home *** CD-ROM | disk | FTP | other *** search
- Here is a recent statement, which appeared on an IBM PC information users
- group, reguarding a trojan horse program (NOTROJ.ARC/NOTROJ.COM) of the worst
- kind. One that intentionally destroys data in a way that covers up the
- program actually destroying data and makes it appear that the guilty
- program is actually trying to help by protecting against trojan programs.
-
- NOTROJ.COM is a TROJAN HORSE (comes in NOTROJ.ARC--for now).
-
- I first became aware of NOTROJ when a member of The BOSS BBS community
- reported his belief that the program destroyed the directory of his hard
- disk. After two days of restoring his files, he concluded:
-
- This Trojan was written by a real Pro---he knows his ASM and
- uses it as a weapon---not a tool. From lokkin' at the job he
- did on me, I tendto doubt that I would have found the bomb has I
- been smart enough to look. ---PLEASE!!!!! Spread the word 'bout
- this one. It's a Killer!
-
- In the next couple of days, I saw a similar note on the Boston Computer
- Society bulletin board. This victim rather pathetically credits NOTROJ
- with a "valiant" attempt at saving his data.
-
- The program in question is a time-bomb (about 10 minutes) and
- works by the "SOFTGUARD UNFORMAT" method of attack. I'm not
- sure what it did, or how it did it, or even how I could have
- recovered the disk but the NOTROJ program I had in the
- background alerted me to the fact, and tried a valiant attempt
- to shut down the hard disk. To no avail, though.
-
- Since my hard disk was becoming fragmented anyway, I decided to test
- NOTROJ. Everything looked pretty reasonable from the start; in fact, the
- program looks like a very useful tool (although I'm not in love with the
- interface). One loads NOTROJ resident and then accesses the options menu
- through Alt-N. The menu contains about fifteen items, some of them
- annotated "DANGER", e.g., "Format track (DANGER!)". For each parameter,
- the user can select one of four responses: Proceed, Timeout, Reboot, or
- Bad Command. The menu also provides a fifth option--"Pause&Display"--
- which provides the user with full information on the activity that the
- currently active program is trying to perform and prompts for one of the
- four primary actions, e.g, Proceed.
-
- I selected "Pause&Display" for all of the DANGERous parameters.
- Everything worked fine, although I found that iteratively selecting
- "Timeout" in response to the "Write sectors" interrupt hung up the
- machine. I fooled around with a number of commands and finally
- reproduced the disk crash. At the time, I was running the DOS ERASE
- command (I had been suspicious of that one for quite some time anyway).
- I don't have the full message that the program displayed, but I did write
- down this much "Softguard-style low-level disk format." (Keep those
- words in mind.)
-
- In spite of the fact that I had prepared for a disk crash, it took me at
- least an hour to get running again. When I booted the machine, I was
- thrown into BASIC and could not get back to the system. I put a DOS
- diskette in, and got an invalid drive error message when I tried to
- access the hard disk. Here is the recovery procedure for this and most
- disk crashes:
-
- 1) Insert DOS system disk in drive A.
- 2) Reboot the machine.
- 3) Run FDISK and install a DOS partition on the hard disk.
- 4) Format the hard disk with the '/S' option.
- 5) Restore files from the most recent full-disk Bernoulli or tape
- backup.
- 6) Restore files modified since the most recent full-disk Bernoulli
- or tape backup.
-
- Once I got a minimal system running, I decided to reproduce the crash to
- ensure that this was not some quirk of bad programming. What, ho! I got
- bored playing around with COPY and ERASE and a few other programs. I
- waited for a while, read a magazine--no signs of a simple timing
- technique. I began to think that NOTROJ might be more incompetent than
- vicious. Something about the documentation made it seem unlikely that
- the author was a criminal. It occurred to me, however, that the author
- might have had some time to waste on this program. Does he, perhaps,
- check to see how full the hard disk is? It would be reasonable to evade
- detection immediately after a bomb by making it impossible to reproduce
- the crash. In addition, it would be much more painful for people if they
- have restored all of their files or gradually rebuilt their hard disks
- before they discover that this is a trojan horse. So, I restored all of
- my files.
-
- This time, Norton's NU command turned out to be the great blackguard that
- was trying to format my disk (according to NOTROJ--although it was only
- reading the FAT). So, I restored my hard disk. All of the while,
- however, I had the nagging feeling that the documentation did not reflect
- the personality of someone vicious. When I got running again, I took a
- look into NOTROJ.COM. Nowhere could I find the words from the message
- "Softguard-style low-level disk format." That convinced me. I have
- concealed passwords on mainframes by assembling strings dynamically
- instead of storing them statically. Our trojanette must have used the
- same technique so that no one would spot the suspicious messages. I had
- counted on being able to get them directly from the program so that I
- would not have to take the time to write the whole message down while my
- system was being operated on. I do recall NOTROJ patting itself on the
- back, however, for preventing "further damage."
-
- As I think back on it, the documentation contains something of a rant
- against copy-protection schemes, including Softguard. In addition, I had
- always been troubled by the fact that the name NOTROJ is an acrostic for
- TROJAN and also an assertion that the program is not itself a trojan.
- The documentation is also very badly written. One has to experiment to
- make sense of it, although that is nothing new in software documentation.
- Also, the style is something of a pidgin English, which seems consistent
- with the fact that the author has an Oriental name (Ng, or is that for
- "no good"?). Well, since the author's name and address are listed in the
- documentation, I decided to give him a call. Mirabile dictu! It's a
- real name, and I got a real number--I just didn't get an answer, even at
- 2 a.m. It doesn't make much difference anyway, there's nothing that he
- can say to convince me that he had legitimate reasons for concealing
- error messages and that his program is not a trojan horse. There is also
- the possibility that the person listed as author has nothing to do with
- the program. Could the pidgin style of the documentation be the work of
- a clever linguist--an acrostic fan--a sick person who considers himself
- to be the bozo that Sherlock Holmes was always after? Who knows? I have
- to write a book. No time to play with these fools.
-
- So, be careful. Note that sysops don't have the time to test every
- program extensively. If a program like NOTROJ requires that a disk be
- more than 70% full, for example, a lot of people may never have any
- problems with it. What else can we do? Does someone want to try to
- prosecute the author of NOTROJ? And how do we keep ourselves from
- becoming paranoid about new noncommerical software?
-
- Eventually, I think it will all shake out just fine. Those of us who are
- prepared for problems provide others with the testing and filtering.
- Junk like NOTROJ just does not make it into my community. Actually, I
- find mediocre software much more of a problem. I have spent a lot of
- time and money sorting through megabytes of chaff to find but a few
- grains of wheat. I would like to see us find some way to constrict the
- growth of chaff and worms both. If we can't do this, many of us may
- have to switch to commercial software.
-
- --Jim
-
-
- Replies may be made to:
- BITNET: JAZBO@BROWNVM