home *** CD-ROM | disk | FTP | other *** search
-
- ▄▄▄ ▄▄▄▄▄▄▄▄ ▄▄▄ ▄▄▄▄▄▄ ▄▄ ▄▄ ▄▄▄ ▄▄▄▄▄ ▄▄▄▄▄▄▄ ▄▄▄▄▄
- █▒▒█ █▒▒▒▒▒▒▒█ █▒▒█ █▒▒▒▒▒█ █▒▒█ █▒▒█ █▒▒█ █▒▒▒▒█ █▒▒▒▒▒▒█ █▒▒▒▒█
- █▒▒█ ▀▀▀▀▀▀▀▀ █▒▒█ ▀▀▀▀█▒▒█ █▒▒█ █▒▒█ █▒▒█ ▀▀▀█▒▒█ ▀▀▀█▒▒█ ▀▀▀▀▀
- █▒▒█ █▒▒█ ▄▄▄▄█▒▒█ █▒▒█ █▒▒█ █▒▒█ ▄▄▄█▒▒█ █▒▒█
- █▒▒█ █▒▒█ █▒▒▒▒▒█ ▀▀ █▒▒█ █▒▒█ █▒▒▒▒█ █▒▒█
- █▒▒█ █▒▒█ ▀▀▀▀█▒▒█ █▒▒█ █▒▒█ ▀▀▀▀▀ █▒▒█
- █▒▒█ ▄▄▄▄▄▄▄▄ █▒▒█ █▒▒█ █▒▒█ █▒▒█ █▒▒█
- █▒▒█ █▒▒▒▒▒▒▒█ █▒▒█ █▒▒█ █▒▒█ █▒▒█ █▒▒█
- ▀▀▀ ▀▀▀▀▀▀▀▀ ▀▀▀ ▀▀ ▀▀ ▀▀▀ ▀▀
-
- NEWSLETTER NUMBER 13
-
- ****************************************************************
- ******* Another festive, info-glutted, tongue-in-cheek training
- manual provided solely for the entertainment of the virus
- programmer, security specialist, casual home/business user or PC
- hobbyist interested in the particulars - technical or otherwise
- - of cybernetic data replication and/or mutilation. Jargon free,
- too. EDITED BY URNST KOUCH, February - March 1993
- CRYPT INFOSYSTEMS BBS - 215.868.1823
- ****************************************************************
-
-
- TOP QUOTE: ". . . in the end the perfumed and tailored yes men
- are as dangerous and evil as the bullies they serve."
- -- Morley Safer
-
- IN THIS ISSUE: News . . . Interview with Kim Clancy of the AIS
- BBS . . Aristotle founds the Virginia Institute of Virus
- Research . . . Mark Ludwig's 1st International Virus Writing
- Contest . . . SUSAN virus . . . VOOTIE virus: a demo virus
- optimized for PRODIGY e-mail . . . Lawrence Livermore Labs
- switches to puppet manufacturing after bottom falls out of
- thermonuclear weapons design . . . ViruDos: an April Fool's
- command shell . . . In the reading room with TIME and WIRED
- magazines . . . FLAGYLL virus . . . much more
-
-
- News: JAPS NOT PLAGUED MUCH BY VIRUSES: NUMBER OF REPORTED CASES
- TRIVIAL SEZ CRYPT NEWSLETTER
-
- Japan's Information Technology Promotion Agency says "computer
- damage" (?) caused by viruses amounted to 253 cases. Agency
- bureaucrats attributed the surge in data vandalism, four-fold
- over 1991, to international exchange of software. That's it,
- blame the foreigners! Wooo.
-
- MAN PRANKS EX-WIFE WITH PC TROJAN, EX-WIFE SHOWS SKILLFUL USE OF
- LOCAL SHERIFF
-
- A Santa Rosa, CA., computer prankster has been stung by a felony
- tampering charge after admitting he sabotaged his ex-wife's
- computer files. If convicted, prankster James Welsh could be
- headed for a three year trip to the "bighouse."
-
- The 32-year-old James Welsh says he sent a disk with a "kamikaze
- program" to his ex-wife as vengeance for an unpleasant divorce.
-
- Welsh's former wife, Kathleen Shelton, had all her files erased
- when she used the booby-trapped program. The trojan left a
- taunting limerick as its calling card. Shelton said Welsh set up
- the system for her and she had [stupidly] continued to rely on
- him for help and advice.
-
- Welsh's defense will hinge upon the fact that he claims the
- trojan erased a program that he had pirated. Because it was a
- pirated "ware," "it [is] not protected under the state's
- anti-hacking law," he says. No news on how closely software
- engineers at CERT or the SPA will be watching this case.
-
- TOMORROW CANCELLED! RUSTY & EDIE'S BUSTED FOR PIRACY,
- UNDERGROUND BBSer's SAY THEY HAD IT COMING, SUITS PLAY
- DUMB
-
- "No hassles. No rules! Just a couple of burn-out hippies from
- the '60s . . ." were a number of the lines sysops Rusty & Edie
- used to describe themselves in various ads plugging the wonders
- of their BBS. Now "First to try on the new felonization of
- piracy bill" can be added to the list.
-
- The FBI and SPA stormed the gates of the Boardman, Ohio,
- bulletin board system in early February, seizing equipment
- and accusing the operators of pirating software. In what has
- become a standard statement whenever large pirate BBS's are
- raided, the Software Publishers Association, which worked with
- the FBI in investigating the case, said agents seized computers,
- hard disk drives and telecommunications equipment, as well as
- financial and subscriber records. ". . . following the receipt
- of complaints from a number of SPA members that their software
- was being illegally distributed on the Rusty & Edie's BBS" the
- trade group said that it began an investigation months earlier
- which included the download of retail programs from the BBS.
- The system, established in 1987 and described as the third
- largest BBS in the country in a glowing review which landed in
- the pages of Computer Shopper only days before the bust,
- maintained 124 nodes and more than 14,000 subscribers.
-
- For $89 a year, "subscribers . . . were given access to the
- board's contents, including many popular copyrighted business
- and entertainment packages," droned the SPA statement.
-
- Alert Crypt Newsletter readers familiar with the issue of
- software piracy had a variety of responses to the news. "Copy
- that floppy!" cried a subscriber in the northeast. "I'm
- surprised it took so long," sneered another. "I was going to
- join the week before the bust, but they were too expensive,"
- added a reader from the Midwest. Jim O'Brien, the editor in
- charge of the section in Computer Shopper which ran the review
- of Rusty & Edie's claimed neither he nor free-lance writer
- Dennis Fowler had any inkling the BBS was allegedly involved in
- piracy.
-
- The FBI has not charged Russell and Edwinia Hardenburgh in the
- case. The FBI has also been equivocal on whether it will extend
- its dragnet to include patrons of the system.
-
- And as of the last week in February the ACLU had thrown its hat
- into the ring on the side of the BBS, challenging the
- constitutionality of the raid on the grounds that the piracy
- charge should have been pursued in civil court. ACLU Ohio
- legal director Kevin O'Neill conceded to the United Press
- International that the FBI's copyright infringement, uh, piracy,
- charges might have merit.
-
- HAND PUPPETS TO TEACH COURSE IN COMPUTER ETHICS (BUT WILL THEY
- BE ELIGIBLE TO JOIN THE UNION)?
-
- Still reeling from the double rabbit-punch of the end of the
- Cold War and a Democrat in The White House, which has seen their
- 40-year pursuit of better ways to make thermonuclear explosives
- and X-ray pumped space weapons at the expense of the taxpayer
- thrown into disrepute, Lawrence Livermore Laboratory scientists
- are turning to puppetry as one way of justifying their continued
- funding.
-
- Livermore Computation Organization employees Lonnie Moore and
- Gale Warshawsky have developed a pilot puppet program to teach
- very young school children about computer ethics and security.
- The stars of the show cover two of the major computer
- stereotypes: Gooseberry, a stupidly trained computer operator,
- and Dirty Dan, a "hapless, heinous hacker," software pirate and
- virus spreader.
-
- In one skit, according to the Associated Press, Dirty Dan brings
- home a computer game obtained from a friend and ends up
- "feeding" Chip - the computer - a virus which "makes him dizzy."
-
- " . . . nobody out there is teaching ethics and security," said
- Moore on the reason for his program. The Crypt Newsletter
- adds, "Who's the leader of the gang that's made for YOU and ME?
- M - I - C, Kay - E - Why, M - O - U - S - E!!!"
-
-
- ──────────────────────────────────────────────────────────
- PROFILE: KIM CLANCY & THE AIS BBS - VIRUS CODE FOR ALL
- ──────────────────────────────────────────────────────────
-
- Here at the Crypt Newsletter, every time the editorial staff
- reads another piece of e-mail from the local FeebNets saying,
-
- "If you have virii on your board, soon 'The Feds [in blinking
- red]' will be giving you a call, so be carrefill [sic]."
-
- or
-
- "Here in England, bobbies from Scotland Yard just confiscated
- Tinker Dill's Virus Happy Place in Squatney. It's a bloody
- shame. <RWG>"
-
- we have a good laugh. And that's because the two cover a whole
- wealth of ignorance concerning possession of virus code. The
- first is the handiwork of the 15-year old user thoroughly
- convinced that a US Robotics modem and 1 terabyte of anarchy
- texts makes him an expert on every legal and social aspect of
- cyberspace. The second generally comes from users who take the
- popular press too seriously and have no qualms with authorities
- capable of routinely violating the rights of the helpless,
- unwitting or unpopular.
-
- It would be a rude shock to these people to know that the U.S.
- government runs a BBS which archives A LOT of well-commented
- virus source code that any taxpayer can access and leech until
- their diskettes are full. Run by Bureau of The Public Dept.
- employee Kim Clancy, the BBS is called AIS and is the
- clearinghouse for a stockpile of information covering a variety
- of underground and aboveground computer security issues.
-
- "Our computers track the deficit. That's job security," laughed
- Clancy in a recent interview.
-
- "The only thing we don't have is live viruses, but the source
- code's there - that's certainly not far from it," she said.
- "We've got the Virus Creation Laboratory, too."
-
- AIS was started about two years ago and has grown steadily
- since. Membership currently exceeds 600. It reached critical
- mass, Clancy said, when Computer Underground Digest interviewed
- her and profiled the system as a convenient place for the hacker
- underground and security-types to mingle.
-
- Much of AIS's material Clancy acquired on repeated jaunts to
- "underground" (man, do we hate that term) BBS's like Hell Pit
- and the now defunct Nun-Beaters Anonymous, both in the Chicago
- area.
-
- Needless to say, Clancy has maintained contact with a number of
- virus programmers, some of whom she says are her best technical
- advisors. On one occasion, virus authors from NuKe and
- Phalcon/SKISM set up an early morning conference call with her,
- one which was monitored, she said, by the Secret Service.
- Later, said Clancy, an agent called her and warned her she
- shouldn't have made sport of a security "expert" in the military
- who was a user on AIS, something the agent could only have known
- as an eavesdropper. Clancy shrugs this off as venal harassment
- and repeats the story when lecturing around the country.
-
- About the stock of virus code? "I've had very few complaints,
- very little comment to me, directly," finished Clancy.
-
- The AIS sysop's philosophy seems to be one that encompasses the
- idea that if you want to know about something, you need to get
- your hands on it without interference. Sounds dangerous!
-
- Give AIS and Kim Clancy a ring at 304.420.6083.
-
- ─┼──────────────────────────────────────────────────────────────┼
- │ARISTOTLE: "IT'S A GIANT PISSING CONTEST!" HE SEZ OF Vx/A-V │
- ─┼──────────────────────────────────────────────────────────────┼
-
- "It's a giant pissing contest and the only guy getting hurt is
- John Q. Public!" quoth Aristotle in a recent interview concerning
- his decision to drop out as the dean of virus exchange BBS'ing.
-
- "As far as the anti-virus people go, 60% of the files on virus
- exchanges are 'goat files.' ["Goats" are the small host
- programs, usually bearing the identifier of an anti-virus
- developer, which researchers infect with a virus they wish to
- examine.] Now, you want to crash virus exchanges, make my
- collection illegal. Well, you tell me how I got all these
- 'goats!'
-
- "Everybody's talking shit," Aristotle continued, explaining that
- security people and anti-virus developers have agents on every
- virus exchange. The sysops think their systems are hard to
- penetrate, Aristotle claims, but the reality is just the
- opposite. The anti-virus developers get the newest viruses
- direct from the source, use them to fuel their advertising
- campaigns and trade viruses from their collections in return for
- continued access. All the while, Aristotle says, there's little
- chance any of the new viruses will actually end up in the wild.
-
- "There's complete distrust, everyone in the [groups] is scared
- to death of each other." Aristotle went on to explain a recent
- tiff with members of Phalcon/SKISM stemming from Kim Clancy's
- late night conference [see above] which had been monitored by
- the Secret Service. Aristotle was party to the alliance call,
- too, and was painted as the "man on the inside," a Secret
- Service informer. Untrue, Aristotle says, completely untrue.
-
- Aristotle is best known for his drive to sell viruses and source
- code in bulk, the entirety of "The Black Axis BBS" collection.
- There have been 40 takers, so far, Aristotle says. And they're
- not kids. "You think a kid has the money?" he asked. "Who do
- you think does? Haha."
-
- The virus sales paid for a course in computer information system
- management at William & Mary University, he said. "My research
- was on viruses and the underground. I got an A."
-
- Aristotle also maintained the VxNet, linking a number of virus
- exchanges and quasi-virus exchanges globally. The Crypt
- Newsletter asked him what would become of it.
-
- "You want it?" he said with a laugh.
-
- While The Black Axis is gone, Aristotle has replaced it with the
- Virginia Institute of Virus Research in Newport News. No more
- handles, either, said John Buchanan.
-
- "My object was to bring all this out into the open. I got the
- virus programmers to start arguing with the security people on
- the FidoNet," Buchanan concluded. "I did that."
-
- IN THE READING ROOM: TIME AND PUZZLEMENT - SUPERMARKET NEWS MAG
- MUGS "CYBERPUNK"; ALL HACKERS LOOK LIKE R. U. SIRIUS, DANCE TO
- HOUSE MUZIK, GOBBLE ECSTASY, QUOTE TIMOTHY LEARY, IT'S KEWL, MAN
-
- Buzzwords, like "cyberpunk," I've decided, are cruel pranks
- sickeningly ambitious writers at glossy magazines use to make
- themselves instant authorities. Media magnification always makes
- these terms legitimate, whether they are or not, so you know
- that while the TIME article on "cyberpunk" two weeks ago was
- pure baffle-crap (see, I can make my own buzzword, too), inside
- 4 months it will have spawned 6 like-minded articles in other
- supermarket magazines, taking on a complete life of its own.
-
- So, I'm gonna rehash some of this nonsense now, in hope that you
- laugh, because if you don't, when you see it again as truth in
- the coming weeks, you just might have to cry.
-
- Didja know,
-
- that the computer virus is "the cybernetic analogue of AIDS," a
- disease which has affected millions worldwide and caused
- horrifying death and human suffering? According to Phil
- Elmer-Dewitt of TIME, it's so!
-
- Didja know,
-
- according to certified geezer Timothy Leary, "the PC is the LSD
- of the '90s"? Like you, I thought this was a fatuous,
- self-serving statement. But then I thought about it some more
- and began to feel warm inside. Since I missed LSD when it came
- around the first time, it felt good to know that I now had an
- unending supply of it sitting on my desk, just in case I felt
- the need to be "groovy."
-
- Didja know,
-
- that now "cyberpunks" don't look like young men with coke-bottle
- thick glasses and plastic pocket-protectors? No, they look like
- young, less warty, versions of Tiny Tim (which is what R. U.
- Sirius looks like in the photo in TIME magazine). It's true!
-
- Didja know,
-
- cyberpunks listen to "house" music, that "post-industrial,"
- droning, art-phag stuff that bands with names like Surgical
- Penis Klinik and Throbbing Gristle couldn't sell in the '80s
- because it was "too" alternative, but now it's big business
- because computer dudes and dudettes don't like those dead, fat
- guys in Lynyrd Skynyrd. Yup, it's true! And boy am I bummed!
- What am I going to do with my Angry Samoans and Mentors records?
-
- Didja know,
-
- "without visual cues, people communicating on-line tend to
- flame: to state their views more heatedly than they would face
- to face?" Visual cues-visual shmues - here I thought they did
- it because there was little chance they would get popped on the
- jaw for being a jerk.
-
- Didja know,
-
- the movie "Terminator 2" was a cult film?
-
- Didja know,
-
- that TIME magazine used the same virtual illustration of
- "virtual reality d00d sucking the face off a virtual reality
- d00dette" as the movie "The Lawnmower Man," and the magazines
- OMNI, COMPUTE, PC Computing, Byte, MacWorld, Discover, Newsweek,
- Rolling Stone, SPIN, Science News, Playboy, Penthouse, Gent, USA
- Today, Details, MONDO 2000, Dog Fancy, Cat Fancy, Harpers, The
- Atlantic, etc., etc., etc.?
-
- Didja know,
-
- that the Electronic Frontier Foundation is a group that defends
- "exploratory hacking"? Well, they didn't know and they seemed
- pissed in Computer Underground Digest when they found out.
-
- Didja know,
-
- that TIME magazine is now sold with samples of cheap men's
- cologne, along with ads for "Elvis not dead" books and chemicals
- which will chase away your male pattern baldness? It's true!
-
- -----------------------------------------------------------------
-
- W E L C O M E
-
- T O
-
- T H E
-
- F I R S T
-
- * * * * * * * * * * * * * * * * * * * * * * * * * * * *
- * *
- * I N T E R N A T I O N A L *
- * *
- * C O M P U T E R *
- * *
- * V I R U S *
- * *
- * W R I T I N G *
- * *
- * C O N T E S T *
- * *
- * * * * * * * * * * * * * * * * * * * * * * * * * * * *
-
- - 1 9 9 3 -
-
- Final Date For Submissions: APRIL 1, 1993
-
-
- This Contest is Sponsored by:
-
- American Eagle Publications, Inc.
- P. O. Box 41401
- Tucson, AZ 85717 USA
-
- Publisher of The Little Black Book of Computer Viruses
-
- * * * * * * * * * * * * * * * * * * * * * * * * * * * *
- ! DISTRIBUTE THIS FILE ALL OVER THE KNOWN UNIVERSE !
- * * * * * * * * * * * * * * * * * * * * * * * * * * * *
-
- Ok, all you genius hackers out there! Here is a challenge
- for you. Prove your stuff!
-
- This is an INTERNATIONAL contest, and this file is
- being circulated all over the world, so if you want to compete,
- be forewarned, you've got worldwide competition. Only the best
- have a chance in this game.
-
- Still up to the challenge?
-
- Ok, here it is:
-
- I am writing Volume 2 of The Little Black Book of Computer
- Viruses. This is a study of the scientific applications of
- computer viruses, and their use in artificial life research,
- and all of that neat stuff. One of the things I want to discuss
- in the book is the limit on the size of a virus for a given
- level of functionality. So I took the TIMID virus from Volume 1
- and tore it down to the bare minimum. Not good enough. I wrote
- a virus that worked a little differently. I tore that one down
- to the bare minimum. Good enough? Well maybe. But maybe not.
- I have some pretty compact code, but is it the absolute best?
- I'm guessing somebody out there can top it.
-
- Here are the rules:
-
- (1) The object of this game is to write the smallest
- virus you can with the required level of functionality.
-
- (2) The virus must be capable of infecting all COM files
- on the logged drive in the current directory of a PC,
- no matter how many COM files are there. It may infect
- them as quickly or as slowly as you like, so long as
- it can be demonstrated that it will do so in an hour,
- when running the programs in that directory one after
- the other in sequential order.
-
- (3) The virus must recognize itself and avoid re-infecting
- files that have been infected. At most, only one in
- fifty thousand files should get accidently re-infected,
- assuming that the data in unknown COM files is random.
-
- (4) The virus must terminate gracefully if it cannot find a
- file to infect.
-
- (5) The virus must not destroy any of the code in any file
- which it infects. It must allow that code to execute
- properly, or refuse to infect a file.
-
- (6) The virus must be self-contained. It cannot hide
- code in some common location on disk.
-
- (7) The virus must function properly under MS-DOS 5.0 with
- no TSR's resident, and nothing loaded high.
-
- (8) The size will be determined by the larger of (A) the
- number of bytes the virus code itself takes up in
- an infected file, and (B) the largest number of bytes
- the virus adds to a program when it infects it.
-
- The best code I have for a virus that follows these rules right
- now is 139 bytes long. Both source and executable are included
- in the ZIP, named LITTLE.ASM and LITTLE.COM.
-
- In the event of a tie for size, originality and ingenuity of
- the code will break the tie. All judges decisions are final.
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- The winner will receive the following:
-
- (1) A $100 CASH REWARD.
-
- (2) Your code will be published in The Little Black Book
- of Computer Viruses, Volume 2.
-
- (3) I will give you credit for the code and for winning
- the International Virus Contest in the book, using
- either your real name or an alias, your choice,
- published in the book.
-
- (4) Your name will be posted on the MISS bulletin board
- as the contest winner.
-
- (5) A free copy of The Little Black Book of Computer
- Viruses, Volume 2, and a one year subscription to
- Computer Virus Developments Quarterly ($95 value).
-
- Three honorable mention winners will receive a free copy of
- The Little Black Book of Computer Viruses, Volume 2.
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- You may make an entry in two ways:
-
- (1) Mail your entry on a PC format floppy disk to American Eagle
- Publications, Inc., PO Box 41401, Tucson, AZ 85717 USA.
-
- (2) Upload your entry to the M.I.S.S. bulletin board at
- (805)251-0564 in the USA. Log on as GUEST, password VIRUS,
- last 4 digits of phone number 0000, and upload to the CONTEST
- UPLOADS directory.
-
- A valid entry consists of the following items:
-
- (A) Complete source code for a virus, which can be assembled
- using either TASM, MASM, or A86. If you use another assembler
- and don't know if one of the above will work, then send the
- assembler along with the submission. If you do anything tricky
- that we may not understand, you must explain it in comments in
- the assembler source.
-
- (B) A statement of who you are (aliases accepted) and how to
- get in touch with you in case you win the contest. This
- information will be kept strictly confidential, and encrypted
- at all times.
-
- By submitting an entry to the contest, you agree that the
- copyright to your entry will be considered the property of
- American Eagle Publications. The copyright to any losing
- entry will be returned to the owner upon written request.
- In the event that you win or receive honorable mention in the
- contest, the copyright to the code will remain the property
- of American Eagle Publications, Inc.
-
- You may submit your entry encrypted with PGP 2.1 if you
- desire. Use the following public key to encrypt:
-
- -----BEGIN PGP PUBLIC KEY BLOCK-----
- Version: 2.1
-
- mQBNAitZ9w4AAAECAOXJYOsJNavAAWFBRwf4/u0QWMJ9IHj8eajgOfDRdlCNwEBJ
- wMs1vb5GcdJCaeoCgBR3Xxzh6oEo2nrwfru8mqMABRG0CE1BTHVkd2ln
- =P6d4
- -----END PGP PUBLIC KEY BLOCK-----
-
- Go to it!
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- D O N ' T M I S S O U T ! ! !
-
- Get Your Very Own
-
- International Virus Writing Contest 1993
-
- T-SHIRT
-
- Great fun to wear to your local user's group meeting, or the
- next computer security conference you attend. Sure to get
- people's attention and initiate lots of interesting
- conversation. Specify Small, Medium, or Large.
-
- Only $9.95
-
- from
-
- American Eagle Publications, Inc.
- P.O. Box 41401
- Tucson, AZ 85717
-
- (US Customers please add $3.00 for UPS delivery)
- (Overseas customers please add $7.50 for airmail delivery)
- (Overseas customers please add $3.00 for surface delivery)
- (AZ residents add 5% sales tax)
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- American Eagle Publications, Inc., gives you first class
- information to learn the ins and outs of viruses. You may
- order any of the following items from American Eagle
- Publications, PO Box 41401, Tucson, AZ 85717. (Shipping is $2.00
- to the US, $7.50 for overseas airmail.) AZ residents add 5%
- sales tax.
-
- The Little Black Book of Computer Viruses, Volume 1,
- by Mark Ludwig. This award-winning book will teach you the
- basics of how viruses work in no-nonsense terms. 192 pp.,
- $14.95.
-
- The Little Black Book of Computer Viruses Program Disk. All
- of the programs in the book, both source code and executables,
- $15.00.
-
- Computer Virus Developments Quarterly, This takes up where the
- Little Black Book leaves off, providing the reader with
- quarterly updates on viruses and anti-virus technology.
- For the advanced security specialist or programmer. One year
- subscription with diskettes, $75.00 postpaid, overseas airmail
- add $10.00.
-
- Computer Virus Developments Quarterly, current single issue,
- $25.00. (Please inquire as to price and availability of back
- issues.)
-
- Technical Note #1: The Pakistani Brain Virus, a complete
- disassembly and explanation. This is one of the first boot
- sector viruses ever written, and the first stealth boot sector
- virus. It hides on floppy disks and inserts the label (c) Brain
- on the disk. 32 page booklet and diskette with assembler source
- and compiled virus, $20.00.
-
- Technical Note #2: The Stoned Virus, a complete disassembly and
- explanation. The Stoned is the world's most successful boot
- sector virus. It infects floppy disks and hard disks. Find out
- what makes it tick. 24 page booklet and diskette with assembler
- source, compiled virus, and detection tool, $20.00.
-
- Technical Note #3: The Jerusalem Virus, a complete disassembly
- and explanation. Jerusalem is an old but highly effective virus
- which hides in memory, and infects every program you try to
- execute. It starts deleting programs on Friday the 13th. Booklet
- and diskette with assembler source and compiled virus, $20.00.
-
- Technical Note #4: How to Write Protect an MFM Hard Disk. The
- only hard-and-fast way to stop viruses from spreading is to
- physically write-protect your disk. This tech note tells you how
- to do it for the older MFM style drives. Some companies
- sell such devices for hundreds of dollars, but this booklet
- will tell you how to do the job for under $20. Complete with
- theory, circuit diagrams, and a circuit board layout. No
- diskette, $12.00.
-
- How to Become a Virus Expert, a 60 minute audio tape by author
- Mark Ludwig tells you how to get hold of the critical information
- you need to protect your computers, and stop relying on some anti-
- virus product developer to spoon-feed you. $10.00.
-
- Wanted: Translators for these works in all languages and outlets
- for these works in all countries. An opportunity for big $$ awaits
- the enterprising person. Please contact us.
-
- ================================================================
-
- No Virus Contest is complete without POLITICAL COMMENT:
-
- Freedom is only free if it is VOLUNTARY. If you live in a
- "democratic" nation that will not allow secession, then you DO
- NOT live in a free country. The democracies of this world are
- learning how to become tyrannies. Support a Secession Amendment
- for your constitution, before it is too late and you wish you
- had. Secession is the only logical way to short-circuit the trend
- toward big government and tyranny, short of all-out civil war.
- -- Mark Ludwig
- ================================================
-
- CRYPT NEWSLETTER GIVES YOU A FIGHTING CHANCE IF YOU HOSE
- YOURSELF WITH A "TYPICAL" MEMORY RESIDENT VIRUS
-
- Ever wish the "suit" computer magazines supplied something more
- useful than utilities to "beep the speaker" or "turn OFF that
- pesky numLock light?" Well, Hell has a better chance of freezing
- over before that happens. But we're not like that here at the
- Newsletter! NosirreeBob! We've got a batch file, yes a "batch
- file" for you - absolutely free, which in most cases will allow
- you to remove any generic resident virus from the command processor
- and start the machine from a clean memory slate.
-
- Add it to the VERY BEGINNING of your AUTOEXEC.BAT. Then, create
- a directory called SAVE and:
-
- copy COMMAND.COM C:\SAVE\WHATMEWO.RRY
- copy C:\DOS\FC.EXE C:\SAVE\HELL.NO
- copy C:\DOS\FIND.EXE C:\SAVE\HELL.YES
-
- Then add the 17-byte utility, REBOOT.COM (included in
- this issue), to your SAVE directory and rename a copy of it
- as GREET.OOT in the same directory.
-
- @ECHO OFF
- ECHO -=SANDOZ-KOUCH=- ANTI-VIRUS BATCH FILE! WOO-WOO!!
- PAUSE
- SET HOME=C:\COMMAND.COM
- SET SAFE=C:\SAVE\WHATMEWO.RRY
- SET LOC1=C:\CARBUNKL
- SET LOC2=C:\FESTER
- IF EXIST %LOC2% DEL %LOC2%
- FC %HOME% %SAFE% | FIND "FC: no differences encountered" > %LOC1%
- COPY %LOC1% %LOC2%
- DEL %LOC1%
- COPY %LOC2% %LOC1%
- IF EXIST %LOC2% DEL %LOC2%
- IF EXIST %LOC1% GOTO END
- GOTO VIRUS
-
- :VIRUS
- ECHO COMMAND.COM could be fouled by a virus!
- ECHO Hit CTRL-C TO STOP MACHINE NOW . . . or
- ECHO to refresh the file and purge memory, just
- PAUSE
- GOTO REFRESH
-
-
- :REFRESH
- CD \SAVE
- COPY WHATMEWO.RRY C:\COMMAND.COM
- COPY HELL.NO C:\DOS\FC.EXE
- COPY HELL.YES C:\DOS\FIND.EXE
- REBOOT
-
- :END
- IF EXIST %LOC1% DEL %LOC1%
- SET HOME=
- SET SAFE=
- SET LOC1=
- SET LOC2=
- CD \SAVE
- COPY GREET.OOT REBOOT.COM
- -----the rest of whatever you're doing----
-
- What this batch job does is set up a back-up archive of your
- command processor in the SAVE directory, along with the
- executables called by the program. If FC detects any
- differences between the back-up and your command processor, the
- pipe through FIND creates a 0 byte file which can't be copied.
- The batch file traps the "nocopy" result, assumes COMMAND.COM is
- fouled, restores it and promptly reboots the machine. Typical
- memory resident viruses can easily infect the files used during the
- batch, which is why we restore them just before rebooting, too.
- Essentially, the Victor Charlie anti-virus program uses much of
- this methodology, only it costs you $50.
-
- This batch file will uncover marginal or "semi-stealth" viruses
- which infect COMMAND.COM. Most of these spoof the file
- size change as reported by the DIR command through Interrupt 21
- (that is they simply subtract their size from the amount
- reported before DIR presents it to the user). FC will detect them
- since it is not dependent upon these functions. For example,
- the HITLER virus (from Newsletter 11) the PC BYTE BANDIT and
- ARCV's SCROLL, all marginal stealth, are detected and removed from
- COMMAND.COM by the batch file.
-
- A few points to keep in mind: viruses which parasitize
- COMMAND.COM can cause it to fail or its functions to become
- slightly deranged. The LITTLE virus, included in this issue,
- messes up COMMAND.COM just enough to prevent the SET commands
- from working, although the machine will boot properly. This
- causes the batch file to fail - a quite noticeable occurrence. In
- the real world, you should be suspicious when this happens.
-
- Also, some resident infecter are ill-mannered. The MULE
- variant of Jerusalem will cause boot failure if it gets into
- COMMAND.COM - another quite noticeable gaff. The Scroll and
- PC Byte Bandit - as well as a number of other memory resident
- viruses - attempt to infect batch files as they are executed.
- Both attach themselves to the Newsletter batch file. In
- this case, the batch file will remove them from COMMAND.COM and
- reboot the machine anyway, although you will get a number of
- "bad command" messages as DOS tries to read the binary
- gibberish which is the virus attached to the end of the
- file. If this happens to you, restore the file.
-
- What this file won't do:
-
- It won't protect you from an overwriting virus, like VOOTIE (in
- this issue). VOOTIE is a dumb virus and it will immediately
- cause boot failure if it gets into the root directory. You will
- notice this problem. It will also not protect your
- command processor from full stealth viruses and it will NOT
- protect your machine from multi-partite or partition sector
- infecting viruses. It can also be defeated by viruses which
- infect the target executable on copy. In our estimation, this
- isn't common enough for you to worry about.
-
- None of this will protect you from a virus infection that has
- crawled all over your hard disk before it gets into the command
- processor. (Also keep in mind, that some viruses will SHUN your
- command processor.) If this file reports a virus and reboots your
- machine, it's a smart move to stop the load of your AUTOEXEC.BAT
- with a judicious "Control-C" as soon as the "-=Sandoz-Kouch=-"
- banner reappears and the program pauses. At this point, you
- stand a good chance of being able to examine your machine more
- closely without a virus in memory to worry you. At the very
- least, you get a good warning.
-
- Like features of the hated Victor Charlie 5.0 anti-virus
- program, you can expand the batch file to restore any of the
- programs called in your old AUTOEXEC.BAT. In fact, this isn't
- a bad feature to add to the REFRESH segment of the code.
- Do it yourself if you like.
-
- ---------------------------------------------------------------
- VOOTIE VIRUS: SMALL ENOUGH FOR PRODIGY E-MAIL; OW VIRUS, EVEN
- BETTER
- ---------------------------------------------------------------
-
- Recently, PRODIGY, the interactive information service for
- numerous mixed-up Democrat, Bush-voting yuppies, liberalized its
- policies as to what users can and can't discuss on its public
- message base forums. Formerly, the service exercised
- rigid editorial control over these, enlisting wannabe
- busy-body's with the aid of a "fink" switch, which anyone
- could use to flame and squeal anonymously on the electronic
- scribblings of others.
-
- Although, the "fink" switch is still in operation, users are no
- longer routinely spiked for posting "help me's" on how to attain
- live viruses or source code.
-
- For Newsletter readers who are also PRODIGY members, the VOOTIE
- virus is small enough to fit into the 6-panel PRODIGY e-mail
- format as source code or a DEBUG script. So when someone asks
- for a virus on PRODIGY, you can swiftly send VOOTIE as a simple
- example. The rationale is similar to the one which sent the TINY
- virus to interested parties on the FidoNet a couple of years
- ago.
-
- VOOTIE is merely an overwriting virus; a younger, smaller
- brother to POPOOLAR SCIENCE included in issue 12. It is, in
- essence, merely a small fragment of runaway code. Such programs
- are called "virons," whatever that is, in the VSUM database.
- If you MUST have a term, use "viroid." "Viroid" is a real
- world scientific label used to characterize very small, extremely
- simple natural viruses. "Viron" is anti-virus jargon; "viroid" is
- more scientific, more accurate. And hep, too. Use it and leave
- your listeners flabbergasted on the next user group lecture stop.
-
- VOOTIE overwrites everything in the current directory by
- printing itself on top of its targets. Infected .COMfiles can
- spread VOOTIE, as can .EXE's, if under 65k in size. Data is
- mutilated. VOOTIE will make a disk unbootable if it enters the
- root directory. VOOTIE infected files are ruined as usable
- programs, you must delete them. Infected files can be identified
- by the time/date stamp which is updated to mark the time of
- infection. A file viewer can spot the name VOOTIE, in weird ASCII,
- near the end of the virus in infected or mutilated files. In
- addition, the OW virus by the TridenT group, a smaller 42-byte
- overwriting program, is included in this issue for comparative
- purposes.
-
- ---------------------------------------------------------------
- SUSAN AND FLAGYLL VIRUSES: RESIDENT, OVERWRITING PROGRAMS
-
- The SUSAN virus, an interesting program created by Night
- Breeze, is included in this issue as a source listing.
- The programmer has tied the viruses infection cycle into the
- DIR function so that it infects only the first .EXEfile in the
- current directory. Since SUSAN is in overwriting virus, it
- naturally destroys its host files. This would be devastating
- if the virus infected a fresh .EXE in the current directory
- every time the user typed DIR. However, by limiting the virus to
- one file, Night Breeze has kept it from being too disruptive.
- In addition, it spoofs the user with a "Bad command or file
- name" error message when an infected file is loaded.
-
- SUSAN also keeps a count of infections and begins deleting files
- when conditions outlined in the source code are met.
-
- You can compare SUSAN to the FLAGYLL virus, another memory
- resident infecter which overwrites .EXEfiles on load. If you try
- FLAGYLL out, you'll see it's immediately noticeable, ruining
- every .EXE that attempts to run. SUSAN would be similar if it
- was not restricted to one file per directory. FLAGYLL-Z governs
- its destructive infections by relying on a value returned from the
- system clock to determine when it will infect. This trigger is
- noted in FLAGYLL-Z's source code and can be easily tweaked to
- see how the virus's behaviour is altered.
-
- Excutables infected by either the SUSAN or FLAGYLL viruses are
- permanently ruined. To remove the viruses from the system, reboot
- the machine and delete the infected files. All of the viruses can
- be found by searching for the embedded text strings noted in their
- respective source codes.
-
- VIRUDOS: A PRACTICAL JOKE COMMAND SHELL
-
- Also included in this issue is ViruDos. ViruDos is a simple
- command shell which can be inserted into the AUTOEXEC.BAT. It
- is harmless, but the colorful "Bartles & Jaymes" virus which
- afflicts the user is a laff riot at computer shows
- and parties. To tell more would spoil the fun. Read the
- accompanying documentation and fire it up. ViruDos's
- programmers "Thank you for your support."
-
- ----------------------------------------------------------------
- FICTUAL FACT/FACTUAL FICTION: DARK COFFIN BLASTED BY FLIP VIRUS
- ----------------------------------------------------------------
-
- For most of the month of February the Dark Coffin virus exchange
- has been off-line due to a close look at the business end of the
- FLIP virus. Sysop Pallbearer is slowly salvaging his data and
- promises to be answering the phone by the time you read this.
-
-
- The March issue of PC Magazine sports am exceedingly smelly
- product review of a fistful and anti-virus software packages.
- In what has become known informally as a "done deal," Central
- Point Anti-virus and Norton Anti-virus took home top honors,
- beating out performers like F-Prot, Leprechaun Software's Virus
- Buster and the Solomon Anti-virus Toolkit. The Toolkit and
- Virus-Buster both took hits for their user interfaces, which
- apparently weren't attractive enough for PC Mag's team of rogue
- reviewers. It is unfortunate that computer viruses, as a rule,
- remain unimpressed by various elaborate menuing schemes leading
- to the question, "Who, exactly, was the testing aimed at?"
- Advertisers or customers. The alert Crypt Newsletter reader
- already knows the answer, as we suspect, so do the losers in
- this runoff.
-
- The product reviewers warned of new bugaboos like "stealth"
- viruses and the "Virus Construction [sic] Laboratory." And
- we were surprised to learn that companion/spawning viruses are now
- classified as "stealth" - because they create "hidden" files.
- Don't tell that to our copy of DOSSHELL which lists them very
- nicely alongside every other program on our machine!
-
- In summation, once again consumer reporting takes it on the chin
- at the hands of "suit computer mag" reporters who should NOT
- forgive their parents for imposing the heavy burden of fetal
- alcohol syndrome upon them.
-
- ----------------------------------------------------------------
- Thanks and a tip o' the hat for this issue go out to alert
- readers Mr. Badger, Lookout Man, Cory Tucker and SandoZ.
- ----------------------------------------------------------------
-
- The Crypt Newsletter includes virus source code in each issue.
- If assembled, it will produce working copies of the viruses
- described. In the hands of incompetents, irresponsibles and
- and even the experienced, these programs can mess up the software
- resources of any IBM-compatible PC - most times, irretrievably.
- Public knowledge that you possess such samples can make you
- unpopular - even shunned - in certain circles of your computer
- neighborhood, too.
-
- This copy of the Crypt Newsletter should contain the following
- files:
-
- CRPTLT.R13 - this electronic document
- VOOTIE.ASM - VOOTIE virus source listing
- OW.ASM - OW virus source listing
- SUSAN1.ASM - SUSAN virus source listing
- FLAGYLL.ASM - FLAGYLL virus source listing
- FLAGYLLZ.ASM - FLAGYLL-Z virus source listing
- LITTLE.ASM - LITTLE virus source listing
- VDOS.DOC - Documentation for ViruDos
- VIRUDOS.EXE - ViruDos joke command shell
- BARNJ.BSV - Bartles & Jaymes data file, must accompany
- VIRUDOS.EXE
- FLAGYLL & FLAGYLL-Z.SCR - Scriptfiles for FLAGYLL viruses
- SUSAN1.SCR - Scriptfile for SUSAN virus
- VOOTIE.SCR - Scriptfile for VOOTIE virus
- OW.SCR - Scriptfile for OW-42 virus
- MAKE.BAT - handy, dandy "maker" for programs in this issue
-
- To assemble the programs in this issue, just unzip all of them
- into the current directory, add the MS-DOS program DEBUG.EXE and
- type "MAKE" at the prompt.
-
-
-
- You can pick up the Crypt Newsletter at these fine BBS's, along with
- many other nifty, unique things.
-
-
- CRYPT INFOSYSTEMS 1-215-868-1823 Comment: Crypt Corporate East
-
-
- DARK COFFIN 1-215-966-3576 Comment: Crypt Corporate West
- THE HELL PIT 1-708-459-7267
- DRAGON'S DEN 1-215-882-1415
- RIPCO ][ 1-312-528-5020
- AIS 1-304-420-6083
- CYBERNETIC VIOLENCE 1-514-425-4540
- VA. INSTITUTE OF VIRUS RESEARCH 1-804-599-4152
- UNPHAMILIAR TERRITORY 1-602-PRI-VATE
- THE OTHER SIDE 1-512-618-0154
- MICRO INFORMATION SYSTEMS SERVICES 1-805-251-0564
- REALM OF THE SHADOW 1-210-783-6526
- STAIRWAY TO HEAVEN 1-913-235-8936
- THE BIT BANK 1-215-966-3812
- CYGNUS-X 1-215-791-2457
- CAUSTIC CONTAGION 1-817-776-9564
-
- The Crypt Newsletter staff welcomes your comments, anecdotes,
- thoughtful articles and hate mail. You can contact Urnst Kouch at
- Crypt BBS, CSERVE#:70743,1711 or Internet: 70743.1711@compuserve.com
-
-