The Computer Specialist Logo
CALL US
405-627-3168
FOLLOW US
  • Home
  • Services
  • Frequently Asked Questions
  • Book Appointment
  • Request a Quote
  • Blog

Case Study: What Is a Virus?

April 3, 2017 by John

Last Friday, 3/31/2017, we had an issue with a client who was reporting that antivirus had picked up a particular kind of virus, called a worm, which was called Bluber.A. The problem had arisen after a routine software update, so we told the client our tech would roll back that last update and try to figure out where the worm had come from. After that was a success, we pushed the update out again, and the worm did not return. What happened?

Types of Viruses

There are several types of software which you might call  a “virus”. A virus, specifically, is a type of malicious program (hereafter, “malware”) that reproduces itself. Once copying is complete, the affected files are said to be “infected”. Here are some other types of malware that you might find on an infected machine, adapted from Malware Truth:

  1. Adware: this is the least dangerous, but most lucrative form of malware. Adware displays unwanted popup advertisements on your computer.
  2. Spyware: Spyware spies on what you do, and sends that information back to its distributor. Paired with adware, you will get targeted advertisements.
  3. Worm: A worm works to eat your hard drive, much like earthworms go through dirt. Like their organic cousins, computer worms leave unusable refuse behind them. Unlike their organic cousins, their leavings are not good for your garden.
  4. Trojan: Trojan software makes itself look desirable to encourage you to download it. It might look like a game or a music track you want to hear. It might actually have the desired content, but it definitely has a viral payload inside, as well. A Trojan can allow hackers to gain access to your machine remotely, and you might never know they are there.
  5. Ransomware: Ransomware has become popular recently with hackers. It locks you out of your own computer and demands payment, usually in the form of digital commodities like BitCoin. The money you pay to convert into BitCoin is much harder to trace than other payment methods, and it is fairly easy for criminals to convert back into cash. Ransomware can be defeated by regular backups.
  6. Fake Antivirus: You may see advertisements for antivirus software online. Be careful and stick with reputable solutions, because otherwise you will be tricked into downloading the fake stuff! While claiming to be good antivirus, a fake program will actually contain another kind of malware, particularly something like a Trojan or Ransomware.
  7. Browser Hijackers: If your internet homepage suddenly changes, especially after installing a new piece of software, you could be victimized by a Browser Hijacker. These are the latest in the Adware/Spyware type, and they function as a way to funnel your clicks and searches into money for the hacker or as a gateway for more malware.

What Happened?

It turned out that the Bluber.A infection was a false positive! Antivirus functions on rules called heuristics, which are guidelines that tell your antivirus program what a virus might look like. The antivirus software provider occasionally updates these rules to keep them up-to-date and prevent malware from spreading. Making these rules are definitely more art than science, and sometimes antivirus will report malware when none exists. Antivirus software has to be oversensitive, because the worst outcome would be a false negative – detecting no virus when one does, in fact, exist on the system. Fortunately for us, the Bluber worm had not made a comeback (Microsoft first detected it in 2012), but their antivirus definitions were simply bugged temporarily. Updating the system made the problem go away.

Do you have a problem with viruses? We can help!

Do you need help with your small business’s technology? Contact us today!

Filed Under: Case Study Tagged With: antivirus, bluber, case study, virus, worm

Share:

Services

  • Mobile Phone Repair
  • Remote Tech Support
  • Online Computer Help
  • Small Business IT Services
  • Data Backup and Recovery
  • Networking
  • Virus Removal & Prevention

Recent Posts

  • The Psychology of Social Engineering
  • 3 Tools that Hackers Use to Assault Your Computer
  • Decrypt0r? I hardly knew ‘er! WannaCry and the Importance of Updates
  • Anatomy of a Social Engineering Attack
  • How to End the Threat of Social Engineering

Testimonials

  • Over the last twenty years I have served both small and large business clients as a contract accountant. When there has been a need for computer technical assistance in these offices or in my own business office, I have used John Williams, dba The Computer Specialist. I have found that he makes himself available to... Read More
    Kathy F
  • John spent several hours setting up my new home computer system. He took out the hard drive and installed a 500GB SSD. He needed some special installation pieces and went to a local source without billing me for his travel time there and back. He did a great job and I have his number in... Read More
    Dr. Robert G
  • We've been very impressed with the whole process of top to bottom site system security monitoring of our computers as well as the installation, maintenance, and upgrades done with our surveillance platform for our commercial property. From consulting to quote to execution and beyond we have been very pleased with every aspect of the business!... Read More
    Andrew R.
  • very nice man to deal with, came a day earlier than he said he would. gave me a call to let me know. he did a great job and it looks very nice as well. I now have internet in my shop as fast as in my house. thanks John for a job well done Read More
    Gary H.
  • You recommended them. They picked up my computer and determined the hard drive crashed. They replaced it and were able to save all my docs and photos. Extremely pleased. Read More
    Larry C.

VISIT US

FOLLOW US

The Computer Specialist

405-627-3168
218 1/2 East Main St. Suite "B"
Norman, OK 73069

Testimonials

  • Over the last twenty years I have served both small and large business clients as a contract accountant. When there has been a need for computer technical assistance in these offices or in my own business office, I have used John Williams, dba The Computer Specialist. I have found that he makes himself available to... Read More
    Kathy F
  • John spent several hours setting up my new home computer system. He took out the hard drive and installed a 500GB SSD. He needed some special installation pieces and went to a local source without billing me for his travel time there and back. He did a great job and I have his number in... Read More
    Dr. Robert G
  • We've been very impressed with the whole process of top to bottom site system security monitoring of our computers as well as the installation, maintenance, and upgrades done with our surveillance platform for our commercial property. From consulting to quote to execution and beyond we have been very pleased with every aspect of the business!... Read More
    Andrew R.
  • very nice man to deal with, came a day earlier than he said he would. gave me a call to let me know. he did a great job and it looks very nice as well. I now have internet in my shop as fast as in my house. thanks John for a job well done Read More
    Gary H.
  • You recommended them. They picked up my computer and determined the hard drive crashed. They replaced it and were able to save all my docs and photos. Extremely pleased. Read More
    Larry C.

Copyright © 2019 · The Computer Specialist · 218 1/2 East Main St. Suite "B", Norman, OK 73069 · Powered by Tech Site Builder