Reasons for Computer Virus

Computer Virus Reasons: Computer viruses are created for various malicious and illegal purposes including causing system damage, stealing personal information, making illegal profits, gaining unauthorized access, disrupting services, and demonstrating hacking skills. Understanding why viruses exist helps in developing better protection strategies.

Quick Summary

  • Viruses are created intentionally by programmers (virus writers or hackers)
  • Main reasons include financial gain, data theft, revenge, vandalism, and cyber warfare
  • Some viruses are created to test security systems or demonstrate programming skills
  • Virus attacks can cost individuals and organizations millions of naira in damages
  • Understanding virus motivations helps in prevention and protection

Why Do People Create Computer Viruses?

Computer viruses do not appear by accident. They are deliberately created by people called virus writers, hackers, or cybercriminals. Understanding why these people create viruses helps us protect our computers and data more effectively.

Just like armed robbers have reasons for breaking into homes or banks, virus creators have motivations for attacking computer systems. Some do it for money, others for revenge, and some simply to cause chaos. In Nigeria, we have seen viruses attack bank systems, government databases, and even school portals during exam periods.

Major Reasons for Creating Computer Viruses

1. Financial Gain (Fraud and Theft)

This is the most common reason for virus creation today. Cybercriminals create viruses to steal money directly or indirectly. They use different methods:

Banking Fraud: Viruses can steal your ATM card details, online banking passwords, and transaction PINs. In Nigeria, many people have lost money from their bank accounts after downloading infected files or clicking suspicious links. The virus records your keystrokes when you enter sensitive information and sends it to the criminal.

Ransomware Attacks: Some viruses lock your computer or encrypt your files, then demand payment (often in Bitcoin or other cryptocurrencies) to unlock them. Imagine finishing your WAEC project on your computer, only to find all your files locked and a message demanding N50,000 to get them back.

Cryptocurrency Mining: Modern viruses can secretly use your computer’s power to mine cryptocurrencies for the attacker. Your computer becomes slow because it is working for someone else without your knowledge.

Selling Personal Data: Viruses collect personal information like names, addresses, phone numbers, email addresses, and browsing habits. This data is sold to companies or used for targeted scams.

2. Data Theft and Espionage

Some viruses are designed specifically to steal valuable information rather than money. This includes:

Corporate Espionage: Companies create viruses to steal trade secrets, customer lists, or business strategies from competitors. For example, a soft drink company might try to steal the secret formula from a rival company.

Government Spying: Countries develop sophisticated viruses to spy on other governments, steal military secrets, or monitor diplomatic communications. This is called cyber warfare.

Academic Theft: Viruses can steal research data, unpublished papers, or exam questions from educational institutions. In Nigeria, there have been cases where JAMB or WAEC questions were leaked through hacked systems.

3. Revenge and Sabotage

Not all virus creators want money. Some create viruses out of anger or desire for revenge:

Disgruntled Employees: Workers who feel mistreated or get fired may create viruses to damage their former employer’s systems. They know the company’s security weaknesses and exploit them.

Personal Vendettas: Someone angry at a person or organization may create a virus to destroy their data or reputation. This is similar to vandalizing property, but in the digital world.

Political Activism: Some groups create viruses to attack government or corporate websites as a form of protest. They may deface websites or shut down online services to make a political statement.

4. Vandalism and Mischief

Some virus creators simply enjoy causing chaos and destruction without any clear financial or political motive:

Digital Vandalism: Like spray-painting graffiti on walls, some people create viruses just to see the damage they cause. They enjoy the power of disrupting thousands of computers.

Pranks: Some early viruses were created as jokes. They might make funny messages appear on screen, reverse your mouse controls, or play unexpected sounds. While these seem harmless, they still waste time and can spread like serious viruses.

Notoriety: Young programmers may create viruses to become famous in hacker circles. They want bragging rights and recognition among other hackers.

5. Testing Security Systems

Not all virus-like programs are malicious. Some are created for legitimate purposes:

Security Research: Cybersecurity experts create viruses in controlled environments to test antivirus software and improve security systems. These test viruses help companies like Norton, McAfee, and Kaspersky develop better protection.

Penetration Testing: Companies hire ethical hackers to create and deploy virus-like programs to test their own security. This helps identify weaknesses before real criminals exploit them.

Educational Purposes: Computer science students may study how viruses work to understand cybersecurity better. However, creating actual viruses, even for learning, is illegal in most countries.

6. Disruption of Services

Some viruses aim to shut down or disrupt important services:

DDoS Attacks: Distributed Denial of Service viruses turn infected computers into “zombies” that flood websites with fake traffic, causing them to crash. This has affected Nigerian banking websites during salary payment days.

Infrastructure Attacks: Advanced viruses target critical infrastructure like power grids, water systems, or telecommunications networks. These attacks can affect millions of people.

Business Disruption: Competitors may use viruses to slow down or crash rival businesses’ online services, especially during peak sales periods.

Consequences of Virus Attacks

Impact Area Consequences Example
Financial Loss of money, business revenue, recovery costs Bank account hacked, ransomware payment demanded
Data Loss Permanent deletion of files, photos, documents All your school projects and family photos deleted
Privacy Personal information stolen and misused Social media accounts hacked and used for scams
Time Hours or days spent cleaning infected systems Reinstalling Windows and all programs
Reputation Loss of trust from customers or friends Your email account sends spam to all contacts
Legal Lawsuits, regulatory fines, criminal charges Company sued for exposing customer data

The Psychology of Virus Creators

Understanding the mindset of virus creators helps us predict and prevent attacks:

Thrill Seekers: Some creators are motivated by the excitement and adrenaline rush of successfully infecting thousands of systems. They see it as a game or challenge.

Ideologists: These creators believe they are fighting for a cause, whether political, religious, or social. They justify their actions as serving a greater purpose.

Profit Seekers: For many modern virus creators, it is simply a business. They calculate the potential profit against the risk of getting caught.

Attention Seekers: Some want fame, recognition, or respect from peers. Creating a widely-spread virus can make someone notorious in hacker communities.

Common Exam Mistakes

Confusing Reasons with Effects: WAEC examiners note that students often list consequences (like data loss or system crash) instead of reasons why viruses are created (like financial gain or revenge). Reasons explain the motivation of the virus creator, not what happens when the virus attacks.

Being Too Vague: Writing “to cause harm” or “to damage computers” is too general. Examiners want specific reasons like “to steal banking credentials for financial fraud” or “to demand ransom payments after encrypting files.”

Listing Only One Perspective: Some students only mention criminal reasons and forget that viruses can be created for security testing or research purposes. A complete answer shows different motivations.

Poor Expression: Students write “for privacy” when they mean “to violate privacy” or “avoid privacy” when they mean “invade privacy.” Be clear whether you are describing the attacker’s goal or the victim’s loss.

Practice Questions

Multiple Choice Questions

1. The MOST common reason for creating computer viruses today is:
a) Educational research
b) Financial gain through fraud
c) Political activism
d) Software testing
Answer: b) Financial gain through fraud ✓ (Most modern viruses target banking details, ransomware payments, or data theft for profit)

2. A virus that locks your files and demands payment to unlock them is called:
a) Trojan horse
b) Ransomware
c) Worm
d) Spyware
Answer: b) Ransomware ✓ (Ransom means payment demanded, ware means software)

3. Which of the following is a LEGITIMATE reason for creating virus-like programs?
a) Stealing competitor’s customer data
b) Testing company security systems
c) Demanding ransom from businesses
d) Disrupting government websites
Answer: b) Testing company security systems ✓ (Ethical hacking and penetration testing are legal with permission)

4. A disgruntled employee creating a virus to damage his former company’s system is an example of:
a) Financial gain
b) Security testing
c) Revenge and sabotage
d) Educational research
Answer: c) Revenge and sabotage ✓ (Motivated by anger and desire to harm the organization)

Essay Questions

1. Explain FIVE reasons why people create computer viruses. (10 marks)

Examiner’s Tip: Give five distinct reasons, not five examples of the same reason. Include both criminal reasons (financial gain, data theft, revenge) and non-criminal reasons (security testing, research). Award 2 marks for each well-explained reason. Simply listing without explanation earns only 0.5 marks per point.

2. Distinguish between viruses created for financial gain and those created for revenge, giving TWO examples of each. (8 marks)

Examiner’s Tip: Start with clear definitions showing the difference (financial gain seeks money, revenge seeks to harm). Then provide specific examples like banking trojans vs. sabotage by fired employees. Award 2 marks for distinction, 3 marks for financial gain examples and explanation, 3 marks for revenge examples and explanation.

3. A school’s computer laboratory was infected with a virus that deleted all student project files two days before submission deadline.

(a) State THREE possible motivations the virus creator might have had. (3 marks)
(b) Suggest FOUR measures the school could have taken to prevent this attack. (4 marks)

Examiner’s Tip: For part (a), consider various angles: revenge by a student who failed, vandalism for notoriety, testing security weaknesses. For part (b), focus on practical prevention: regular backups, antivirus software, user education, restricted access to critical systems.

Memory Aids

Major Virus Motivations (FREDS):

  • Financial gain – stealing money or data to sell
  • Revenge – angry employees or individuals seeking harm
  • Espionage – spying and stealing secrets
  • Disruption – shutting down services and causing chaos
  • Security testing – legitimate research and protection development

Remember: “Not all viruses are created equal – motivations range from Money to Mischief”

Related Topics

  • Types of Computer Viruses and Malware
  • How Computer Viruses Spread
  • Antivirus Software and Security Measures
  • Cybercrime and Computer Security Laws in Nigeria
  • Safe Computing Practices and Digital Hygiene

Leave a comment

not allowed!