scams, Identity Theft, and Urban Legends: Are You at Risk?"
http://www.scambusters.org/
Hoax-Slayer.Com
Mission Statement: The goal of the Hoax-Slayer Website is to help make the Internet a safer, more pleasant and more productive environment by: Debunking email and Internet hoaxes, Thwarting Internet scammers, Combating spam, Educating web users about email and Internet security issues.
http://www.hoax-slayer.com/
FBI Computer Scam
What does it mean?
http://www.techopedia.com/definition/29500/fbi-computer-scam 
 
ROOTKITS WORST THREAT TO COMPUTERS BEFORE BOTNETS
 
Rootkit (definition)
http://en.wikipedia.org/wiki/Rootkit
RootkitRevealer
http://technet.microsoft.com/en-us/sysinternals/bb897445.aspx
http://en.wikipedia.org/wiki/RootkitRevealer
Rootkit FAQ's (chkrootkit -- locally checks for signs of a rootkit)
http://www.chkrootkit.org/faq/ 
 
WORLD WIDE WEB CRIMEWARE / CYBER CRIME EVENTS
Phishing
http://en.wikipedia.org/wiki/Phishing
Pharming
http://en.wikipedia.org/wiki/Pharming
FTC.Gov- Phishing Scams and How to Spot Them
http://www.ftc.gov/opa/reporter/idtheft/phishing.shtml
Scareware
http://en.wikipedia.org/wiki/Scareware
Rogue security software
http://en.wikipedia.org/wiki/Rogue_software
Ransomware (malware)
http://en.wikipedia.org/wiki/Ransomware_(malware)
E-mail address harvesting
http://en.wikipedia.org/wiki/Email_harvesting
E-mail harvesting is the process of obtaining lists of e-mail addresses for use in bulk mail or other purposes
usually grouped as spam. Methods range from purchasing lists of e-mail addresses from other spammers to
the more common use of special software, known as "harvesting software", "harvesting bots" or "harvesters",
which scan web pages, postings on Usenet, mailing list archives and other online sources to obtain e-mail addresses.
Cyber crime
http://www.webopedia.com/TERM/C/cyber_crime.html
Zero-Day exploit
http://www.webopedia.com/TERM/Z/Zero_Day_exploit.html
Malicious code
http://www.webopedia.com/TERM/m/malicious_code.html
Spoof
http://www.webopedia.com/TERM/S/spoof.html
Password cracking
http://www.webopedia.com/TERM/P/password_cracking.html
Man-in-the-middle attack
http://www.webopedia.com/TERM/m/man_in_the_middle_attack.html
Masquerade attack
http://www.webopedia.com/TERM/M/masquerade_attack.html
Nuker
http://www.webopedia.com/TERM/N/Nuker.html
Binder
http://www.webopedia.com/TERM/B/binder.html
Malicious Active Content
http://www.webopedia.com/TERM/M/malicious_active_content.html
Scams and Hoaxes
http://threatinfo.trendmicro.com/vinfo/
Avoiding Online Job Scams | Privacy Rights Clearinghouse
https://www.privacyrights.org/fs/fs25a-JobSeekerPriv2.htm
Avoid Work at Home Scams - Job Searching - About.com
http://jobsearch.about.com/cs/workathomehelp/a/homescam.htm
 
BOTNETS / ZOMBIE COMPUETERS / ZOMBIE NETWORKS
 
BOT = payload of infection or single infected computer - BOTNET = network of infected computers controlled by botmaster,
botherder, Comand and Control. (NOTE a botnet infection can be built by several installations secretly by viruses, worms, trojans
and downloader trojans, rootkits, spyware kits, virus kits, etc and various other probable instant full payload infections via reverse
engineering of many security devices/wares/appliances etc.
SEE
http://bluecollarpc.us/forensics.php (reverese engineered encapsulation example - full payload delivered instantly)

Botnet - Wikipedia, the free encyclopedia
http://en.wikipedia.org/wiki/Botnet
botnet Definition: TechEncyclopedia
http://www.techweb.com/encyclopedia/defineterm.jhtml?term=botnet
Botnet : Definition From Webopedia
http://www.webopedia.com/TERM/b/botnet.html

Article: Battling the Botnet Pandemic
http://www.lavasoft.com/company/newsletter/2007/2_28/article2.html
Lavasoft News - March 2007
Battling the Botnet Pandemic. Your home computer may be among the millions of PCs that are under the control of criminals, and worse yet, you may not even
be aware of it.
Article: Botnet - CNET News.com
http://news.cnet.com/Security-from-A-to-Z-Botnet/2100-7355_3-6138435.html
Security from A to Z: Botnet | These armies of zombie PCs are used by cybercriminals for sending spam .. These armies of zombie PCs are used by cybercriminals
for sending spam. Part of a series on ...
Article: Botnet Basics
http://www.eweek.com/c/a/Video/Botnet-Basics/
Bots are software applications that run automated tasks over the Internet. A network of bots working under
a central command and control center is a botnet. This eVideo seminar looks at the basic ...
Article: Botnet Battle Already Lost?
http://www.eweek.com/article2/0,1759,2029720,00.asp
Botnets have become a big underground business, and the security industry has few answers.
eWEEK ... It's dress-down Friday at Sunbelt Software's Clearwater, Fla., headquarters. In a bland cubicle on ...

MSNBC: The lowdown on 'Bots'
The lowdown on 'Bots'
http://www.msnbc.msn.com/id/17805145/
What are ‘bots’?
“Bots” – short for robots – are hijacked computers that are infected by computer viruses and then used by criminals
and pranksters for a variety of criminal and malicious purposes.
Who controls ‘bots’?
The criminals behind “bots,” known as “bot herders,” assemble armies of infected computers -- often between 50,000
and 70,000 PCs strong -- that they can then charge customers for the use of. The going rate for sending spam is $5,000
a day or more, according to Howard Schmidt, former White House cyberczar.
What are ‘bots’ used for?
“Bots” are used to spread malicious programs, send spam, fuel “pump-and-dump stock schemes and launch
denial-of-service attacks, among other things.
How many ‘bots” are there?
Internet founding father Vint Cerf recently estimated that 150 million computers have been hijacked. Most other experts
believe that figure is too high, but there is general agreement that “bots” number in the millions, if not the tens of millions.
How can I tell if my computer is a ‘bot’?
You can’t necessarily. Antivirus software will catch most known viruses, but new ones are being created all the time.
It used to be that poor performance often tipped off users that their computers had been infected, but “bot herders” now
distribute tasks among thousands of computers to avoid tell-tale crashes.

More:
How big is the botnet problem?
Feature By Julie Bort, Network World, 07/06/07
http://www.networkworld.com/research/2007/070607-botnets-side.html?fsrc=rss-security
Types of attacks: Botnets
Cross-site scripting: Inserting malicious JavaScript into the header of an otherwise legitimate Web site.
DNS cache poisoning: Hacking a DNS so that it directs people who enter legitimate URLs to the hacker's malicious Web site.
iFrames: Invisible frames capable of executing malware.
Pharming: Creating an illegitimate copy of a real Web site and redirecting traffic to the phony site to obtain information or
download malicious code.
Pretexting: Pretending to be a legitimate entity to lure people to malicious sites.
Toxic blogs: Uploading links to malicious Web sites, or when blogs support HTML or scripts, uploading malicious code or
using iFrames. 
 
VIRUS CATAGORY THREATS
(Antivirus products block, detect, remove) 
 
Microsoft JPEG Vulnerability
Microsoft JPEG Vulnerability and the Six New Content Security Requirements
http://whitepapers.silicon.com/0,39024759,60129423p-39000575q,00.htm
In November 2004, a critical Microsoft security vulnerability (MS04-028) was discovered which could allow attackers to embed malicious code inside JPEG image
files. Until that time, JPEG image files were considered immune to attack. To effectively deal with this vulnerability, security and IT professionals need to
incorporate six new and critical content security requirements into their networks.
Morris worm
(One of first Computer Worms)
From Wikipedia, the free encyclopedia
http://en.wikipedia.org/wiki/Morris_worm
"The Morris worm or Internet worm of November 2, 1988 was one of the first computer worms distributed via the Internet. It is considered the first worm and was certainly the first to gain significant mainstream media attention. It also resulted in the first conviction in the US under the 1986 Computer Fraud and Abuse Act.[1] It was written by a student at Cornell University, Robert Tappan Morris, and launched on November 2, 1988 from MIT. ...."continued
Metamorphic virus
Virus that changes its own code with each infection
http://www.virusbtn.com/resources/glossary/metamorphic_virus.xml
"A metamorphic virus is one that is capable of rewriting its own code with each infection, or generation of infections, while maintaining the same functionality. The rewriting process allows each infection to appear different from others, but the changes are not supposed to affect the functionality of the code. This is intended to avoid detection by anti-malware software, but can usually be overcome via emulation or other techniques, and in many cases is deployed in a flawed manner leading to large numbers of misinfections. The complex technology required to do the rewriting is known as a metamorphic engine, and the same such engine may be implemented in several different virus variants.
The term is often used interchangeably with polymorphic virus."
http://www.virusbtn.com/resources/glossary/polymorphic_virus.xml

 ONE REASON FOR NEED OF REAL TIME PROTECTION ANTIMALWARE PRODUCTS AS OPPOSED TO JUST FREE STAND ALONE SCANNER....
(Real Time Protection products detect/block/quarantine threats)
Computer virus
From Wikipedia, the free encyclopedia
SEE - "Resident viruses"
http://en.wikipedia.org/wiki/Computer_virus
"....If the virus scanner fails to notice that such a virus is present in memory the virus can "piggy-back" on the virus scanner and in this way infect all files that are scanned. ...." 


Glossary of Malware
http://www.westcoastlabs.org/
Security Threat Glossary:

Attack Vectors
Method by which malware attempts to enter a system. This generally refers to a protocol such as HTTP, SMTP, FTP, IRC, IM, etc. Anti-Malware - A term
generally applied to a software application which combats malicious code through detection and/or removal.

Drive-by Download
This technique is used to surreptitiously download malware onto a user's machine. The attack generally includes exploits to browser or OS vulnerabilities, and
may be separated into several pieces so that a user may be directed to several websites or domains to avoid detection by anti-malware programs.

FTP Threats
Malware which uses FTP as an attack vector.

Malicious URL
URLs which direct a user to a Web Threat.

SMTP Threats
Malware which uses email as an attack vector Application-specific attacks - Exploits or hacking attempts which seek to use a vulnerability in a particular software
program to gain entrance onto a user's system.

Socially Engineered Attack
Exploits or hacking attempts which seek to use a user's susceptibility to fear, trust or titillation to gain entrance onto a user's system or information. Phishing and
trojans are two types of attacks which rely almost exclusively on social engineering.

Undesirable URL
URLs which direct a user to content which may be considered inappropriate for certain contexts, such as "adult" or violent content, or network tools which could
be used to compromise a network.

Web Threats
This is a category of threats delivered by HTTP which intend to perform actions which harm a user or their system. Phishing, drive-by downloads and sites which
host malware can be considered to fall into this category.

Malware Glossary

Bots
The term Bot (short for robot) is a type of program, which has evolved from RATs (see Spyware definitions). A bot usually leverages an internet facing port to
deliver a program that awaits a further command upon which it can take remote control of the system. Bots are often combined with other infected machines to
form a botnet (a network of bot-infected machines). Bots are used to turn an individual machine into a "zombie" that can then be used for actions such as
co-ordinated DoS attacks on websites, spamming, or hired/sold to others for such use.

Exploits
An Exploit is a piece of code designed to attack a vulnerability on a computer system, or such an attack. Hackers and writers of Malware look for announcements
of such vulnerabilities by manufacturers and other sources and then attack machines, which have not been patched against the vulnerability. The code is designed
to enable an activity that otherwise could not take place, or to avoid system restrictions preventing such an activity. Various payloads attached to the exploits may
provide the attacker with a number of ways into the compromised system.

Rootkit
Although the term referred originally to Unix systems, the term has come to more widely mean a set of tools or programs that are used on a host system, often
in conjunction with malware, to allow attackers to exploit said system or a network. Rootkits can be used to hide applications from third party scanners and the
term is also coming to mean more generalized cloaking utilities that mask the attacker's activities. Recently the term rootkit has become more publicly known after
the anti-copy security software on several Sony-BMG audio CDs displayed rootkit-like tendencies as part of their Digital Rights Management strategy.

Spyware
Spyware is a form of software that makes use of a user's internet connection without his or her knowledge, usually in order to covertly gather information about
the user. Once installed, the Spyware may monitor user activity on the Internet and transmit that information in the background to someone else. Spyware can
also gather information about addresses and even passwords and credit card numbers. Spyware is often unwittingly installed when users install another program,
but can also be installed when a user simply visits a malicious website.

Types of Spyware used in the West Coast Labs Test Suites

Backdoor - A Backdoor is a secret or undocumented way of gaining access to a program, online service, computer or an entire computer network. Most Backdoors
are designed to exploit a vulnerability in a system and open it to future access by an attacker. A Backdoor is a potential security risk in that it allows an attacker to
gain unauthorized access to a computer and the files stored thereon.

Key Loggers - A Key Logger is a type of surveillance software that has the capability to record every keystroke to a log file (usually encrypted). A Key Logger
recorder can record instant messages; email and any information typed using the keyboard. The log file created by the Key Logger can then be sent to a specified
receiver. Some Key Logger programs will also record any e-mail addresses used and Web Sites visited.

Financials - A Financial is a program that has the capability of scanning a PC or network for information relating to financial transactions and then transmitting the
data to a remote user.

Proxies - Proxies are designed to enable an external user to use a computer for their own purposes, for example, to launch DDoS attacks or send spam, so that
the true originator of the attack cannot be traced.

Password Stealers and Crackers - A Password Stealer is a program resident on a computer, which is designed to intercept and report to an external person any
passwords, held on that machine. A Password Cracker has the ability to decode any encrypted passwords.

Downloaders - A downloader is a file which when activated, downloads other files on to the system without the knowledge or consent of the user, those other
files then carrying out malicious functions on the system.

Hijacker - A Hijacker is a file with the ability to change your default Internet home page and/or to create or alter other Web browser settings such as bookmarks
and redirection of Internet searches or Internet browsing to commercial sites that could offend the user or breach corporate policies on inappropriate or illegal
content.

RATs - A Remote Access Trojan (RAT) is a piece of malware designed to run and gain access to a remote computer across a network or the Internet in order to
carry out a particular purpose on that remote computer, that purpose being malicious and without the consent of the remote system's owner or user. Access is
usually gained by use of a backdoor, either already installed or included in the code of the RAT.

Trojan
Trojan Horses or Trojans are destructive programs that pretend to be benign applications. Unlike Viruses or Worms, Trojan Horses do not replicate themselves;
they can be damaging to networks by delivering other types of Malware.

Virus
A Virus is a program or piece of code attached to a file or diskette's boot sector; it is loaded onto a computer without the user's knowledge. Viruses are manmade
(though they can be corrupted in use to form new variants of the virus) and replicate themselves by attaching themselves to files or diskettes, often soaking up
memory or hard disk space and bringing networks to a halt. Most recent viruses are internet-borne and capable of transmitting themselves across and bypassing
security systems. Minor variants of the same virus are classed as families of viruses.

Worm
A Worm is an insidious program or algorithm that replicates itself over a computer network or by email system and usually performs malicious actions, such as using
up the computer's resources or distributing pornography and possibly shutting the system down. Unlike Viruses, Worms copy themselves as standalone programs
and do not attach themselves to other objects.

Common Types of Network Attacks
http://technet.microsoft.com/en-us/library/cc959354.aspx
Eavesdropping, Data Modification, Identity Spoofing (IP Address Spoofing), Password-Based Attacks, Denial-of-Service Attack, Man-in-the-Middle Attack, Compromised-Key Attack, Sniffer Attack, Application-Layer Attack
FULL DESCRIPTIONS: http://technet.microsoft.com/en-us/library/cc959354.aspx
 
 
NEW
 
Unbelievable! - Windows 8 Boot Security Cracked already before released (Bootkit malware)
November 18, 2011 - bluecollarpc
 
Unbelievable! - Windows 8 Boot Security Cracked already before released (Bootkit malware)....
 
Windows 8 Boot Security Cracked
CRN
By Antone Gonsalves, CRN
An Austrian security analyst has built the first known bootkit that bypasses Windows 8′s defenses against installing malware while the operating system is booting.
Peter Kleissner, an independent programmer and recognized ...
http://www.crn.com/news/security/231903295/windows-8-boot-security-cracked.htm;jsessionid=NZjzL4QedChUWf+VUz6Tyg**.ecappj02

( HATE TO BE I TOLD YOU SO BUT THE BLUECOLLARPC.US PREDICTED THIS THAT WINDOWS 8 BOOT UP SECURITY FEATURE WILL BE CRACKED AS FAST AS IT HITS THE STREETS..... LOOKS LIKE WE WERE A LITTLE OFF - IT HAS BEEN CRACKED EVEN BEFORE IT HIT THE STREETS ! ! ! .....LOL / This was not product bashing but based on security experience. The changes to BIOS will prove disastorous... read : ) 
 
We can expect Windows 8 to be launched sometime in mid-late 2012, however, it's too early to predict the Windows 8 release date, since it is still under development. Nevertheless, the only question that haunts each and every one of us - Will Windows 8 win the battle against Apple which it had lost several years back?
 
Bootkits
http://en.wikipedia.org/wiki/Bootkit#bootkit
A kernel-mode rootkit variant called a bootkit is used predominantly to attack full disk encryption systems, for example as in the "Evil Maid Attack", in which a bootkit replaces the legitimate boot loader with one controlled by an attacker; typically the malware loader persists through the transition to protected mode when the kernel has loaded.[35][36][37][38] For example, the "Stoned Bootkit" subverts the system by using a compromised boot loader to intercept encryption keys and passwords.[39] More recently, the Alureon rootkit has successfully subverted the requirement for 64-bit kernel-mode driver signing in Windows 7 by modifying the master boot record.[40]
The only known defenses against bootkit attacks are the prevention of unauthorized physical access to the system-a problem for portable computers-or the use of a Trusted Platform Module configured to protect the boot path.[41]

HISTORY TO DATE.....
Windows 8 Spells Trouble for Linux, Hackintosh Users and Malware Victims
http://tech.groups.yahoo.com/group/LinuxDucks/messages/523
Windows 8 won't dual-boot Linux?
http://tech.groups.yahoo.com/group/LinuxDucks/message/539
Microsoft, Red Hat Spar Over Secure Boot-loading Tech
http://tech.groups.yahoo.com/group/LinuxDucks/message/541
Windows 8 Dual Boot Possible If 'Secure Boot' Disabled
http://tech.groups.yahoo.com/group/LinuxDucks/message/544
How to change the boot order of a dual-boot Linux PC
http://tech.groups.yahoo.com/group/LinuxDucks/message/550
Linux Licensing in Conflict with Secure Boot Support
http://tech.groups.yahoo.com/group/LinuxDucks/message/565
FSF warns of Windows 8 Secure Boot (Sign Petition)
http://tech.groups.yahoo.com/group/LinuxDucks/message/626
Linux Foundation, Canonical and Red Hat Weigh In On Secure Boot
http://tech.groups.yahoo.com/group/LinuxDucks/message/650
The right to dual-boot: Linux groups plead case prior to Windows 8
http://tech.groups.yahoo.com/group/LinuxDucks/message/662
Linux Foundation: Secure Boot Need Not Be a Problem
http://tech.groups.yahoo.com/group/LinuxDucks/message/671
Linux Community Offers Secure Boot Ideas
http://tech.groups.yahoo.com/group/LinuxDucks/message/672
Leading PC makers confirm: no Windows 8 plot to lock out Linux
http://tech.groups.yahoo.com/group/LinuxDucks/message/673
Linux Advocates protest 'Designed for Windows 8′ secure boot policy
http://tech.groups.yahoo.com/group/LinuxDucks/message/679
Linux Community Counters Microsoft's Windows 8 Secure Boot Mandate
http://tech.groups.yahoo.com/group/LinuxDucks/message/696
 

INFORMATION LINKS
New Windows 8 Security Items

Unified Extensible Firmware Interface
http://en.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface
Hardware Design and Development for Windows 8
Unified Extensible Firmware Interface
http://msdn.microsoft.com/en-us/library/windows/hardware/br259114.aspx
Bootkits
http://en.wikipedia.org/wiki/Rootkit#bootkit
BIOS
http://en.wikipedia.org/wiki/BIOS

Windows 8 "Secure Boot"

Circumvented Already
http://news.softpedia.com/news/Windows-8-Bootkit-Might-Prove-Secure-Boot-Ineffective-235138.shtml
Comprimised already by bootkit:
http://www.itworld.com/security/225417/windows-8-secure-boot-already-cracked
http://arstechnica.com/business/news/2011/11/security-researcher-defeats-windows-8-secure-boot.ars?utm_source=rss&utm_medium=rss&utm_campaign=rss
http://www.pcworld.com/businesscenter/article/248342/windows_8_secure_boot_the_controversy_continues.html
(This is a great debate and many, many articles already )
http://linuxducks.free-forums.org/fsf-warns-of-windows-8-secure-boot-sign-petition-vt508.html

SelectionFile type iconFile nameDescriptionSizeRevisionTimeUser
Comments