Skip to main content
Penn Information Systems & Computing Systems Home

Search form

Getting system status
  • Get Started
    • IT Staff
    • Faculty
    • Staff
    • Students
    • Alumni & Guests
    • ISC Staff
  • Services
    • — Services A to Z —
    • Accounts, Access & Security
      • Access Management Services
      • Active Directory
      • Identity Management Services
      • Information Security Services
    • Applications & Data Analytics
      • Application Development & Delivery
      • Data Analytics
        • Data Analytics at Penn
      • Integration Development & Delivery
    • Backup, Storage & Platforms
      • BackItUp
      • Cloud Solutions
      • Data Center & Colocation Solutions
      • Database & Application Platform Support & Consulting
      • Endpoint Management
      • Recovery Solutions
      • Storage
      • Virtual Desktop
      • Virtual Server Hosting
    • Community, Support & Learning
      • Classroom Technology Services
      • Desktop Engineering
      • IT Community Events
      • LinkedIn Learning
      • Tech Center
    • Consulting & Professional Services
      • Brokered Products
      • HireIT
      • Systems Support & Consulting
      • Technology Forecasting
    • Email, Calendaring & Collaboration
      • Classlists
      • Penn Email Routing
      • PennBox
      • PennNet Mailing Lists
      • PennO365
      • PennZoom
      • SMTP-Relay
      • Secure Share
    • Networks & Connectivity
      • Firewall Services
      • Network Design & Installation
      • PennNet
        • Network Names & Numbers
        • MAGPI (Penn's Internet2 Regional Optical Network)
      • PennNet Ethernet Ports
      • Wireless at Penn
    • Phone, TV & Video
      • Contact Center
      • Live Video Streaming
      • Penn Video Network
      • PennFlex Phone
      • Traditional Telephony
      • Video Content Management
      • Video Production
        • Producing Video Content
    • Web Hosting
      • Web Hosting Service
    • — Service Rates —
    • — Service Level Agreements —
  • Security
    • Office of Information Security
    • Security Services
    • Special Projects
    • Policies & Procedures
    • Training & Awareness
    • Penn SecureIT program
  • Collaborations
    • Computing Policies
    • Engaging Penn’s IT Community
    • Identity & Access Management
    • Penn IT Strategic Plan
    • Cloud First
    • Next Generation Unified Communications
    • Penn Bot
    • IT Advisory Groups
      • Common Solutions
      • IT Roundtable
      • Network Policy Committee
      • Penn Technology Investment Committee (PTIC)
        • About PTIC
        • The PTIC IT Development Fund
    • Special Interest Groups (SIGs)
      • Audio-Visual (AV-SIG)
      • Cloud Computing (Cloud-SIG)
      • Data Visualization (DataViz-SIG)
      • Developer SIG (Dev-SIG)
      • High-Performance Computing (HPC-SIG)
      • Instructional Technology SIG
      • Linux SIG
      • Macintosh Networking Group (MacNet)
      • Mobile Technologies (Mobile-SIG)
      • O365 Special Interest Group
      • PC Networking Group (PC-Net)
      • Project Partners SIG
      • Security SIG
      • Social Media SIG
      • Splunk Special Interest Group
      • Super User Group (SUG)
      • Web SIG
    • Technology Services Strategy Review Board
  • News
  • About
  • Hot Topics
  • Get IT Help

You are here

Home » Malware

Malware

Hackers are becoming increasingly sophisticated and adept at creating exploits that combine these categories to produce programs that threaten networked computers. Over the last several years, the term "malware" has been used to describe various kinds of malicious software that hackers engineer to compromise personal computers. For best protection against malware (and other threats), be sure to install and update anti-virus software, keep operating system patches and service packs up to date, and never open an e-mail attachment unless absolutely sure it is harmless. The four main categories of malware are Viruses, Worms, Trojans, and Back Doors.

Viruses
  • Viruses
  • Worms
  • Trojans
  • Back Doors
  • Combating Malware

In their simplest form, viruses are individual programs that can produce results ranging from the innocuous placement of a "test" file to the deletion of data and reformatting of the hard drive. Not all viruses are malicious - some are written by "white hat" programmers as tests to help discover vulnerabilities and remove/strengthen them. There are many "families" of viruses with variations (or strains) that have been around many years, and new viruses appear almost daily. To combat viruses, it's essential to install anti-virus software and update it frequently. For more information on anti-virus efforts at Penn, visit https://www.isc.upenn.edu/how-to/antivirus-desktops-and-laptops

Worms are programs whose sole purpose is to replicate and spread to other computers. Some programmers write worms solely to see how far they spread, and in many cases, there is no actual payload or threat. However, in recent years, worms have been used to more rapidly spread viruses. Once a computer has been infected by a virus/worm (usually by an opened, infected e-mail attachment), the virus component will begin running an SMTP mail server; the worm component will begin to replicate the virus and e-mail it to addresses found in the computer's address book with the "From:" header (This most frequently occurs with computers using Microsoft Outlook.)

As in "Trojan Horse", these programs are designed to imitate normal, useful programs. However, they contain hidden code that can perform a wide variety of compromises, including granting a remote user complete control of the compromised computer. For example, the Trojan may be a version of a common command-line utility, such as 'ls' in Unix, with the same file name and which performs all the normal command functions, in addition to other functions known only to the attacker.

A "back door" is an entry point the programmer leaves himself in order to gain quick access without dealing with built-in security checks. In theory, back doors are removed from final release of the software, but history has shown that often they are not. Though in the current network climate, a back door is generally considered a program that has been placed on a computer (usually discretely) and allows a remote user to gain/maintain complete administrative control, typically without the knowledge of the computer's primary user. The most infamous examples of back door programs have been SubSeven and Back Orifice, but there are many others, with new ones appearing regularly. There are several ways back doors can be placed on a computer, though this can never be a truly complete list:

  • Opening an infected e-mail attachment (They are often combined with viruses and worms)
  • Exploiting a computer left vulnerable by a previous, existing virus
  • Following a URL to a malicious website that surreptitiously downloads the back door to the computer
  • Exploiting a vulnerable, unpatched software application or operating system service (which happened with the famous Code Red exploits)
  • Leaving the computer unattended and unsecured (no password-protected screen saver), so that the back door can be loaded directly from floppy disk, "thumb drive", CD-ROM, etc.
  • Active FTP server on the computer (especially one that allows "anonymous" sessions)

For a computer that has been corrupted or compromised by malware, the remedy depends almost exclusively on the virus. In some cases, vendors such as Symantec, McAfee, and eEye make available software tools that can remove the exploit and repair the damage. However, in many cases, the exploit has either installed and activated a back door that permits remote administrative access, leaving the computer vulnerable: Once the possibility of a back door exists, it's impossible to be certain that additional back doors haven't also been installed. When a computer has been exposed to a possible administrative, "root-level" compromise, Penn Information Security requires that the computer be disconnected from the network, all hard drives reformatted, the operating system re-installed from original media, and all current patches/service packs be applied before the computer can be re-attached to the network. 

For more information on why this is an industry-recommended remedy for compromised computers, please read Help: I Got Hacked! Now What Do I Do? on Microsoft's website at http://www.microsoft.com/technet/community/columns/secmgmt/sm0504.mspx

We recommend that Local Support Providers (LSPs) review the options below and use their judgment regarding whether deployment makes sense for their unit. There may be local solutions already in place that fulfill the same roles (e.g. different patch management software). Before making a systemic change to how you manage systems, be sure to consult with IT leadership in your organization.

Prevention

Resources Provided by Penn
  • Computing Security Policy: strong passwords, patching, built-in firewalls, A/V
  • DNS Blackholing: SafeDNS
  • Handheld Devices: Policy on Server-Managed PDAs
  • Phishing: archive of messages targeting Penn
  • Strategy for Risk Reduction: Security and Privacy Impact Assessment (SPIA)
  • Virus, Spyware, Adware Protection Symantec Endpoint Protection (SEP) on Windows
  • Virus Protection: Symantec Endpoint Protection on macOS
  • Vulnerability Scanners: Nessus
Other Resources
  • Configuration Benchmarks: CIS guidelines
  • Finding Sensitive Data: Spirion (formerly Identity Finder) Penn Preferred Pricing and Support
  • Patch and Workstation Management: Tivoli Endpoint Manager for Security and Compliance Analytics (SCA) built on BigFix technology (through ISC Support-on-Site Services)
  • Windows Security Enforcement:
    • Group Policy to enforce software restrictions
    • User Account Control (UAC), Windows 7 & Vista
    • AppLocker for Windows 7
  • Personal Firewalls: Windows and Mac

Detection

  • Malware Bytes
  • Tom Liston's LaBrea Tarpit
  • OSSEC

Visit ISC on LinkedIn

Print
InfoSec Home
Resources
  • Desktop Security 101
  • Report a Problem
  • Email Headers
  • InfoSec Training & Awareness 
Contact InfoSec
  • Computing Policies
  • Tech Jobs @ Penn

© 2025 THE UNIVERSITY OF PENNSYLVANIA — 3401 Walnut Street, Philadelphia, PA 19104 — Report accessibility issues and get help — For ISC Staff