Jump to content

hotspot infected?


Recommended Posts

If it is an Internet worm - Yes.

But you use "virus" too will-nilly.

The vast majority of malware, the over arching concept of all malicious software, are trojans, not viruses.  There is a taxonomy to malware.

A virus self replicates.  That is it autonomously spreads on it own.  Either from file to file or from computer to computer.

A file infecting virus will prepend, append or cavity inject malicious code into a legitimate file.  Once infected, that infected file can further the infection by infecting other legitimate files.

On the other hand there are trojans that will also prepend, append or cavity inject malicious code into a legitimate file.   However that file can not infect other files.  The infection stops with that targeted file.  These files are either deemed to be "trojanized" or "patched".  Since trojans can not spread on their own, they need assistance.  

When malicious code uses a protocol or service to perform its action of spreading it is known as a worm (a sub-type of virus) such as an Internet Worm or an AutoRun Worm.

What you are suggesting is the virus sub-type of Internet Worm.  That means the worms self replicates or spreads over Internet protocols.  So if a HotSpot is infected with an Internet worm it may use connected devices to spread to other new devices and networks assuming its payload is able to compromise the platform that's connected to it.

Examples:

 

 

 

Edited by David H. Lipman
Edited for content, clarity, spelling and/or grammar
  • Like 1
Link to post
Share on other sites

3 hours ago, David H. Lipman said:

If it is an Internet worm - Yes.

But you use "virus" too will-nilly.

The vast majority of malware, the over arching concept of all malicious software, are trojans, not viruses.  There is a taxonomy to malware.

A virus self replicates.  That is it autonomously spreads on it own.  Either from file to file or from computer to computer.

A file infecting virus will prepend, append or cavity inject malicious code into a legitimate file.  Once infected, that infected file can further the infection by infecting other legitimate files.

On the other hand there are trojans that will also prepend, append or cavity inject malicious code into a legitimate file.   However that file can not infect other files.  The infection stops with that targeted file.  These files are either deemed to be "trojanized" or "patched".  Since trojans can not spread on their own, they need assistance.  

When malicious code uses a protocol or service to perform its action of spreading it is known as a worm (a sub-type of virus) such as an Internet Worm or an AutoRun Worm.

What you are suggesting is the virus sub-type of Internet Worm.  That means the worms self replicates or spreads over Internet protocols.  So if a HotSpot is infected with an Internet worm it may use connected devices to spread to other new devices and networks assuming its payload is able to compromise the platform that's connected to it.

Examples:

 

 

 

can rats use worms to spread across a network?

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.