home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker 2
/
HACKER2.mdf
/
virus
/
virusl2
/
virusl2.247
< prev
next >
Wrap
Text File
|
1995-01-03
|
26KB
|
619 lines
VIRUS-L Digest Wednesday, 22 Nov 1989 Volume 2 : Issue 247
VIRUS-L is a moderated, digested mail forum for discussing computer
virus issues; comp.virus is a non-digested Usenet counterpart.
Discussions are not limited to any one hardware/software platform -
diversity is welcomed. Contributions should be relevant, concise,
polite, etc., and sent to VIRUS-L@IBM1.CC.LEHIGH.EDU (that's
LEHIIBM1.BITNET for BITNET folks). Information on accessing
anti-virus, document, and back-issue archives is distributed
periodically on the list. Administrative mail (comments, suggestions,
and so forth) should be sent to me at: krvw@SEI.CMU.EDU.
- Ken van Wyk
Today's Topics:
Re: Sophisticated Viruses (Mac)
Anti-Virals (Mac)
Anti Virals, cont'd (Mac)
Re: Ohio vs. Den Zuk (PC)
Using Relay for real time conference
Comprehensive Virus Tools (PC)
Virus Attributes Listing
Any volunteers ? (PC)
High Level Language viruses
Corrections and new details on DataCrime (PC)
RE: Potential Virus? (Mac)
Self-modifying applications (Mac)
Re: Internet worm impact (UNIX & Internet)
---------------------------------------------------------------------------
Date: 21 Nov 89 18:26:07 +0000
From: ut-emx!chrisj@cs.utexas.edu (Chris Johnson)
Subject: Re: Sophisticated Viruses (Mac)
christer@cs.umu.se (Christer Ericson) writes:
>First, restoring the traps to their original values isn't that
>difficult. These are initialized by the ROM, then there must be a
>table from where all initial values are fetched from, right? As I
>haven't been writing any viruses lately, I'm not sure if this table is
>moving around from ROM version to ROM version, but attaining the start
>address of this table for each and every ROM version isn't too
>difficult. Also, the virus would of course restore the trap vector
>after it's done, so why would there be crashes? Actually, it wouldn't
There would be crashes because it's very common for software that
patches traps to have interdependencies between its patches, i.e. one
patch depends on data discovered and stored for later use by another
patch. Removing only a portion of such patches will be likely to kill
the machine sooner or later. Even if you remove *all* patches, the
machine is still in grave danger since the INIT (or whatever did the
patching) may have changed some key characteristics of the machine
already - characteristics that it's patches would have isolated other
software from while they were installed and operating.
Further, restoring traps to their original values is going to remove
all of the patches put in place by the System itself - the patches
that keep that machine running inspite of bugs in the ROMs, etc.
Also, whole portions of the OS and Toolbox will be removed by
restoring traps to their initial values (as taken from the ROM) - this
will kill the machine for sure. And even if you were to take the
status of the trap table at some point early in the boot phase (after
the key System patches had been made) and restore it much later (just
before the first application is loaded, say) you would still be
removing portions of the OS since the portions related to MultiFinder
are added *after* (not before) all the INITs are loaded. Again, the
machine dies for sure.
Even if these changes to the trap table are temporary, the same
problems inhere - portions of the OS are fully installed and operating
while other portions have been partially or completely lobotomized by
restoring their trap table entries to some initial value. Provided
there were no inter- dependencies between routines in the OS (not to
mention the Toolbox) this might not kill the machine immediately (but
it would likely kill it event- ually), but since there *are* such
interdependencies (often matched only in their importance by their
subtlety), the machine is going to die very quickly.
Writing well behaved patches is a black art on the best of days -
writing the sort of un-patching patches discussed here would make that
"black art" look like a carefree romp in the sunlit countryside. I
don't think such patches could be implemented safely, and I don't
think anyone clever enough to do so would be wasting his time working
on viruses in the first place.
>even have to change the trap vectors, it could call the ROM directly,
>but I left that to your imagination to figure out (a fruitless
>attempt, obviously) since I didn't want to give away freebies to
>aspirant virus writers. Some things they'll have to figure out
>themselves.
>
>/Christer
All in all, I don't think the techniques dealt with in this discussion
are significant simply because there are too many reliability and
compatibility problems intrinsically linked to them.
For what it's worth,
- ----Chris (Johnson)
- ----Author of Gatekeeper
- ----chrisj@emx.utexas.edu
------------------------------
Date: Tue, 21 Nov 89 16:13:38 -0500
From: Kim Dyer <3C257F7@CMUVM.BITNET>
Subject: Anti-Virals (Mac)
a Mac Antiviral list:
Antipan
Disinfectant 1.2
Gatekeeper 1.111
Interferon 3.1
Killscores
Killvirus-nvir
Repair 1.5
Rwatcher
Vaccine 1.01
Virus detective 3.01
Virus rx 1.4a2
All the above are available from the Info-Mac archives or various users
groups. There are also several informational postings.
------------------------------
Date: Tue, 21 Nov 89 16:30:52 -0500
From: Kim Dyer <3C257F7%CMUVM.BITNET@vma.cc.cmu.edu>
Subject: Anti Virals, cont'd (Mac)
I found more information on Mac Anti-Virals
There is a good write-up on 20 different Macintosh Antivirals in the
documentation for Disinfectant. I don't want to type it all in without
getting the author's permission.
I'm very pleased with Disinfectant. Available from INFO-MAC archives
many users groups or the author.
John Norstad
Academic Computing and Network Services
Northwestern University
2129 Sheridan Road
Evanston, IL 60208 - USA
Bitnet JLN @ NUACC
Internet JLN at ACNS.MWU.EDU
Applelink A0173
------------------------------
Date: 22 Nov 89 00:36:26 +0000
From: munnari!stcns3.stc.oz.AU!dave@uunet.UU.NET (Dave Horsfall)
Subject: Re: Ohio vs. Den Zuk (PC)
frisk@rhi.hi.is (Fridrik Skulason) writes:
| As I have mentioned before, the "Ohio" virus contains the signature of
| the "Den Zuk", but it also contains some interesting text strings:
|
| V I R U S
| b y
| The Hackers
| Y C 1 E R P
| D E N Z U K O
| Bandung 40254
| Indonesia
|
| (C) 1988, The Hackers Team....
|
| Remember that Den Zuk puts the volume label Y.C.1.E.R.P on
| Brain-infected diskettes, when it removes the infection.
Just a long shot, but "YC1ERP" happens to be a legitimate Amateur
Radio (ham radio) callsign allocated to Indonesia...
I don't have access to an International Callbook just now.
Perhaps someone would like to check this out!
Dave Horsfall (VK2KFU), Alcatel STC Australia, dave@stcns3.stc.oz.AU
dave%stcns3.stc.oz.AU@uunet.UU.NET, ...munnari!stcns3.stc.oz.AU!dave
------------------------------
Date: Tue, 21 Nov 89 19:40:00 -0500
From: IA96000 <IA96@PACE.BITNET>
Subject: Using Relay for real time conference
Has anyone ever considered setting up a real time conference using
the Bitnet RELAY system?
I for one think it would be very interesting and educational for
everyone interested in viruses to get together and chat!
Well, the door is now open....Let's see if anyone enters.
------------------------------
Date: Wed, 22 Nov 89 01:39:46 -0500
From: "Eric Rowan" <ca6726@siucvmb.bitnet>
Subject: Comprehensive Virus Tools (PC)
I'm looking for comprehensive virus tools for the PC. Frankly,
I'm looking for the PC world's analogy of the Mac virus
detector/disinfector Disinfectant as well as the analogy for a
preventative aid like Vaccine and GateKeeper....Hopefully these
analogies exist. Please send any info, opinions and/or other comments
directly to me: CA6726@SIUCVMB.BITNET Also, please include relevant
info like software availability (ie. shareware?) and the wheres and
hows on obtaining the software (eg. ftp addresses). Thank you VERY
much.
Virtually,
Eric Rowan
Southern Illinois University at Carbondale
Computing Affairs
Computer Learning Center 1, Faner 1027
Carbondale, IL 62901
(618) 453-6213
------------------------------
Date: 22 Nov 89 09:33:51 +0000
From: wetmore@iris.ucdavis.edu (Bradford Rice Wetmore)
Subject: Virus Attributes Listing
Hi,
I am just getting back into the virus game, and there are quite a few
new ones (and variations). Is there a quick overview someone has
put together listing some of the common viruses (attributes,
methods of attack, etc.)? If there was something posted earlier,
I would sure appreciate it if someone could send me a copy.
Thanks much,
Brad Wetmore
Grad Student-UC Davis
No funky signatures, just this: wetmore@iris.ucdavis.edu
------------------------------
Date: Wed, 22 Nov 89 11:19:03 +0000
From: frisk@rhi.hi.is (Fridrik Skulason)
Subject: Any volunteers ? (PC)
For the past four months I have been working on a comprehensive
anti-virus package, capable of detecting/stopping and removing all PC
viruses known.
Well, it is finally finished.
The package will be posted on comp.sys.ibm.pc and made available on
SIMTEL and various anti-virus archives.
Right now I am looking for a few volunteers. The package itself has
been thoroughly tested (I estimate that it is running on 5-6% of the
computers here in Iceland), but I need a bit of help with....
... checking that the programs do indeed disinfect all infected
programs and diskettes. I have verified that it will "cure"
all the samples I have of the following viruses:
Alameda (Yale)
Brain
Den Zuk/Ohio
New-Zealand (Stoned)
Pentagon
Ping-Pong/Typo
Swap (Israeli Boot)
Alabama
April 1.
Cascade
Dark Avenger
DataCrime
DataCrime II
dBase
Do-Nothing
405
Fumble
Fu Manchu
Ghost
Icelandic/Icelandic II/Saratoga/Mix1
Jerusalem/Sunday
Lehigh
South African "Friday 13."
SysLock
Traceback/2930
Vacsina
Vienna/Lisbon
Yankee Doodle
Zero Bug
but there may be variants floating around that I do not have a
copy of. If you have a collection of viruses, I would appreciate
if you could test this.
... Another problem is the manual. It consists of several text files,
around 65K in size. Since English is not my primary language,
(and not even my second language, for that matter), I am sure
there are some serious spelling and grammar errors in the
documentation. Anybody willing to take a look at that ?
- -frisk
------------------------------
Date: Wed, 22 Nov 89 12:19:35 +0000
From: frisk%rhi.hi.is@vma.cc.cmu.edu (Fridrik Skulason)
Subject: High Level Language viruses
Most of the viruses we have seen to date seem to be written in
assembly language. However, it is possible to write viruses in a High
Level Language (HLL), and a few such viruses have been reported. The
AIDS virus, written in TURBO Pascal is probably the best known one.
Compared to an assembly language virus, a HLL virus will have the following
"features":
* It is bigger. The AIDS virus, for example, is around 12K,
which makes it the biggest virus known.
* It is more difficult to select good signature strings, since
most of the code produced by the compiler is probably also
present in a number of other (legitimate) programs. This makes
the job of detecting HLL viruses a bit harder.
* Is is much harder to write a good .EXE file infector in Pascal
or C than a .COM infector.
* Just about any programmer could write an usable .COM infector in
C or Pascal in less than an hour. (I mention C and Pascal because
they are the most popular languages, but a virus could just as
easily be written in other languages, Forth, Basic or even APL
or Cobol. Can anybody imagine what a Cobol or APL virus would
look like... ;-)
Comments ...?
- -frisk
------------------------------
Date: Tue, 21 Nov 89 18:41:50 +0200
From: Y. Radai <RADAI1@HBUNOS.BITNET>
Subject: Corrections and new details on DataCrime (PC)
Last month I wrote that whereas the original DataCrime virus per-
forms its damage from Oct 13 to Dec 31, DataCrime II does it from Jan
1 to Oct 12. David Chess and Alan Solomon both replied that in their
copies of DC II, the dates were the same as for DC I: Oct 13 - Dec 31.
That left two possibilities: either there's a mutation with the date
range modified, or my sources were mistaken.
One source for the Jan 1 - Oct 12 range was the July/August issue of
the Computer Security Newsletter. I did not at the time accept this
as necessarily correct. But when I saw a similar statement in the Sep
issue of the Virus Bulletin by Joe Hirst, who does independent disas-
semblies and who always seemed very accurate and reliable in the past,
I became convinced that this was correct.
After the differences of opinion, however, Joe admitted that he had
been mistaken and that the date range for DC II was the same as for DC
I even on his copy. Since there apparently haven't been any further
claims for the pre-Oct 12 dates, I tend to believe that the CSN was
also mistaken. Of course, one *could* easily modify DC II to activate
on Jan 1 - Oct 12 (or on any other date range), but it makes more
sense for the infection period to be long than for the damage period
to be long.
Joe also wrote originally that Sundays are excluded from damage by
DC II. This also turned out to be incorrect, although in this case
the correct behavior is different than for DC I: Mondays are excluded.
Following is the relevant part of the code for each virus (I have
translated the disassembly into a pseudo high-level language; the
variable Hdflag contains 0 if there is no hard disk, 1 if there is):
DataCrime I
If current date > Oct 12 then go to Hard-disk test;
Go to Infection routine;
Hard-disk test:
If Hdflag not 0 then go to Damage routine;
DataCrime II
If current date > Oct 12 then go to Day-of-week test;
Go to infection routine;
Day-of-week test:
If day-of-week (0 for Sunday, 1 for Monday, etc.) not = Hdflag
then go to Hard-disk test;
Go to Infection routine;
Hard-disk test:
If Hdflag not 0 then go to Damage routine;
Thus in DC II the damage will be performed only if there is a hard
disk and the date is after Oct 12 *and the day is not a Monday*.
To summarize, there are (at least) six differences between DC I and
DC II:
DataCrime I DataCrime II
Type of files infected: COM COM/EXE
Size increase: 1168 or 1280 1514
Days excluded from damage: None Mondays
Encrypted? No Yes
Files excluded from infection: 7th letter = D 2nd letter = B
Message: DATACRIME VIRUS DATACRIME II VIRUS
So much for corrections. Now for some new info on these viruses.
Both of them contain code which low-level formats Track 0 on all heads
from 0 to 8. The pseudo-code looks like this:
H := 0;
Loop:
Format Track 0, Head H;
If error go to Continue;
H := H+1;
If H not = 9 then go to Loop;
Continue:
But what happens in the case of disks having less than 9 heads? Pre-
viously, it was assumed by many that this would result in an error, so
that the extra heads would be ignored, i.e. the virus would format
only Cylinder 0. But Joe has discovered by experimentation that in
most cases the number of tracks formatted is actually 9, even if this
goes beyond Cylinder 0. The explanation is that most BIOSes convert
an invalid head number into the valid equivalent. On a 17-sector/track
disk, this will wipe out 153 sectors, which on most hard disks contain
the partition record, boot sector, both copies of the FAT, the root
directory, and possibly some files.
Fridrik Skulason reported in Virus-L that he was able to recover
from an attack of DC II by using the Norton Disk Doctor. This might
seem to contradict the above findings. However, he rebooted before
the virus had a chance to format very much of the disk. It seems
likely that if he had not done this, all of Norton's horses wouldn't
have been able to put his disk together again.
There is a package available from Simtel20, called COLUMBUS, which
is supposed to be of use against the "Columbus Day" [i.e. DC] virus.
It consists of two simple programs, ST0 and RT0. ST0 saves the con-
tent of a certain portion of the hard disk on a diskette file, and RT0
restores it in case of damage by the virus. Just which portion is
saved is not very clear from the documentation. In one place it says
"Track 0", while in another place it says "cylinder zero". Experiment
shows that ST0 saves Track 0 on Head 0 only, which is of little use
against the DC viruses. A look at the source code shows that the
author left the possibility of saving all of Cylinder 0 by defining a
certain symbol at compile time, but as we now know, even that isn't
enough. However, the source code can presumably be modified to save
all 9 tracks damaged by a DC virus by simply replacing "maxhead=0" by
"maxhead=8" in both ST0.C and RT0.C.
Joe Hirst has written a small resident program to prevent damage by
the DC viruses, or more generally, to halt any program which attempts
to low-level format any part of a hard disk by a call to Int 13h func-
tions 5-7. It (along with the above clarifications on the extent and
dates of the damage) appears in the Nov issue of the Virus Bulletin.
Y. Radai
Hebrew Univ. of Jerusalem, Israel
RADAI1@HBUNOS.BITNET
------------------------------
Date: Wed, 22 Nov 89 08:30:02 -0500
From: m20280@mwvm.mitre.org (Jason D. Blue)
Subject: RE: Potential Virus? (Mac)
In VIRUS-L V2 #246, Joel Glickman writes:
>I have just recently noticed a problem on my Mac. After using Cricket
>Graph I checked the last modified date and the program had just been
>modified. After noting this, I began checking other programs and
>found that my copy of Versaterm Pro was also being modified every time
>I ran it. It was at that point that I checked these programs on other
>people's Macs in the office and saw that these programs were not being
>modified on some, while they were being modified on others.. I am
>running Gatekeeper and Vaccine and have checked these programs with
>Disinfectant and they report no trouble.
I have noticed the same problem, with a number of applications (among
them are TinCan and Mac286). I use SAM Intercept from Symantec, and
it alerts me from time to time that an application is trying to change
itself. I checked for viruses, using a number of packages (Virex,
Sam, Disinfectant and Virus detective), but found none.
I don't think this is a virus, but I find it disturbing because, like
Joel mentions, this happens even when I only start an application and
then quit out of it, without changing preferences or options that
might need to be saved to disk.
Jason
User Services
/~~~ Jason D. Blue The MITRE Corporation
|o|o| (703) 883-7999 7525 Colshire Drive MS W130
v_/ jblue@mdf.mitre.org McLean, VA 22102-3481
------------------------------
Date: Wed, 22 Nov 89 09:30:00 -0500
From: I Like Hike! <ACSCDS%SEMASSU.BITNET@vma.cc.cmu.edu>
Subject: Self-modifying applications (Mac)
In issue #246, Joel Glickman writes...
>From: joel_glickman@MTS.RPI.EDU
>Subject: Potential Virus? (Mac)
>I have just recently noticed a problem on my Mac. After using Cricket
>Graph I checked the last modified date and the program had just been
>modified. After noting this, I began checking other programs and
>found that my copy of Versaterm Pro was also being modified every time
>I ran it. It was at that point that I checked these programs on other
>people's Macs in the office and saw that these programs were not being
>modified on some, while they were being modified on others.. I am
>running Gatekeeper and Vaccine and have checked these programs with
>Disinfectant and they report no trouble.
>My question is: Should these programs modify themselves when I just
>run them. All I do is run them and quit immediately and they are
>modified??? Do you think I have a virus problem???
>Joel Glickman
>Rensselaer Polytechnic Institute.
Some programs DO modify themselves while running, the important thing
to remember is that these modifications are usually made to the data
fork of the application. Most virus detectors look only for attempts
to write to resource forks. (I don't know about Gatekeeper, perhaps
its author could let us know?) It still seems strange that other
people were not experiencing the same problems as you, but that
doesn't necessarily mean a virus. To quote Douglas Adams "DON'T
PANIC", as many others do. Here are some things you can check:
1. The other people you are working with may have locked their
copies of CG or Versaterm Pro, preventing them from being
modified.
2. Make sure Vaccine is running, look in your control panel and
see that the protection is turned on (incidentally, when you
alter the preferences for Vaccine, the size of the file
changes, since Vaccine has no "preferences" file)
3. Try replacing your cricket graph with someone else's, see if
the problem persists. Likewise for Pro.
4. Try reinstalling your system, use the same release as those
coworkers of yours who are not experiencing this phenomenon,
again, see if the problem persists.
These are just ideas, they're not carved in stone, but they may
provide some insights... good luck!
-- Chuck Seggelin
Academic Computing Services
SMU
ACSCDS@SEMASSU.BITNET "Opinions expressed are MINE alone!!!!"
------------------------------
Date: 22 Nov 89 15:11:04 +0000
From: spaf@cs.purdue.edu (Gene Spafford)
Subject: Re: Internet worm impact (UNIX & Internet)
We'll never have exact figures, of course. Here are some ballpack
figures that represent my estimates based on site accounts from over
100 sites, plus some additional information I've gathered elsewhere.
I believe that between 3000 and 6000 machines were infected by the
virus, at perhaps 500 sites maximum.
Many more 1000s of machine were affected by network disruption or
preventative action, however, but those machines were not
directly infected.
Many of these machines were "down" for only 6 to 12 hours. Few of the
infected machines are used 24 hours per day, so most were not
discovered to be infected until Thursday morning. Within 24 hours of
the infection starting, folks at Berkeley had distributed source code
patches to stop its spread, and folks at Purdue had developed and
publicized an innoculation that would prevent infection. Thus, most
machines were affected for less than a single business day.
Most admins discovered early on that rebooting all their machines at
once cleared them of the Worm. Once this occurred, reinfection from
outside often failed to happen -- other machines were also being
cleared, and bugs (probably) in the Worm code caused it to spread more
slowly than many people think it did. The massive infection that
occurred happened only because it had overnight on lightly-loaded
machines to probe across the net. Once sites started to go down and
disconnect, the rate of infection dropped significantly.
A very large percentage of the infected machines were single-use Sun
workstations, or small Vaxen. Thus, the number of users prevented
access was much less than the 20 people per machine quoted in one of
the preceding articles. 3-5 per machine might be better averages.
Many of the affected users were students. Their time can hardly be
valued at $27 per hour. On the other hand, many machines belonged to
faculty or research engineers. Their time is usually valued a bit
more than $27 per hour.
Lost time is very difficult to value. I'd guess that based on
everything I've heard and the information I've gathered, I'd estimate
the "loss" as between $30million and $50million. McAfee's estimate of
$96million was, at best, badly estimated, and at worst self-serving
and irresponsible. Numbers greater than $75million cannot be
supported in the face of critical analysis.
5% of the machines on a known-to-be-insecure network of loosely
administered machines were infected. This is noteworthy, but it
was not the crisis some people have claimed it to be.
- --
Gene Spafford
NSF/Purdue/U of Florida Software Engineering Research Center,
Dept. of Computer Sciences, Purdue University, W. Lafayette IN 47907-2004
Internet: spaf@cs.purdue.edu uucp: ...!{decwrl,gatech,ucbvax}!purdue!spaf
------------------------------
End of VIRUS-L Digest
*********************
Downloaded From P-80 International Information Systems 304-744-2253