home *** CD-ROM | disk | FTP | other *** search
-
-
- Security experts are afraid that sabateurs could
- infect computers with a "virus" that would remain
- latent for months or even years, and then cause
- chaos.
-
-
-
-
- Attack of the Computer Virus
- --------------------------------
-
- By Lee Dembart
-
-
-
- Germ warfare-the deliberate release of deadly bacteria or viruses-is a
- practice so abhorrent that it has long been outlawed by international treaty.
- Yet computer scientists are confronting the possibility that something akin to
- germ warfare could be used to disable their largest machines. In a
- civilization ever more dependent on computers, the results could be disastrous
- -the sudden shutdown of air traffic control systems, financial networks, or
- factories, for example, or the wholesale destruction of government or business
- records.
-
- The warning has been raised by a University of Souther California reasercher
- who first described the problem in September, before two conferences on
- computer security. Research by graduate student Fred Cohen, 28, shows that it
- is possible to write a type of computer program, whimsically called a virus,
- that can infiltrate and attack a computer system in much the same way a real
- virus infects a human being. Slipped into a computer by some clever sabateur,
- the virus would spread throughout the system while remaining hidden from it's
- operators. Then, at some time months or years later, the virus would emerge
- without warning to cripple or shut down any infected machine.
-
- The possibility has computer security experts alarmed because, as Cohen
- warns, the programming necessary to create the simplest forms of computer
- virus is not particularly difficult. "Viral attacks appear to be easy to
- develop in a short time," he told a conference co-sponsored by the National
- Bureau of Standards and the Department of Defense. "[They] can be designed to
- leave few if any traces in most current systems, are effective against modern
- security policies, and require only minimal expertise to implement."
-
- Computer viruses are aptly named; they share several insidious features with
- biological viruses. Real viruses burrow into living cells and take over their
- hosts' machinery to make multiple copies of themselves. These copies escape to
- infect other cells. Usually infected cells die. A computer virus is a tiny
- computer program that "infects" other programs in much the same way. The virus
- only occupies a few humdred bytes of memory; a typical mainframe program, by
- contrast, takes up hunreds of thousands. Thus, when the virus is inserted into
- an ordinary program, its presence goes unnoticed by computer operators or
- technicians.
-
- Then, each time the "host" program runs, the computer automatically ececutes
- the instructions of the virus-just as if they were part of the main program. A
- typical virus might contain the following instructions: "First, suspend
- execution of the host program temporarily. Next, search the computer's memory
- for other likely host programs that have not been already infected. If one is
- found, insert a copy of these instructions into it. Finally, return control
- of the computer to the host program."
-
- The entire sequence of steps takes a half a second or less to complete, fast
- enough so that no on will be aware that it has run. And each newly infected
- host program helps spread the contagion each time it runs, so that eventually
- every program in the machine is contaminated.
-
- The virus continues to spread indefinately, even infecting other computers
- whenever a contaminated program in transmitted to them. Then, on a particular
- date or when certain pre-set conditions are met, the virus and all it's clones
- go on the attack. After that, each time an infected program is run, the virus
- disrupts the computer's operations by deleting files, scrambling the memory,
- turning off the power, or making other mischief.
-
- The sabateur need not be around to give the signal to attack. A disgruntled
- employye who was afaid of getting fired, for example, might plot his revenge
- in advance by adding an insruction to his virus that caused it to remain
- dormant only so long as his personal password was listed in the system. Then,
- says Cohen, "as soon as he was fired and the password was removed, nothing
- would work any more."
-
- The fact that the virus remains hidden at first is what makes it so
- dangerous. "Suppose your virus attacked by deleting files in the system,"
- Cohen says. "If it started doing that right away, then as soon as your files
- got infected they would start to disappear and you'd say 'Hey, something's
- wrong here.' You'd probably be able to identify whoever did it." To avoid
- early detection of the virus, a clever sabateur might add instructions to the
- virus program that would cause it to check the date each time it ran, and
- attack only if the date was identical -or later than- some date months or
- years in the future. "Then," says Cohen, "one day, everything would stop. Even
- if they tried to replace the infected programs with programs that had been
- stored on back-up tapes, the back-up copies wouldn't work either - provided
- the copies were made after the system was infected.
-
- The idea of viruslike programs has been around since at least 1975, when the
- science fiction writer John Brunner included one in his novel `The Shockwave
- Rider'. Brunner's "tapeworm" program ran loose through the computer network,
- gobbling up computer memory in order to duplicate itself. "It can't be
- killed," one charachter in the book exclaims in desperation. "It's
- indefinately self-perpetuating as long as the network exists."
-
- In 1980, John Shoch at the Xerox Palo Alto research center devised a
- real-life program that did somewhat the same thing. Shoch's creation, called a
- worm, wriggled through a large computer system looking for machines that were
- not being used and harnessing them to help solve a large problem. It could
- take over an entire system. More recently, computer scientists have amused
- themselves with a gladitorial combat, called Core War, that resembles a
- controlled viral attack. Scientists put two programs in the same computer,
- each designed to chase the other around the memory, trying to infect and kill
- the rival.
-
- Inspired by earlier efforts like these, Cohen took a security course last
- year, and then set out to test whether viruses could actually do harm to a
- computer system. He got permission to try his virus at USC on a VAX computer
- with a Unix operating system, a combination used by many universities and
- companies. (An operating system is the most basic level of programming in a
- computer; all other programs use the operating system to accomplish basic
- tasks like retrieving information from memory, or sending it to a screen.)
-
- In five trial runs, the virus never took more than an hour to penetrate the
- entire system. The shortest time to full infection was five minutes, the
- average half an hour. In fact, the trial was so successful that university
- officials refused to allow Cohen to perform further experiments. Cohen
- understands their caution, but considers it shortsighted. "They'd rather be
- paranoid than progressive," he says. "They believe in security through
- obscurity."
-
- Cohen next got a chance to try out his viruses on a privately owned Univac
- 1108. (The operators have asked that the company not be identified.) This
- computer system had an operating system designed for military security; it was
- supposed to allow people with low-level security clearance to share a computer
- with people with high-level clearance without leakage of data. But the
- restrictions against data flow did not prevent Cohen's virus from spreading
- throughout the system - even though he only infected a single low-security
- level security user. He proved that military computers, too, may be
- vulnerable, despite their safeguards.
-
- The problem of viral spread is compounded by the fact that computer users
- often swap programs with each other, either by shipping them on tape or disk
- or sending them over a telephone line or through a computer network. Thus, an
- infection that originates in one computer could easily spread to others over
- time - a hazard that may be particulary severe for the banking industry, where
- information is constantly being exchanged by wire. Says Cohen, "The danger is
- that somebody will write viruses that are bad enough to get around the
- financial institutions and stop their computers from working."
-
- Many security professionals also find this prospect frightening. Says Jerry
- Lobel, manager of computer security at Honeywell Information Systems in
- Phoenix, "Fred came up with one of the more devious kinds of problems against
- which we have very few defenses at present." Lobel, who organized a recent
- security conference sponsored by the International Federation for Information
- Processing -at which Cohen also delivered a paper- cites other potential
- targets for attack: "If it were an air traffic control system or a patient
- monitoring system in a hospital, it would be a disaster."
-
- Marvin Schaefer, chief scientist at the Pentagon's computer security center,
- says the military has been concerned anout penetration by viruslike programs
- for years. Defense planners have protected some top-secret computers by
- isolating them, just as a doctor might isolate a patient to keep him from
- catching cold. The military's most secret computers are often kept in
- electronically shielded rooms and connected to each other, when necessary, by
- wires that run through pipes containing gas under pressure. Should anyone try
- to penetrate the pipes in order to tap into the wires, the drop in gas
- pressure would immediately give him away. But, Schaefer admits, "in systems
- that don't have good acces controls, there really is no way to contain a
- virus. It's quite possible for an attack to take over a machine."
-
- Honeywell's Lobel strongly believes that neither Cohen nor any other
- responsible expert should even open a public discussion of computer viruses.
- "It only takes a halfway decent programmer about half a day of thinking to
- figure out how to do it," Lobel says. "If you tell enough people about it,
- there's going to be one crazy enough out there who's going to try."
-
- Cohen disagrees, insisting that it is more dangerous `not' to discuss and
- studt computer viruses. "The point of these expiriments," he says, "is that if
- I can figure out how to do it, somebody else can too. It's better to have
- somebody friendly do the expiriment, tell you how bad it is, show you how it
- works and help you counteract it, than to have somebody vicious come along and
- do it." If you wait for the bad guys to create a virus first, Cohen says, then
- by the time you find out about it, it will be too late.