Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

is there much of a timeline to how viruses and malware work?


  • Please log in to reply
3 replies to this topic

#1 Carpentry

Carpentry

  • Members
  • 61 posts
  • OFFLINE
  •  
  • Local time:03:24 AM

Posted 05 August 2016 - 02:19 PM

Lets say I download some virus/malware that gathers info on my system. The second the download completes would the transmission of my data begin?

 

 



BC AdBot (Login to Remove)

 


#2 Viper_Security

Viper_Security

  • Members
  • 826 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:127.0.0.1
  • Local time:04:24 AM

Posted 05 August 2016 - 03:02 PM

It depends on how it was written, some may lay dormant for months even years before they activate.

 

you'd have to dissect the malware to find that out, each malware is different.

 

and hell some may even transmit your data then kill your machine, you never know till its too late in some cases.


    IT Auditor & Security Professional

hQBT2G3.png


#3 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,601 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:07:24 AM

Posted 07 August 2016 - 09:48 AM

You may want to read...
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#4 Didier Stevens

Didier Stevens

  • BC Advisor
  • 2,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:24 PM

Posted 07 August 2016 - 01:49 PM

No, a download is not enough (most of the time). It has to be executed.


Didier Stevens
http://blog.DidierStevens.com
http://DidierStevensLabs.com

SANS ISC Senior Handler
Microsoft MVP 2011-2016 Consumer Security, Windows Insider MVP 2016-2019
MVP_Horizontal_BlueOnly.png

 

If you send me messages, per Bleeping Computer's Forum policy, I will not engage in a conversation, but try to answer your question in the relevant forum post. If you don't want this, don't send me messages.

 

Stevens' law: "As an online security discussion grows longer, the probability of a reference to BadUSB approaches 1.0"





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users