home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Tech Arsenal 1
/
Tech Arsenal (Arsenal Computer).ISO
/
tek-12
/
vir04024.zip
/
VIR04024.TXT
< prev
Wrap
Text File
|
1991-02-09
|
23KB
|
534 lines
From wang!elf.wang.com!ibm1.cc.lehigh.edu!virus-l Fri Feb 8 23:42:48 1991 remote from tosspot
Received: by tosspot (1.63/waf)
via UUCP; Sat, 09 Feb 91 11:27:50 EST
for lee
Received: from somewhere by elf.wang.com id aa14040; Fri, 8 Feb 91 23:42:46 GMT
Received: from IBM1.CC.Lehigh.EDU by uunet.uu.net (5.61/1.14) with SMTP
id AA06859; Fri, 8 Feb 91 14:02:35 -0500
Message-Id: <9102081902.AA06859@uunet.uu.net>
Received: from LEHIIBM1.BITNET by IBM1.CC.Lehigh.EDU (IBM VM SMTP R1.2.2MX) with BSMTP id 8735; Fri, 08 Feb 91 13:59:33 EST
Received: from LEHIIBM1.BITNET by LEHIIBM1.BITNET (Mailer R2.05) with BSMTP id
1871; Fri, 08 Feb 91 13:58:57 EST
Date: Fri, 8 Feb 91 13:53:00 EST
Reply-To: VIRUS-L@ibm1.cc.lehigh.edu
Sender: Virus Discussion List <VIRUS-L@lehiibm1.bitnet>
From: "The Moderator Kenneth R. van Wyk" <krvw@cert.sei.cmu.edu>
Subject: VIRUS-L Digest V4 #24
Comments: To: VIRUS-L@IBM1.CC.LEHIGH.EDU
To: Multiple recipients of list VIRUS-L <VIRUS-L%LEHIIBM1@uunet.uu.net>
VIRUS-L Digest Friday, 8 Feb 1991 Volume 4 : Issue 24
Today's Topics:
Yet another virus! (PC)
Re: Boot Sector/Partition Table Protection (PC)
Re: Hardware damage?
Apologies to Sim (Mac)
Re: Hardware damage? (PC)
Re: Write-protecting 3.5 inch disks
Virus Protection and Universities
VAX/VMS and Viruses
Re: Compressors
Using UUENCODE to send samples.
Re: Boot sector self-check (PC)
4th Annual Ides-of-March Virus & Security Conference
VIRUS-L is a moderated, digested mail forum for discussing computer
virus issues; comp.virus is a non-digested Usenet counterpart.
Discussions are not limited to any one hardware/software platform -
diversity is welcomed. Contributions should be relevant, concise,
polite, etc. Please sign submissions with your real name. Send
contributions to VIRUS-L@IBM1.CC.LEHIGH.EDU (that's equivalent to
VIRUS-L at LEHIIBM1 for you BITNET folks). Information on accessing
anti-virus, documentation, and back-issue archives is distributed
periodically on the list. Administrative mail (comments, suggestions,
and so forth) should be sent to me at: krvw@CERT.SEI.CMU.EDU.
Ken van Wyk
---------------------------------------------------------------------------
Date: Wed, 06 Feb 91 16:34:07 -0400
From: "Michael J. MacDonald I.S.P." <MIKEMAC@UNB.CA>
Subject: Yet another virus! (PC)
I recieved a call on Jan 29, 91 from a local pc retailer.
They seemed to have a virus.
This is what I was told:
1) it ``appeared'' about a week ago.
2) any access of an uninfected disk infects it.
3) infects any version of dos, he said that ``4.01 was worse''
4) infects a 386
5) warm boot infects.
6) infects all disks 1.2M, 5 1/4, 3.5, and hard disks.
7) formating a 1.2M disk on an infected machine will format the
full disk 100% complete, and then returns a Invalid Media or Track
0 bad. Formating the exact same disk with an uninfected system
the format completes successfully with no errors.
8) McAfee's(sp) scan V72 does not detect it
9) f-disinf version 1.12 July 90 says:
``This boot sector is infected with a new version of the virus.''
(no name).
What I have done and ``know to be true''
1) A fresh copy of Scan V72 and AVSearch 2.21 from the wuarchive
does not detect it.
2) I watched them do 7, 8 and 9 and I duplicated 8 on my own equipment.
3) If I try to boot an IBM PC Portable (lugable) (8086) 2 floppy) no
hard disk. The drive light comes on to do the boot and it never goes
off. A ctrl-alt-del does not do anything.
4) If I try to boot an IBM PC (original) (8086 ) 2 floppy) no
hard disk. The drive light comes on to do the boot and it goes
off, no boot, no error message. If I then stick in an clean
bootable floppy and ctrl-alt-del it will boot and not infect the
clean floppy.
5) The person said that the disk I had could boot a clone, but it would
not boot a true blue IBM 8086, it might boot a 386 didn't try.
6) f-disinf version 1.13 says:
``This boot sector is infected with a new version of the Stoned virus.''
7) f-disinf version 1.14 says: (not a quote)
This is not a typical boot sector and could be a virus.
I contacted Kenneth van Wyk and after exchanging a few notes etc
I recieved a confirmation that it was a new virus.
Fortunately the mdisk suite of utilities appears to clean up this
virus.
Anyway to make a long story short. We appear to have a brand new
boot sector virus. As far as a name, I suggest 910129 as the
date of first appearence. There is no ascii text in the boot
sector. An ugly name and if anyone has a better suggestion thats
ok. I do not have a machine that I can get an active virus to run on
such that I can test it.
I just recieved the following note from Ken
> Mike,
>
> Our technical contacts said that you should feel free to give the virus a
> name and send a write-up to VIRUS-L about it. They also added that,
> it'll eventually write junk over the master boot record of the first
> hard disk (causing not-too-hard-to-reverse loss of access to C: etc).
>
> Hope this helps.
>
> Cheers,
>
> Ken
I would like to express my thanks to Kenneth van Wyk
for his assistance in tracking this down and also for VIRUS-L
Thanks all .
mikemac...
P.S. if you want to contact me about this please feel free but NOTE
1) I will not send a copy of the virus to people who ask unless first
oked by ken.
2) I will be on vacation for the next two weeks.
========================================================================
Michael MacDonald, I.S.P.
Senior Systems Specialist,
Faculty of Computer Science It is wrong to assume that because
University of New Brunswick a computer can calculate PI to
Po. Box 4400 several thousand digits in a blink
Fredericton, New Brunswick of an eye that it is any more
CANADA E3B 5A3 intelligent than your average toaster.
(506) 453-4566
Netnorth/BITNET: MIKEMAC@UNB.CA
========================================================================
------------------------------
Date: Thu, 07 Feb 91 09:30:00 +0100
From: "Mark Aitchison, U of Canty; Physics" <PHYS169@csc.canterbury.ac.nz>
Subject: Re: Boot Sector/Partition Table Protection (PC)
padgett%tccslr.dnet@uvs1.orl.mmc.com (Padgett Peterson) writes:
>>>... what would be the possibility of 'delibrately' infecting ones boot-secto
r
with a piece of code ...
...
> allow such intrusion to be detected prior to the load of the OS and can block
> any such infection thereafter...
If anybody's interested, there is such a program avaliable, i.e. stops
hard disk boot viruses early in the start-up sequence. If anyone is
interested, I can e-mail further details. It's a companion product to
an automatic diskette boot sector scanner.
Mark Aitchison, Physics, University of Canterbury, New Zealand.
------------------------------
Date: 07 Feb 91 08:05:30 +0000
From: lan@bucsf.bu.edu (Larry Nathanson)
Subject: Re: Hardware damage?
While the existance of the HCF assembly command (Halt and Catch Fire)
has been debated, :-) I seem to remember a discussion similar to this.
I believe the basic conclusion was that it is impossible to damage the
CPU itself through programming.
However, peripherals remain very vulnerable- if you take a standard
hard drive, and drag the R/W head across the media 4 or 5 thousand
times, it can't be good. While it is unlikely that any user would
allow the machine to sit there grinding for several hours, it is
possible to write to virus to add 2 or 3 full head sweeps to each disk
access. This would slightly slow up the response time of the drive,
and might make it wear out much faster.
I saw a computer anecdote about some guys who had access to a printer
where imprints of the letters were layed out sequentially along a
linked chain. The chain spun laterally in front of 80 hammers, which
would strike, when the right character was in the right position.
These fellows found out the sequence of the letters, and attempted to
send that string to this printer to see what would happen. They said
that there were finding parts of the printer in the corners for many
months.
If one were to come up with a well sequenced access drive request,
timed with the drive speed, and in sync with the sector interleave, a
similar effect might be possible. However, as in the story, much
advance knowledge about the hardware is necessary. Unless the
hardware configuration is VERY public, it would almost have to be an
inside job. Writing enough code to screw with every HD, and every
printer around would make the virus big enough to be easily detected.
I think there may be ways to screw with the refresh rate of certain
brand monitors, but again- that requires inside knowledge- then there
is no reason to use viral propagation- a trojan horse will do fine.
- --Larry
- --
// Larry Nathanson . 726 Comm Av #5J . Boston, MA 02215 . 617 266 7419 \\
I've heard they just built a tunnel from England to France. The French
drive on the right hand side, the English on the left. Can they save
money by building only one lane?
------------------------------
Date: Thu, 07 Feb 91 08:14:43 -0600
From: THE GAR <GLWARNER@SAMFORD.BITNET>
Subject: Apologies to Sim (Mac)
I would like to make a public apology to Simware, and especially to
Greg Bisaillon at Simware, regarding the note that I posted previously
on this list.
I fear that I have caused his company some damage by the posting, an
excerpt of which follows:
**************************************************************************
Date: Mon, 28 Jan 91 16:52:31 CST
From: THE GAR <GLWARNER@SAMFORD>
Organization: Samford University Computer Services
Subject: SimWare 3.1
BUT . . . SIMWARE's "SimMac 3.1 Application Disk" (Master Program), which
I received on or about Jan 11 was infected! SAM reports that it was last
altered on 12/21/90 at 12:55 PM. This INFURIATES me, as I had up until
today always trusted the programs that come straight from the manufacturer
sealed in the "Read Carefully BEFORE Opening" license envelope!
************************************************************************
Greg Bisaillon contacted me from Simware, and together we checked our
respective shipping logs. It seems that the package WAS at Samford on
Dec 21! The first time that I used the disk on my machine was not
until early January, however it was used in ANOTHER Mac before it came
to mine.
This Mac must have been the infector, NOT Simware.
I was unaware that this had occurred, as the disk was in its envelope
when I received the disk. All my packages are opened by the person in
charge of our purchase orders, so it did not bother me, I had assumed
it was open so the shipping invoice could be removed.
Having spoken with Greg, I have come to understand what a thorough and
outstanding job of quality assurance they provide at Simware, with
each disk being checked with SAM and Disinfectant some four times
before leaving the premises.
I again would like to apologize, and hope that Chris Radziminski, and
the MacWeek people are still reading this list, as both had expressed
concerns to Simware. I have always despised the rumors that went
along with the software business, and now I have unwittingly started
one!
[Ed. Thanks for setting the record straight, Gary!]
/++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\
! Later + Systems Programmer !
! Gary Warner + Samford University Computer Services !
! + II TIMOTHY 2:15 !
\+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++/
------------------------------
Date: Thu, 07 Feb 91 14:55:21 +0000
From: gjackson@athena.mit.edu (Gregory A. Jackson)
Subject: Re: Hardware damage? (PC)
Not strictly a virus, but as to software damaging hardware it was true
under Windows 2.1 and WordPerfect 5.0 that running grab.com to capture
an Paint image from the screen caused VGA monitors to snap, arc,
oscillate, and (if you didn't shut it off immediately) burn out.
- --
Greg Jackson
20B-140/MIT/Cambridge MA 02139
(617) 253-3712
------------------------------
Date: Thu, 07 Feb 91 17:22:13 -0500
From: lotus!LDBVAX!AZAVATONE@uunet.UU.NET
Subject: Re: Write-protecting 3.5 inch disks
Write protecting 3.5 inchers. (disks) Very simple. All you need
is a pocket knife or a push pin. Pry up on the corner of the disk
with the write protect tab till you hear a snap. Then, with the knife
or whatever, push out the write protect tab. Finally if the edge of
the disk is still seperated, squeeze it untill it snaps togeather
again. Viola! Write protected disk. However, if you want to be able
to write to it again, place a small strip of tape (even scotch tape)
across the back of the write protect hole and write to your heart's
content. I know this works for the mac.
Alex Zavatone
123 Mac - Lotus
Zav B!-]
My opinions do not represent those of my employer, but they should.
------------------------------
Date: Thu, 07 Feb 91 16:41:02 -0500
From: RAY <ACRAY@ECUVM1.BITNET>
Subject: Virus Protection and Universities
I would like to know what other universities are doing about buying
virus protection packages. We have a copy of Virex for our use but
would like to implement something in the labs. We have look at SCAN
but McAfee shareware site licences prices are exceptionally high. The
minimum purchase is for use on 100 machines for $3250. We would
probably be better off buying just a few copies and putting them on
machines set aside for virus checking only.
Any thoughts from other university labs?
===============================================================
Ray Drake ACRAY@ECUVM1.BITNET
Microcomputer Consultant (919)757-6401
East Carolina University Greenville, NC 27858
===============================================================
------------------------------
Date: Thu, 07 Feb 91 20:05:51 +0000
From: bert@medley.ssdl.com (Bert Medley)
Subject: VAX/VMS and Viruses
Does anyone know of any virus protection software for VAX/VMS or UNIX
(Sun, DG Aviion, DEC ULTRIX)? Please e-mail to bert@medley.ssdl.com
or post. I will summarize and repost if there are answers. I NEED
any answers you might can give. Thanks in advance.
- --
Bert Medley | UUCP: bmedley@hounix.uucp
Synercom Technology | or ..uhnix1!hounix!bmedley
2500 City West Blvd., Suite 1100 | Internet: bmedley%hounix@uh.edu
Houston TX 77042 | "My opinions are my own ..."
------------------------------
Date: 08 Feb 91 10:05:49 +0000
From: frisk@rhi.hi.is (Fridrik Skulason)
Subject: Re: Compressors
jguo@cs.NYU.EDU (Jun Guo) writes:
> We know that signature based scanner will not search into compressed
>EXE/COM file.
Not 100% correct - some scanners will scan some types of compressed
files simply by uncompressing them first - for example my F-PROT, and
(I think) McAfee's SCAN will scan a LZEXE-packed file.
Of course I want to make my scanner be able to scan all the different
types of compressed files - the problem is just that I don't have a
copy of all the compressors - in fact, I only have LZEXE and EXEPACK.
I know some of the compressors are available on SIMTEL20 and
elsewhere, but not all. So, could somebody mail me information on the
status of the programs below - are they shareware/freeware/commercial,
and where are they available ?
No need to increase the traffic on Virus-L too much...I will post a
summary of the replies I receive.
> PKlite PKlite -x
> Diet 1.0 Diet -r
> LEXEM
> TinyProg
> AXE
> Shrink
> SCRNCH
> ICE ICE breaker
> CRUNCH
> I'd like to hear from you of other compressors and decompressors.
I know of one program from Bulgaria - perhaps Vesselin Bontchev could
provide some information on it - the problem is just that he does not
have a computer any more, as he was just promoted.
> And one more thing: how are device drivers loaded? Can they be
>compressed also? If yes, how can we decompress that?
I know of no method to compress device drivers, which allows them to
be uncompressed dynamically on loading - it could be written, of
course, but I don't think it is worth the effort - device drivers are
usually so small (less than 50 Kbytes) one does not gain much in space
or loading time.
------------------------------
Date: Fri, 08 Feb 91 09:30:33 +0000
From: frisk@rhi.hi.is (Fridrik Skulason)
Subject: Using UUENCODE to send samples.
I often receive samples containing new viruses by E-mail, or programs
suspected of being viruses or Trojans. To get the samples across, the
files are encoded into printable form, often by the UUENCODE program.
However, if the person sending the file is at a BITNET site, the UUencoded
file will arrive corrupted. So, if you are sending binary files between
Internet and Bitnet machines and want to make sure they arrive OK - please
don't use UUencode - it is useless - use XXencode instead.
If anyone does not have xxencode.c or xxdecode.c, I will be happy to send out
copies of the programs.
- -frisk
Fridrik Skulason University of Iceland |
Technical Editor of the Virus Bulletin (UK) | Reserved for future expansion
E-Mail: frisk@rhi.hi.is Fax: 354-1-28801 |
------------------------------
Date: Wed, 06 Feb 91 07:35:57 -0500
From: Padgett Peterson <padgett%tccslr.dnet@uvs1.orl.mmc.com>
Subject: Re: Boot sector self-check (PC)
>From: Steve Albrecht <70033.1271@CompuServe.COM>
>
>While waiting for the same type of self-check in the boot sector, we
>have developed a small program (so far only intended to protect
>ourselves against reinfection by the Stoned virus) which does the
>following:
(lengthy description follows)
This method will detect the Stoned however "stealth" type
viruses (Brain, Joshi) will return the original boot sector
(floppy-Brain) or partition table (hard disk-Joshi) when an Int 13
request is processed since these viruses (as well as others) trap the
Int 13 call. A proven technigue is to first perform an Int 12 call
(returns # of k in hex to AX) and check for either 280h (640k) or 200h
(512k). Successful BSI/PTI viruses (Brain, Stoned, Joshi) go resident
at the TOM and change this value to some lower number.
Padgett
------------------------------
Date: Fri, 08 Feb 91 08:54:41 -0500
From: jsb@well.sf.ca.us (Judy S. Brand)
Subject: 4th Annual Ides-of-March Virus & Security Conference
Who SHOULD attend this year's Ides-of-March
Fourth Annual Computer VIRUS & SECURITY Conference
at the New York World Trade Center?
MIS Directors, Security Analysts, Software Engineers, Operations
Managers, Academic Researchers, Technical Writers, Criminal
Investigators, Hardware Manufacturers, Lead Programmers who are
interested in:
WORLD-RENOWNED SECURITY EXPERTS: CRIMINAL JUSTICE LEADERS:
Dorothy Denning - DEC Bill Cook - US Justice Dept
Harold Highland - Comp & Security Donn Parker - SRI Intl
Bill Murray - Deloitte & Touche Steve Purdy - US Secret Service
Dennis Steinauer - NIST Gail Thackeray - AZ Attorney
UNIVERSITY RESEARCH LEADERS: LEGAL/SOCIAL ISSUES EXPERTS:
Klaus Brunnstein - Hamburg Mike Godwin & Mitch Kapor - EFF
Lance Hoffman - GWU Emmanuel Goldstein - 2600 Magazine
Eugene Spafford - SERC/Purdue Tom Guidoboni - (R.Morris' lawyer)
Ken van Wyk - CERT/CMU Marc Rotenberg - CPSR
PLUS Fred Cohen, Ross (FluShot) Greenberg, Andy (DrPanda) Hopkins, and
over 40 MORE!
Over 35 PRODUCT DEMOS including: include Candle's Deltamon, HJC's
Virex, McAfeeSCAN, Symantec's SAM, ASP 3.0, DDI's Physician,
Gilmore's FICHEK, Certus, FluShot Plus, Iris's Virus Free, 5D/Mace's
Vaccine, Norton Utilities, PC Tools, Quarantine, Viruscan, Panda's
Bear Trap, Disk Defender, Top Secret, Omni, ACF2, RACF and OTHERS AS
REGISTRANTS REQUEST.
FIFTY PRESENTATIONS INCLUDE:
Security on UNIX Platforms, Tips for Investigators, HURRICANE Recovery,
Dissecting/Disassembling Viruses, 6 Bytes for Detection, LAN Recovery,
ISDN/X.25/VOICE Security, Encryption, Apple's Security, EARTHQUAKE Recovery,
IBM's High-Integrity Computing Lab, US/Export Issues, 22-ALARM Fire Recovery,
Publicly Available Help, Adding 66% More Security, NETWARE VIRUS Recovery,
Next Generation of Computer Creatures, THE WALL STREET BLACKOUT Recovery,
Mini Course in Computer Crime, Great Hacker Debate, REDUCING Recovery Costs,
S&L Crisis: Missing DP Controls, OSI and the Security Standard, Virus Myths,
Viruses in Electronic Warfare, US Armed Forces Contracts for New Ideas....
INTERESTED? ONLY $275 one day (Thurs 3/14 - Fri 3/15) or $375 both days:
* Bound, 600-page Proceedings containing ALL materials - no loose paper!
* Eight meal breaks, including Meet-the-Experts cocktail party 107th Floor
* 2-day track of product demo's * 2-day course for ICCP Security exam
* Full-day Legal & Justice Track * Full-day disaster Recoveries Track
There is a $25 discount for ACM/IEEE/DPMA members.
Fourth member in each group gets in for no charge!
To register by mail, send check payable to DPMA, credit card number
(VISA/MC/AMEX), or purchase order to:
Virus Conference
DPMA
Financial Industries Chapter
Box 894
New York, NY 10268
or FAX to (202) 728-0884. Be sure to include your member number if
requesting the discounted rate. Registrations received after 2/28/91
are $375/$395, so register now!
For registration information/assistance, call (202) 371-1013
Discounted rates available at the Penta Hotel. $89 per night. Call
(212) 736-5000, code "VIRUS"
Discounted airfares on Continental Airlines, call (800) 468-7022, code EZ3P71
Sponsored by DPMA Financial Industries Chapter, in cooperation with
ACM SIGSAC and IEEE-CS.
------------------------------
End of VIRUS-L Digest [Volume 4 Issue 24]
*****************************************