*+*+*+*+*› Warning: Computer A.I.D.S. At› Work By Bill Pike, PAC› Reprinted by THE OL' HACKERS from› the STATUS Newsletter-Vol. 7, Issue› 3- and with THANKS! › ****› PC Disease-(Also as it applies to› the 8 bit!)› *********› This article has been written› from the 8-bit view point. However› the same principles apply to the ST.› › THE CONCLUSION:>>Always suspect Menu› programs and ANY pirated program.› Also suspect programs that work with› popular programs. All purchased disks› are write protected and an error in› writing could be trapped so you› wouldn't see it happen if the error› occurred during the booting of the› program, as the drive is already› running. However, if the disk wasn't› write protected the program would› write the virus. This would obviously› include broken programs and boot› disks made into files. Anyone could› sabotage a disk or file at anytime.› ****››› Well, we knew it was coming sooner› or later! It is here now! Some› Phreakers are circulating a VIRUS› program thru BBSs. There is also a› virus program that came out of Europe› and is causing much havoc there. The› program is encoded in some nice› looking, popular programs. These are› probably innocent programs that may› have been around for awhile, the› phreakers are too lazy and/or stupid› to write something new, other than› trying to upgrade the virus section› of a program, themselves. ›› The original program may run fine,› HOWEVER, when the file has been› loaded or run, the virus writes a› program to the disk. The virus sits› inside the computer memory and waits› for a disk Input/Output operation.› Each time a disk is placed in the› drive and an Input/Output operation› is performed a copy of the virus is› written to the disk. If a file› containing the virus goes along with› the program. This virus then sits in› wait on the disk, no it isn't listed› in the directory and may or may not› change the VTOC. At some› predetermined later time the virus› goes to work and may wipe out the› directory and VTOC or it just might› FORMAT the entire disk. Some virus› programs modify DOS so that the virus› program is appended to EVERY file on› the disk when a file is loaded off of› the disk or transferred via modem.›› You can easily see that your whole› library of programs could be rendered› infected and then gone. In the› meantime you could have been an› innocent carrier of the virus› infecting your friends and others.› That is why the name of the article› is COMPUTER A.I.D.S. There are ways› of protecting yourself and others as› well as cleaning out any existing› virus programs that you may have› picked up.›› Atari owners have a big advantage› over other types of computers in that› the disk drive is a smart-drive,› meaning if the disk is write› protected the drive WILL NOT write to› or format that disk. This is part of› the ROM instructions within the drive› itself and a virus cannot modify ROM.› However there is a modification› available to bypass this feature. I› would suggest that it be removed for› obvious reasons. › Keeping the virus out of your› library is much easier than removing› it when it already exists. You can› never be sure that you have caught› every disk the virus has infected and› if you don't get all infected disks› it will just spread again. Now to the› cures: › › #1. WRITE PROTECT your disks that › are not supposed to be written to. › If you want to write to a disk of› this type you can always remove the› tab and replace it when you are› done.›› #2. The virus cannot survive a › COLDSTART. Re-boot the computer each› time with a KNOWN GOOD DOS disk after› switching the computer off then back› on. If you are using a BOOT disk make› a copy of the original disk, archive› the original and boot from the direct› copy, then reserve any other disks› that may be written to by the program› as possible INFECTED. Don't use these › disks for any other purpose! NEVER › use your archive disk for any purpose› other than to make a copy for your› working disk. You might also write› protect your working copy, if› possible. ›› #3. Here is a rather long one for those who trade programs or down load› programs from BBSs. Keep your› downloads or trades on a separate› disk. Then load and run each program,› make sure you don't use the original› or working copy of any program that› the file works with, use a test copy.› After you have run each program,› format a blank disk, using a known› good copy of DOS. Then use a sector› editor to check the first 4 sectors› (0-3) of the disk of the suspect disk› against the freshly formatted disk.› If these don't match, one of the› files on the disk was a virus. You› can find the file by using a good DOS› and copying each file individually to› another disk, then running that file› and comparing the boot sectors (0-3)› to the formatted disk. You might also› wish to compare all file lengths› including the DOS.SYS and DUP.SYS› files. If any file is longer than› the original file, sus- pect a› virus. There are a couple of› ANTIBIOTIC programs going around that› can usually detect a virus infected› file. However, as the Phreakers get› their hands on the antibiotics, they› will find a way around them, so don't› trust them totally. ›› **STATUS Editor's Note: This of› course is just a fad, and probably› started as a joke. But, in my› opinion, it is a crime, and not a› joking matter! It is surely an› invasion of privacy, destroying of› personal property and a downright› waste of programming talent. Liken it› if you will to a visitor placing a› concealed time bomb in your house,› due to explode at some future date or› event. Or, maybe a mechanic› programming your automobile to render› the ignition system inoperable after› X number of starts. It behooves me to› think that an individual, or group of› individuals, could get enjoyment out› of such dastardly acts. Suppose an› individual, knowingly or not,› uploaded an infected file to GEnie,› during the process of testing and› posting the entire library became› infected, with eventual system crash› and infection of every one of the› systems users... it could happen.› Shouldn't the parties responsible for› these virus programs be brought to› court, and prosecuted to the full› extent of the law without leniency› for being demented?›› (OL' HACKERS EDITOR- I am in full› agreement with the above remarks from› STATUS, and I hope it persuades even› one person to stop this cruel joke,› which benefits NO ONE!)›› *** Part II following: ***›› *******› Computer AIDS II› By Blair Davis For S.T.A.T.U.S.› Reprinted from STATUS Vol#7, Iss#4 by› THE OL' HACKERS and with THANKS!› *******›› This article is a continuation of› the first computer aids article seen› in the Status Newsletter about 2› months ago. As of June 19, 1988 I› have never seen any of the virus› discussed in that article, however, I› have seen a new virus in the last few› days. The following is a description› of this new virus and ways to detect› it and others like it. This new virus› seems to affect linked sector DOS's› only at this time, but I can see how› a different version of the same one› could affect Sparta Dos.› › First a description of how it works› This virus does not append itself to› any/all binary files like many other› viruses do. Instead, it first finds› the highest free sector, then writes› a copy of itself into that sector. It› then modifies the VTOC to protect its› sector. It then modifies the DOS boot› routine to invoke itself when the› disk is booted. › Second, what it does.› When the disk is first booted the› viruses loads into Page 6 RAM.› It then counts th number of sector› writes and decrements a three byte› counter both in page 6 and it's› stolen sector. When this counter› reaches zero it then destroys the› disk. This counter is set from the› jiffy clock, (bytes 180), each time a› new copy of the virus is written. Due› to a bug in the virus each time a new› disk is used in the drive, a new copy› of the virus may be written. This may› result in multiple copies of the› virus on the disk. The method of› resetting the counter time results in› what are apparently random disk› failures.› Third, finding it.› Finding it is very easy, to find it› simply count the number of sectors› used by ALL the files in the› directory, subtract that total from› the number of free sectors on a KNOWN› GOOD blank formatted disk of the same› DOS, density and number of sides.› Compare this to the number of free› sectors displayed by the suspect› disk. If the number of sectors› displayed by the suspect disk is less› than the number you calculated, you› probably have it. ›› Fourth, curing it.› At this time I have not yet found› a way to remove it from an infected› disk, however, there is a way to save› your files. To save your files, you› must first boot your system from a› known uninfected DOS disk. Then,› using the copy file function, (NOT› duplicate disk or copy multiple› files), copy each file except DOS.SYS› and DUP.SYS individually to a new› disk. Each file, (basic only) needs› to be tested to see if it will write› the virus to a disk but object files› should be clean. By the time you› read this, I should have uploaded a› detector program to the STATUS BBS.› This program will simply count the› free sectors and warn you if there is› a discrepancy. This virus may have› been around for a while as it does› not seem to be very sophisticated.› Hopefully this detector program› should help eliminate this type of› virus from our program libraries. › › In conclusion, I must say that the› only way to prevent the spread of› this virus is to boot your DOS off of› known good disks only. The virus is› only started from BASIC game programs› that write to the disk (as far as I› know!)›› -=-=-=-=- end -=-=-=-=-››