home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker 2
/
HACKER2.mdf
/
virus
/
virusl2
/
virusl2.98
< prev
next >
Wrap
Text File
|
1995-01-03
|
9KB
|
209 lines
VIRUS-L Digest Monday, 24 Apr 1989 Volume 2 : Issue 98
Today's Topics:
Re: CheckSum Methods of Virus Detection (PC)
re: Information wanted on "Stoned" virus (PC)
Write protecting a hard disk (Mac)
Virus papers (finally) available on Lehigh LISTSERV
---------------------------------------------------------------------------
Date: Mon, 24 Apr 89 15:37:13 +0200
From: Y. Radai <RADAI1@HBUNOS.BITNET>
Subject: Re: CheckSum Methods of Virus Detection (PC)
Peter Jaspers-Fayer (in Issue 93) mentioned that CHECKOUT does not
checksum the boot sector. It's strange, but despite the abundance of
boot sector viruses, few checksum programs are any better in this
respect than CHECKOUT. In fact, of the over 20 such programs I have
heard of for the PC, none of the freeware/shareware ones and not too
many of the commercial ones checksum the boot sector.
And even of those who are aware of the need to checksum the boot
sector in addition to files, most seem to miss the fact that the
*partition record* also contains code which is executed when booting
from a hard disk. And there's at least one virus (the "Stoned" or
"Marijuana" virus, which apparently originated in New Zealand) which
exploits this fact. Note, by the way, that Len Levine's method (in
Issue 95) of copying the content of the boot block to a file won't
work in the case of the partition record since DEBUG can't access it.
Concerning Len's solution for the boot block, he writes:
>Note that a virus that affects every read made from the disk,
>detects an attempt to read the boot block, and passes you a copy
>of the good boot block instead of the infected one, will defeat
>this.
But that's only if the virus is already in memory. You can avoid
this problem by running the checksum program immediately after cold
booting from a system which is known to be clean (as was mentioned
recently by David Chess).
Y. Radai
Hebrew Univ. of Jerusalem
------------------------------
Date: 24 April 1989, 11:26:40 EDT
From: David M. Chess <CHESS@YKTVMV.BITNET>
Subject: re: Information wanted on "Stoned" virus (PC)
Tom Sheriff asked about this virus back on 4/17. I've seen it, and
done a certain amount of analysis. It seems to infect both floppies
and hard disks. It captures INT13, and uses that to try to infect any
floppies read or written in drive A: (BIOS 00). If an infected floppy
is used to boot a machine with a C: drive (BIOS 80), the c: drive will
become infected. If an infected floppy is booted at just the right
time (it tests the system clock), the message (or at least the first
sentence) is displayed on the screen before the boot occurs. The
message will not be displayed when booting from an infected hard disk.
The virus is rather lazy, and uses hard-wired locations to store the
original boot record. So it will overlay possibly-in-use tracks when
it infects a new disk or diskette. That's the only "destructive"
behavior that I saw. It makes no attempt to hide, and an infected
boot record can be visually identified by the presence of the message.
Automatic programs that watch for changes to boot sectors should have
no trouble spotting it, either.
Usual disclaimers: the virus that I'm describing here may not be the
same one you're infected with!! Get a guru to analyze yours
thoroughly before deciding that you're clean. (If it *is* the same
one I've seen, it'll be pretty simple to analyze...)
Dave Chess
Watson Research
------------------------------
Date: Mon, 24 Apr 89 15:21:50 EDT
From: "Gregory E. Gilbert" <C0195@UNIVSCVM.BITNET>
Subject: Write protecting a hard disk (Mac)
Is it possible to lock a Macintosh hard disk so as to protect it from
an infection?
------------------------------
Date: Mon, 24 Apr 89 15:32:19 EDT
From: luken@ubu.cc.lehigh.edu (Kenneth R. van Wyk)
Subject: Virus papers (finally) available on Lehigh LISTSERV
After much prodding, I've placed most of the virus papers that we've
accumulated on the LISTSERV@LEHIIBM1.BITNET. BITNET users can now
obtain these files from LISTSERV (please don't send your requests to
the list - it won't work). Note that the series of reports on the
Internet worm are not included on the LISTSERV, primarily for reasons
of size (most of them exceed the BITNET limit of 300000 characters, as
stated in the BITNET Usage Guidelines).
These files, as with the ones on lll-winken.llnl.gov, are also
accessible via anonymous FTP to IBM1.CC.Lehigh.EDU.
Also, I was asked to include a description (or abstract) of each of
the documents. Here is what I have (along with filenames in CAPS), in
no particular order:
"Coping with Computer Viruses and Related Problems"
by Steve R. White, David M. Chess, and Chengi Jimmy Kuo
of IBM
January 1989
LISTSERV Filename: IBM PAPER
ABSTRACT: We discuss computer viruses and related problems. Our
intent is to help both executive and technical managers understand the
problems that viruses pose, and to suggest practical steps they can
take to help protect their computing systems.
"Developing Virus Identification Products"
by Tim Sankary
Copyright (c) 1989, all rights reserved.
(April) 1989
LISTSERV Filename: IDENTIFY TXT
DESCRIPTION: This paper presents techniques for virus identification.
"Net Hormones"
by David S. Stodolsky, PhD. of Copenhagen University
Copyright (c) 1989, all rights reserved.
March 1989
LISTSERV Filename: HORMONES NET
ABSTRACT: A new type of infection control mechanism based upon contact
tracing is introduced. Detection of an infectious agent triggers an
alerting response that propagates through an affected network. A
result of the alert is containment of the infectious agent as all
hosts at risk respond automatically to restrict further transmission
of the agent. Individually specified diagnostic and treatment methods
are then activated to identify and destroy the infective agent. The
title "Net Hormones" was chosen to indicate the systemic nature of
this programmed response to infection.
"Computer Viruses: A Rational View"
by Raymond M. Glath of RG Software Systems, Inc.
April 1988.
LISTSERV Filename: VIRUS GLATH
DESCRIPTION: This paper presents an overview of viruses and associated
terminology. It examines such topics as how one might become infected
by a virus, and what to do if one does become infected. It also sets
guidelines for virus prevention and removal.
"The Infection of PC Compatible Computers"
by Stephen E. Kiel and Raymond K. Lee of Georgia Tech
Summer 1988.
LISTSERV Filename: VIRUS KIEL
DESCRIPTION: The recent publicity over computer viruses has produced
mixed reactions and much confusion inside, as well as outside, of the
computing industry. The conflicting opinions are caused either by a
misunderstanding of what viruses are or a lack of understanding of
their potential problems. This paper answers those questions and in
addition, gives a description of currently suggested methods for IBM
PC's and compatibles for detecting, preventing, and eliminating
viruses. A highly technical discussion is not the objective, but
rather a broad overview is given along with sources of additional
information and assistance.
"Potential Virus Attack"
by L. P. Levine of University of Wisconsin-Milwaukee
September 1988
LISTSERV Filename: VIRUS LEVINE
DESCRIPTION: This paper examines the vulnerability to viruses of Dr.
Levine's computing environment and suggests methods for reducing its
risk.
"Virus 101" (Chapters 1-4)
by George Woodside
March 1989
LISTSERV Filenames: V101 1 V101 2 V101 3 V101 4
DESCRIPTION: This series of papers present an in-depth look at
viruses, in the form of a virus "course" of four chapters. Note that
many of the author's statements are specific to his ATARI ST.
Enjoy,
Ken
------------------------------
End of VIRUS-L Digest
*********************
Downloaded From P-80 International Information Systems 304-744-2253