home *** CD-ROM | disk | FTP | other *** search
Text File | 1992-12-04 | 51.8 KB | 1,073 lines |
-
-
-
-
-
- ▄▄▄ ▄▄▄▄▄▄▄▄ ▄▄▄ ▄▄▄▄▄▄ ▄▄ ▄▄ ▄▄▄ ▄▄▄▄▄ ▄▄▄▄▄▄▄ ▄▄▄▄▄
- █▒▒█ █▒▒▒▒▒▒▒█ █▒▒█ █▒▒▒▒▒█ █▒▒█ █▒▒█ █▒▒█ █▒▒▒▒█ █▒▒▒▒▒▒█ █▒▒▒▒█
- █▒▒█ ▀▀▀▀▀▀▀▀ █▒▒█ ▀▀▀▀█▒▒█ █▒▒█ █▒▒█ █▒▒█ ▀▀▀█▒▒█ ▀▀▀█▒▒█ ▀▀▀▀▀
- █▒▒█ █▒▒█ ▄▄▄▄█▒▒█ █▒▒█ █▒▒█ █▒▒█ ▄▄▄█▒▒█ █▒▒█
- █▒▒█ █▒▒█ █▒▒▒▒▒█ ▀▀ █▒▒█ █▒▒█ █▒▒▒▒█ █▒▒█
- █▒▒█ █▒▒█ ▀▀▀▀█▒▒█ █▒▒█ █▒▒█ ▀▀▀▀▀ █▒▒█
- █▒▒█ ▄▄▄▄▄▄▄▄ █▒▒█ █▒▒█ █▒▒█ █▒▒█ █▒▒█
- █▒▒█ █▒▒▒▒▒▒▒█ █▒▒█ █▒▒█ █▒▒█ █▒▒█ █▒▒█
- ▀▀▀ ▀▀▀▀▀▀▀▀ ▀▀▀ ▀▀ ▀▀ ▀▀▀ ▀▀
-
- NEWSLETTER NUMBER 10
- **********************************************************************
- Another festive, info-glutted, tongue-in-cheek training manual
- provided solely for the entertainment of the virus programmer,
- security specialist, casual bystander or PC hobbyist interested in
- the particulars - technical or otherwise - of cybernetic data
- replication and/or mutilation.
- EDITED BY URNST KOUCH, early December 1992
- **********************************************************************
-
-
-
- TOP QUOTE: "From Hell's heart, I stab at thee!"
- --Captain Ahab in Melville's "Moby Dick"
- (or Khan, from a Star Trek movie, if you're
- a Philistine)
-
-
- IN THIS ISSUE: A virus ate my lunch money: South American
- drug lord served by computer mishap . . . A virus ate my
- lunch money, part II: Crypt newsletter and the PROTO-T
- hoax revisited, Jeezus H. Christ . . . Consumer report:
- Trend Micro Devices' PC-Rx anti-virus software . . .
- GOBBLER II test drive . . . AMBULANCE CAR virus . . .
- The first annual Crypt Virus/Anti-virus Awards . . . In the
- READING ROOM: Bruce Sterling's "The Hacker Crackdown" . . .
- Pallbearer's AT THE MOVIES: raiding BlockBuster Video over
- "Sneakers", the movie . . . Thom Media cracks jokes . . .
- URNST'S SCAREWARE TOOLS . . . stupid humor and more . . .
-
-
-
- ****************************************************************
- A VIRUS ATE MY LUNCH MONEY: COLOMBIAN POLITICIANS AND PABLO
- ESCOBAR SERVED BY "Ghost of La Catedral" VIRUS
- ****************************************************************
-
- Reuters news service reports that on Nov. 13, Colombian officials
- announced from Bogota that a computer virus had
- nuked a report containing critical comments on government
- ministers involved in the muffed prison transfer of drug lord
- Pablo Escobar. Escobar and a number of accomplices escaped
- during the June transfer and a national scandal erupted, resulting
- in a formal investigation of government officials involved in
- orchestrating the event. The virus allegedly eliminated the
- investigation's conclusions mere hours before they were to be
- publicly presented. The virus was called "Ghost of La
-
- Page 1
-
-
-
- Catedral," in reference to the prison from which Escobar escaped.
-
- Reuters was one of the first international news agencies to
- hype the threat of Michelangelo virus.
-
- *****************************************************************
- A VIRUS ATE MY LUNCH MONEY, PART II: CRYPT NEWSLETTER AND THE
- PROTO-T HOAX REVISITED
- *****************************************************************
-
- In an odd case of art imitating life and life coming back to
- bite it in the caboose, the "PROTO-T" virus from Crypt Newsletter
- #9 has taken on a strange will of its own.
-
- Alert Crypt readers will remember the editor ridiculing
- bogus FidoNet alerts warning of the threat posed by a new
- virus, PROTO-T, which could hide in COM port buffers, video
- memory, etc. Further, readers with reading comprehension well
- above the level of cabbage should recall the generic, memory
- resident infector supplied with Newsletter #9. This virus,
- clearly labeled as a program NAMED "in honor" of "the anonymous
- electronic quacks" who LAUNCHED the PROTO-T HOAX in no way
- constituted prima facie evidence that PROTO-T, as described
- on the networks and elsewhere, existed.
-
- Nevertheless, many readers missed this fine distinction, prefering
- to believe that the Crypt newsletter had, indeed, supplied them
- with a pure sample of the REAL THING: PROTO-T in all its horror.
- Readers and virus collectors surfaced on the WWIVnet, and even
- on PRODIGY, in the next few days, INSISTING that PROTO-T was real
- and that they had the source code and DEBUG scripts, supplied by
- the newsletter, to prove it. Some even went as far to execute
- PROTO-T on their machines, but more on that later.
-
- Well, PROTO-T most certainly DIDN'T exist prior to our covering
- the hoax. There was no evidence that any viral or Trojan code
- was in the hack PKZip 3.0., the alleged "carrier" of PROTO-T.
- The claims that PROTO-T could hide in a COM port buffer were
- patent bullshit. (Not our bullshit mind you, but still bullshit.)
- However, for all intents and purposes, PROTO-T now exists
- even though OUR "symbolic gesture" is nothing close to the shambling
- monster confabulated by the original hoaxsters.
-
- In short, IT WAS SUPPOSED TO BE A JOKE.
-
- So, now you have PROTO-T and you don't recall its features
- because you were so excited you messed yourself and forgot
- to read issue #9 closely. Listen up, then! PROTO-T, the demo virus
- supplied by Crypt newsletter, is a simple, memory
- resident .COM infector which hooks interrupt 21 and monitors
- the DOS "execute" function, contaminating files just before they
- run. It reduces the apparent amount of memory by approximately
- 1 kilobyte, a phenomenon which can be observed by recording the
- amount of available memory from a MEM /C command before and after
- the virus is installed on a machine. PROTO-T is not stealthy; it
- is not encrypted. It will not trash your drive although
- IT WILL irreversibly infect programs, making them difficult
- to use. The virus contains the ASCII string, "This program
-
- Page 2
-
-
-
- is sick. [PROTO-T by Dumbco, INC.]"
-
- Now, if you temporarily lost your sanity and ran PROTO-T
- before reading the documentation, here is a clip-list of
- "Common PROTO-T trouble-shooting questions and answers."
-
- -=Cut here and save=-
- --------------------------------------------------------------
- URNST'S QUICK TIPS ON REMOVING PROTO-T FROM A CARELESSLY
- INFECTED IBM PC
- ______________________________________________________________
-
- Q. I stupidly ran PROTO-T and promptly forgot about it. How
- do I find the virus on my system?
- A. If you have NORTON UTILITIES or any reasonable facsimile,
- use its text searching capability to look for strings like
- "PROTO-T" or "Dumbco, INC." Delete the files that turn up,
- they contain the virus.
-
- Q. My computer makes a strange quacking noise on boot, then
- the drive light comes on, stays on and the machine appears
- to hang. What's up?
- A. PROTO-T has infected your COMMAND.COM and it's after 4:00
- in the afternoon. Either wait until morning, or boot with
- a CLEAN diskette from the A: drive and delete the infected
- command processor. Restore the deleted processor from your
- DOS backup disk.
-
- Q. Ever since I foolishly ran PROTO-T without knowing what
- I was doing, my machine is plagued by intermittent quacking
- noises, hangs and unexpected, furious activity on the C:
- drive. Now my hair is turning prematurely gray. What can
- I do?
- A. A number of your programs have been contaminated with
- PROTO-T. Either delete all the files found in question
- #1, or use this "trial and error" method: Boot from a
- clean DOS diskette and set your system's time to 4:00 pm.
- Begin executing all the .COM programs on your disk. Those
- that make the PC quack, hang or indulge in furious disk
- activity are infected with PROTO-T. Delete them and restore
- from your original backup or distribution disks. Presently,
- PROTO-T cannot be removed from infected files. These
- programs are ruined unless you wish to keep your system clock
- reset to BEFORE 4:00 pm, permanently. Alternatively, you
- can wait until an antivirus developer equips its software
- to "clean" PROTO-T.
-
- Q. I used a hex editor to rip the ASCII string out of
- PROTO-T because I wanted to "rename" it as mine and upload
- it to a virus exchange BBS for credit. Then I foolishly lost
- my usually sound judgment and allowed the virus to escape on
- my system. Is there any hope?
- A. Use the method described above to find the PROTO-T
- infected files, then delete them.
-
- Q. I used a hex editor to, well, you know - AND my machine is
- an XT with NO internal clock. I lost my head and allowed
- the virus to escape on my system. Am I screwed?
-
- Page 3
-
-
-
- A. Could be.
-
- Q. I don't have a "clean" DOS boot disk and I don't keep
- back-ups. I infected my system with PROTO-T anyway, because
- I'm so far off my rocker my parents don't even trust me
- with a box of pumpkin-colored plastic leaf bags. How do I
- recover?
- A. Why are you fooling around with viruses? Seek psychological
- counseling, you have a profound death wish. Dealing with
- death wishes is beyond the scope of the Crypt Newsletter.
- ***************************************************************
-
- -*-
-
- ***************************************************************
- WESTERN DIGITAL ANNOUNCES HARDWARE & SOFTWARE-BASED ANTI-
- VIRUS MEASURES INCLUDED IN ITS CLASS OF 386/486 MICROPROCESSORS.
- YOGI BERRA COMMENTS, "I'LL BELIEVE IT WHEN I BELIEVE IT!"
- ***************************************************************
-
- "Without some form of generic virus detection methodolgy, the
- industry cannot hope to keep up with the growing epidemic of
- more than 1000 known virus strains, much less the dozens of
- unidentified and mutated strains that are introduced into the
- community each month," said Charles Haggerty, Western Digital's
- president.
-
- Western Digital's generic anti-virus technology will be served
- through a combination of proprietary control logic
- and associated software shipped with the company's WD8755
- system logic controllers. Initial customers will
- be the company's PC manufacturing clients. The anti-virus
- measures are designed to cover IDE-type hard files equipped with
- DOS or Windows.
-
- Impenetrable jargon supplied by press release.
-
- As to the effectivess of "generic" virus detection, see report
- on PC-Rx's "rules-based" generic protection later in this issue.
-
- ****************************************************************
-
- -*-
- ****************************************************************
- MO' NEWS, BY WAY OF Compute Magazine, December 1992 -
- REMOTE POSSIBILITY OF VIRUS WRITING BEING DECLARED OUTLAWRY
- REARS ITS HEAD . . . AGAIN
- ****************************************************************
-
- In a short story called "Controlling The Infectious:",
- the December issue of COMPUTE magazine reported that the
- International Computer Security Association (ICSA), a
- Washington-based spin-off group of the Carlisle, PA-based National
- Computer Security Association, is attempting to call for legislation
- which would felonize virus authors, their software and publications.
-
- To quote briefly from that piece:
-
-
- Page 4
-
-
-
- "Last July, a hacker calling himself Nowhere Man released version
- 1.00 of Virus Construction [sic] Laboratory, a slick, professional
- product intended to write a variety of viruses that resist
- debuggers and can contain up to 10 of 24 programmed effects such
- as clear the screen, cold reboot, corrupt file(s), lock up the
- computer, drop to ROM basic, trash a disk, and warm reboot.
- According to the [ICSA], most of the viruses are undetectable
- by today's anti-virus products. Creating a new virus takes just
- a few minutes with a virus construction kit. David Stang, Director
- of Research at the ICSA, says such products are destined to make
- today's virus problems look like 'the good ol' days.'"
-
- Because of this, the ICSA is moving to strengthen current computer
- crime law with regards to virus writing and/or enabling.
-
- It seems clear that "publicly," software like the VCL 1.0
- (and its Holiday Season-timed update, VCL 2.0), Phalcon/SKISM's
- [viral] code generators, the publication of Mark
- Ludwig's "Little Black Books of Computer Viruses" (Volume 2
- tentatively scheduled for release early in 1993) and "Computer
- Virus Developments Quarterly," underground publications like 40HEX,
- Dark Angel's Phunky/Crunchy/Crispy Virus Writing Guides and the
- Crypt Newsletter (not to mention the dozens of "research" viruses
- which just 'happen' to end up in the wild - man, this is running
- on ;-]) have alarmed segments of the anti-virus
- community enough so that they feel there is a need for new
- law. At present, existing law DOES NOT dub the
- publication or writing of hazardous, replicative code a crime.
-
- Alert Crypt newsletter readers may recall a similar move
- proposed by U.S. Senator Patrick Leahy. Although Crypt newsletter
- no longer retains the particulars, Leahy's legislation would
- have provided legal ground for the prosecution of programmers
- whose creations directly damaged public computer systems regardless
- of who planted or spread the code. This legislation failed.
-
- Anyone who follows mainstream computer news is also aware of how
- "threat descriptions" of software like VCL 1.0 are played up in
- the world of gleaming white-shirt/corporate-toady computer
- publications. For example, the Mutation Engine was blown out of
- proportion in places like Newsweek, mainly because its technology
- writers seem to lack even the most basic understanding of computer
- programming.
-
- Privately, anyone who frequents the networks knows that the
- same anti-virus community commentators supplying the "expert"
- opinion for such high-impact stories openly downplay the
- complexity and practicality of software like VCL 1.0 in copious,
- fleering public e-mail transmissions.
-
- There is a lesson to be learned from this in public
- relations and political persuasion 101 which should not be lost on
- any card-carrying members of "the computer underground." The editors
- leave it to you to dope out the nut of it, or continue following
- the Crypt Newsletter for timely news coverage.
-
- FYI: The ICSA was created at around the time of the Michelangelo
- "hype," February thru early March, 1992.
-
- Page 5
-
-
-
- ******************************************************************
-
- ****************************************************************
- GOBBLER II - COMRAC's FREEWARE ANTI-VIRUS SCANNER: A SHORT
- REPORT
- ****************************************************************
-
- GOBBLER II, an anti-virus scanning suite provided by a Dutch
- programmer, aims at the ground somewhere between Skulason's
- F-PROT and Thunderbyte's TBScan. Its creator brags that it
- is blazingly fast and, indeed, this is so. (Stupid technical
- stats: Like TBScan, GOBBLER covers a 30 Meg hard file full of
- executables in approximately 30 seconds on a 80286 PC.)
-
- The scanner is menu-driven and allows the user to customize
- his alarm messages and switch between idiot-proof scanning
- and scanning augmented by some "heuristic" features.
-
- As a "heuristic" scanner, GOBBLER II fails. If used, the
- "heuristic" mode flags every file with internal overlays, meaning
- it will raise a false alarm for almost every complex program on
- your machine. This is a useless, laughable feature. GOBBLER II
- users will wish to always rely on its idiot-proof signature
- scanning.
-
- GOBBLER II is effective at detecting Mutation Engine-based viruses,
- screening every one (GROOVE, POGUE, CRYPTLAB, MtE SPAWN, and
- ENCROACHER) we threw at it and any reasonable number of variants
- generated by these viruses. In its documentation, GOBBLER II claims
- disinfection for all Mutation Engine virus-contaminated programs.
- In practice, GOBBLER II failed in attempts to clean CRYPTLAB
- and ENCROACHER from infected files.
-
- Like any signature-based scanner, GOBBLER II ran up a checkered
- report card against "common" file and boot viruses. It detected
- STONED, MICHELANGELO, RED CROSS and JERUSALEM variants with ease
- and performed accurately against JOSHI, DEN ZUK, ITALIAN, PRINT
- SCREEN, ALAMEDA, BRAIN and AZUSA contaminated diskettes.
-
- It completely missed an oddball like the South African VOID POEM
- and a number of LITTLE BROTHER variants, although its virus-list
- indicated recognition of the latter.
-
- It was not effective against any VCL 1.0 or Phalcon/SKISM Mass
- Produced Code (PS-MPC) generator samples, understandable in
- light of the fact that the program hasn't been updated since
- July (a bad sign) when both virus tools were still relatively new.
-
- In any case, the discerning reader should recognize that most
- scanners vary widely in their performance, depending upon the
- virus collections tested, particular strains chosen for scan testing,
- how often they're updated and a host of other factors which
- average users won't give a rat's ass about. GOBBLER II is no
- exception. Does GOBBLER II detect your garden-variety, COMMON
- infectors reliably? We think so.
-
- COMRAC's program comes with a memory installable utility which
- intercepts virus-contaminated files by signature. It takes
-
- Page 6
-
-
-
- up a mere 6k in RAM due to clever disk-swapping. The utility,
- known as CATCHER, easily caught Mutation Engine-based
- viruses, supplying cryptic "access denied" messages with
- a ray-gun warning noise.
-
- GOBBLER II has no useful on-line virus database and it
- does not operate under NDOS or 4DOS, although this isn't
- mentioned in the measly documentation.
-
- GOBBLER II appears to be a product still in beta-testing, subject
- to those limitations and the question of whether it will
- receive continued support. Under these conditions, it is free.
- As such, it is good value - still far superior to freeware
- scanners supplied by SYMANTEC and CENTRAL POINT SOFTWARE, offering
- better detection, ease of use and some features - limited
- disinfection and memory resident barriers to virus infection -
- not offered by larger retail companies.
-
- This is more proof that only fools patronize Symantec and
- Central Point Software.
-
- To sum up, those extremely strapped for cash, unable to find
- F-PROT (or wishing to augment that program) AND plagued
- by guilty conscience when using unregistered shareware could
- benefit from GOBBLER II.
-
-
- ------------------------------------------------------------------
- HUMOR BREAK: THREAT OR MENACE?
-
- There's a really cool virus out there. It's called the Secretary 1.0.
- What it does is stick a 5.25" disk into a 3.5" drive and ruin the
- floppy heads.
- --Thom Media, Phalcon/SKISM
- Communications, Nov. 1992
-
- ------------------------------------------------------------------
-
- ******************************************************************
- TREND MICRO DEVICE's PC-Rx & "RULES-BASED" GENERIC VIRUS
- PROTECTION: EH, MAYBE.
- ******************************************************************
-
- The basis for Steve Chang's PC-Rx v. 2.0 is its "rules-based"
- generic virus detection utility, a buzz term that far too many
- corporate retailers abuse in an attempt to fluster consumers.
- How good is this stuff? Is it worth your cash money? Let's take a
- look and see.
-
- Trend's PC-Rx comes with its own dumb "install" program which
- can coach even the mentally enfeebled through rudimentary
- disinfection of his system, configuration of the software and
- creation of "rescue" images which allow PC-Rx to retrieve
- the master boot record and partitions of the hard file should
- they be lightly damaged by a virus. Good features!
-
- The central part of PC-Rx is the PCRXVT utility which
- is inserted into the AUTOEXEC.BAT and uses a set of
-
- Page 7
-
-
-
- "rules" to monitor the machine's performance. This translates
- to activity equated with viruses, i.e., writes/changes
- to the boot record, creation of new memory control blocks
- (a feature found in many memory resident viruses), file
- opens which remove and restore attributes and date/time
- stamps and calls to interrupts 13 and 25/26.
-
- Because PCRXVT makes no attempt to scan for virus signatures,
- it is smaller than most competitor programs and does not
- sigificantly slow a machine down during standard computing.
- It also does not generate many false alarms. From this stand-point,
- it is elegant and user-friendly.
-
- However, PCRXVT will only detect "average" viruses reliably.
- For example, PROTO-T, which creates a new memory control block -
- average memory resident virus behavior, is immediately captured
- by PCRXVT. However, VOTE (L. BROTHER) - a companion infector
- which becomes resident by copying itself to a rarely used portion
- of memory, is not. Viruses like VOTE, and there are a number, can
- operate with impunity on machines protected in this manner. PCRXVT
- also does not pay attention to programs which redirect segments of
- the interrupt vector table, a feature present in other programs
- of this variety.
-
- PCRXVT WILL reliably detect most direct-action viruses. It will
- NOT trap much of their destructive behavior, however. This is a
- glaring fault. For example, any direct action virus which deletes,
- renames or otherwise corrupts other executables not directly
- involved in its chain of infection is not trapped. What this means
- is that if a virus does any of these things BEFORE it infects
- another file, the computer is left wide open to attack by PC-Rx.
- And it is this hole which demonstrates the trade-off anti-virus
- developers must make between utility and full protection. Make
- your program air tight and it will drive users nuts with alarms
- during every day tasks. Make it more "user-friendly" and it
- becomes prey to the new class of viruses created by the Virus
- Creation Laboratory and similar tools.
-
- PC-Rx is also vulnerable to "companion" infections.
- While this may seem trivial to some because "companion"
- viruses do not directly alter their infection targets, consider
- that the "companion" virus DOES take low-level control of the
- machine every time it executes. Would you want a software that
- lets a virus take control just because it's not directly
- manipulating a target? Yeah, sure, and you enjoy hitting myself
- on the head with a hammer because it feels so good when you
- stop, too.
-
- The upshot? Novice users or other computerists using isolated
- systems or PC's in low-threat environments (i.e., household
- computers where family members aren't engaged in obsessive/
- compulsive software piracy) may wish to inspect Trend Micro
- Devices' PC-Rx. Others will pass.
-
- (PCRx retails for approximately $70 cash money and includes
- a brute-force virus signature scanner in addition to resident
- virus barriers.)
- ******************************************************************
-
- Page 8
-
-
-
-
-
- ******************************************************************
-
- PALLBEARER'S KONSUMER KORNER - A CRYPT EVENING AT THE MOVIES!!!
-
- >>>>>----------------->>>>> SNEAKERS <<<<<---------------<<<<<
-
- ******************************************************************
-
- After hearing all the hype about a "Movie about the Computer
- Underground," I, the mighty PALLBEARER, couldn't resist an
- opportunity to check it out. As a result, I went
- to see "SNEAKERS" in one of those $1 movie theaters (because I am
- too cheap to see anything when it first comes out).
-
- On the way there, was I excited! I couldn't wait - a movie
- about a couple of cyberpunks evading the Secret Service, rooms full
- of boxes of every color of the rainbow, viral programming, and the
- like! So I sat down with a big tub of popcorn and counted the
- seconds until they stopped playing the elevator music and started
- with an hour's worth of trailers. I fidgeted through those, my
- excitement growing . . . and, finally, "Sneakers" started! Two guys,
- obviously the fathers of hacking as we know it today, in a computer
- lab hacking people's bank accounts . . . I said to myself, "OK,
- it'll get better, don't pop a nut."
-
- But no! Later, we see one of these hackers as he really is - a
- very old and leathery looking Robert Redford! No, haha, just
- joking. Actually, we think he is a common criminal, but then we
- realize that he is employed to break into corporations. Exactly
- how exciting is that??? Interesting if that's your line of
- work, but definitely not something to make a movie of.
- Thankfully, there was one moment here that kept my eyes glued
- to the screen: the NSA appeared with dossiers on the main characters.
- We see that the hackers must be prominent in cyberspace, since why
- else would the NSA know of them and their aliases? Anyhow, the
- "hackers" are commissioned by the NSA to steal a universal decryptor
- from a famous mathematician. They do it to keep their leader
- from a trip to the Federal lumber yard in Taladega, GA, when the
- NSA threatens to turn over his rap sheet to the FBI. Extortion by
- the NSA as a motivational tool - what a good plan! (Obviously, the
- screen writer never familiarized himself with Jim Bamford's "The
- Puzzle Palace." Yes, I know, too many three syllable words.) The
- plot goes downhill from there. And I shall not bother telling you
- the rest.
-
- "Sneakers" was also chock-full of technically inaccurate and/or
- impossible computer feats. Many of the monitors shown were
- nothing more than DEBUG screens or .GIFs. Almost everything
- was done under MS-Windows (I will get back to this later). And
- Dan Aykroyd was greasy and swollen beyond good sense.
-
- Overall, there were two MAJOR technical faux pas that
- annoyed me so much I shrieked aloud, startling the moviegoers
- in front of me. The first was "enhancement of computer images"
- where a picture was imported into a computer (possible, especially
- with a "computer camera" in the best multimedia systems), zoomed
-
- Page 9
-
-
-
- in on (you know what a .GIF looks like when you zoom in 50 or 100
- times - just big blocks of color), and then magically focused in on
- the image with a turn of a dial. Now, this may be possible with a
- old mainframe or supercomputer, but instantly, on a PC, under
- MS-Windows? Hahahahaha. (I told you I would get back to Windows.)
-
- My other beef concerns a room in the NSA that housed what looked
- to be a Cray-MP.
-
- Well, the Cray's monitor was turned on, and what was it running? You
- got it! WINDOWS! A Cray-MP running WINDOWS. In the words of
- Wayne, "T'shya. Right. As if." I'm sorry, but there's a better
- chance of ME joining INC and calling myself PaLLBeaReR than there
- is of a Cray-MP running Windows.
-
- As you may have guessed, I don't quite suggest that you run
- out and see this movie. Actually, the further away from it you
- stay, the better. I assume that it fascinates those who know nothing
- of computers (the producers and "technical advisers" belong in this
- group), but I was unimpressed. After all the hype (and I did hear
- a lot about it from computer illiterates), I have decided to dub
- SNEAKERS "The PROTO-T of the Big Screen." On a scale of 1 to 10,
- where 10 is a pile of gold bullion 6 feet high and 1 is a carbuncle
- on the back of your neck, I give "Sneakers" a -2.
-
- Look for my next KONSUMER KORNER whenever I feel like writing
- it!
-
- Pallbearer [CryPt]
-
- >>> I now return you to your regularly scheduled newsletter.<<<
- *****************************************************************
-
-
-
-
- ***************************************************************************
- IN THE READING ROOM: BRUCE STERLING's "THE HACKER CRACKDOWN: LAW AND
- DISORDER ON THE ELECTRONIC FRONTIER" (BANTAM HARDCOVER, $23.00)
- ***************************************************************************
-
-
- ". . . we are in a war and we are losing - badly."
- -Invalid Media, from log-in message on
- Unphamiliar Territory BBS, in the wake of
- a series of Phalcon/SKISM busts at
- PumpCon '92
-
-
- Still scraping yourself off the floor at the news of Secret
- Service harrassment of readers of 2600 Magazine in northern
- Virginia? Find yourself rifling through local bulletin boards for
- the latest issue of Computer Underground Digest, terrified about
- what you might read next?
-
- Then "The Hacker Crackdown" couldn't arrive in your library
- at a better time.
-
-
- Page 10
-
-
-
- Bruce Sterling has spun together the warp and the woof of the
- computer underground better than anyone to date, transforming
- the infinite roar of the network and the deeds of some of its more
- famous citizens into a tale even the terminally (heh) computer-phobic
- can grasp. "The Hacker Crackdown" is about action and spasm in
- "cyberspace," a zone where there's no master plan but plenty of
- cause and effect.
-
- The book begins in 1990. The telco's are reeling from a series of
- embarrassing technical setbacks. And John Q. Public has gotten
- the idea that it's his civic duty to rip off the nearest faceless
- bureaucracy. The phone companies are big, easy targets. Or so "they,"
- faceless leaders at Bell South and a variety of nationwide law
- enforcement offices, think.
-
- You see, corporate embarrassment creates a crying need for
- scapegoats, criminals to seize and punish in a cathartic ritual of
- purifying judicial flame. Hence, "hackers" - young, fast and
- scientific scofflaws with no decent respect for propriety
- and '50's America - will do. Only it's not so cut and dried in
- real life. The laws were (and are) squishy and ill-defined, the
- enforcers unsure and careless, the chosen victims unpredictable.
-
- Nevertheless, under the scrutiny of the Feds, "cyberpunks" went down
- like 10-pins in 1990, according to "The Hacker Crackdown." It
- was only when Knight Lightning, the editor of PHRACK magazine,
- was dragged into court and wouldn't roll over, that the Feds' ball
- of wax began to melt. For those who don't recall, PHRACK published an
- internal Bell South memo - "the Document" Sterling calls it -
- dubbed proprietary and secret by its makers. Law enforcement
- officials bought this claim.
-
- In fact, the document was a manual so caked with
- jargon and stupefyingly dull telco-speak that it was
- of use only if one was interested in learning the language of
- Bell South as if it were a foreign country. It didn't help that Bell
- also sold the substance of it for $20 to any takers, effectively
- wrecking claims that it contained any secret or particularly damaging
- information. PHRACK's defense threw this into the faces of
- its enemies and the prosecution collapsed. Justice, in this case,
- prevailed.
-
- Or did it? "Hackers" and their computers are still being hauled
- away on a monthly basis. And jaundiced observers might be
- justified in saying that on the electronic frontier, this is the way
- things will be from now on.
-
- However, "The Hacker Crackdown" shies away from making
- stupid predictions about the future of cyberspace, prefering
- to point the way into the ambiguous dark, describing all the
- archetypes found the length of the matrix.
-
- You know these characters well - the popinjay phone phreaks and
- fraud artists; the obsessive/compulsive software pirates, the
- "wacko" underground journalists, the few computer savvy
- Feds (some not so different than their chosen enemies)
- and the ocean of establishment citizens in which they all swim; a
- group still as uncomprehending about the the computers in their
-
- Page 11
-
-
-
- lives as ambulatory bags of dirt.
-
- Yup, refuse to part with your holiday season gift money for
- Bruce Sterling's "The Hacker Crackdown" at your peril. The
- Crypt Newsletter gives it a solid thumbs up!
- -------------------------------------------------------------
- RELATED NEWS: AUTHORITIES CHARGE MICHIGAN LEGION OF DOOM
- WANNABE, "NATION OF THIEVES" LEADER WITH FRAUD
- -------------------------------------------------------------
- Michael Shutes, a 24-year old Farmington Hills, Mich. man, who says
- he started the underground group known as the "Nation of Thieves"
- has rolled over on colleagues and pleaded guilty to a fraud charge,
- according to a United Press International (UPI) news story
- published at the end of November.
-
- The prosecution of Shutes is part an on-going investigation
- into the "Nation of Thieves," a group which emulated the reputation
- of the Legion of Doom and, according to authorities, misused
- credit card numbers and phone access codes nationwide.
-
- Assistant Washtenaw County Prosecutor Kirk Tabbey, who
- coordinates the Michigan Computer Crime Task Force, told United
- Press International that Shutes squealed on his peers, resulting
- in pending charges against two associates and the continued
- investigation of six other "hackers."
-
- UPI reported that local police were tipped off about the
- "Nation of Thieves" in February when a Utah retailer asked
- them to investigate nearly $4,000 in fraudulent charges for
- computer equipment shipped to an apartment complex in Michigan.
- Ten thousand dollars of computer equipment was confiscated
- from Shutes.
-
- ******************************************************************
-
- SAVING THE BEST FOR LAST: THE CRYPT NEWSLETTER'S VIRUS/ANTI-VIRUS
- AWARDS
-
- ******************************************************************
-
- And now [drum roll, puh-leez], our subjective choices in a number
- of categories of interest to the virus/anti-virus community.
- Award winners were picked, loosely based on amount of bribe money,
- profile in mainstream and underground media outlets, performance
- and personality. Without further ado:
-
- MOST VALUABLE PLAYER: NOWHERE MAN. Illinois' favorite-son
- virus author sprang from obscurity in 1992 with the historic
- Virus Creation Laboratory 1.0, a tool which puts the ability
- to create dangerous code into the hands of meddling schnooks
- everywhere. Taking the idea of mass-produced user-customized
- viruses from the one-virus German Virus Construction Set,
- Nowhere Man fashioned a garish and glitzy menu-driven program
- which created a cottage industry of its own: weirdly written
- press releases and baleful warnings from computer security
- professionals, rival products from other virus-enabling groups
- and way too much fan mail on the nets for any sane person to
- handle. In a stroke, the VCL 1.0 illustrated the obsolescence
-
- Page 12
-
-
-
- of scanning technology without idiot mathematical formulae
- or long and windy discussions in VIRUS L-Digest. And the software
- was free! If anyone tells you that Nowhere Man didn't have lasting
- impact on the industry in 1992, they're just jealous.
-
- MOST INTERESTING VIRUS: MICHELANGELO. Hands down winner! No other
- virus ever created the stink this one-sector boot-block infector
- generated in the first three months of 1992. And because of it,
- none will probably ever gain such distinction again. Add
- John McAfee; gullible, image-hungry journalists and a public
- as dense as lead ingots and that's a recipe for success, er,
- fame, er, infame, er . . . something.
-
- BEST ANTI-VIRUS SOFTWARE: SKULASON'S F-PROT. Nothing comes close
- to its ease of use, reliability, durability and price. Single-
- handedly "invented" heuristic scanning. Even its detractors tend
- to model their software after it. Since it's free for home use,
- perhaps it is time to examine what the civilians are breathing
- and drinking in Iceland.
-
- BEST COMPREHENSIVE RETAIL ANTI-VIRUS SOFTWARE: SOLOMON's ANTI-VIRUS
- TOOLKIT. Close to F-PROT in performance, but it'll cost ya. In
- addition, the company tosses in integrity checking, a few hard disk
- utilities and other bells and whistles that fans of shrink-wrap
- deem necessary. We still think it's over-priced, but what do we
- know?
-
- NATIONAL DUMMKOPF: MICHAEL CALLAHAN, editor of SHAREWARE Magazine.
- Callahan spent two issues interviewing John McAfee in the late
- summer and still managed to come away thinking that viruses can
- damage hard disks irreparably. And just think, Callahan writes
- computer books for the masses for a living. Certainly, we're
- all doomed.
-
- BEST PUBLICATION: For reason's outlined in this issue, Bruce
- Sterling's "The Hacker Crackdown: Law and Disorder on the
- Electronic Frontier." Honorable mention to Dark Angel for
- his "Phunky/Crispy/SomethingorOther Viral Writing Guides"
- (samizdat) and Mark Ludwig for "The Little Book of Computer
- Viruses" (American Eagle Publishing, Tucson, AZ).
-
- WORST PUBLICATION: VIRUS L-Digest - the definitive forum
- for stream-of-consciousness, hair-splitting, turgid
- arguments between obscure, fossilized academics. Hey, you think
- not? I was reading back issues of Virus-L and in February
- there was some nut going on ad nauseum about viruses viably
- infecting text files.
-
- BEST PEN PAL: SARA GORDON, 'nuff said.
-
- WORST ANTI-VIRUS SOFTWARE: Far too many to choose from.
-
- BBS's TO VISIT AND STAY AWHILE: THE HELL PIT
- (Sysops Kato and Hades), RIPCO ][, AIS (Sysop Kim Clancy),
- UNPHAMILIAR TERRITORY (Sysop Invalid Media), THE VIRUS (Sysop
- Aristotle), CYBERNETIC VIOLENCE (Sysops Pure Energy and
- Rock Steady).
-
-
- Page 13
-
-
-
- MISSING IN ACTION: GARY WATSON.
- *****************************************************************
-
- BITS AND PIECES I: FRANS HAGELAARS STEPS DOWN AS FIDONET VIRUS
- ECHO MODERATOR, NAMES EDWIN CLETON AS REPLACEMENT. CLETON
- VOWS STRICT ADHERENCE TO RULES, OR IT'S THE HIGHWAY FOR ALL
- THOSE CRUMMY, GRAND-STANDING FIDO-FLAMERS. AS FIRST ACT, CLETON
- SHUSHES A USER FOR EXTRACTING A COUPLE LINES FROM THE VSUM
- DATABASE WITHOUT NEGOTIATING A LICENSING AGREEMENT WITH PATRICIA
- HOFFMAN. 'THAT'LL SHOW 'EM I MEAN BUSINESS,' HE SEZ.
- *****************************************************************
-
- BITS AND PIECES II:
-
- We grabbed this advert of interest off the wires. Now, mebbe
- we'll be able to bring you a product run through for the next
- issue.
- -*-
- AVLab v1.0, the antiviral researcher's toolkit from Cairo Research
- Labs, is now available!
-
- * Extensive Virus Signature Database System capable of handling
- multiple databases
- * Ability to search across the signature database
- * Generate custom virus signature datafiles from your database
- * Ability to read VIRSCAN.DAT style signature files and add them
- to the database!
- * Create detailed reports to the screen, printer, or a file
- * Implement a very detailed virus scanner testbed!
- * Much more!
-
- AVLAB or AVLAB*.* from: Under the Nile! 9600v.32 1:3613/12
- 120K in size Backwoods BBS 9600USR-DS 1:3613/10
- -------------------------------------------------------------------
- Scott Burkett & Christopher Brown,
- Cairo Research Labs
- -*-
- ------------------------------------------------------------------
- BITS & PIECES III:
-
- Steve Rosenthal, a Macintosh product reviewer published by Prodigy
- spent a recent weekly column shilling for Symantec's SAM.
- Rosenthal openly griped about the current state-of-
- affairs which has set up a market where large retail
- software developers charge $60-$100 for anti-virus measures
- which can be had for free or almost so as shareware. His
- case in point was Symantec's SAM versus "Disinfectant", a
- freeware program developed by a Northwestern University
- researcher. In the article, Rosenthal added he was miffed
- that software developers could profit from the computer virus
- phenomenon, although he saw no evidence that any programmers of
- such things had ever written viruses. An interesting, naive
- oversight: In the IBM world, names like Ralph Burger and Mark
- Washburn - with viruses named after both - immediately come to
- mind.
- -------------------------------------------------------------------
-
-
-
- Page 14
-
-
-
- URNST'S SCAREWARE TOOLS: CLASSIC VIRUS DEMOS ADD LIFE TO ANY PARTY
- ******************************************************************
-
- Part of this issue's software packet are DEBUG scripts which will
- allow you to create demonstrations of the "classic" (sort of like
- "classic" rock, y'know, from David Stang's 'good 'ol days')
- viruses: PingPong, Den Zuko, Jerusalem and Cascade.
-
- We call them "scareware" because they've been optimized for
- convincing "real-life" testing or demonstration. Unlike many
- virus demo programs which are either scanning viral fragments
- or cumbersome command-line driven tools which loudly advertise
- their presence on any system, Urnst's Scareware Tools are
- completely silent. All are invoked simply by typing the name
- of the program. In addition, they do not scan. Although not
- infectious, all the programs will install themselves into memory
- and continue generating specific symptoms until a warm reboot is
- initiated.
-
- These programs are not self-aware. That is, they will not complain
- and refuse to function if modified, like many performance crippled
- virus-dummy simulator/generators. This has advantages and drawbacks,
- depending upon what use one decides to make of Urnst's Scareware
- Tools.
-
- The features of Urnst's Scareware Tools are as follows:
-
- *DENSCARE.COM - upon invocation, DenZukoScare (tm)
- immediately displays the popular DEN ZUK virus
- graphic effect and exits.
-
- *JERSCARE.COM - upon invocation, JerusalemScare
- (tm) becomes resident. After a short period of
- time - about a minute on most systems - Jerusa-
- lemScare will effect the characteristic Jerusalem
- virus system slowdown and scrolling black window
- display on the left side of the monitor.
-
- *PPSCARE.COM - upon invocation, PingPongScare (tm)
- will become resident and clutter the screen with
- the characteristic "bouncing ball" of the PingPong
- boot block infector. Computing can continue while
- PingPongScare is in effect. [Warning: The Surgeon
- General has determined that daily computing while
- PingPongScare (tm) is in effect can result in eye
- strain and, possibly, headaches.]
-
- *CASCARE.COM - upon invocation, CascadeScare (tm)
- will become resident. After a brief pause, the
- characteristic rat-a-tat sound of the Cascade
- virus and its nifty falling letters effect will
- be seen. This will continue intermittently, for as
- long as CascadeScare is resident. If the computer is
- in graphics mode, only the rat-a-tat sound effect
- will be noticed.
-
- Besides demonstration, there are many other uses for Urnst's
- Scareware Tools. Some examples: April Fool's jokes, parlor
-
- Page 15
-
-
-
- trickery, devilment of bosses & administrators, entertainment,
- aahhhh, you get the idea.
-
- An URNST tip! Tie DenZukoScare (tm) into your AUTOEXEC.BAT.
- Then everyday, as you start computing you'll be greeted by the
- cheerful DEN ZUKO display. Kooky!
- ******************************************************************
- AMBULANCE CAR VIRUS [STRAIN B]
- ******************************************************************
- Supplied in this issue of the letter as a DEBUG script and
- recompilable disassembly, AMBULANCE CAR is a simple, path-searching
- direct-action infector with a gaudy display. By paying close
- attention to the technical notes in the virus's disassembly, you
- should be able to run it on your system enough times to see
- its trademark "ambulance" effect.
-
- My tip of the hat to an early issue of 40Hex which included this
- interesting virus as a DEBUG script, too. (I think).
-
- *******************************************************************
- ADDITIONAL KUDOS: THANKS AND A TIP O' THE HAT TO CRYPT READER
- CAPTAIN AEROSMITH WHO PROVIDED THE GOBBLER II AND PCRx SOFTWARE
- FOR TEST-DRIVES.
- *******************************************************************
-
-
- MAKING USE OF THE CRYPT NEWSLETTER SOFTWARE:
-
- To produce the software included in this issue, place
- the included MAKE.BAT file, the MS-DOS program
- DEBUG.EXE and the included *.SCR files in the
- current directory. (Or ensure that DEBUG is in the
- system path.)
-
- Type "MAKE" and DEBUG will assemble the SCRiptfiles into
- working copies of URNST's SCAREWARE TOOLS and
- AMBULANCE CAR virus. Alternatively, you can do it
- manually by assembling Ambulance from the supplied
- source listing. To do that, you'll need the TASM
- assembler and its associated linker.
-
- Remember, software included in the Crypt newsletter can
- fold, spindle and mutilate the precious valuables on
- any IBM-compatible PC. In the hands of incompetents,
- this is very likely, in fact.
-
- **********************************************************************
- This issue of the Crypt Newsletter should contain the
- following files:
-
- CRPTLT.R10 - this electronic document
- JERSCARE.SCR - scriptfile for JerusalemScare (tm)
- PPSCARE.SCR - scriptfile for PingPongScare (tm)
- DENSCARE.SCR - scriptfile for DenZukoScare (tm)
- CASCARE.SCR - scriptfile for CascadeScare (tm)
- AMBUL.SCR - scriptfile for AMBULANCE CAR virus
- AMBUL.ASM - TASM source listing for AMBULANCE CAR virus
- MAKE.BAT - Makefile which, when used with the MS-DOS
-
- Page 16
-
-
-
- program DEBUG.EXE, will produce working copies of
- Urnst's Scareware Tools and Ambulance Car virus from the
- included scriptfiles.
-
- You can pick up the Crypt Newsletter at these fine BBS's, along with
- many other nifty, unique things.
-
-
- DARK COFFIN 1-215-966-3576 Comment: Crypt Corporate
- THE HELL PIT 1-708-459-7267
- DRAGON'S DEN 1-215-882-1415
- FATHER & SON 1-215-439-1509
- RIPCO ][ 1-312-528-5020
- AIS 1-304-420-6083
- CYBERNETIC VIOLENCE 1-514-425-4540
- THE VIRUS 1-804-599-4152
- NUCLEAR WINTER 1-215-882-9122
- UNPHAMILIAR TERRITORY 1-602-PRI-VATE
- THE OTHER SIDE 1-512-618-0154
- MICRO INFORMATION SYSTEMS SERVICES 1-805-251-0564
-
- If you have contributions, mail or just wish to be listed as above,
- contact Urnst Kouch at Dark Coffin BBS, the FidoNet Virus
- echo or VxNet matrix.
-
- And we'll see YOU around New Year or thereabouts!
- -*-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 17
-