Cyber Awareness

Virus Attack and Ransomware

What is Computer Virus?

A Computer Virus is a type of Malicious Software that, when executed, replicates itself by modifying other computer programs and inserting its own code.

Types of Computer Virus

Ransomware Virus

Ransomware is a type of Malware that prevents one from using his/her computer or accessing certain files unless he/she pays a ransom. It often encrypts files so that they cannot be opened.


Boot Sector Virus

A Boot Sector virus is a type of virus that infects the boot sector of floppy disks or the Master Boot Record (MBR) of hard disks (some infect the boot sector of the hard disk instead of the MBR). The infected code runs when the system is booted from an infected disk.But once loaded, it will infect other floppy disks when accessed in the infected computer. While boot sector viruses infect at a BIOS level, they use DOS commands to spread to other floppy disks. For this reason, they started to fade from the scene after the appearance of Windows 95 (which made little use of DOS instructions). Today, there are programs known as ‘bootkits’ that write their code to the MBR as a means of loading early in the boot process and then concealing the actions of malware running under Windows. However, they are not designed to infect removable media.

The only absolute criterion for a boot sector is that it must contain 0x55 and 0xAA as its last two bytes. If this signature is not present or is corrupted, the computer may display an error message and refuse to boot. Problems with the sector may be due to physical drive corruption or the presence of a boot sector virus.


Computer Worms

A Worm Virus is a malicious, self-replicating program that can spread throughout a network without human assistance.

Worms cause damage similar to viruses, exploiting holes in security software and potentially stealing sensitive information, corrupting files and installing a back door for remote access to the system, among other issues.

Worms often utilize large amounts of memory and bandwidth, so affected servers, networks and individual systems are often overloaded and stop responding.

But worms are not viruses. Viruses need a host computer or operating system. The worm program operates alone.

The worm is often transmitted via file-sharing networks, information-transport features, and email attachments or by clicking links to malicious websites. Once downloaded, the worm takes advantage of a weakness in its target system or tricks a user into executing it. Some worms have a phishing component that entices users to run the malicious code.

Internet worms are often designed to exploit new security issues, and search for systems that haven’t installed current software or operating system security updates.

Classifications and names of worms include:

  • Email-Worm
  • IM-Worm
  • IRC-Worm
  • Net-Worm
  • P2P-Worm

Trojan Virus

A Trojan Horse or Trojan virus is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system.


Rootkit Virus

A Rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. Today rootkits are generally associated with malware, such as trojans, worms, viruses – that conceal their existence and actions from users and other system processes.


Macro Virus

A Macro Virus is a computer virus written in the same macro language as the software it infects — common victims include Microsoft Excel and Word. Because they target software rather than systems, Macro Viruses can infect any operating system. So a Macro Virus can infect a PC or Mac.

How to safeguard your computer from viruses

Keep your software up-to-date

Software makers like Microsoft and Oracle routinely update their software to fix bugs that could potentially be exploited by hackers.


Don’t click on links within emails

A good rule of thumb is if you don’t recognize a sender of an email, don’t click on any links within it. Microsoft says 44.8 percent of Windows virus infections happen because the computer user clicked on something.


Use antivirus software

You can buy antivirus software like Avast, MacAfee, Bitdefender etc.,


Back up your computer

Regularly back up the information on your computer. You have three basic backup options: an external hard drive, online backup service, or cloud storage. Use a service like Google Drive, and your files will be continually backed up to the cloud.


Use a strong password

A strong password is one that is complex, with a mix of letters, numbers, and symbols. While some people use the same password for everything, try to avoid that practice.

Password security company SplashData.com says the three most common passwords are password, 123456, and 12345678. The company recommends avoiding using the same user name/password combination for multiple online site logins.

When creating a password, use eight characters or more and, to make them easier to remember, try using short phrases separated by spaces or underscore marks – such as “Car_123_@#$”


Use a firewall

Just because you have antivirus software running doesn’t mean you have a firewall. Both PCs and Macs come with built-in firewall software. Be sure to check that it’s enabled.


Minimize downloads

Make sure your Web browser’s security settings are high enough to detect unauthorized downloads. For Internet Explorer, the medium security setting is the minimum level to use.


Use a pop-up blocker

Web browsers have the ability to stop pop-up windows and allow you to set the security for accepting pop-ups or use popup blocker.

Incident Reporting

How & Where to Report a Cyber Fraud?

  • Take a clearly visible screenshot of the evidence.
  • Brief facts of the complaint explaining how you have come in contact with the alleged person/website and subsequent fraud.
  • Visit the nearest Police Station/Cyber Cell immediately.
  • To report cybercrime complaints online, visit the National Cyber Crime Reporting Portal. This portal can be accessed at https://cybercrime.gov.in. In this portal, there are two sections. One section is to report crimes related to Women and Children (where reports can be filed anonymously as well). Another section is to report other types of cybercrimes. Complaint can also be filed via offline by dialing the helpline number 1930 which connects to the T4C i.e., Telangana Cyber Crimes Co-ordination Centre from which authorized personnel will guide the victim in freezing/ withholding the victim's amount in the bank account.