Viruses Revealed

Total Page:16

File Type:pdf, Size:1020Kb

Viruses Revealed Y L F M A E T Team-Fly® Blind Folio i Viruses Revealed David Harley, Robert Slade, Urs Gattiker Osborne/McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright © 2001 by The McGraw-Hill Companies, Inc. All rights reserved. Manufactured in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a data- base or retrieval system, without the prior written permission of the publisher. 0-07-222818-0 The material in this eBook also appears in the print version of this title: 0-07-213090-3. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales pro- motions, or for use in corporate training programs. For more information, please contact George Hoare, Special Sales, at [email protected] or (212) 904-4069. TERMS OF USE This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGraw-Hill”) and its licensors reserve all rights in and to the work. Use of this work is subject to these terms. Except as permitted under the Copyright Act of 1976 and the right to store and retrieve one copy of the work, you may not decompile, disassemble, reverse engineer, reproduce, modify, create derivative works based upon, transmit, distribute, disseminate, sell, publish or sublicense the work or any part of it without McGraw-Hill’s prior consent. You may use the work for your own noncommercial and personal use; any other use of the work is strictly prohibited. Your right to use the work may be terminated if you fail to comply with these terms. THE WORK IS PROVIDED “AS IS”. McGRAW-HILL AND ITS LICENSORS MAKE NO GUAR- ANTEES OR WARRANTIES AS TO THE ACCURACY, ADEQUACY OR COMPLETENESS OF OR RESULTS TO BE OBTAINED FROM USING THE WORK, INCLUDING ANY INFORMA- TION THAT CAN BE ACCESSED THROUGH THE WORK VIA HYPERLINK OR OTHERWISE, AND EXPRESSLY DISCLAIM ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. McGraw-Hill and its licensors do not warrant or guarantee that the func- tions contained in the work will meet your requirements or that its operation will be uninterrupted or error free. Neither McGraw-Hill nor its licensors shall be liable to you or anyone else for any inac- curacy, error or omission, regardless of cause, in the work or for any damages resulting therefrom. McGraw-Hill has no responsibility for the content of any information accessed through the work. Under no circumstances shall McGraw-Hill and/or its licensors be liable for any indirect, incidental, special, punitive, consequential or similar damages that result from the use of or inability to use the work, even if any of them has been advised of the possibility of such damages. This limitation of lia- bility shall apply to any claim or cause whatsoever whether such claim or cause arises in contract, tort or otherwise. DOI: 10.1036/0072228180 Blind Folio iii It has been said, in regard to computer network communities, that no community is worthy of the name until it has had a wedding and a funeral. We, in the computer virus research tribe, have had both. We will not embarrass the newlyweds here. We wish, however, to dedicate this book to the memory of Ysrael Radai and Harold Joseph Highland. Their contributions to our field, and to so many others, are appreciated, and they will be sorely missed. To the Meeter Machine, and its viral output. —Robert Slade To my daughter Katie, my constant reminder that computer security should not be confused with real life. Now, perhaps, we’ll have time to play Monopoly. Also to my mother, Gwendoline Harley, for being an honorary parent to Katie when I had to find time for Baby Book. —David Harley Dedicated to my friends Inger Marie, Melanie, Lars, Rainer, Stefano, and all my current and past students who continue in keeping me going when obstacles seem insurmountable. —Urs Gattiker This page intentionally left blank. For more information about this title, click here. Table of Contents Foreword . xxi About the Authors . xxv Acknowledgments . xxix Introduction . xxxi I The Problem 1 Baseline Definitions . 3 Computer Virus Fact and Fantasy . 4 Definitions . 5 Viruses and Virus Mechanisms . 6 Virus Structure . 7 Damage . 7 Damage Versus Infection . 8 Stealth Mechanisms . 9 Polymorphism . 10 What Is This, a UNIX Textbook? . 10 Diet of Worms . 12 Trojan Horses . 12 In the Wild . 13 Instant Guide to Anti-Virus Software . 15 Summary . .16 2 Historical Overview . 17 Virus Prehistory: Jurassic Park to Xerox PARC . 18 Wormholes . 19 Core Wars . 19 The Xerox Worm (Shoch/Hupp Segmented Worm) . 20 Real Viruses: Early Days . 22 v Copyright 2001 by The McGraw-Hill Companies, Inc. Click Here for Terms of Use. vi Viruses Revealed 1981: Early Apple II Viruses . 22 1983: Elk Cloner . 23 1986: © BRAIN . 25 1987: Goodnight Vienna, Hello Lehigh . 26 1988: The Worm Turns . 27 The Internet Age . .30 1989: Worms, Dark Avenger, and AIDS . 30 1990: Polymorphs and Multipartites . 32 1991: Renaissance Virus, Tequila Sunrise . 33 1992: Revenge of the Turtle . 34 1993: Polymorphism Rules . 36 1994: Smoke Me a Kipper . 37 1995: Microsoft Office Macro Viruses . 38 1996: Macs, Macros, the Universe, and Everything . 39 1997: Hoaxes and Chain Letters . 40 1998: It’s No Joke . 40 1999: Here Comes Your 19th Server Meltdown . 41 2000: Year of the VBScript Virus/Worm . 43 And So It Goes... 48 Summary . .49 3 Malware Defined . 51 What Computers Do . 52 Virus Functionality . .53 Application Functionality Versus Security . 53 In-the-Wild Versus Absolute Big Numbers . 54 What Do Anti-Virus Programs Actually Detect? . 57 Viruses . 58 Worms . 61 Intendeds . 62 Corruptions . 63 Germs . 64 Droppers . 64 Test Viruses . 65 Generators . 65 Trojans . 66 Password Stealers and Backdoors . 70 Jokes . 71 Contents vii Remote-Access Tools (RATs) . 74 DDoS Agents . 75 Rootkits . 77 False Alarms . 77 Summary . .79 4 Virus Activity and Operation . 81 How Do You Write a Virus? . 83 Tripartite Structure . 87 Infection Mechanism . 87 Trigger . 88 Payload . 88 Replication . 90 Non-Resident Viruses . 91 Memory-Resident Viruses . 91 Hybrid Viruses . 92 Generality, Extent, Persistence . ..
Recommended publications
  • UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations
    UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations Title A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Permalink https://escholarship.org/uc/item/6w76f8x7 Author Swift, Kathy Publication Date 2017 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Santa Barbara A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Education by Kathleen Anne Swift Committee in charge: Professor Richard Duran, Chair Professor Diana Arya Professor William Robinson September 2017 The dissertation of Kathleen Anne Swift is approved. ................................................................................................................................ Diana Arya ................................................................................................................................ William Robinson ................................................................................................................................ Richard Duran, Committee Chair June 2017 A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Copyright © 2017 by Kathleen Anne Swift iii ACKNOWLEDGEMENTS I would like to thank the members of my committee for their advice and patience as I worked on gathering and analyzing the copious amounts of research necessary to
    [Show full text]
  • Virus Bulletin, August 1994
    ISSN 0956-9979 AUGUST 1994 THE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Richard Ford CONTENTS Technical Editor: Fridrik Skulason Consulting Editor: Edward Wilding, EDITORIAL Network Security Management, UK Bigger, By Being Better? 2 VIRUS PREVALENCE TABLE 3 NEWS Central Point Merger Completed 3 Pathogen Author Arrested 3 IBM PC VIRUSES (UPDATE) 4 IN THIS ISSUE: INSIGHT CARO explained. Many people have no idea what Schwartau on Security 6 CARO is, what it does, or how to join it. Everything you ever wanted to know about the organisation but were FEATURE afraid to ask is on pp.8-9. CARO: A Personal View 8 The professionals professional. For the first time VIRUS ANALYSES ever, VB reviews AVP, one of Russias leading virus 1. AntiCMOS - Brain Damage 9 scanners: have researchers behind the former Iron 2. A Pile of Junk? 11 Curtain made as many advances in their work as those in 3. Pure Thoughts 13 the West? FEATURE The Lotus position. Lotus has adopted a novel ap- Epidemic Virus Control 15 proach to the prevention of large-scale virus outbreaks within the company. How effective is its technique, and PRODUCT REVIEWS is it a practical alternative in other companies? See p.15. 1. AVP - A Professional Choice 18 2. NetShield 1.5 21 END NOTES & NEWS 24 VIRUS BULLETIN ©1994 Virus Bulletin Ltd, 21 The Quadrant, Abingdon, Oxfordshire, OX14 3YS, England. Tel. +44 (0)235 555139. /94/$0.00+2.50 No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form without the prior written permission of the publishers.
    [Show full text]
  • 59520611.Pdf
    SOFTWARE • The software provides the commands that tell the hardware what tasks to perform, what to read and write, how to send the end result (the output) to a monitor and/or printer. • Software is the programs and data that a computer uses. • Software is kept on some hardware device such as a hard disk or floppy disk, but it itself is intangible. • Software consists of both programs and data. Programs are lists of instructions for the processor. Data can be any information that a program needs: character data, numerical data, image data, audio data, and countless other types. KINDS OF SOFTWARE • Application software (usually called just "applications") are programs that people use to get their work done. It may include data entry; update query and report programs, productivity software for spreadsheets, word processing, databases and custom accounting programs for payroll, billing and inventory. It is designed to help people with specific task such as making a spreadsheet of creating a graphic image. Example of Application Software: Word Processor Microsoft Word Lotus Word Pro Word Perfect Spreadsheet Software Microsoft Excel Lotus 123 Quicken Presentation Software Microsoft PowerPoint Lotus Freelance Graphics Database Software Microsoft Access Lotus Approach Web Browser Internet Explorer Netscape Navigator PIM (Personal Information Manager) - software designed to organize names, addresses, and random notes for easy and efficient retrieval. It is just like an electronic equivalent of a conven- tional book-type personal organizer. PIM usually features an automatic dialing telephone list, a programmable calendar and an automatic reminder scheduler. It is ideal for people with hectic schedules who spend a lot of time working with their computers.
    [Show full text]
  • La Sécurité Informatique Edition Livres Pour Tous (
    La sécurité informatique Edition Livres pour tous (www.livrespourtous.com) PDF générés en utilisant l’atelier en source ouvert « mwlib ». Voir http://code.pediapress.com/ pour plus d’informations. PDF generated at: Sat, 13 Jul 2013 18:26:11 UTC Contenus Articles 1-Principes généraux 1 Sécurité de l'information 1 Sécurité des systèmes d'information 2 Insécurité du système d'information 12 Politique de sécurité du système d'information 17 Vulnérabilité (informatique) 21 Identité numérique (Internet) 24 2-Attaque, fraude, analyse et cryptanalyse 31 2.1-Application 32 Exploit (informatique) 32 Dépassement de tampon 34 Rétroingénierie 40 Shellcode 44 2.2-Réseau 47 Attaque de l'homme du milieu 47 Attaque de Mitnick 50 Attaque par rebond 54 Balayage de port 55 Attaque par déni de service 57 Empoisonnement du cache DNS 66 Pharming 69 Prise d'empreinte de la pile TCP/IP 70 Usurpation d'adresse IP 71 Wardriving 73 2.3-Système 74 Écran bleu de la mort 74 Fork bomb 82 2.4-Mot de passe 85 Attaque par dictionnaire 85 Attaque par force brute 87 2.5-Site web 90 Cross-site scripting 90 Défacement 93 2.6-Spam/Fishing 95 Bombardement Google 95 Fraude 4-1-9 99 Hameçonnage 102 2.7-Cloud Computing 106 Sécurité du cloud 106 3-Logiciel malveillant 114 Logiciel malveillant 114 Virus informatique 120 Ver informatique 125 Cheval de Troie (informatique) 129 Hacktool 131 Logiciel espion 132 Rootkit 134 Porte dérobée 145 Composeur (logiciel) 149 Charge utile 150 Fichier de test Eicar 151 Virus de boot 152 4-Concepts et mécanismes de sécurité 153 Authentification forte
    [Show full text]
  • Lecture Three Systems Systems
    Complex Complex Sociotechnical Press... Sociotechnical Lecture Three Systems Systems Stories of Complex Sociotechnical Systems: Measuring Measuring Measurement, Mechanisms, and Meaning Happiness Happiness Some motivation Some motivation Measuring emotional Measuring emotional Lipari Summer School, Summer, 2012 content content Data sets Data sets Analysis I “Social Scientists wade into the Tweet Analysis Songs Songs Prof. Peter Dodds Blogs stream” by Greg Miller, Blogs Tweets Science, 333, 1814–1815, 2011 [15] Tweets Positivity Bias Positivity Bias Department of Mathematics & Statistics | Center for Complex Systems | “Does a Nation’s Mood Lurk in Its Songs and Vermont Advanced Computing Center | University of Vermont References I References Blogs?” by Benedict Carey New York Times, August 2009. () I More here: http://www.uvm.edu/∼pdodds/research/ () Licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License. 1 of 83 4 of 83 Complex Complex Outline Sociotechnical Happiness: Sociotechnical Systems Systems Measuring Measuring Measuring Happiness Happiness Happiness Some motivation Some motivation Some motivation Measuring emotional Measuring emotional content content Measuring emotional content Data sets Data sets Data sets Analysis Analysis Songs Songs Blogs Blogs Tweets Tweets Analysis Positivity Bias Positivity Bias Songs References References Blogs Tweets Bentham: Jefferson: Positivity Bias Socrates et al.: hedonistic . the pursuit of eudaimonia [8] calculus happiness References 2 of 83 6 of 83 Complex Complex
    [Show full text]
  • Paradise Lost , Book III, Line 18
    _Paradise Lost_, book III, line 18 %%%%%%%%%%%%%%%%%%%%%%%% ++++++++++Hacker's Encyclopedia++++++++ ===========by Logik Bomb (FOA)======== <http://www.xmission.com/~ryder/hack.html> ---------------(1997- Revised Second Edition)-------- ##################V2.5################## %%%%%%%%%%%%%%%%%%%%%%%% "[W]atch where you go once you have entered here, and to whom you turn! Do not be misled by that wide and easy passage!" And my Guide [said] to him: "That is not your concern; it is his fate to enter every door. This has been willed where what is willed must be, and is not yours to question. Say no more." -Dante Alighieri _The Inferno_, 1321 Translated by John Ciardi Acknowledgments ---------------------------- Dedicated to all those who disseminate information, forbidden or otherwise. Also, I should note that a few of these entries are taken from "A Complete List of Hacker Slang and Other Things," Version 1C, by Casual, Bloodwing and Crusader; this doc started out as an unofficial update. However, I've updated, altered, expanded, re-written and otherwise torn apart the original document, so I'd be surprised if you could find any vestiges of the original file left. I think the list is very informative; it came out in 1990, though, which makes it somewhat outdated. I also got a lot of information from the works listed in my bibliography, (it's at the end, after all the quotes) as well as many miscellaneous back issues of such e-zines as _Cheap Truth _, _40Hex_, the _LOD/H Technical Journals_ and _Phrack Magazine_; and print magazines such as _Internet Underground_, _Macworld_, _Mondo 2000_, _Newsweek_, _2600: The Hacker Quarterly_, _U.S. News & World Report_, _Time_, and _Wired_; in addition to various people I've consulted.
    [Show full text]
  • Wavetek 488RT Manual
    Full-service, independent repair center -~ ARTISAN® with experienced engineers and technicians on staff. TECHNOLOGY GROUP ~I We buy your excess, underutilized, and idle equipment along with credit for buybacks and trade-ins. Custom engineering Your definitive source so your equipment works exactly as you specify. for quality pre-owned • Critical and expedited services • Leasing / Rentals/ Demos equipment. • In stock/ Ready-to-ship • !TAR-certified secure asset solutions Expert team I Trust guarantee I 100% satisfaction Artisan Technology Group (217) 352-9330 | [email protected] | artisantg.com All trademarks, brand names, and brands appearing herein are the property o f their respective owners. Find the Rockwell / Allen-Bradley 1784-T45 at our website: Click HERE WAVETEK WaveTese Runtime 488-RT WAVETE ST SOFTyARE PREFACE WaveTest Runtime (488-R1) enables you to run already developed and debugged automatic test programs. Clear. easy-to -use screens with pull-down menus guide you through program execu- tion. Programs developed with WaveTest (488) can be loaded and exe- cuted. The operator will have available all of the operator dialogs and runtime output that have been included in the test program. There are no editing capabilities. Chapter 1. Configuring Chapter 1 tells you how to setup WaveTest Runtime. This in- cludes ways to automatically load and run a test program. Chap- ter 1 also has useful information regarding how to effectively use the runtime environment of Windows. Chapter 2. Reference Chapter 2 describes the windows and menus available for access- ing test programs and controlloing their execution. Chapter 2 is not meant to be read through, but rather referred to for help with questions as they arise.
    [Show full text]
  • Tangled Web : Tales of Digital Crime from the Shadows of Cyberspace
    TANGLED WEB Tales of Digital Crime from the Shadows of Cyberspace RICHARD POWER A Division of Macmillan USA 201 West 103rd Street, Indianapolis, Indiana 46290 Tangled Web: Tales of Digital Crime Associate Publisher from the Shadows of Cyberspace Tracy Dunkelberger Copyright 2000 by Que Corporation Acquisitions Editor All rights reserved. No part of this book shall be reproduced, stored in a Kathryn Purdum retrieval system, or transmitted by any means, electronic, mechanical, pho- Development Editor tocopying, recording, or otherwise, without written permission from the Hugh Vandivier publisher. No patent liability is assumed with respect to the use of the infor- mation contained herein. Although every precaution has been taken in the Managing Editor preparation of this book, the publisher and author assume no responsibility Thomas Hayes for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. Project Editor International Standard Book Number: 0-7897-2443-x Tonya Simpson Library of Congress Catalog Card Number: 00-106209 Copy Editor Printed in the United States of America Michael Dietsch First Printing: September 2000 Indexer 02 01 00 4 3 2 Erika Millen Trademarks Proofreader Benjamin Berg All terms mentioned in this book that are known to be trademarks or ser- vice marks have been appropriately capitalized. Que Corporation cannot Team Coordinator attest to the accuracy of this information. Use of a term in this book should Vicki Harding not be regarded as affecting the validity of any trademark or service mark. Design Manager Warning and Disclaimer Sandra Schroeder Every effort has been made to make this book as complete and as accurate Cover Designer as possible, but no warranty or fitness is implied.
    [Show full text]
  • June 2020 Volume 87 / Number 6
    JUNE 2020 VOLUME 87 / NUMBER 6 President Kevin Maher Publisher Frank Alkyer Editor Bobby Reed Reviews Editor Dave Cantor Contributing Editor Ed Enright Creative Director ŽanetaÎuntová Design Assistant Will Dutton Assistant to the Publisher Sue Mahal Bookkeeper Evelyn Oakes ADVERTISING SALES Record Companies & Schools Jennifer Ruban-Gentile Vice President of Sales 630-359-9345 [email protected] Musical Instruments & East Coast Schools Ritche Deraney Vice President of Sales 201-445-6260 [email protected] Advertising Sales Associate Grace Blackford 630-359-9358 [email protected] OFFICES 102 N. Haven Road, Elmhurst, IL 60126–2970 630-941-2030 / Fax: 630-941-3210 http://downbeat.com [email protected] CUSTOMER SERVICE 877-904-5299 / [email protected] CONTRIBUTORS Senior Contributors: Michael Bourne, Aaron Cohen, Howard Mandel, John McDonough Atlanta: Jon Ross; Boston: Fred Bouchard, Frank-John Hadley; Chicago: Alain Drouot, Michael Jackson, Jeff Johnson, Peter Margasak, Bill Meyer, Paul Natkin, Howard Reich; Indiana: Mark Sheldon; Los Angeles: Earl Gibson, Andy Hermann, Sean J. O’Connell, Chris Walker, Josef Woodard, Scott Yanow; Michigan: John Ephland; Minneapolis: Andrea Canter; Nashville: Bob Doerschuk; New Orleans: Erika Goldring, Jennifer Odell; New York: Herb Boyd, Bill Douthart, Philip Freeman, Stephanie Jones, Matthew Kassel, Jimmy Katz, Suzanne Lorge, Phillip Lutz, Jim Macnie, Ken Micallef, Bill Milkowski, Allen Morrison, Dan Ouellette, Ted Panken, Tom Staudter, Jack Vartoogian; Philadelphia: Shaun Brady; Portland: Robert Ham; San Francisco: Yoshi Kato, Denise Sullivan; Seattle: Paul de Barros; Washington, D.C.: Willard Jenkins, John Murph, Michael Wilderman; Canada: J.D. Considine, James Hale; France: Jean Szlamowicz; Germany: Hyou Vielz; Great Britain: Andrew Jones; Portugal: José Duarte; Romania: Virgil Mihaiu; Russia: Cyril Moshkow.
    [Show full text]
  • UF Student Becomes Youngest Elected Official In
    We Inform. You Decide. www.alligator.org VOLUME 115 ISSUE 12 MONDAY, NOVEMBER 16, 2020 Not officially associated with the University of Florida Published by Campus Communications, Inc. of Gainesville, Florida Is it enough? UF students ask for more mental health services CWC FUNDING CRITICISMS Escoto said program directors HAVE COMPOUNDED began researching virtual counsel- AS STUDENTS EXPRESS ing alternatives, setting up technol- DISSATISFACTION WITH THE ogy and training staff to jumpstart STATE OF THE PROGRAM their tele-mental health services as soon as UF moved online. The cen- By Jack Prator ter dipped into its savings to pay Alligator Staff Writer for these unforeseen expenses. He expects that remote CWC Editor’s note: This article services are not just a temporary contains a reference to suicidal solution to the challenges of the thoughts. Students were granted pandemic. anonymity for reasons including “We’re kind of surprised that it the sensitivity of the topic and actually works,” Escoto said. “It’s their ongoing interactions with been pretty effective in a lot of the CWC. spaces. And so, there is no reason for us to go back to fully providing “U Matter, We Care” is the slo- everything in person.” gan adopted by UF’s Counseling He said he expects to see a hy- & Wellness Center. It feels like an brid option developed, when it is empty gesture to some students safe to do so in light of the pan- who have sought out the center’s demic, with the hope it provides services. better flexibility for students. Students’ experiences vary, After being on the waitlist for with accounts of long wait times, two weeks, a 19-year-old UF astro- feelings of being brushed off by physics sophomore said she saw CWC counselors and a lack of a CWC counselor for four months transparency about UF’s available before the pandemic hit.
    [Show full text]
  • Editorial Sommaire
    www.grasco.eu Parution trimestrielle www.larevuedugrasco.eu N°8— Février 2014 gratuite EDITORIAL SOMMAIRE EDITO1 Vers une directive « investigations fi- INTERVIEW : nancières » pour lutter contre le déve- EMILE PEREZ, DIRECTEUR DE LA COOPÉRATION INTER- NATIONALE4 loppement de l’économie criminelle ? . JACQUES BARROT, MEMBRE DU CONSEIL CONSTITU- TIONNEL, ANCIEN VICE-PRÉSIDENT DE LA COMMISSION EUROPÉENNE, CHARGÉ DE JUSTICE, LIBERTÉ ET SÉCU- RITÉ8 e CEIFAC accueillera, à Strasbourg, sa seconde promotion, RAPPORTS : DESSINER LE MINISTÈRE PUBLIC DE DEMAIN, À PROPOS du 17 mars au 4 avril 2013, formée de 30 représentants des DU RAPPORT NADAL, PAR MYRIAM QUÉMÉNER9 autorités de justice/police-gendarmerie/Douanes et Rensei- L CONSTATS ET PRÉCONISATIONS : gnement des Etats membres de l’Union européenne. DU RAPPORT NORA-MINC À LA LUTTE CONTRE LA CYBERCRIMINALITÉ, PAR ANNE SOUVIRA11 Créé eu sein de l’Université de Strasbourg dans le cadre d’un parte- PHÉNOMÉNOLOGIE DE LA CRIMINOLOGIE ORGANISÉE : nariat européen, le CEIFAC vise à promouvoir, au sein des Etats LES ESCROQUERIES AUX FAUX ORDRES DE VIREMENT, membres, le développement des investigations financières et de PAR PHILIPPE PETITPREZ16 FINANCE ET CRIME : PUISSANCES, HYBRIDATIONS, l’analyse financière dans le but de mieux lutter contre le dévelop- CONVERGENCES, PAR JEAN-FRANÇOIS GAYRAUD22 pement de l’infiltration de l’économie par des flux d’argent illicite. BLANCHIMENT D’ARGENT, UN NOUVEAU FLÉAU POUR Elles doivent également permettre de déjouer les fraudes finan- LES PARIS SPORTIFS, PAR CHRISTIAN KALB ET PIM VERSCHUUREN25 cières de grande envergure considérées comme étant en partie res- LA PRODUCTION ET LE TRAFIC DE CANNABIS DANS LE ponsables de la crise économique actuelle et qui menacent de dé- SUD DES BALKANS, PAR CYRILLE BAUMGARTNER31 stabiliser les systèmes financiers à l’échelle internationale.
    [Show full text]
  • Chapter 3: Viruses, Worms, and Blended Threats
    Chapter 3 Chapter 3: Viruses, Worms, and Blended Threats.........................................................................46 Evolution of Viruses and Countermeasures...................................................................................46 The Early Days of Viruses.................................................................................................47 Beyond Annoyance: The Proliferation of Destructive Viruses .........................................48 Wiping Out Hard Drives—CIH Virus ...................................................................48 Virus Programming for the Masses 1: Macro Viruses...........................................48 Virus Programming for the Masses 2: Virus Generators.......................................50 Evolving Threats, Evolving Countermeasures ..................................................................51 Detecting Viruses...................................................................................................51 Radical Evolution—Polymorphic and Metamorphic Viruses ...............................53 Detecting Complex Viruses ...................................................................................55 State of Virus Detection.........................................................................................55 Trends in Virus Evolution..................................................................................................56 Worms and Vulnerabilities ............................................................................................................57
    [Show full text]