2.2 THE PROCESS OF INFECTION
To understand how a malware infects a system, we go back to the elementary working of a computer. On booting, the system carries out the ROM (Read Only Memory) instructions, the first being the power on Self Test which is followed by the bootstrap process of reading the boot record and loading of the disk operating system. The booting process culminates into the system prompt displayed on the monitor.
The infection may begin as soon as a computer system boots from a contaminated disk or executes an infected program. Whatever malwares are present gets activated, which immediately begin to spread throughout the system.
Another important aspect that needs mention here is the interrupt mechanism. All input/output activities on a PC are carried out by interrupts. We will try to understand the concept of interrupt with an example. Let us say, a user wishes to save his program and presses on the key board. This is treated as an interrupt. The main memory has specific routines to handle these user requests. The program that services the interrupt request is termed as Interrupt Service Routines (ISR's) and is located in the memory with their addresses. Then interrupt request activates a number and not the routine address, thus, there exists a table with the interrupt numbers and the corresponding routine address. When an interrupt request is made, the CPU looks up the table, performs the required routines and transfers the control back to the program.
The contents of ISR address table being in the RAM is vulnerable to modification by user programs and that is what a virus doesmodifying the ISR'S.
The first commercial application of malware was in 1985, when two Pakistani brothers, in order to keep track of software piracy used Brain Virus (also known as Pakistani virus) on their low cost software sold from their outlet in Lahore. Hidden in nearly every disk they sold, was an extra program not supplied by the original manufacturer a snippet of computer code, selfreplicating in nature that would infect an unauthorized user's computer by disrupting his operations. These selfreplicating programs multiplied so fast that, today, they created a great threat to the smooth operation of a computer.
Comments
Post a Comment