Are You Unknowingly Spreading Computer Viruses?

Updated on May 29, 2018
Glenn Stok profile image

Mr. Stok teaches Internet related topics based on his professional insight as a computer systems analyst with a Master of Science Degree.

Cyber terrorists take advantage of those who fall for scams. Their tactics get you to allow your computer to spread viruses and malware to your friends without you knowing.

Even computer literate people can be fooled. You might even unknowingly be spreading computer viruses among your friends.

The trick that these cyber criminals use is to make it look like you're getting an email from a trusted friend. So you open it and click on the attachment, which plants malware on your machine.

What that malware does is extremely dangerous.

Source

How Trusted Friends Spread Malware

Here's an example. I once received similar emails from two friends at about the same time. Both emails had a link to a site and mentioned that I should look at this interesting site. However, nothing was said about why I should look at it.

It was immediately obvious to me that both my friends had a virus that spreads by looking like it was sent from a trusted friend.

Instead of clicking the link, which I knew was asking for trouble, I just deleted the emails. These types of emails can contain a link to a site that plants a virus or malware on your computer. That's why I won’t follow the link.

Getting two similar emails from two people at the same time was definitely a clue that those emails were not written by my friends.

Even if I had gotten just one, I still would not have clicked the link. I'll tell you why...

Since there was no information as to why I should follow the link, it was clear that something was wrong. If it were real, they would have or should have said something more about it.

If a friend sends me an email without having the courtesy of including a meaningful reference in the subject field, too bad. They should know better. I just won’t open it for my own safety. They need to be taught proper computer etiquette. Teach this to your friends. Spread the knowledge for their safety and yours.

How a Computer Virus Duplicates and Spreads

A computer virus can copy itself and spread to other computers.

  1. It does that by looking for email addresses in your email directory as well as any email addresses contained in the "TO:" field or the "CC:" field of emails you received from other people.
  2. Then it uses your own email program to send an email to all your friends, like the one I was talking about above. That email contains a copy of the virus as an attached file.
  3. Each time any recipient opens the attachment, the process is continued. It keeps repeating this propagation from one person's computer to another.

Your friends may be making it easy for these viruses to spread by not hiding email addresses in the "BCC" (blind copy) field when they send a message to multiple friends at once.

If any one of the recipients has a virus that spreads like this, each of your friends gets an email with the virus. Friends who are not computer savvy will click the link and continue spreading the virus because they think they received the email from a trusted friend.

That explains how I got two of those emails at the same time. It happens quickly. You have 10 friends and they each have 10 friends. That is already 100 copies of this virus. It just keeps duplicating itself that way. They each have 10 friends, now there are 1000 copies.

By the 4th generation there are 10,000 copies! By the 5th generation... 100,000.

You can see that a million people will have the virus just after six repeated generations of friends opening the email attachment.

This means that you are responsible for millions of cyber attacks if you are one of the people in that chain.

Source

How This Can Be Used in Cyber Warfare

Some of these viruses were created for one reason. They may be benign to you and me, but they have a purpose of attacking a specific target.

They just use us to spread the attacking software in search of something specific so that it can carry out its task of destruction.

Remember what I explained about a million copies existing in just six generations. Eventually a copy of it will reach its desired destination. Possibly finding a computer in the Pentagon or the U.S. Defense Department and sending back all the data on those computers to the host.

In May 2011 defense contractor Lockheed Martin was hit by a cyber attack made possible by malware that was carelessly introduced into their system.1

It requires a human to allow a virus to become active. Too many people allow themselves to be fooled by emails that ask to click a link that ends up freeing the malware that activates a virus. They need to learn to do their due diligence with email requests to click a link.

There are ways to investigate the actual source of the email from its header info. The sender's address is useless because it can be forged, or the sender may have a virus that is spreading by sending copies of itself to all their friends.

The Consequences of Cyber Warfare

This carelessness can lead to cyber warfare.2

  1. A virus might be searching for a control server of a nuclear power plant to instruct it to disable the cooling system and create a meltdown.
  2. Another might shut down the US power grid or disrupt telecommunications.

Malware in Computer Chips

Over the past few years it has been discovered that the Chinese have been implementing malware into the chips we import for our computers. Chips with malware or viruses that are used in military applications could interfere with a weapon’s intended purpose.3

So far these viruses have been stopped in their tracks before doing anything really bad. However, many of them already had infiltrated government computers to get vital information that the hacker needed to get their hands on.

On the other hand, they may have been paid to do it for someone who wants the data with a desire to trigger something more serious.

These are Cyber Terrorist

The outcome can be catastrophic:

  • They are using the Internet to create destruction in the real world.4 The data these hackers find is sold to terrorists planning worse catastrophes.
  • They can gain control over a computer server that controls telecommunications, the national power grid, or anything related to national security.
  • Secret government information can be used against the U.S. and hinder our national security.

Don't include yourself in the chain that leads to this turmoil. Be alert to emails that you think have come from a trusted friend asking you to follow a link. Otherwise you will be the trusted friend who spreads mayhem.

References

  1. Lockheed Martin hit by cyber attack. (May 29, 2011). The Associated Press (CBS News)
  2. Cyber Defense (Dec 14, 2017). North Atlantic Treaty Organization
  3. Gerald Posner (Jan 12, 2010). China's Secret Cyberterrorism. The Daily Beast
  4. John P. Avlon (Oct 20, 2009). The Growing Cyberthreat. Forbes.com

© 2011 Glenn Stok

Reader Comments

Submit a Comment

  • Glenn Stok profile imageAUTHOR

    Glenn Stok 

    5 years ago from Long Island, NY

    PegCole17 - I know a number of people who fell for this tactic. When one thinks an email is from a trusted friend it is easy to think it's for real. That's why it's so important to pay close attention to detail. If the subject is strange, or there are other addresses in the To Field, I usually think twice before opening an attachment. Thanks, Peg, for stopping by.

  • Millionaire Tips profile image

    Shasta Matova 

    5 years ago from USA

    My virus scanner is doing its regularly scheduled scan as we speak. I've gotten those vague emails and I ignore them as well, although one person did ask me why I didn't open it. I told her to be more descriptive in the emails in the future. I don't think many people realize that there are bigger implications than a virus lodging themselves in their own computer. I didn't realize that the message also gets sent to recipients of incoming mail and not just people in the address book. I appreciate this warning.

  • PegCole17 profile image

    Peg Cole 

    5 years ago from Dallas, Texas

    Thanks for this important and valuable explanation. This has happened to me, too. Receiving an email from a trusted friend is quite a disarming tactic.

  • Glenn Stok profile imageAUTHOR

    Glenn Stok 

    7 years ago from Long Island, NY

    sasanka7, Thanks for your comments and your question about Anti Virus protecting a PC. I have received emails from friends that contain links to viruses and spread by clicking on a link in the email. They start spreading from a friend who clicks the same email when they got it.

    I, for one, break the chain because I never click these links without checking first. But the point I want to make is that these friends claim to have their anti virus up to date. So I suspect the answer to your question is NO.

    Based on this experience I have to come to the conclusion that anti virus software will not necessarily protect the PC if the user clicks to allow the virus. It can only stop the virus if it starts up by some other means or when it is matched to a known virus signature.

    If the software is not up to date then it can most definitely miss newer viruses.

  • sasanka7 profile image

    sasanka7 

    7 years ago from Calcutta, India

    Thank you so much Mr. Stok for your suggestion. I think your hub should be published widely.

    I want to learn more from you.

    1. Generally, free Anti Virus software like ‘Avast’ is being used by maximum users in India which also up dates automatically, but until it is upgraded could the Anti Virus software protect any PC?

    The most alarming thing you have pointed out about the use of China made spare parts / I C/ Mother Board etc. Total Indian market has been flooded by China made spares. They are cheap but disturb much after the expiry of warranty period. This could not be cured but endure.

    Thanks again for sharing.

  • Glenn Stok profile imageAUTHOR

    Glenn Stok 

    7 years ago from Long Island, NY

    sasanka7, To answer your question, it can be stopped by educating people to NEVER click on links in emails. Even if it comes from a trusted friend, since your friend may have let a hacker get control of their email program (by clicking a link) to send copies further. Every time someone tells me they have a virus, it turns out they let it in themselves.

  • sasanka7 profile image

    sasanka7 

    7 years ago from Calcutta, India

    Very useful information. Frequently i receive some messages, mainly from Africa that i have selected / win for some gadget / some lady is earnestly asking for help or something like that or my trusted friend request me to sign in for some site etc. Though I never open them yet in India it is seen that renowned & innocent persons are being cheated by them. How could it be stopped? Although there are some sites to help cyber crime yet it takes time to have any remedy.

  • Glenn Stok profile imageAUTHOR

    Glenn Stok 

    7 years ago from Long Island, NY

    Danette Watt - Thanks for the info on NPR. And thanks for following me. You left very nice fan mail too, which is very much appreciated.

  • Danette Watt profile image

    Danette Watt 

    7 years ago from Illinois

    I listen to NPR and there have been a number of programs (talk shows) and news segments about cyber-terrorism, -attacks and -warfare.

    Thanks for the hub, it was interesting.

  • Glenn Stok profile imageAUTHOR

    Glenn Stok 

    7 years ago from Long Island, NY

    samsons1, thanks for the vote up and stumble. Hopefully it will help others who might otherwise get scammed.

    WannaB, You are doing the right thing notifying your friends when they have a virus that sends itself to you. Unfortunately I had the experience where I warned a friend that she had a virus and she didn't understand how I knew. So she ignored me until she started getting 200 of her contacts complaining to her that she sent them a virus. How silly is that? Thanks for your comments.

  • WannaB Writer profile image

    Barbara Radisavljevic 

    7 years ago from Templeton, CA

    Thanks for mentioning this. When you make your living on the internet it's easy to forget what you did as a newbie and assume all your friends have the same level of awareness that you do. I can normally spot a scam or junk mail just from the header now, and I've learned not to click any link with no other bit of information -- no matter whom it's from unless I'm expecting it. I regularly get this sort of email from someone who spends little time on line and has a Yahoo address, and I immediately delete them. I keep very few contacts in my yahoo account, so the one time I did get hacked at Yahoo, the damage was limited. In that instance, I don't think I clicked anything. I know a couple of friends were hacked once before I was. When their messages came, I spotted them at once and notified the owners of the email account, who, by that time, already knew. This is something they should teach in computer courses and books for those just getting a first computer.

  • samsons1 profile image

    Sam 

    7 years ago from Tennessee

    voted up and useful! Thanks Glenn for the 'reminder', it never hurts to be cautioned again, and just might save us expense and heart ache. I will stumble also...

  • Glenn Stok profile imageAUTHOR

    Glenn Stok 

    7 years ago from Long Island, NY

    BlissfulWriter, thanks for adding that. I discover many times that some friends never upgrade their anti-virus software and they think they are still protected.

  • BlissfulWriter profile image

    BlissfulWriter 

    7 years ago

    Also, all computers should have up to date anti virus software.

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, turbofuture.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://turbofuture.com/privacy-policy#gdpr

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)