home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
World of Education
/
World of Education.iso
/
world_p
/
pcl54.zip
/
PART1.EXE
/
VIRUS.TUT
< prev
Wrap
Text File
|
1991-04-02
|
23KB
|
413 lines
████████████████████████████████████████████████████████████████
VIRUS WARFARE: THE NOVEMBER MESSAGE
████████████████████████████████████████████████████████████████
Interesting stories sometimes begin with a touch of horror.
Technological terror is so much more invigorating when the plot
is true and the author real . . .
Imagine you are a computer operator at a local college on a
crisp November afternoon. It is Monday and you have finished
running a routine payroll data processing job which will print
employee paychecks on Friday. You decide to check messages on
the University computer network which links colleges and
Universities throughout America. At 4:15 PM the following
message flashes onto your screen. This message is NOT fictional.
The dates and people are REAL:
Monday, 30 November 1987 BITNET computer network - URGENT
FROM: Kenneth R. Van Wyk, User Services Senior Consultant,
Lehigh University Computing Center (215)-758-4988
<LUKEN@LEHIIBM1.BITNET> <LUKEN@VAX1.CC.LEHIGH.EDU> {RISKS-FORUM
Digest Volume 5 : Issue 67}
Last week, some of our student consultants discovered a virus
program that's been spreading rapidly throughout Lehigh
University. I thought I'd take a few minutes and warn as many
of you as possible about this program since it has the chance of
spreading much farther than just our University. We have no
idea where the virus started, but some users have told me that
other universities have recently had similar problems.
The virus: the virus itself is contained in the stack space of
COMMAND.COM. When a PC is booted from an infected disk, all a
user need do to spread the virus is to access another disk via
TYPE, COPY, DIR, etc. If the other disk contains COMMAND.COM,
the virus code is copied to the other disk. Then, a counter is
incremented on the parent. When this counter reaches a value of
4, any and every disk in the PC is erased thoroughly. The boot
tracks are nulled, as are the FAT tables, etc. All Norton's
horses couldn't put it back together again... :-) This affects
both floppy and hard disks. Meanwhile, the four children that
were created go on to tell four friends, and then they tell four
friends, and so on, and so on.
Detection: while this virus appears to be very well written, the
author did leave behind a couple of footprints. First, the
write date of the COMMAND.COM changes. Second, if there's a
write protect tab on an uninfected disk, you will get a WRITE
PROTECT ERROR... So, boot up from a suspected virus'd disk and
access a write protected disk - if an error comes up, then
you're sure. Note that the length of command.com does not get
altered.
I urge anyone who comes in contact with publicly accessible
disks to periodically check their own disks. Also, exercise
safe computing -always wear a write protect tab. :-)
This is not a joke. A large percentage of our public site disks
have been gonged by this virus in the last couple of days.
END OF MESSAGE ...
████████████████████████████████████████████████████████████████
COMPUTER VIRUSES: ELEGANT PROGRAMMING CODE
WITH A SAVAGE PURPOSE
████████████████████████████████████████████████████████████████
If you followed the previous message closely you are beginning
to sense what a computer virus is and can do. A definition might
roughly describe a VIRUS as a SELF-REPLICATING computer program
which copies itself and attaches to one of the following areas
of a computer: the hard disk partition table, the DOS boot
sector of hard disks or floppies or one or more executable files
within the system. It may also make itself resident in RAM
memory during computer operation.
Infected executable files may be operating system programs,
system device drivers, .COM files, .EXE files, overlay files or
any other file which can be loaded into memory and executed.
The virus activates itself at some predetermined (or randomly
determined) time and attempts to destroy, remove or otherwise
scramble data and programs.
A trademark of a virus is that it is SELF-REPLICATING and thus
clones multiple copies of itself. A virus is a computer program
- designed by someone - to spread identical copies of itself
among many computers and destroy data or programs in a specific
targeted manner.
In many ways a computer virus is quite similar to a biological
virus. It attacks one computer then proliferates among many
computers as infected floppy disks and the programs contained
within are shared among many computer users. The virus may lie
dormant for many months, or even years, all the while
replicating its program code to many more programs and floppy
disks. When an infected program is run it will in turn infect
other programs and disks in that same computer. Sometimes, but
not always, viruses interfere with printing or other routine DOS
operations. Many times the programmer who designed the virus
allows unintentional errors to exist within the virus program
code which can cause unexplained system crashes and other odd
behavior BEFORE the virus is triggered to erase or destroy data.
It seems even viruses are not perfect programs and can be
subject to programming bugs and errors just like standard
programs!
What does a virus program look like to a human operator? Simply
a string of highly encoded computer data bytes which by
themselves mean nothing to the casual observer. If you were to
glimpse deep inside the computer program code which makes up a
virus you might see something on your screen like the following
"machine code" listing:
xxxx:0110 02 00 02 3B A2 F8 29 00-11 00 04 00 11 00 80 00
xxxx:0120 00 00 00 00 0F 00 00 00-00 01 00 FA 33 C0 8E D0
xxxx:0130 BC 00 7C 16 07 BB 78 00-36 C5 37 1E 56 16 53 BF
xxxx:0160 13 72 67 A0 10 7C 98 F7-26 16 7C 03 06 1C 7C 03
xxxx:0190 A1 34 7C E8 96 00 B8 01-02 E8 AA 00 72 19 8B FB
xxxx:01B0 B9 0B 00 F3 A6 74 18 BE-5F 7D E8 61 00 32 E4 CD
xxxx:01C0 16 5E 1F 8F 04 8F 44 02-CD 19 BE A8 7D EB EB A1
xxxx:01D0 1C 05 33 D2 F7 36 0B 7C-FE C0 A2 31 7C A1 2C 7C
xxxx:0200 0C 01 06 2C 7C F7 26 0B-7C 03 D8 EB D9 8A 2E 15
xxxx:0210 7C 8A 16 1E 7C 8B 1E 32-7C EA 00 00 70 00 AC 0A
xxxx:0230 18 7C FE C2 88 16 30 7C-33 D2 F7 36 1A 7C 88 16
xxxx:0240 1F 7C A3 2E 7C C3 B4 02-8B 16 2E 7C B1 06 D2 E6
xxxx:0250 0A 36 30 7C 8B CA 86 E9-8B 16 1E 7C CD 13 C3 0D
What triggers a virus to destroy data once it is embedded within
your computer? Depending on the person who designed the virus
programming code, the virus can trigger and destroy data based
on:
A date, perhaps Friday the 13th to add a cruel twist of fate.
The number of repetitions a certain program is run. An occurrence
such as printing the payroll or running Lotus 123. A lack of an
occurrence (removal of a name from a list.) A time of day,
perhaps 1 AM when an office network is running unattended. A
capacity, say when your hard drive reaches 90% capacity, nearly
full! A random time of day or random date, or both. The presence
of another program or removal of a program. Use of a modem or
your printer. A particular person's name or password.
Essentially, the programmer of the virus code selects a
"trigger" of some type and deliberately programs the virus
to wake up and "bite" when a certain condition is met!
In 1987, a European public BBS modem system was found to contain
a highly specialized program "toolkit" designed by a young
programmer. The purpose of this toolkit program was to assist in
designing yet better and more clever virus programs! Private
American BBS systems have been reported to exist wherein virus
programmers trade virus program code examples and ideas on how
to create "better" and "more savage" virus programs! These BBS
systems have confidential telephone numbers and passwords so
that only virus programmers can access these "virus libraries of
information."
What is the lure of programming a virus? No one is sure, but the
few programmers of virus software who have been caught usually
explain their act as an intellectual challenge - an attempt to
see how far programming code can be extended. In some respects
this may be true. Virus programs are frequently crafted with
obscure and highly elegant machine code and can be self
replicating, self-modifying and "wired" with elaborate logic and
algorithmic triggers. A virus must be small, fast and very
stealthy. A virus in many respects is programming at the cutting
edge of the craft, and perhaps this is the challenge . . .
████████████████████████████████████████████████████████████████
NOW THE BAD NEWS:
VIRUSES AREN'T THE ONLY TOUGH KID ON THE BLOCK!
████████████████████████████████████████████████████████████████
Perhaps we should back up and also define several other "rogue
program" types which pose a security risk to your computer data.
A TROJAN HORSE program appears as something useful - perhaps a
program to sort names or print a list of telephone numbers on
the computer. Yet it actually does something destructive either
immediately or at a later time. As an example, several trojan
horse programs offer to display X-rated images or colorful games
which distract your attention to the screen long enough for the
program to cheerfully erase your bookkeeping data. A trojan
horse might (but does not usually) replicate its code to several
other disks. This replication feature is more distinctive of a
true virus.
A LOGIC BOMB is much like a trojan horse and may lie hidden
within a useful program. However when a certain point of logic
or data is presented to the program (e.g., the programmer's name
is removed from the company payroll records presumably because
the programmer has been fired) then the logic bomb is activated
to "extract revenge" by scrambling payroll records or perhaps
removing all occurrences of the numbers 4, 7 and 9 from any data
throughout company records. Insidious . . .
A WORM is somewhat similar to a virus. It can replicate and
spread throughout a computer system. When the worm program is
run is creates copies of itself and runs those copies. It can
wreak havoc on interconnected computer systems such as are found
within university networks or government computers. A well-known
worm infection occurred in the Fall off 1988 when a worm program
was installed on a large internet network and quickly spread
through hundreds of government and university UNIX type
computers. All of the infected computers quickly bogged down as
the worm created and then ran many copies of itself thus
demanding more and more memory and computing time from
legitimate programs and more necessary work tasks.
A word before we continue. Virus programs are not THAT common.
They are real, but have been vastly over-reported in the popular
press. They seem to be more common within university communities
where youthful students might be tempted to "test" their
programming skills by creating virus programs. Commercial
software has OCCASIONALLY been infected, but for practical
purposes, commercial programs purchased from retail sources and
packed in original factory boxes are low probability sources of
viruses.
Public domain and shareware sources of software as well as
BBS/modem sources are slightly more suspect for virus infection,
but for the most part reputable shareware distributors and most
BBS systems have over the years reported low computer virus
incidence. Computer virus programs DO exist, but they are
quickly caught and erradicated from most BBS systems and
shareware sources. Your chance of computer virus infection is
probably on the order of 2% probability, but knowledge and
foresight are a wise investment in computer and data security!
Published lists of virus programs detail unique and precise
virus characteristics. One of the better virus lists is the
shareware software program DIRTY DOZEN which is available from
most computer clubs and many BBS systems. Some examples of virus
programs which have been identified include:
ICELANDIC
PENTAGON
DARK AVENGER
SYSLOCK
DISK KILLER/OGRE
ZERO BUG
VACSINA
DATACRIME
TRACEBACK
Downloading files from a public bulletin board system is one way
to become infected with a computer virus. If you find a file on
a public BBS system interesting, leave it there for a month and
wait to see if other users report problems with the program.
This pessimistic may save considerable hard disk data. Some
conservative and common sense suggestions for preventing virus
outbreaks include the following:
Avoid sharing commercial software and making copies for others.
It is a violation of the author's copyright to copy commercial
software, in any event. Always obtain public domain and
shareware software from reliable sources such as large BBS
systems - Compuserve and PC MagNet are relatively reliable as
are large shareware distributors such as PC SIG and Public Brand
Software who obtain their copies directly from the author via US
mail.
If possible, use one of the many virus checking programs on the
market to test public domain and shareware software prior to
installation on your system. Occasionally test all the files on
your system as a monthly or weekly routine. The first time you
start a suspected public domain/shareware program run it from a
floppy disk and not your hard drive. Always write protect your
floppies if possible.
Use one of the available "vaccination programs" which continuously
monitor your system for unauthorized or otherwise unexpected data
transfers. These programs monitor your hard disk and memory for
activity not usually normal under DOS operations. If you do detect
a virus program, consider that both your hard disk and your
backup copies are probably infected. Use a virus antidote program
if possible and do not share any disks generated by that machine
with others. Keep original application disks from the manufacturer
safely tucked away and if possible protected by write protect tabs.
Make frequent backups of data you consider essential. Weekly is
a minimum. Daily is not unreasonable. Limit the exchange of data
disks within your workplace unless necessary - especially if
those disks contain EXE or COM files. Always write protect all
floppies unless they are data disks which must be updated
routinely.
Never start a hard disk-equipped computer from a floppy disk
except the ORIGINAL DOS disk which is WRITE PROTECTED with a tab
in place. No exceptions!
Curiously, 90% of those infected with a virus or trojan horse
program are reinfected within a month! This attests to
widespread sharing of data disks and poor data work habits.
Don't always assume a computer problem is virus related. Most of
the time it is related to improper equipment use. Carefully
scrutinize file directories on your disk(s) for date or file
size changes. Viruses are fond of adding their code to the files
COMMAND.COM, IBMBIO.COM, or IBMSYS.COM. Perhaps jot down or
print out known file sizes and dates of creation and check for
any changes which may appear since you first installed that file
on your disk.
Software programs exist whose purpose is to detect and/or repair
damage caused by virus software. Some are commercial and some
are shareware or public domain.
Software Program Purpose and method of action
------------------------------------------------------------------
PC Magazine Checks and verifies your files and allows
PCDATA continued testing. Public domain, free from
many computer clubs or shareware outlets.
Documentation in February 13, 1990 edition
of PC Magazine. Highly recommended; cost is
right! Reading the magazine article will give
you a detailed understanding of how and why
to protect your data.
VIRUSCAN From McAfee Associates telephone (408) 988-3832.
ScanV___ Frequently seen on public bulletin board systems
and within libraries of most computer clubs, this
is an exceptional program, updated frequently.
Scans drives and RAM memory for virus presence.
The program is proactive: is searches for exact
virus "flags" rather than waiting for a virus to
hit. Program is self-testing to make sure that
it has not itself been infected! Recommended.
McAfee also sells virus removal programs and
provides business consulting: virus erradication.
McAfee Associates, 4423 Cheeney Street,
Santa Clara, CA 95054
C-4 Virus Protection Program.RAM resident and
thus watches for signs of virus activity and
then freezes system before problems can happen.
Dirty Dozen Detailed list of virus and trojan horse programs
which is available from most computer clubs or
shareware distributors. Interesting reading.
Virus Pro Does much the same job as PCDATA
Check 4 Bomb Check programs for ASCII strings unique to virus
programs. Shareware
Bombsquad Prevent unwanted disk reads, writes, formatting
DBack Backup FAT Tables, similar capability in PCDATA
FluShot+ Virus Protection Program
Prognosis Check programs for harmful function calls
PC-Tools Deluxe Repairs damage to file allocation table and other
"unerase" damaged file functions.
Mace+ Repairs damage to file allocation table and other
Utilities/Gold "unerase" damaged file functions.
Norton Utilities Repairs damage to file allocation table and other
"unerase" damaged file functions.
████████████████████████████████████████████████████████████████
SO NOW WHAT? - WHAT TO DO WHEN A VIRUS BITES
████████████████████████████████████████████████████████████████
The cat is out of the bag and you are pretty sure (that sinking
feeling) that a virus is in your system. What's next? If you
don't want to try to unravel the mess yourself, try calling
McAfee Associates at the telephone number listed above. They can
send you a diagnosis program (VIRUSCAN) and virus removal
program.
In the case of boot sector infestations, power down your system
then restart from an uninfected write protected ORIGINAL COPY
DOS disk. Execute the DOS SYS command to attempt to overwrite
the boot sector with new startup files. This will work in most
cases. If it does not work, backup all data files which are
essential (and maybe infected) then perform a low level format
of the hard disk or a normal format if it is an infected floppy
disk. Do likewise for ALL floppies which may have come into
contact with the virus. When you are done, use VIRUSCAN to check
for the presence of continuing virus infestation.
If an EXE or COM file has been infected, power down the system,
reboot from the factory WRITE PROTECTED DOS disk, delete all
infected COM and EXE files then replace them with the original
files from the WRITE PROTECTED, factory original program disks.
Run VIRUSCAN again to check to for absence of viruses.
For a disk partition table infection, the only option short of a
removal utility is to low level format the disk. And with that
action destroy not only the virus but also your data. Better
hope you have backup data on a floppy disk!
After disinfecting a hard disk, you must reformat EVERY floppy
that came into contact with the infected computer. If you are
reinstalling a backup copy, do not restore it unless it was made
BEFORE the system became infected. Run VIRUSCAN to be sure.