Blog : Virus Attacks

Virus Attacks

Written by Rohas Nagpal
Friday, 16 April 2010 12:58 - Last Updated Monday, 19 April 2010 08:43
Computer viruses are malicious programs that destroy electronic information. As the world is
increasingly becoming networked, the threat and damage caused by viruses is growing by leaps
and bounds.
Scenario 1:
The virus is a general “in the wild” virus. This means that it is spreading all over the world and is
not targeted at any specific organization.
Modus Operandi: A skilled programmer creates a new type or strain of virus and releases it on
the Internet so that it can spread all over the world. Being a new virus, it goes undetected by
many anti-virus software and hence is able to spread all over the world and cause a lot of
damage. Anti-virus companies are usually able to find a solution within 8 to 48 hours.
Usual motives: Thrill and a perverse pleasure in destroying data belonging to strangers.
Applicable law (Before 27 October, 2009): Sections 43 & 66 of the Information Technology
Act and section 426 of Indian Penal Code
Applicable law (After 27 October, 2009): Sections 43, 66 & 66A of the Information Technology
Act and section 426 of Indian Penal Code
Scenario 2:
The virus targets a particular organization. This type of a virus is not known to anti-virus
companies as it is a new virus created specifically to target a particular organization.
Modus Operandi: A skilled programmer creates a new type or strain of virus. He does not
release it on the Internet. Instead, he sells it for a huge amount of money. The buyer uses the
virus to target his rival company. Being a new virus, it may go undetected by the victim

Virus Attacks
Written by Rohas Nagpal
Friday, 16 April 2010 12:58 - Last Updated Monday, 19 April 2010 08:43
company’s anti-virus software and hence would be able to cause a lot of damage. Anti-virus
companies may never get to know about the existence of the virus.
Applicable law (Before 27 October, 2009): Sections 43 & 66 of the Information Technology
Act and section 426 of Indian Penal Code.
Applicable law (After 27 October, 2009): Sections 43, 66 & 66A of the Information Technology
Act and section 426 of Indian Penal Code.