What Kinds of Files Can Be Viruses?

What Kinds of Files Can Be Viruses?

Introduction and File Types to Watch Out For

In this section, the speaker introduces the topic of file types that hackers can use and focuses on the importance of being familiar with them. The speaker also mentions the significance of showing file extensions in Windows Explorer.

Common and Unfamiliar File Types

  • There are numerous file types that hackers can exploit, beyond .exes and .zip files.
  • Familiarity with these less common file types is crucial for protection against potential threats.
  • The video will primarily focus on Windows-specific file types.
  • Showing file extensions in Windows Explorer is recommended to identify the type of files.

Categories of Malicious File Types

This section provides an overview of five major categories of potentially malicious file types, including executables, library files, script files, program-specific documents with executable code (e.g., macros), and archive files.

Executables

  • Executable files directly execute code and can be run independently.
  • Examples include .exe files, but there are other executable file types as well.

Library Files

  • Library files structurally resemble executables but are called by other processes rather than running independently.
  • They contain general-use functions utilized by various programs.

Script Files

  • Script files are not run independently but require another program (e.g., a shell or script host) to execute them.
  • Scripts are human-readable when opened with Notepad or similar software.

Program-Specific Documents with Executable Code

  • Certain documents open in programs that allow executing code, such as macros in Microsoft Office files.
  • Allowing script code to run within these documents can pose risks similar to running a malicious executable file.

Archive Files

  • Archive files can contain various other file types.
  • The most common archive file type is .zip, but there are other types to be aware of.

Sponsor Message and Additional Protection

In this section, the speaker introduces Bitdefender Total Security as a comprehensive security suite that offers protection against malware and scams. The importance of protecting oneself online is emphasized.

Bitdefender Total Security

  • Bitdefender Total Security is more than just an antivirus program; it provides a complete security suite.
  • Features include network threat prevention, behavior analysis of new malware, anti-phishing measures, and fraud detection.
  • Online protection is crucial due to the increasing cleverness of hackers and scammers.

Conclusion

The transcript covers various file types that can be exploited by hackers. It emphasizes the importance of being familiar with these file types to protect against potential threats. Additionally, the speaker recommends using Bitdefender Total Security as a comprehensive security solution.

Types of Executables

In this section, the speaker discusses different types of executables that can be used for both legitimate and malicious purposes.

Common Executables Used by Hackers

  • EXE files are commonly known executables.
  • SCR files, which are screen saver files, can be used as executables by hackers due to their unfamiliarity among users.
  • COM and MSI files are also frequently used by hackers. While MSI is an installer file, it can contain arbitrary code called a Custom Action, making it potentially dangerous.
  • CPL and MSP files are less common but still possible executable file types to watch out for.

Script Files

  • BAT and CMD files run command prompt commands.
  • Other script file types include JS (JavaScript), VBS (Visual Basic Script), WSF (Windows Script File), JSE (Encoded JavaScript File), VBE (Encoded VBScript File), WSH (Windows Script Host File), and SCT (Windows Script Component).

Preventing Accidental Execution of Script Files

  • To prevent accidental execution of script files, create empty files with these extensions: .js, .vbs, .wsh, .jse, .vbe, and .sct.
  • Right-click on each file, select "Open With," choose Notepad as the program to open with, and set it as the default program. This will open the file in Notepad instead of executing it.

PowerShell Scripts

  • PowerShell scripts usually have the extensions .ps1 and .psm1.
  • While they typically require manual execution through the command line, be cautious if you encounter them in downloaded content as they could be used as a payload by viruses.

Shortcut Files

This section focuses on how regular shortcut files in Windows (.LNK) can potentially be used maliciously.

  • Shortcut files (.LNK) can be used to run commands, including potentially running other malicious files.
  • Hackers may use a zip file with a hidden DLL file and a shortcut file named "Attachment" to execute the DLL file through the command run by the shortcut.

Library Files

This section discusses library files such as DLL, DRV, and SYS files and their potential for misuse by hackers.

  • Library files like DLL, DRV, and SYS are not typically executed by double-clicking them.
  • However, hackers can still utilize shortcuts or other methods to execute these library files maliciously.

Archives

This section highlights the use of archives, particularly zip files, by hackers due to their familiarity among users.

  • Zip files are commonly used by hackers because people are familiar with them and often open them without suspicion.
  • Zip files have features that make them attractive to hackers for hiding malicious content.

Types of Malicious Files and Security Measures

In this section, the speaker discusses various types of malicious files and provides security measures to protect against them.

Common Archive Formats

  • ISO and IMG files are disk image files that can be mounted as virtual disks on a computer. Hackers have been using these file types more frequently.
  • Cabinet files are another type of archive format that can potentially contain malware.

Office Document Files

  • Office document files such as .docx, .xlsx, and .pptx can be malicious and may contain macros and scripts.
  • Less common file extensions like .docm, .xlsm, and .pptm indicate macro-enabled documents for Microsoft Office.
  • Templates for Office apps also have specific file types.
  • Regular document files could potentially have embedded objects that could be malicious.
  • It is important to exercise caution when dealing with these file types.

Security Settings for PDF Files

  • Adobe Reader users should enable the "Protected View" setting in the "Security (Enhanced)" preferences. This prevents scripts from running by default.
  • Users should avoid enabling all content unless they are certain the file is safe.
  • It is recommended to use this security setting as default since it is not always enabled by default in Adobe Reader.

Macros in Microsoft Office Programs

  • By default, Microsoft Office programs disable macros on files downloaded from the internet or external sources due to the "mark of the web" feature added by Windows.
  • However, caution should still be exercised with these files as zip files do not support the mark of the web data. Hackers can exploit this limitation to make their malicious macros undetectable by Windows.
  • While Office programs may not execute macros, it is still a hurdle that hackers can overcome.

General Advice and Conclusion

  • If a file extension is unfamiliar, it is best to avoid running it unless its purpose has been thoroughly researched and verified.
  • Being aware of the discussed file types and their potential risks can help users stay vigilant against malware.
  • Bitdefender Total Security is recommended for comprehensive protection against various forms of malware, scams, and fraud.

**** The transcript ends here.