home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker 2
/
HACKER2.mdf
/
virus
/
virusl2
/
virusl2.211
< prev
next >
Wrap
Text File
|
1995-01-03
|
18KB
|
412 lines
VIRUS-L Digest Wednesday, 4 Oct 1989 Volume 2 : Issue 211
VIRUS-L is a moderated, digested mail forum for discussing computer
virus issues; comp.virus is a non-digested Usenet counterpart.
Discussions are not limited to any one hardware/software platform -
diversity is welcomed. Contributions should be relevant, concise,
polite, etc., and sent to VIRUS-L@IBM1.CC.LEHIGH.EDU (that's
LEHIIBM1.BITNET for BITNET folks). Information on accessing
anti-virus, document, and back-issue archives is distributed
periodically on the list. Administrative mail (comments, suggestions,
and so forth) should be sent to me at: krvw@SEI.CMU.EDU.
- Ken van Wyk
Today's Topics:
New virus? - further report (Mac)
Lost mail in U.K.
Tiger Teams
Re: Followup on new virus (Mac)
Columbus Day Virus in the Military
Virus protection (PC)
NIST Special Publication
Re: viruses in Commercial Software
Correction to previous posting (Mac)
new IBMPC anti-virals
UNIX virus proof?! (UNIX)
Jerusalem Virus -B (PC)
---------------------------------------------
Date: 03 Oct 89 14:49:03 +0000
From: jap2_ss@uhura.cc.rochester.edu (Joseph Poutre)
Subject: New virus? - further report (Mac)
Here is a further report on the possible virus at the U of R. The
student consultants at the University computing center made copies of
programs they believed infected and sent them to our computer center.
I had an infected copy of Macwrite 5.01 for a while., where I
discovered the added STR and the changed ICN. I have had reports of
Macwrite II being attacked, but the info I have is inconplete. I am
still trying to get another infected program, but I am never around
when an infected disk is found. When I get one those that requested a
copy will be sent one via email, if it works. The infected System on
the consultants' hard drive is 6.0.2, and the only symptom it has
shown so far is the "Last Modified" date and time change at irregular
intervals, including this morning. I was able to induce a change by
repeatedly doing a Get Info on the system.
The virus probably found its way onto the disk when a consultant put
recovered files from a disk showing what may be sysmptoms of the virus
onto the hard drive. Vaccine is installed in teh System folder, and
did nothing. The system also has NVIR immunity. The applications
known to be attacked, so far, are Macwrite 5.01, Macwrite II, the
System and its associated files. All of them, even the clipboard. I
just watched to Last Modified date change on Laserwriter change during
a copy. (Needless to say the consultants are working on replacing and
File Locking everything. This appears to protect against the virus.)
I will obtain copies of the infected stuff and try to do some
comparisons using Resedit.
To repeat, Disinfectant 1.2 has no effect, and Vaccine does not
protect against it, at least from infecting within a disk. I plan to
spend today working with infected and non-infected programs, and
report my findings, and those of the others working on tis problem.
Joseph Poutre (The Mad Mathematician)
jap2_ss@uhura.cc.rochester.edu
Understand the power of a single action. (R.E.M.)
------------------------------
Date: Mon, 02 Oct 89 09:40:10 -0000
From: "David.J.Ferbrache"
Subject: Lost mail in U.K.
Due to disruption of the mail gateway at Heriot-Watt University mail
during the month of September has been intermittent. Anyone who has
sent mail to me and not received a reply, please accept my apologies
and resend the letter.
The info-server facility is currently clearing a backlog of requests and
should return to normal service shortly.
Many thanks
- ------------------------------------------------------------------------------
Dave Ferbrache Internet <davidf@cs.hw.ac.uk>
Dept of computer science Janet <davidf@uk.ac.hw.cs>
Heriot-Watt University UUCP ..!mcvax!hwcs!davidf
79 Grassmarket Telephone +44 31-225-6465 ext 553
Edinburgh, United Kingdom Facsimile +44 31-220-4277
EH1 2HJ BIX/CIX dferbrache
- ------------------------------------------------------------------------------
------------------------------
Date: 03 Oct 89 14:03:00 +0700
From: "Okay S J" <okay@tafs.mitre.org>
Subject: Tiger Teams
In VIRUS-L V2NO208 "Thomas B. Collins, Jr." <TBC101@PSUVM.BITNET> writes:
>Say I get my new system, put all the software on
>it, and run a few virus scanners that turn up nothing. I then run all
>applications from my hard drive, and don't use any floppy disks. It
>wouldn't make sense for me to check my hard drive every day for viruses,
>because they don't just pop up from nowhere.
You're discounting the fact that your machine could be on a network. Having
an infected machine on a network where one transfers files between machines
can be just as bad as sticking a floppy in the machine. One shot does
not cure all
>If I did add software to my system, I would check it for viruses before
>adding it. I think it would make more sense for the Tiger Teams to come
>in in the middle of the day, ask you to please save your work, and then
>run a virus checker on your system.
It would cause too much of a loss of productivity and interruption of
the work routine. Night is better if you're going to do it. Plus the
public embarrasment of having ones machine checked. Seriously, its
kind of like any test for drugs or AIDS or anything like that. Its not
so much as to whether you are infected, but just the idea that it was
done. After all, why have a test done if there isn't some
suspicion...This at least would be the view of most people around
those who had their machines tested. 'Did you hear George got busted
by the Tiger Team last week?---They didn't find anything, but you
never know....'
>If anything is found, you are "cited" as letting a virus into your system.
>If you're clean, you go back to work, and the Tiger Team moves on.
What exactly does 'cited' mean? Disciplined?, public marked as a
electronic leper in the company? fired? --Now that we've established
how they would operate, what should be the penalties for those
'caught'?
Stephen Okay Technical Aide, The MITRE Corporation
x6737 OKAY@TAFS.MITRE.ORG/m20836@mwvm.mitre.org
'Geez...I actually have to use a disclaimer now,
I must be getting important!'
Disclaimer:Its mine, mine, mine, mine, mine !!!!!!!!!!!!!!
------------------------------
Date: 03 Oct 89 16:14:59 +0000
From: eplrx7!milbouma@uunet.UU.NET (milbouma)
Subject: Re: Followup on new virus (Mac)
>No anti-virus program has been able to find it, including Interferon,
>Virus Rx, Anti-pan, and Disinfectant 1.2. If this is recognized by anyone,
>please email me ASAP at the address below with devirusing help.
I tried to e-mail but the message bounced.
I do not recognize the virus by your description, but if it is new
then no one will including the antiviral apps that you mention.
I can recommend Symantec's new antiviral package, SAM, which will flag
any abnormal writes from an application (like Vaccine if you're
familiar with it, but better than Vaccine). SAM will at least protect
your machines from getting infected and also has a Virus scanner
program that scans for known viruses and can also repair irreplaceable
apps that are infected. Part of the protection init also will ask you
if you want to scan a floppy for known viruses whenever you insert
one.
I also recommend that you contact Symantec and give them a copy of
your virus so they can update their Virus scanner program.
Symantec can be contacted at (408) 253-9600, (800) 441-7234.
Please keep the net posted on further developments with this virus. I
would especially be interested to know if the SAM INIT flags infection
attempts by the virus.
Thanks
(I do not work for Symantec)
------------------------------
Date: Tue, 03 Oct 89 11:10:34 -0600
From: Chris McDonald ASQNC-TWS-RA <cmcdonal@wsmr-emh10.army.mil>
Subject: Columbus Day Virus in the Military
While I did not see the computer chronicles report referenced by a
poster in a recent Virus-L edition, I would propose that there really
is no accurate way at the present time to gauge any computer viral
infection within the military given existing policies and
organizational structures. The diversity of organizations has
resulted in differing policies as to whether such reporting is or is
not mandatory. This "discretionary" rather than "mandatory" reporting
ensures in my opinion that viral infections go unreported. Indeed, I
am aware of an outbreak of the Israeli B virus strain which infected
several PCs at a particular Army activity which I subsequently learned
was not reported through its chain-of-command. In all fairness the
written policies applicable to that activity do not make reporting
mandatory.
In so far as the Columbus Day virus is concerned, the Army's
Information Systems Command through a variety of sources has tapped
the resources of Virus-L to alert its users as to the potential
threat. An advisory message on the subject has been distributed
utilizing information first seen on Virus-L. Other Army Commands have
retransmitted the same information.
I would like to propose that the military subscribers to Virus-L
perhaps pursue the problem of reporting by answering these questions:
1. Has your site experienced a viral infection?
2. What viruses were present?
3. Was it reported to the next level of command?
I am volunteering to compile the results and then post a summary of
the responses received to Virus-L. I will of course ensure the
confidentiality of the identity of all sites. Responses should be
sent to me directly at <cmcdonal@wsmr-emh10.army.mil>. If this is
unacceptable, then perhaps someone out there in NETLAND has a better
idea. Parenthetically, I wonder if Ken might provide a breakdown of
who actually subscribes to Virus-L in terms of military, university,
and contractor subscribers? This would be important to assess the
level of participation.
[PS: Congratulations on your marriage!]
[Ed. Thanks! It would be extremely difficult to quantify the
different VIRUS-L subscribers, particularly since we're now
distributing VIRUS-L via the comp.virus Usenet newsgroup. I can tell
you, however, that the actual mailing list contains just shy of 1300
subscribers, over 200 of which are redistribution points. These sites
represent a solid cross-section of educational, commercial, military,
and government sites in several countries. Most (perhaps 70%) of the
sites are educational, with approximately equal numbers of com, mil,
and gov sites. Let me stress that these are not accurate numbers for
any sort of statistical analysis.]
------------------------------
Date: Tue, 03 Oct 89 14:01:11 -0600
From: Brian Piersel <S1CH@SDSUMUS.BITNET>
Subject: Virus protection (PC)
I'm a new owner of an IBM AT compatible computer, and so I am not
very familiar with the various anti-virus programs. Could someone
explain to me how these work, and/or recommend one to get? Respond
directly to me, if possible. Thanks in advance...
------------------------------
Brian Piersel
BITNET: S1CH@SDSUMUS ICBM: 96.50W 44.20N
INTERNET: S1CH%SDSUMUS.BITNET@VM1.NoDak.EDU
(The Internet address doesn't always work)
"Live long and prosper."
------------------------------
Date: Tue, 03 Oct 89 14:16:52 -0600
From: Chris McDonald ASQNC-TWS-RA <cmcdonal@wsmr-emh10.army.mil>
Subject: NIST Special Publication
I would like to add some additional thoughts to those who have already
commented on the NIST "Computer Viruses and Related Threats: A
Management Guide."
1. I believe there is a signifiant error on page 2-6. The report in
discussing the INTERNET Worm states: "It was unclear what the network
worm's objective was, as it did not destroy information, steal
passwords, or plant viruses or Trojan horses." I think there is
substantial evidence to prove that the Worm in causing denial of
service attacks did indeed destroy information. Donn Seeley has made
the point that the author of the Worm program specifically "deleted"
an audit file so as to hide his location. There are also numberous
reports that the program successfully "captured" passwords on other
hosts to which the Worm author was not entitled. The NIST authors
reference Dr. Spafford's report on page A-1 which addresses the
"stealing" of passwords. Both Seeley's and Spafford's analysis of the
incident can be found, along with other related papers, in the Jun 89
edition of the "Communications of the ACM." This ACM edition is
probably the best reference on the entire incident available in the
public domain. I think it should have been included in the NIST
reference list.
2. I differ from several commentators who suggest that the document
is "prejudiced" against the use of public domain and shareware
products. I think on pages 3-3 and 5-3 the document stresses only
that organizations should develop a clear policy on the acquisition
and on the use of such software.
3. I am struck by the lack of any reference to Virus-L, RISKS Forum
and other INTERNET services which have for years provided we users the
best available, open source information on the subject of computer
viruses. There is also little in the way of reference to the work of
professional associations such as ACM, IEEE, the Computer Security
Institute, and the Information Systems Security Association in
addressing the computer virus phenomenon. Surely "technical
managers", who are the audience for this publication, could use such
resources to implement the virus prevention suggestions in the NIST
publication.
Chris Mc Donald
White Sands Missile Range
------------------------------
Date: Tue, 03 Oct 89 12:11:00 -0400
From: <ACSAZ@SEMASSU.BITNET>
Subject: Re: viruses in Commercial Software
We too have been hit, though not recently. Last semester, a freehand
disk from Aldus had scores on it right out of the box. These
'professionals' should pay more attention to what they are doing.
Alex Z... . . .
------------------------------
Date: Tue, 03 Oct 89 20:31:00 -0500
From: <CTDONATH@SUNRISE.BITNET>
Subject: Correction to previous posting (Mac)
Sorry, folks, I spread a little misinformation without realizsing it.
I have Disinfectant 1.2, not 1.5. (BTW- does anyone know where the latest
versions can be obtained as they become available?) I had gotten swamped
with requests for 1.5. Sorry!
------------------------------
Date: Tue, 03 Oct 89 21:37:54 -0500
From: jwright@atanasoff.cs.iastate.edu (Jim Wright)
Subject: new IBMPC anti-virals
New additions to the archives. For the most recent site listings, see
vol 2 num 209 of VIRUS-L (or better yet, save those monthly site lists!).
All the files in this batch are shareware.
bootchk.exe
Program to verify boot sector of disk. Performs comparison with
secure copy of boot sector. To be used in autoexec.bat. Sent to
me by author. Version 1.00 (first release). Self-extracting zip.
m-1704.arc
Update to previous file of same name. Only change is in docs to
warn of possible false alert issued by viruscan. Direct from
author's BBS.
netscan.arc
Network compatible program to scan disks for known viruses.
Version 0.4v33, update to previous releases. Direct from author's
BBS.
scanrs39.arc
Resident program to scan executables for viruses before loading.
Version 0.9v39, update to previous releases. Note minor change
in spelling of archive name. Direct from author's BBS.
scanv40.arc
Program to scan disk and report any viruses found. Version 0.7v40,
update to previous releases. Direct from author's BBS.
shez48.exe
Shell program for manipulating archives which, with this new
release, is compatible with viruscan. Version 4.8. From HomeBase
where it was placed by author. Self-extracting LZH archive.
[ I was unable to get the viruscan aspect to work as advertised ]
[ but I only put forth a minimal effort. -- jrw ]
BOOTCHK.EXE Verifies boot sector against secure copy, v1.00
M-1704.ARC Repairs and removes infections of 1704A and 1704B viruses
NETSCAN.ARC Network compatible program to scan for viruses, 0.4v33
SCANRS39.ARC Resident program to check for viruses, 0.9v39
SCANV40.ARC Scans disks and reports viruses found, 0.7v40
SHEZ48.EXE Shell for archive manipulation w/ virus checking, v4.8
Jim
------------------------------
Date: Tue, 03 Oct 00 19:89:58 +0000
From: ficc!peter@uunet.uu.net
Subject: UNIX virus proof?! (UNIX)
I wouldn't say UNIX is virus-proof (I posted a hoax article about a
UNIX virus over a year ago, just before the Internet Worm incident),
but it's sure a hell of a lot more virus-resistant than DOS.
------------------------------
Date: 04 Oct 89 07:14:43 +0000
From: consp06@bingvaxu.cc.binghamton.edu
Subject: Jerusalem Virus -B (PC)
SUNY Binghamton has been hit by the Jerusalem Virus. It seems to be
spreading pretty well. We are looking for:
1) Advice.
2) SCAN38, SCANRES, etc... any of those.
3) UNVIRUS
We have SCAN28, and we want to know where to get everything else we
need to arm ourselves against this nasty villain.
Thank you very much.
-Robert Konigsberg
------------------------------
End of VIRUS-L Digest
*********************
Downloaded From P-80 International Information Systems 304-744-2253