{"id":13233,"date":"2016-10-13T12:00:52","date_gmt":"2016-10-13T16:00:52","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/?p=13233"},"modified":"2019-11-15T13:47:42","modified_gmt":"2019-11-15T11:47:42","slug":"signature-virus-disinfection","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/signature-virus-disinfection\/13233\/","title":{"rendered":"Antivirus fundamentals: Viruses, signatures, disinfection"},"content":{"rendered":"<p>We talk and talk (and talk) about how to behave \u2014 and even how to survive \u2014 in the digital world. And we hope it\u2019s not in vain, that our readers learn from us and then teach their friends and relatives. It\u2019s really important.<\/p>\n<p>But we sometimes take for granted a common knowledge of some specific terms and expressions. So today we\u2019re going back to basics to tackle three fundamentals of antivirus.<\/p>\n<h3>1. Signatures<\/h3>\n<p>Antivirus databases contain what are called <em>signatures<\/em>, both in common usage and in writing. In reality, classic signatures have not been in use for about 20 years.<\/p>\n<p>From the very beginning, in the 1980s, signatures as a concept were not clearly defined. Even now, they don\u2019t have a devoted Wikipedia page, and the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Malware\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">entry on malware<\/a> uses the term without defining signatures, as if were such common knowledge as to go without explanation.<\/p>\n<p>So: Let\u2019s define signatures at last! A virus signature is a continuous sequence of bytes that is common for a certain malware sample. That means it\u2019s contained within the malware or the infected file and not in unaffected files.<\/p>\n<div id=\"attachment_13235\" style=\"width: 715px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2016\/10\/06021417\/malanov-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13235\" class=\"size-full wp-image-13235\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2016\/10\/06021417\/malanov-1.png\" alt=\"Antivirus fundamentals: Viruses, signatures, disinfection\" width=\"705\" height=\"229\"><\/a><p id=\"caption-attachment-13235\" class=\"wp-caption-text\">A characteristic sequence of bytes<\/p><\/div>\n<p>Nowadays, signatures are far from sufficient to detect malicious files. Malware creators obfuscate, using a variety of techniques to cover their tracks. That\u2019s why modern antivirus products must use more advanced detection methods. Antivirus databases still contain signatures (they account for more than half of all database entries), but they include more sophisticated entries as well.<\/p>\n<p>As a matter of habit, everyone still calls such entries \u201csignatures.\u201d There\u2019s no harm in that, as long as we remember that the term is shorthand for a gamut of techniques that make up a much more robust arsenal.<\/p>\n<p>Ideally, we\u2019d stop using the word <em>signature<\/em> to refer to any entry in the antivirus database, but it\u2019s so commonly used \u2014 and a more accurate term doesn\u2019t yet exist \u2014 so the practice persists.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/MachineLearning?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#MachineLearning<\/a> is fundamental to <a href=\"https:\/\/twitter.com\/hashtag\/cybersecurity?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#cybersecurity<\/a>. Here are some interesting facts about them: <a href=\"https:\/\/t.co\/5BV78lc737\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/5BV78lc737<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/ai_oil?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#ai_oil<\/a> <a href=\"https:\/\/t.co\/6frMGOzUgL\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/6frMGOzUgL<\/a><\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/780417443424534528?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">September 26, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>An antivirus database entry is just that: one entry. The technology behind it could be either a classic signature or something super-sophisticated, innovative, and targeting the most advanced malware.<\/p>\n<h3>2. Viruses<\/h3>\n<p>As you might have noticed, our analysts avoid using the term <em>virus<\/em> and prefer <em>malware<\/em>, <em>threat<\/em>, and so on. The reason is that a virus is a specific type of malware that exhibits a specific behavior: It infects clean files. Between themselves, analysts refer to a virus as an <em>infector<\/em>.<\/p>\n<p>Infectors enjoy a unique status in the lab. First, they are difficult to detect \u2014 at a glance, an infected file seems clean. Second, infectors require special treatment: almost all of them need specific detection and disinfection procedures. That is why infectors are handled by experts who specialize in this field.<\/p>\n<div id=\"attachment_13236\" style=\"width: 460px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2016\/10\/06021416\/malanov-2.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13236\" class=\"size-full wp-image-13236\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2016\/10\/06021416\/malanov-2.png\" alt=\"Antivirus fundamentals: Viruses, signatures, disinfection\" width=\"450\" height=\"450\"><\/a><p id=\"caption-attachment-13236\" class=\"wp-caption-text\">Malware, classified<\/p><\/div>\n<p>So, to avoid confusion when talking about threats in general, analysts use umbrella terms such as \u201cmalicious program\u201d and \u201cmalware.\u201d<\/p>\n<p>Here are a couple of other classifications that may come in handy. A <em>worm<\/em> is a type of malware that can replicate itself and break out of the device it initially infected to infect others. And malware, technically speaking, does not include <em>adware<\/em> (intrusive advertising software) or <em>riskware<\/em> (legitimate software that can inflict harm on a system if installed by malefactors).<\/p>\n<h3>3. Disinfection<\/h3>\n<p>Lately, I\u2019ve been seeing a lot of what I hope is not a common misperception: that antivirus can only scan and detect malware, but then a user needs to download a special utility to remove the malware. In fact, <a href=\"http:\/\/support.kaspersky.com\/viruses\/disinfection\" target=\"_blank\" rel=\"noopener noreferrer\">special utilities<\/a> do exist for certain types of malware: for example, <a href=\"https:\/\/noransom.kaspersky.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">decryptors for files<\/a> affected by ransomware. But antivirus can cope on its own \u2014 and at times it\u2019s the better option, provided access to system drivers and other technologies that cannot fit into a utility.<\/p>\n<p>So, how does malware removal work? In a tiny percentage of cases, a machine picks up an infector (typically before antivirus is installed; infectors seldom slip through an antivirus\u2019s defenses), the infector acts on some files, and then the antivirus goes through any infected files and removes the malicious code, restoring them to their original state. The same procedure is implemented when you need to decrypt files encrypted by ransomware, commonly detected as Trojan-Ransom.<\/p>\n<p>As for the rest \u2014 the vast majority, perhaps 99% of cases \u2014 the malware is caught before it can infect any files, the process consists of simply deleting the malware. If no files were damaged, there\u2019s no need to restore anything.<\/p>\n<div id=\"attachment_13237\" style=\"width: 440px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2016\/10\/06021415\/malanov-3.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13237\" class=\"size-full wp-image-13237\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2016\/10\/06021415\/malanov-3.png\" alt=\"Antivirus fundamentals: Viruses, signatures, disinfection\" width=\"430\" height=\"368\"><\/a><p id=\"caption-attachment-13237\" class=\"wp-caption-text\">In the majority of cases, it\u2019s enough to delete the malicious file<\/p><\/div>\n<p>There is one exception here, though: If the malware is not an infector \u2013 for example, if it is ransomware \u2013 and is already active in the system, the antivirus switches to disinfection mode to make sure the threat is gone for good and won\u2019t come back. You can learn more about the process <a href=\"http:\/\/support.kaspersky.com\/learning\/courses\/kl_102.98\/chapter2.2\/section3\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p>That exception usually happens for one of two reasons:<\/p>\n<ol>\n<li>The antivirus was installed onto an already infected computer. You know, the usual wrong sequence \u2014 first get infected, than decide it\u2019s time to do something about protection.<\/li>\n<li>The antivirus marked something \u201csuspicious\u201d rather than \u201cmalicious\u201d and started to closely monitor its activities. As soon as the malware becomes clearly malicious, the antivirus rolls back all malicious activities (noted during that period of monitoring). For example, the antivirus could restore encrypted files from instant backup copies if the PC was attacked by ransomware or an infector.<\/li>\n<\/ol>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/iX9Ajl8j1Ls?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<h3>Conclusion<\/h3>\n<p>That\u2019s it for today. I hope you now:<\/p>\n<ol>\n<li>Know that \u201csignatures\u201d today are, basically, any antivirus database entries, including the most advanced ones.<\/li>\n<li>Are more familiar with the different types of malware.<\/li>\n<li>Understand that the process of disinfecting a computer or device is well within an antivirus program\u2019s competence \u2014 and why it\u2019s important to keep the System Watcher component in your antivirus program active to analyze the behavior of suspicious files.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>We explain three important concepts underlying antivirus action: signatures, the nature of viruses, and how antivirus solutions remove malware.<\/p>\n","protected":false},"author":669,"featured_media":13234,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7,2670],"tags":[1251,1849,36,522,1848,1850,723,154],"class_list":{"0":"post-13233","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-products","8":"category-threats","9":"tag-antivirus","10":"tag-curing","11":"tag-malware-2","12":"tag-products-2","13":"tag-signatures","14":"tag-terms","15":"tag-trojans","16":"tag-viruses"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/signature-virus-disinfection\/13233\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/signature-virus-disinfection\/7790\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/signature-virus-disinfection\/7799\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/signature-virus-disinfection\/7833\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/signature-virus-disinfection\/9298\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/signature-virus-disinfection\/9151\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/signature-virus-disinfection\/13233\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/signature-virus-disinfection\/6166\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/signature-virus-disinfection\/6708\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/signature-virus-disinfection\/5529\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/signature-virus-disinfection\/8953\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/signature-virus-disinfection\/12878\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/signature-virus-disinfection\/13233\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/trojans\/","name":"trojans"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/13233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/669"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=13233"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/13233\/revisions"}],"predecessor-version":[{"id":24243,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/13233\/revisions\/24243"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/13234"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=13233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=13233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=13233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}