home *** CD-ROM | disk | FTP | other *** search
Text File | 1992-12-05 | 102.7 KB | 2,132 lines |
- =========================================================================
- ||
- From the files of The Hack Squad: || by Lee Jackson, Co-Moderator,
- || FidoNet International Echo SHAREWRE
- The Hack Report || Volume 1, Number 24
- for December 1992 || Report Date: December 5, 1992
- ||
- =========================================================================
-
- Welcome to the twenty-fourth issue of The Hack Report. This is a series
- of reports that aim to help all users of files found on BBSs avoid
- fraudulent programs, and is presented as a free public service by the
- FidoNet International Shareware Echo and the author of the report, Lee
- Jackson (FidoNet 1:382/95).
-
- It is hard to believe, but this issue marks the end of a full year of The
- Hack Report. Over this time, many extremely nasty Trojans and ingenious
- hoaxes have been seen, as well an large allotment of hacks and pirated
- files. It seems that no file is immune - even The Hack Report has been
- the victim of a hack. So, here are the final 1992 entries to the hall of
- shame (with apologies to Fred Roggin), including a Trojan that attacks
- .GIF files, yet another hack of TheDraw, and updates to the Meier/Morlan
- list. Thanks to everyone who has helped put this report together, and to
- those that have sent in comments and suggestions.
-
- NOTE TO SYSOPS: The Hack Report may be freely posted as a bulletin on
- your BBS, subject to these conditions:
-
- 1) the latest version is used,
- 2) it is posted in its entirety, and
- 3) it is not altered in any way.
-
- NOTE TO OTHER READERS: The Hack Report (file version) may be freely
- uploaded to any BBS, subject to the above conditions, and only if you do
- not change the filename. You may convert the archive type as you wish,
- but please leave the filename in its original HACK????.* format. The
- Hack Report may also be cross-posted in other networks (with the
- permission of the other network) as long as it meets the above conditions
- and you give appropriate credit to the FidoNet International Shareware
- Echo (and the author <g>).
-
- The idea is to make this information available freely. However, please
- don't cut out the disclaimers and other information if you use it, or
- confuse the issue by spreading the file under different names. Thanks!
-
- DISCLAIMER: The listings of Official Versions are not a guarantee of the
- files' safety or fitness for use. Someone out there might just be
- sick-minded enough to upload a Trojan with an "official" file name, so
- >scan everything you download<!!! The author of this report will not be
- responsible for any damage to any system caused by the programs listed as
- Official Versions, or by anything using the name of an Official Version.
-
- *************************************************************************
-
- Hacked Programs
-
- Here are the latest versions of some programs known to have hacked copies
- floating around. Archive names are listed when known, along with the
- person who reported the fraud (thanks from us all!).
-
- Program Hack(s) Latest Official Version
- ------- ------- -----------------------
- Aliens Ate !ALIENS K6DEMO
- My Babysitter
- Reported by: Christopher Baker (1:374/14)
-
- ARJ Archiver ARJ250 ARJ230
- | Reported by: Tommy Vielkanowitz (also ARJ239B, a beta test)
- (1:151/2305)
-
- AutoMenu AUTO48 AUTO47
- Reported by: Tony Blair (WildNet)
- via Ken Whiton (1:132/152)
- Verified by Marshall Magee, Magee Enterprises, Inc.
-
- | BNU FOSSIL Driver BNU202 BNU170
- | Reported By: Amauty Lambrecht (2:291/712) (not counting betas)
-
- CatDisk CDISK510 CDISK632
- CDISK530
- CDISK661
- Reported by: Jeff Kaplow (1:120/234)
-
- CompuShow CSHOW801 CSHW850A
- CSHOW831
- CSHOW851
- Reported by: Paul Brazil
- CSHOW91
- Reported by: Harold Stein (Wildnet)
- (Note: Any version ending with a B, such as CSHW841B, is _not_
- a shareware version. This is the enhanced version received
- with the user's registration and is not to be distributed.
- Consider all B archives to be pirated copies.)
-
- | Disk OrGanizer DOG320 DOG317
- | Verified by G. Allen Morris, author of DOG
-
- GoldED SysOp GED241B6 GED0240
- Message Reader GED0241B (patch 0720)
- Reported By: Andrew Owens (3:690/333.11)
- verified by Odinn Sorensen, Author
-
- HS/Link HSLK113 HSLK112
- Reported by: Samuel H. Smith, Author
- (Note - beta copies of HS/Link v1.13 are currently in
- distribution, and are legitimate. The filenames tend
- change daily. As of December 3rd, 1992, the latest
- beta was HSL113D0.)
-
- Las Vegas EGA Casino (unknown)
- Reported by the author, Diana Gruber, in the ILink net,
- relayed by Richard Steiner (1:282/85)
- (Note: a version of this program sold through Gemini
- shareware outlets with the title screen "Special GEMINI
- game disk" and a version calling itself the "Ledyard$
- EGA Casino" have been distributed. No archive names
- have been supplied yet.)
-
- LHA Archiver LHA214 LHA213
- Reported by: Patrick Lee (RIME address RUNNINGB)
- LHA300
- Reported by: Mark Church (1:260/284)
-
- | List LIST8 LIST77A
- | LIST18 (Also LIST77A2)
- Reported by: The Hack Squad (from the Buerg BBS)
- LIST80
- | Reported by: Brad Crochet, FidoNet 4DOS Support Echo
-
- Math Master MATHMSTR M-MST301
- Reported by: James Frazee (1:343/158)
-
- PKLite PKLTE120 PKL115
- Reported By: HW Nemrod Kedem
-
- PKZip PKZIP120 PKZIP110
- PKZ199B
- Verified by Mark Gresbach, PKWare
- PKZIP20B
- PKZIP_V2.EXE
- Reported by: Mike Burger (WildNet)
- via Ken Whiton (1:132/152)
- Reported by: Fred Towner (1:134/73)
- PKZ201.ARJ
- Reported by: HW Frank Pizer
- PKZ201.ZIP
- PKZ201.EXE
- Reported by: Jim Westbrook (1:382/29)
- PKZ202
- Reported by: Scott Drake (1:107/900)
- PKZ2010
- Reported By: Stephen Walker (Internet, stephen.walker@nitelog.com)
- PKZ305
- Reported by: Scott Raymond (1:278/624)
- PKX201.EXE
- Reported by: Bill Logan (1:300/22)
- PKZ210F.EXE
- Reported by: Bert Bredewoud (2:281/703)
- PKZIPV2
- (Claims to be v2.2 of PKZip - reported via PKWare Tech Support)
- PKUNZIP.COM
- Reported by: Harold Stein, via Ken Whiton
- PKZIP203.EXE
- Reported by: Mark Clark (2:440/107)
- VER201
- Reported by: Harold Stein (CIS 72377,3075)
-
-
- QEdit Advanced XEDIT QEDIT215
- Reported by: Sammy Mitchell, Author
- (thanks to Rand Nowell and Joe Morlan for relaying the report)
- QEDIT500
- Reported by: Onno Tesink (ILink, via Richard Steiner, 1:282/85)
-
- Qmodem QM451 QM452TD
- Reported by: Bill Lambdin, via Arthur Shipkowski (1:260/213.2)
-
- Shez SHEZ72A SHEZ82
- SHEZ73
- Reported By: Bill Lambdin (1:343/45)
-
- Telegard TG29EALP Telegard 2.7
- Reported by: Karen Maynor (1:3640/5)
- (Found on the NightOwl CD-ROM disc version 5.0)
- TG30
- Reported by: Doug Sorber, via Martin Pollard (1:120/187)
- JIGSAWV2
- Reported by: Tommy Smith, via Mark Evans (formerly 1:382/87)
-
- Telix Telix v3.20 Telix v3.15
- Telix v3.25
- Reported by: Brian C. Blad (1:114/107)
- Peter Kirn (WildNet, via Ken Whiton)
- Telix v4.00
- Telix v4.15
- Reported by: Barry Bryan (1:370/70)
- Telix v4.25
- Reported by: Daniel Zuck (2:247/30, via Chris
- Lueders (2:241/5306.1)
- MegaTelix
- Verified by Jeff Woods, Exis, Inc. (now deltaComm), in the TELIX
- echo, who also states that there will be _no_ commercial
- release titled Telix 4.0. He states the next release of Telix
- will be under a "modified" form of the name Telix, which has not
- been decided upon yet. Any version with a number higher than
- 3.15 and claiming to be shareware can be considered a confirmed
- hack, unless reported here otherwise.
-
- Telix Pro
- Reported by: Jason Engebretson (1:114/36), in the FidoNet TELIX echo
-
- TheDraw TDRAW430 TDRAW451
- TDRAW500
- Reported by: Ian Davis, Author
- TDRAW550
- Reported by: Steve Klemetti (1:228/19)
- TDRAW600
- Reported by: Hawley Warren (1:120/297)
- THEDR60
- Reported by: Larry Owens (PDREVIEW echo, 1:280/17)
- TDRAW601
- Reported by: Jesper Tragardh (2:200/109)
- TDRAW800
- Reported by: James Carswell (1:153/775)
-
- Turbo Antivirus Version 9.00b Version 8.10
- Version 9.01a
- (Archive names unknown)
- Reported by: Thomas Ruess (2:246/24)
-
- | ViruScan SCAN92 SCAN99
- Reported by: Don Dunlop (1:153/715)
-
- X00 Fossil X00V130 X00V124
- X00V130J (also official is
- X00V149A, a beta
- test of an OS/2 ver.)
-
- *** More Hacks
-
- Bill Lambdin (1:343/45), host of the Intelec Virus Info conference, sent
- a list of versions of McAfee's ViruScan (better known as just SCAN) that
- have been hacked. Here are the version numbers he sent:
-
- SCAN74 SCAN81 SCAN88
- SCAN78 SCAN83 SCAN92
- SCAN79 SCAN87 SCAN96
-
- More information on ViruScan can be found in The Trojan Wars section.
-
-
- HW Bill Dennison saw a copy of the PKZ201.EXE file mentioned above, but
- with a twist: when he used the file view feature of the BBS he saw it
- on, he saw that the file was not a PKZip SFX (self-extracting) file, but
- was an LHA SFX (using -lh5- compression). This, folks, is a bit of a
- giveaway. PKWare isn't likely to use any archiver other than ZIP to
- distribute their next release.
-
-
- Chris Lueders (2:241/5306.1) reports that a file calling itself VPIC50DT
- is a hack of version 4.5 of the VPic graphics file viewer. Specifically,
- the 5.0dt file ("dt" indicates a German language edition, per Chris) is a
- hack of the English version 4.5. At the time of the report, version 5.1
- was the latest official release, but a legitimate version 5.0 was
- released. Just be careful: if your copy of VPic starts up in German,
- delete it.
-
-
- Zone 2 (especially UK) users might want to watch out for a disk being
- distributed by Personal Computer World magazine. Shakib Otaqui (2:
- 440/74) reports that all of the files on the August issue's "free" cover
- disk are zipped using the PKZip 1.93 alpha test release, and that the
- version of PKZip distributed with the disk is the hacked version 2.01.
- The PKZip 2.01 file is 19793 bytes, dated March 15, 1992, and is PKLited
- with the extra compression (non-expandable) option. Shakib tested the
- file and confirmed that it is a simple hack with no viral or Trojan code.
-
-
- Finally, here's one I'm not sure how to handle: It's a hack, but it
- appears to be a hack of a commercial program. HW Frank Pizer has found a
- hack of a program called BitFax. The hack, calling itself ZIPFAX.ZIP (at
- 146320 bytes), has been altered so that all occurrences of the word Bit
- with the word Zip. The archive contains configuration files with the
- words "Technopoint - Avi Miller" in them. Thanks to Frank for the report
- from Zone 5: let's hope the rest of us can keep it from spreading beyond
- there.
-
- =========================================================================
-
- Hoax Alert:
-
- | Yet another hoax of Microsoft's HIMEM.SYS has turned up, this time under
- | the name HIMEM600. Shakib Otaqui (2:440/74) says a binary comparison
- | with the latest official version, v3.07, shows that the only difference
- | is the date and version number. Not only is this pirated, it is a hoax.
- | A similar file is being passed around under the filename HIMEM500.
-
-
- Your Hack Squad has seen many posts of a warning about a virus called
- PROTO-T. The message warns that the virus has the ability to hide in the
- RAM of VGA cards, hard disks, and "possibly, in modem buffers." It goes
- on to warn that the virus was placed in two files: one called "TEMPLE,"
- and in a hack of PKZip, version "3.x".
-
- Joe Morlan (1:125/28) has stated that this message is a hoax. I have
- seen other information that leads me to agree with Joe's statement. In
- the meantime, I have sent a copy of PKZ305 (from your Hack Squad's
- | "TOXIC" diskette) to Bill Logan for testing. In the meantime, Bill
- | Lambdin (1:343/45) has disassembled the file and stepped through it with
- | a debugger Here are his results:
- |
- | "I received PKzip 305 supposedly infected with the Proto-T virus.
- |
- | "I disassembled the file, and stepped through the code with a debugger.
- |
- | "i found suspicious code, and lots of interrupt 3s (debug break points),
- | but there was no replication routine in it whatsoever."
- |
- | He concludes...
- |
- | "Let me say it this way. If there is a Proto-T Virus, it deffinately
- | wasn't in PKzip3.05 that I received."
- |
- | Sounds good to me. I am under the impression that Mr. Logan's results
- | will confirm Bill Lambdin's findings.
-
-
- Here are Bill Logan's test results on Xtratank. If you recall, Mr.
- Logan, an agent of McAfee Associates, agreed to test out this file to see
- once and for all if it really works, or if it is a hoax.
-
- Bill tested the program on two IBM compatible computers and one AT&T XT
- clone. The PC Clones were 286s, one with a 40meg IDE hard drive, the
- other with a 40meg MFM hard drive. The AT&T had a 10meg hard drive.
-
- To weed out possible clashes with DOS versions, the test was repeated on
- each computer using 4 different DOS flavors: MS-DOS 3.30, IBM DOS 3.30,
- MS-DOS 4.01, and MS-DOS 5.0.
-
- The hard drives were formatted and Xtratank was installed on each. The
- PC Clones now reported that their drive capacity was now doubled. The
- AT&T XT did not, since it was not a true IBM compatible. Bill then
- attempted to copy 80 megabytes of raw, non-compressed files from floppy
- disks onto the hard drives. All of the hard drives ran out of disk space
- after only 40 megs of files had been copied.
-
- The testing did not reveal any viral or Trojan code. To quote Bill, "It
- is our opinion that this program is simply nothing but a hoax."
- (However, see the ???Questionable Files??? section for more on this.)
-
-
- In addition to Bill's testing, Gary Weinfurther (1:120/301) sent a
- summary of his disassembly of the programs in the archive. He found that
- the XTRATANK.EXE and the XTRATANK.COM files contained the exact same
- code, with one padded with "garbage" that made it look larger. The code
- is designed to intercept the DOS 21h interrupt, function 36h, which is
- for determining free space on a drive. Xtratank then doubles the result.
-
- None of the warning messages in the docs are present in the files, and no
- check is performed to see if it could be correctly installed. Gary says
- that since it is a simple interrupt-intercept TSR, "it can be
- successfully installed every time." He suggests (humorously) that
- installing it twice would theoretically result in a report that your hard
- drive space had quadrupled.
-
-
- This should settle the debate once and for all - XTRATANK IS A HOAX AND
- DOES NOT ACTUALLY WORK. All of Bill's and Gary's results completely
- verify the Fitzgerald Test results, so if you _still_ don't believe it,
- run the test for yourself.
-
- *** The Fitzgerald Test
-
- Here is the now-famous Fitzgerald Test, devised by Tim Fitzgerald of
- 1:3800/18.0 and validated by Bill Logan's test results. Try this if you
- think you have managed to get XTRATANK to work on your system. Follow
- these simple steps:
-
- 1. Run CHKDSK and write down the free space it reports as free.
- 2. Do a DIR command and write down what XTRATANK reports.
- 3. Copy any text file to a new text file.
- 4. Repeat steps 1 and 2, and compare.
-
- You will see that XTRATANK reports that twice as much disk space is taken
- up by the new text file.
-
-
- Other previously reported hoaxes:
-
- Filename Claimed use/Actual activity/Reporter(s)
- ------------ ---------------------------------------------------------
- 2496 This, and all files that claim to run a 2400 bps
- modem at 9600 or 14400 bps, are hoaxes. If you
- follow their instructions, you will have a 0 bps
- modem. Reported by several people.
-
- AMIGA Claims to allow IBM/Clones to read Amiga Workbench
- Disks: displays a picture of an Amiga Workbench disk
- on your screen, then spins your A: drive and locks
- your system. From Suriya Matsuda, Jacob Kanafoski
- (1:3613/4), Derek Vanmunster (1:229/418), and Jeff
- Hancock (1:3600/7).
-
- BIMOD126 Claims to be version 1.26 of BiModem - actually v1.24
- renamed and re-archived.
-
- HIMEM500 Looks like v5.00 of the HIMEM.SYS driver from MS-DOS and
- Windows, but is actually v3.07 with the numbers changed.
- Pirated as well (HIMEM.SYS is not shareware). From
- Joe Morlan (1:125/28) and Mike Bray (RIME address COFFEE).
-
- MAXRES Claims to "check your graphics interface and show you
- resolutions of your interface card." Elaborate hoax
- that lists the author as Samuel H. Smith (of HS/Link
- fame). Mr. Smith has confirmed that he did not write
- this program. Possible Trojan, but no Trojan activity
- has been reported.
-
- SPEEDUP Claims to increase system clock speed - instead doubles
- the length of each second and resets the system clock to
- use 30 of the new seconds each minute. From Kim Miller
- (1:103/700).
-
- TG27E Hoax "upgrade" of the Telegard BBS package. Completely
- overwrites an existing configuration, but does no real
- damage, with the exception of creating a "horrendous
- color combination that looks like a bad acid trip." From
- Scott Raymond (1:278/624), Telegard Alpha Tester.
-
- WOLFXXX Claims to patch your copy of Wolfenstein-3D to version
- 1.3. No such version exists. Also has a fake address
- that you are asked to send money to. From Jay Wilbur of
- Id Software (1:124/6300).
-
- =========================================================================
-
- The Trojan Wars
-
- There are quite a few new Trojans that popped up last month, some of
- them quite nasty. Read on for the gruesome details.
-
- | Michael Toth (1:115/220) forwards a report from John Kristoff, a member
- | of FidoNet Net115, about a Trojan called BATMAN. The file contains a
- | single executable, called BATMAN.EXE, and the archive is only 7k in size.
- | The description left by the user said, "Don't be fooled by it's (sic)
- | size, after the pretty long installation it will be like 10 times
- | bigger." It is described as a "Very Nice Ega Batman Card Game."
- |
- | John looked inside the .exe for text strings, and here is what he found,
- | edited for television:
- |
- | SPIDER-OPT Version
- | Hard Disk Optimizer
- | System/Disk Information:
- | Instaling
- | : will take approximately
- | minutes.
- | Instaling Game
- | -3YOU STUPID #$% #$%^$# #$%#$%! HOW STUPID CAN YOU BE
- | SPIDER.HAH2<<< YOU HAVE BEEN HIT BY
- | S.W.A.T.
- | YOU LOSER! >>>
- | Done INSTALING! U
- |
- | From the looks of this, it isn't such a nice game after all.
-
-
- | Lincoln Decoursey (1:260/220) reported in the FidoNet VIRUS echo a
- | problem he had with a file called PDESK. He says that he found it on a
- | CD-ROM, and that a virus scanner reported that the executables in the
- | file had suspicious code within. As a test, he ran one of the .exe
- | files, and all of the .exe file on his hard drive were deleted. The
- | files were recoverable using undelete, so it would appear that this was a
- | simple Trojan.
-
-
- | Charles Strusz (RBBS Net 970/201) reports that Southern Illinois has seen
- | a Trojan constructed from an archive of VPIC. Charles says that the file
- | contains a VPIC.COM file in addition to the VPIC.EXE file. The Trojan is
- | apparently either within or triggered by the .com file, since DOS will,
- | when given a filename with no extension, load a .com file with that
- | filename before loading a similarly named .exe file.
- |
- | When the Trojan runs, it seeks out all .GIF files on the drive it is run
- | from, overwrites the first few bytes (essentially ruining the .GIF), and
- | then deletes itself, leaving the original archive.
-
-
- | Bill Lambdin (1:343/45) forwarded a message posted in the Intelec
- | PC-Security conference by Bill Ziegler about an instance of a file called
- | CRPBATL.*. The copy of the file circulating in the Tulsa, Oklahoma area
- | is an apparent dropper of a virus using the Mutation Engine for
- | encryption.
- |
- | The virus is dropped in a unique way: initial scanning with popular
- | anti-viral utilities will not detect the infection. However, when the
- | main executable (CRPBTL.EXE) is run, it overwrites itself and almost
- | doubles in size, at which point the MtE can be detected. When the file
- | is run a second time, the virus tries to infect COMMAND.COM and
- | (possibly) some Novell Netware files as well. Infection can be cleaned
- | with most AV utilties at this point.
- |
- | Mr. Ziegler was not able to make the file infect his test system, and
- | those in the Tulsa area which were infected were easily cleaned.
- | However, this is a particularly nasty way of spreading a potentially
- | destructive bit of code, and should be avoided.
-
-
- | Bill also forwards a message by Jay Blethen from the U'ni Net Virus
- | Conference (via Michael Burkhart) about COPY2-HD, which claims to be a
- | "FAT table cache to speed disk access." Jay says that this file is
- | actually a Trojan which disables reboot calls, scrambles the FAT, and
- | then formats the disk. Jay says that the "screen message is pretty mean,
- | too...."
-
-
- | Eric J. Essman (CompuServe, 74656,557) posted an article in the Internet
- | comp.virus newsgroup about a dropper included in an archive of LARRY5.*
- | (Leisure Suit Larry). The file, which apparently spread from the
- | Northeastern United States, is a .com and .exe infector that infects
- | files over 3k in size when they are opened for any reason. Other
- | symptoms include file allocation errors reported by CHKDSK, a disabled
- | left CTRL key, and a message that says:
- |
- | VSUM VIRUS - your PC is now infected
- | (c) 1992 P/S, Inc.
- |
- | The virus has polymorphic capabilities. No information was given on what
- | programs will detect and/or clean this, so you might avoid any "Leisure
- | Suit Larry" files you see. Even if they were clean, they'd be pirated.
-
-
- | Drew Roberts (1:216/510) forwarded a report from one of his users, Steve
- | Luzovich, into the VIRUS_INFO echo about the file HOYLE2.EXE. The file
- | is supposed to be a collection of Solitaire games. However, Steve said
- | his virus scanner reported that two of the internal files, SIERRA.COM and
- | EXISTS.COM, were infected with a strain of the TP44 virus. To make
- | matters worse, Bill Lambdin (1:343/45) and Janne Granberg (2:227/12)
- | report that the original game is a commercial release by Sierra. Janne
- | also relays that TP44 is "version 44 of the Yankee Doodle virus...."
- | Probably an isolated incident, but be on the lookout nonetheless.
-
-
- | An unusual report for this publication: Kelvin Lawson reports the
- | existance of a file that registers FEBBS, called FEBBSREG. I usually
- | don't relay reports on "crack" programs, but this one may contain a file
- | that might be dangerous. First, here is the archive information:
- |
- | Name Length Mod Date Time CRC
- | ============ ======== ========= ======== ========
- | FEBBSREG.EXE 4253 08 Jan 92 14:37:40 35BDF8FD
- | SETPATH.EXE 2368 12 Jan 92 14:10:58 DAC8EECE
- | 004733.TXT 1406 10 Sep 92 00:57:16 AD32C519
- | ============ ======== ========= ======== ========
- | *total 3 8027 10 Sep 92 00:57:36
- |
- | The FEBBSREG.EXE file generates a serial number for FEBBS. However, the
- | problem, according to Kelvin, is with the SETPATH.EXE file. He says it
- | is a "little program which knackers (sic) your RA (RemoteAccess) BBS by
- | putting a little ANSI ad for (the hacker's) BBS on the login which has to
- | be patched out in the FAT." I have no idea if this is widespread, nor do
- | I have confirmation of its damaging potential. However, it would be a
- | wise move to avoid _any_ file that claims to register another program
- | without having to pay for the original. Support shareware, and pay the
- | author for his or her work.
-
-
- | Bill Lambdin (1:343/45) forwards a message by Stephen Sauls in the Smart
- | Net Virus conference about a fake update patch program for PCBoard.
- | Stephen forwarded the message from Joe Crosby, who received it from David
- | W. Terry of the Salt Air BBS. (Long way around, but at least it got
- | here.)
- |
- | The file in question is not named, but it claims to patch a "stack
- | overflow" problem with PCBoard. David says no such problem exists, and
- | that the patch actually performs a low-level format on the first 300
- | sectors of your hard drive.
- |
- | David concludes that PCBoard users should never make use of patches
- | unless they are obtained directly from Clark Development Company and/or
- | downloaded directly from the Salt Air BBS, at (801) 261-8976. Good
- | advice.
-
-
- | Now, a report that I accidentally left out of last month's issue: Janne
- | Granberg (2:227/12), Co-Sysop of the Black Crypt BBS, reports that a
- | Trojan version of their BBS intro file (archive name BCINTRO) is in
- | distribution. The file contains two executables, README.EXE and
- | INTRONOW.EXE, both of which are Trojans. The first file is actually the
- | ADIDAS Trojan, and the second file is the ELEPHANT-2 Trojan. Both can be
- | detected by Fridrik Skulasson's F-Prot Scanner. (I'm not sure if you
- | have to use the /TROJAN switch on the command line; it might be the
- | default in later versions.)
-
-
- | Kyle Pinkley (1:3803/3.2) forwarded a message he found on a local BBS
- | that appears to be from PKWare, warning of hacked versions of PKZip. In
- | the message, a Trojan version of the PUTAV program (part of the PKZip
- | package) calling itself PUTAV193 is reported. I had not heard of this
- | before, so I am forwarding it here for your consideration.
-
-
- Jef Fraas (CompuServe, 71044,256) has found a hacked archive of the
- October issue of The Hack Report. He said that there were four files in
- the archive, one of which was called "README.BAT." When he ran the file,
- it tried to format his hard drive.
-
- Jef sent me a copy of the file for examination. The hacker merely
- inserted a few commands at the top of the HACK1092.COL file and renamed
- it README.BAT. Not a very professional hack job, and also a very good
- argument for visually examining any unknown batch file before you run it.
-
- Let me emphasize one important point:
-
- >>>>THE OFFICIAL ARCHIVE OF THE HACK REPORT WILL _NEVER_
- >>>>CONTAIN ANY FORM OF EXECUTABLE FILE. ONLY TEXT FILES
- >>>>WILL BE INCLUDED IN THE ARCHIVE.
-
- If you find an archive that has an executable file inside, delete it:
- it's been tampered with. Official copies of the archive are available
- from sites listed at the end of this report. Thanks to Jef for all his
- help.
-
-
- Michael Toth (1:115/220) forwarded a message from Doug Bora (1:115/858)
- about a file someone uploaded to his system called MEM.*. This file
- contained the RedX virus. The file was described as "a program that
- upgrades your memory," and was 2048 bytes long.
-
- | Doug supplied the file information on the archive, which is reprinted
- | here for those interested.
- |
- | Searching ZIP: MEM.ZIP
- |
- | Length Method Size Ratio Date Time CRC-32 Attr Name
- | ------ ------ ----- ----- ---- ---- ------ ---- ----
- | 1818 Stored 1818 0% 01-04-80 00:55 238335e0 --w MEM.COM
- | ------ ------ --- -------
- | 1818 1818 0% 1
-
-
- Your Hack Squad has seen a listing for two files called AIRCOP.* and
- PUNK.*. These files were advertised as viruses. The first one, AIRCOP,
- is supposed to destroy and overwrite files on drive A:, and to attempt to
- corrupt files on any drive. The second one, PUNK, was advertised as the
- "smallest virus in the world." It claims to corrupt every .com file it
- can find.
-
- The above files were advertised as being available "for research purposes
- only," but there is no way to tell if they ever made it into public
- distribution. Keep an eye open, and scan everything, just in case.
-
-
- Tom Lane (1:382/91) forwarded a message from a caller named David Basile
- of Daleville, Alabama, about two Trojan files. The first was called
- HOUSEPAN.*, which appears to be a compiled batch file. It contains a
- .DAT file which says that "your hard drive has just been infected with a
- virus and only the PainKiller has the cure." The Trojan then tries to
- delete files using a program called "House," which is a renamed version
- of a program called RM that simply removes files.
-
- The second file David reports is called RAZOR1.*, which claims to be a
- game with "great graphics and sound." When it runs, David says it claims
- it will need "time to expand and a lot of hard drive space." However, it
- seems to need the same amount of time regardless of the machine it runs
- on - it estimated 7.5 minutes on both his 486 and his Tandy 1000TL. The
- program winds up writing to your COMMAND.COM file during this time. If
- you have a backup copy of COMMAND.COM, David states you can just copy it
- over the infected file and everything will go back to normal. (Make sure
- you boot from a clean, write-protected floppy before you do this,
- though.)
-
-
- Joachim Theile (CompuServe ID 100042,1552), reports a potential problem
- with a copy of a file called PHANTOM2.*. This program, a copy of The
- Phantom of the Keyboard II, v1.1, seems to be an "isolated incident" of
- an infected file. The executable in the archive, PHANTOM2.EXE, was
- reported to be infected with the Hafen [Hafn] virus by McAfee's ViruScan
- (no version of SCAN provided). If my memory serves, the program is
- legitimate. Joachim's copy seems to have been infected by a third party.
-
-
- Jerry Murphy (1:157/2) located a copy of a file called PCS204.* which has
- been infected with the MIMIC2 [Mim] virus. McAfee's ViruScan v97
- detected the infection in the internal files PCS.EXE and PCSLOG.EXE. He
- has sent a copy to McAfee, who have confirmed that the [Mim] virus is
- real (it was added to the SCAN program before shipping, but wasn't
- included in the VIRLIST.TXT in the SCAN archive).
-
- | Jerry informs me that PCS is a program called PC-Sentry, and was the
- | shareware version of the program. This appears to be another "isolated
- | incident" for everyone to be aware of.
-
-
- Russell Wagner (1:202/307) reports in the FidoNet DIRTY_DOZEN echo that a
- file called X_COMM.* contains a Trojan. The file claims to increase the
- speed of your modem. A batch file in the archive, if run, will
- apparently delete all .exe, .com, .sys, and .bat files in your root, DOS,
- and WINDOWS directories.
-
-
- A previous report forwarded by Troy Dowding about REGLITE brought in
- some further information, forwarded by Bill Dennison (1:273/216). One
- message forwarded from Bill Baer of the ILink Shareware conference (via
- Larry Dingethal) says that the file contained only an executable file,
- with no docs. Another message from John Cline gives further info on the
- virus that infected the REGLITE file, called "Particle Man." It
- increases the size of a .com file by 690 bytes (no info on .exe files),
- and is not detectable by SCAN v95.
-
- John says you can make SCAN detect it, using the following procedure:
-
- First make an ascii consisting of the following line:
-
- "b94201313583c702e2f9" Particle Man
-
- Type the line exactly, including the quotes, and save the textfile with
- filename VIR.TXT to the same subdirectory that contains SCAN, next run
- with the following command line:
-
- scan c: /ext vir.txt
-
- You can replace "c:" with any drive letter you want to check.
-
- The above scan string will detect the virus after it has started to
- replicate, but before it starts overwriting files in all your
- directories.
-
-
- HW Richard Steiner forwarded a message from Eric Hamel (RIME address
- SOFTC, Shareware Conference) about the file MSTLST10. A user of a board
- local to Eric found the file, described as "like Sidekick, only better,"
- and downloaded it. An INSTALL.BAT file in the archive had references to
- copying the command interpreter. Eric ran the install program, and wound
- up with an overwritten command interpreter - the file MASTLAST.COM had
- been copied to his root directory and had been renamed to the same name
- as what was pointed to in his COMSPEC setting.
-
-
- Another forwarding from Richard involves a report from Steve Bogacz of
- the Rice Lake PCUG (via George Goza, ILink (Channel 1 BBS)). Steve found
- a file called FLIP-IT that contains a variant of the Wisconsin virus. No
- file description was given. Here comes the sermon again - SCAN
- EVERYTHING YOU DOWNLOAD. Before you run it, preferably.
-
-
- Malte Eppert (2:240/500.6) forwarded a message into the FidoNet
- DIRTY_DOZEN echo from Dick Hazeleger about EARLYWA, an "AV warning
- program." He ran the main program, DAILY.COM, after scanning it with
- McAfee's SCAN95 and getting a clean result. The program crashed when it
- tried to invoke the DOS DEBUG program, which Dick doesn't have on his
- system. After this, he checked the file using Fridrik Skulasson's F-Prot
- virus scanner in "Heuristic" mode, and received the message, "...the
- first 71 bytes of this program contain a primitive virus." (See the
- clarifications section for further information.)
-
-
- Matthew Peddelsden (2:440/302) has received a report of a virus in a copy
- of the GSZ ZModem protocol driver archive by Chuck Forsberg. He says
- that "running any file in the archive will infect the file COMMAND.COM,
- and subsequent program (sic) that is run is infected so that it is
- corrupted and when run simply displays rubbish on the screen and beeps
- madly out of the speaker." Matthew received an archive listing from the
- person whose system was infected by this. Here's the info:
-
- Length Method Size Ratio Date Time CRC-32 Attr Name
- ------ ------ ----- ----- ---- ---- ------ ---- ----
- 76 Shrunk 72 6% 13-12-91 13:32 0a33cf32 --w DS.BAT
- 340 Implode 287 16% 13-12-91 13:35 631a91b6 --w FIX.BAT
- 110 Shrunk 98 11% 13-12-91 13:27 6836df0d --w RZ.BAT
- 36 Shrunk 31 14% 13-12-91 13:22 d8d5d2f9 --w SZ.BAT
- 151 Shrunk 140 8% 13-12-91 13:27 b5400e97 --w ZDOWN.BAT
- 123 Shrunk 115 7% 13-12-91 13:27 5cffa510 --w ZMODEMAD.BAT
- 116 Shrunk 106 9% 13-12-91 13:28 c38f9bfe --w ZMODEMD.BAT
- 134 Shrunk 123 9% 13-12-91 13:28 89aeacd7 --w ZMODEMDR.BAT
- 140 Shrunk 123 13% 13-12-91 13:28 eeba3b6f --w ZMODEMU.BAT
- 59 Stored 59 0% 13-12-91 13:28 3eedc27b --w ZUP.BAT
- 898 Implode 683 24% 24-11-90 04:20 07d84f0d --w DSZ.10
- 71424 Implode 42742 41% 27-04-92 15:00 ccda0966 --w GSZ.EXE
- 33936 Implode 21315 38% 26-04-92 08:44 cd04b5ea --w GCOLORS.EXE
- 130736 Implode 45830 65% 27-04-92 15:38 ead89b23 --w GSZ.DOC
- 3067 Implode 1230 60% 27-04-92 15:03 da90ea8b --w MAILER
- ------ ------ --- -------
- 241346 112954 54% 15
-
- His source says the virus is in both GSZ.EXE and GCOLORS.EXE. McAfee's
- SCAN95B doesn't detect it, but they have been informed. The virus
- contains the string, "APACHE WARRIER," along with a few others.
-
- It seems very unlikely that this infected copy originated from the
- author: it is almost certainly a situation where someone else down the
- line unpacked the archive, infected the files, re-archived them, and
- uploaded the bad archive to a BBS. If you have _any_ qualms about the
- copy of GSZ that you find, you can always go to the source and download a
- copy from Chuck Forsberg's BBS.
-
-
- Cal Gardner previously reported a file called 800II224, claiming to be
- version 2.24 of the 800 II disk formatting program. He did some testing,
- disabling his hard drive from the CMOS and booting from a floppy. When
- he ran the program, it deleted all files on both drive A and drive B. His
- information is that the latest version is v1.80. The author, Alberto
- Pasquale, is in Italy according to Isaac Salpeter (1:3612/210), so he is
- a bit difficult for me to contact. However, the behavior of the file Cal
- found leads me to believe he has located a Trojan copy.
-
-
- John Wagner (1:209/760), the author of IMPROCES, reports that his program
- has been the victim of a Trojan version. The Trojan is in a file called
- IMPROC50.*, which is actually v3.1 of IMPROCES that has been "infected
- with about 10 viruses" according to a report received by John. John also
- reports that his source said the file "waxed" a hard drive when it was
- run. For the record, the latest version of IMPROCES is 4.0, so avoid any
- higher numbers.
-
-
- Bryan Nylin (1:343/116) reports a Trojan version of SCAN95 that has the
- SCAN.EXE file in the archive replaced with a SCAN.COM file. Bryan says
- this wipes out your boot sector and media descriptor byte, then
- overwrites the FAT and data areas with a continuous stream of the string
- "NOT!NOT!NOT!NOT!NOT!NOT!" (and so on). Sounds like this was written by
- a bored programmer who watched Wayne's World once too often.
-
- Note that this seems to be an isolated sighting: McAfee did in fact
- release a valid SCAN95. They also released v94b, a beta test, but
- skipped over that version number due to a report of a Trojan version
- | found in Mexico. The latest official version is v99.
-
-
- Bill Lambdin (1:343/35) forwards a message from Phil Helms of the
- CircuitNET Virus Conference. The file in question, ATTRUE.*, is listed
- as "a DOS utility to change file attributes." Instead, one of the
- internal files (README.COM) deletes all .EXE and .COM files in your DOS
- directory and tries to do the same to your .SYS and .BAT files in your
- root directory. Phil says it looks like another compiled .BAT file.
-
- Please note that Phil did _not_ run the actual program file in the
- archive (i.e., ATTR.COM). This program may be legitimate, and simply was
- archived along with a Trojan README.COM file. The safest way to avoid a
- problem like this is to look inside any README.COM file with a file
- viewer (such as PC Tools VIEW or Buerg's LIST) before you run it. Most
- of these will have readable text strings that look like documentation
- inside them. If yours doesn't, be careful with it.
-
-
- Enoch Ceshkovsky (RIME Shareware Conference, address NSTTZ) found a file
- called ENVIRED.* that claims to be a DOS Environment Editor. However,
- the copy that Enoch found was infected with a strain of the Family virus.
- I'm not sure if the file is a legitimate program, since I'm not familiar
- with it. Either way, this is a single sighting: the virus in it can be
- detected by SCAN v93 or higher.
-
-
- Michael Mac Nessa (1:2250/2) reported in the AMIGA_PDREVIEW echo on an
- attack by a file called DW171.LHA. This was described as "the best
- directory utility" ever seen by the uploader. The file claims to be a
- program called DirWork, version 1.71.
-
- The program checked clean for viruses, so Michael ran it and got a grey
- screen and nothing else. After 30 seconds of this, he rebooted. On
- bootup, his dh0: drive started to access rapidly, and he was then asked
- by his system for dh1:, a drive he didn't even have.
-
- Fortunately, his boot drive setup uses a different setup (not booting
- from dh0), so his boot drive survived the attack. However, his File:
- hard drive was wiped out.
-
- I apologize if I have massacred Amiga terminology, so please correct me
- via NetMail if I'm wrong on any of the drive names. For the record,
- however, this Trojan has been verified by the author of DirWork, Chris
- Hames (via Robert Poole, 1:142/886). The latest version is 1.62.
-
-
- Michael Nelson (1:125/20) received a file called FAST!.*, an apparent
- pirate of the commercial disk cache program FAST!. However, upon further
- inspection, this really looks like a Trojan. The archive contains the
- following files:
-
- NAME SIZE DATE TIME
- ------------------------------------
- README ANS 320 01/01/80 02:25
- INSTALL COM 1459 03/26/92 19:08
- FAST DAT 20927 03/26/92 19:14
- FAST TXT 588 03/26/92 19:00
-
- The text file says the installation is slow, since it has to check every
- program on your hard drive. A look inside the .COM file reveals the line
- "REN fast.dat fast.com c: /q /u". The FAST.DAT file contains lines that
- lead one to believe that this is an MS-DOS FORMAT.COM file, with added
- commands that will try and format all of your drives. Both the
- INSTALL.COM and the FAST.DAT file have gone through a batch file compiler
- somehow, with the INSTALL.COM having a registration notice for the batch
- file compiler.
-
- Although Michael didn't run the program (smart move), he does suspect a
- serious Trojan here. So do I.
-
-
- Harold Stein (CompuServe address 72377,3075) forwards a report from a
- SysOp in his area, Danny Swerdloff, about a file called JOKE.*. The file
- is described variously as either "the best fake FBI database joke
- available," or "a very believeable hard disk crash simulator." The
- archive contains only two files: JOKE.BAT and JOKE.DOC. The doc file
- reassures the user that the batch file is completely harmless. However,
- the batch file contains the following lines:
-
- c:
- cd\dos
- del keyboard.sys
- format C:
-
- This is a rather amateurish Trojan, and can be easily thwarted by giving
- your hard drive a volume label. However, a better precaution is to
- examine any strange batch file you are given before you run it, since
- virus scanners do not look into batch files. That way, if you see the
- word FORMAT in one, you can delete it before it hits.
-
-
- An update on #1BLAST, reported in the October issue of The Hack Report.
- Rick Rosinski (1:239/1004) reports in the PDREVIEW echo that the SysOp
- who was hit by it (Pete Kehrer) experienced some rather bad results from
- it. In short, it overwrites your COMMAND.COM file and replaces it with
- the characters "///", and writes similar garbage over your config.sys and
- autoexec.bat files. It also creates several other files, all ASCII, with
- characters like "////asdfasdf" in them. (In case you're wondering, look
- at the four keys on the left side of the home row of your keyboard - the
- letters are "asdf" on a standard Qwerty keyboard.)
-
- This file at first looks like a real Apogee game - it even has Apogee's
- catalogue in it. It is easy to repair the damage, but it's a shame that
- someone would want to do this to another person's system.
-
-
- Bill Lambdin (1:343/45) forwards a message from Reidar Lilleboth (ILink
- OS/2 Conference) about TEDP090.ZOO. This appears to be an isolated
- incident of a copy of the file being infected with the Maltese Amoeba
- virus. TEDP090 is a small OS/2 text editor. If you see this file,
- please scan it before running to make sure you have a clean copy.
-
-
- HW Mikael Winterkvist (2:205/422) found a file named BREV.*, described as
- "SysOps Sex Habits." However, this is a "device bomb," which contains
- the names of DOS devices in the archive. Similar to a file reported in
- the full report, this is aimed at your CLOCK$ device. When unarchived,
- the CLOCK$ is opened, and about 50K worth of the letter A are written to
- your system clock.
-
- | Mikael now reports a new variant of this (filename not yet known) that
- | contains the files COM1.EXE and COM2.EXE. One version of this wound up
- | connecting the target system to a board in Australia (an expensive call
- | from Sweden), and another version called up a board in the United States.
-
-
- Paul Drapeau (1:322/594) reported in the FidoNet VIRUS_INFO echo a new
- virus called Power Pump. Normally, viruses by themselves are not
- reported in The Hack Report/Update, but this is an unusual situation.
- According to Paul's research, all droppers of this virus have a file in
- their archives called POWER.EXE, with instructions to the user not to run
- this file. He does not understand the connection, but the virus will not
- run without the POWER.EXE file.
-
- A few specifics on Power Pump: it doesn't actually attach its code to
- files, but uses the "corresponding file" technique. It looks for .EXE
- extension files, then creates a file with the same root name but with
- a .COM extension. Since DOS executes .COM files before .EXE files, the
- viral file (1199 bytes long) is run first, where it executes the viral
- code and passes execution on to the corresponding .EXE file. The virus
- also looks for empty directories: if it finds one, it creates a hidden
- file called COM (with no file extension) that contains the viral code.
-
- To date, Paul says the virus has been found in two archives (one of
- SCAN89.ZIP and one of VSUMX204.ZIP). These may have been localized
- occurrences, but be on the lookout for any file with a POWER.EXE file in
- the archive.
-
-
- Dan Christman (1:520/519) reported that there is a version of TheDraw
- that contains "several viruses." He says to watch for a file within the
- archive called THEDRAW.PCK. This file is only created after the program
- is initially executed and is not part of the official archive. Dan gave
- no filename for this dropper, but be on the lookout for any archive that
- already has a THEDRAW.PCK file in it.
-
- | On this subject, Matt Weese (1:170/610) found an archive with the
- | THEDRAW.PCK file inside. However, his copy (archive version 5.00) was
- | not infected - merely hacked. Another sighting of the THEDRAW.PCK file
- | comes from Jesper Tragardh (2:200/109), who reported the TDRAW601 hack
- | listed in the Hacked Files section.
-
- Just for the record (once again), the latest official release of TheDraw
- is v4.51.
-
-
- Please be aware that the PKZip v2.0B hack reported in the hack section of
- this report could be a Trojan. According to the report filed in the
- VIRUS_INFO echo by Fred Towner, the archive (an ARJ archive, no less(!))
- had these files in it:
-
- PKZIP20B.EXE
- UNKNOWN.NFO
- MUSTREAD.COM (archived with PKLITE)
- WATCHME!.EXE (archived with PKLITE)
-
- Fred was wise enough not to try and run any of these programs, so Trojan
- activity has not been confirmed.
-
-
- Other previously reported Trojans/Droppers:
-
- Filename Claimed use/Actual activity/Reporter(s)
- --------- -----------------------------------------------------------
- 240TOMNP Small file that trashes disks (no elaboration on symptoms).
- From Eric Pullen (USTGNET).
-
- ARJ240 Supposed "latest version" of the popular Archiver by Robert
- Jung (ARJ). This is a dropper of the FISH virus, reportedly
- with a "secure envelope." Latest official version of ARJ is
- 2.30, with an official wide beta release under filename
- ARJ239A. Reported by Hazel Clarke (1:134/68) via Ken Miller
- (1:134/111).
-
- BACKFIND Activity unknown, but has many obscene text strings in the
- executable that seem to indicate that it will trash your hard
- drive. From Dan Stark (1:247/101).
-
- BILLNTED No claim reported - begins its "bogus journey" with the message
- "Decompressing database, please wait......", then prints more
- messages and formats the first 50 tracks of your hard drive.
- From David Elkins (2:254/78).
-
- COMPILER Claimed freeware version of Stacker - phone numbers in the text
- files are fake (one is a phone sex number). Erases your
- COMMAND.COM file. From several reporters.
-
- CORWP22 Isolated incident - Corewars game, with an executable
- (CORE.EXE) infected by the Dark Avenger virus. From Gary
- Madison (2:259/22) and Howard Wood (address unknown).
-
- CSHOW900 Fake version of the CompuShow .GIF viewer - the .EXE file in
- the archive tries to truncate your COMMAND.COM file. From Tim
- Spofford (1:105/99).
-
- CUBULOUS No claim reported for this file - apparently contains a dropper
- of the REX virus (detected by SCAN v91 and higher). Reported
- by Bill Arlofski in the CNET Spitfire Support Conference,
- forward by several through Mark Wurlitzer (1:294/9).
-
- CVIR Advertised as a virus scanner - executable has the strings,
- "/Checking drive for VIRII/TROJANs. Please wait.EHAHA God
- your a ****ing moron. YOU HAVE BEEN HIT BY A TROJAN! HAHA".
- (String edited for family viewing.) From Dan Stark
- (1:247/101).
-
- DOS501 Described as a beta of MS-DOS: may contain a variant of the
- DISKILLER virus. From Scott Scoville (1:282/3006).
-
- EPW27 Purported new version of EPW, a file that protects executables
- with an encrypted password. Instead, this Trojan contains
- droppers of the ITTI-A, ITTI-B, and Rock Steady viruses.
- Latest official version is v1.2. From Patrick Pfadenhauer
- (via Mark Evans, formerly 1:382/87).
-
- FONTS Advertised as additional fonts for TheDraw - the FONTS.COM
- file in the archive is a compiled batch file that changes to
- your C: drive root directory and deletes all files within the
- root. A legitimate FONTS archive exists as well. From Glen
- Appleton (1:260/371) via Arthur Shipkowski (1:260/213.2).
-
- FREEHST ANSI bomb - remaps your keyboard, making some keys invoke the
- FORMAT command. Described as how to get a free HST modem
- (steal one, it advises). Avoid by using an ANSI driver that
- disables keyboard remapping. From Tom Ward, SysOp of the BCS
- TI99 BBS (617-331-4181), via Herb Oxley (1:101/435).
-
- GREYSCAL Claims to be a monitor adjustment utility - actually a dropper
- - infects files on your hard drive with the FISH virus through
- the README.EXE file in the archive. Not detectable by any
- scanner. From Bill Logan (1:300/22).
-
- MOBYZ Does "a number on your hard drive" - no further details given,
- but apparently confirmed by McAfee. From Michael Masters,
- SysOp of the Conceptual CAD Design BBS (Tempe, AZ) via Mark
- Evans (formerly 1:382/87).
-
- MONOP3-0 Supposed to be Monopoly for Windows. Contains FORMAT.COM from
- DOS 4.01 and STACKEY v2.1 (renamed as MONOP1.COM and
- MONOPOLY.COM and invoked by a batch file called README!!.BAT).
- Will try and format your hard drive - a volume label on your HD
- will thwart this one. From Derek Vanmunster (1:229/418).
-
- NPV2 The "Non-Programmer's Virus" - a claimed aid to testing
- anti-viral programs. Contains an infected copy of Vern Buerg's
- LIST.COM. From Michael Kerr (1:309/7).
-
- Obnoxious "Tetris" clones for the Macintosh - actually droppers of the
- Tetris MBDFA virus. Via Paul Ferguson (1:109/229) in the VIRUS_INFO
- Tetris- echo.
- cycle
- Ten Tile
- Puzzle
-
- OCEAN From the BBS description: "Wonderful Game, Reward for the
- PLANTS person who conquers it 1 time, Good luck, how does 30,000
- RAINBOW bucks sound to you if you break the pattern, try this game, it
- is wonderful, waht a challenge, bet you can't break the
- pattern. $50, 000 if you do it twice." Actually a compiled
- batch file that tries to erase all files on your C: drive.
- From Richard Dale (1:280/333).
-
- PROTOFIX Possible isolated incident of a patch file for RBBS that claims
- to correct a "flaw" in RBBS - may destroy your hard drive's FAT
- and wipe out files. From Richie Molinelli, via HW Ken Whiton.
-
- PSI3 Passing itself as the LHA Archiver, version 3.00. It destroys
- your partition table, boot sector, and parts of FAT 1 and FAT
- 2. From Nemrod Kedem (2:403/138).
-
- QUICKEYS Claims to increase keyboard speed - turns out to be the actual
- executable file of the BURGER virus. The virus file is called
- QUICKEYS.COM and is 542 bytes long. This is not to be confused
- with the PC Magazine Utility of the same name. Reported by Jay
- Siegel (1:153/151).
-
- RAMBO Contains files with the names of DOS devices that are affected
- when the archive is viewed or unpacked. Reported by Michael
- Toth (1:115/220).
-
- RANEW_16 Isolated incident - 12k larger than real version, causes damage
- to RemoteAccess BBS systems. From HW Nemrod Kedem.
-
- SCAN87 Suspected of Trojan activity, but not confirmed. The latest
- SCAN88 official release is SCAN99. Reported by several.
- SCAN94
- SCAN96
-
- SHIELD20 Claims to protect you from Trojans, but are possible Trojans
- SHIELD21 themselves. From Jim Lambert (CircuitNet) via HW Ken
- Whiton and via Michael Toth (1:115/220).
-
- SPARKS Possible isolated incident - contains the ICE-9 virus. From
- Brian Sterrett (2:255/34).
-
- TG27FAST Trojan "speed-up" for Telegard 2.7 - damages disks to the
- extent that they require reformatting. From Eric Pullen
- (USTGNET) via Robert Hinshaw (1:291/16) and Eric Kimminau
- (1:120/335).
-
- TGCHAT21 Fake Telegard Chat utility - tries to format part of your
- hard drive. From Rajeev Seth (1:250/328) and Todd Clayton
- (1:259/210)
-
- TGSEC16 Trojan version of Telegard Security Package - both executables
- in the archive will infect your system with the Dark Avenger
- virus, and the text files show you how to ease access to your
- system by hackers instead of prevent access. By Scott Raymond,
- author of the real package (latest official version is
- TGSEC17.*).
-
- TIME Several files reported under this name - one dropper, one
- Trojan. Be wary of any file with this name.
-
- TMFIX Claims to fix a problem with the dialing directory used by the
- communication program Telemate. Formats your hard drive (or at
- least part of it) instead. Reported by Brian Hess (WildNet),
- via HW Ken Whiton.
-
- VGA835 Claimed VGA game - wipes out your hard drive. From Gary Meade,
- SysOp of the Tiger Run BBS in Sioux Falls, SD, via HW
- Ken Whiton.
-
- VIRTUAL Supposed to be a virtual reality game. One file in the archive
- has the string, "This bombing was compliments of A.C.K. and
- its affiliates." Trashes hard drives. Possible isolated
- incident. From Dan Stark (1:247/101). See also ??Questionable
- Files?? section.
-
- VPIC47 One circulating version of this seems to contain the Dark
- Avenger virus, "split" so that no scanner can pick it up.
- Get the latest version of VPic, VPIC50, to avoid this. From
- Tim Tim Sawchuck and Jeff Simmons in the WildNet VIRUSES_MN
- conference.
-
- WHALE Not a VGA graphic of a whale as described, but the actual WHALE
- virus. From Dan Stark (1:247/101).
-
- WLFCHEAT Claims to be a "cheat" file for the Apogee/Id game
- Wolfenstein-3D. Actually wipes out your hard drive's boot
- sector and trashes the File Allocation Tables. Not to be
- confused with WLF1CHT, a legitimate "cheat" file written by
- Michael P. Hoffman. Reported by R. Wallace Hale, SysOp of the
- Driftnet BBS (PC Virus Research Foundation), via Clayton Manson
- (1:3612/140).
-
- ZAPPER15 PSI3, mentioned above, recommends an "antivirus" program
- called ZAPPER15.* to remove a virus called "PSQR". ZAPPER15
- is another Trojan which overwrites your hard disk's boot sector
- with random garbage data from memory. It contains no viral
- code. Also from Nemrod Kedem (2:403/138)
-
- =========================================================================
-
- Pirated Commercial Software
-
- Program Archive Name(s) Reported By
- ------- --------------- -----------
- 4D Boxing (game) 4DBOX-1 Jason Sabshon (Internet,
- 4DBOX-2 jsabshon@mindvox.phantom.com)
-
- | 4th and Inches 4TH Jason Sabshon (Internet,
- | (Accolade game) jsabshon@mindvox.phantom.com)
-
- 4X4 off-road racing 4X4 Jon Jasiunas (WildNet, via
- (Epyx) HW Ken Whiton)
-
- Above Disk v3.00A EXP-MEM Dale Woloshin (1:163/211.3)
- and Wolfgang Fritz
-
- Alf and the Alley Cats ALF Bill Dennison (1:273/216)
-
- | AMI Diag v4.0 AMIDIAG4 Dan Westlake (Intelec
- | Shareware Conference, via
- | Bill Lambdin (1:343/45))
-
- Amiga ARexx Manual AREXXMAN HTom Trites (1:282/62),
- (Verified by William Hawes, author) via Derek Oldfather
-
- Arkanoid II: ARK Jack Cross (1:3805/13)
- Revenge of DoH
-
- ASQ v2.0 (Qualitas) ASQ20 HW Nemrod Kedem
- (Note - unlike previous releases of ASQ,
- ASQ v2.0 is not shareware.)
-
- Backgammon Royale BGROYALE Shakib Otaqui (2:440/74)
- BGROYDOX
-
- Bargames BARGAMES Scott Lewis (1:107/607)
- (game from Accolade)
-
- Battle Chess BCHESS Bill Roark (RIME, via
- HW Richard Steiner)
-
- Battle Chess for BCWIN1 Harold Stein
- Windows BCWIN2 (CompuServe, 72377,3057))
-
- BeetleJuice (game) BJUICE Alan Hess (1:261/1000)
- BJ Bill Blakely
- (RIME Shareware echo)
- BTLJWC the Hack Squad
- (1:382/95)
-
- BitCom BITCOM Jason Sabshon (Internet,
- jsabshon@mindvox.phantom.com)
-
- BitFax BITFAX Jason Sabshon (Internet,
- jsabshon@mindvox.phantom.com)
-
- BitFax 1.22B Unknown Antonio Rezende (RIME)
-
- | BLAST Comm Package BLAST-1 Harold Stein, via
- | (US Robotics) BLAST-2 HW Richard Steiner
-
- Blockout BLOCKOUT Bill Lambdin (1:343/45)
- (California Dreams)
-
- Catacomb 3-D CAT3D Jason Culler (1:261/1000)
-
- | Check It v2.0 CHKIT20 Bill Lambdin (1:343/45)
-
- Chessmaster 2000 CHSMSTR David Silver (2:2405/12)
-
- Commander Keen #2KEEN Steve Hodsdon (1:132/199)
- (parts 2 and 3) #3KEEN Harold Stein
- (via Ken Whiton, 1:132/152)
- (part 5) #5KEEN John Van Eekelen (2:500/228)
-
- Crystal Caves pt. 2 CRYSTL-2 John Van Eekelen
- (Apogee)
-
- Desert Storm (Windows) DSTORM Bill Roark (RIME, via
- HW Richard Steiner)
-
- Die Hard (game) DIEHARD Harold Stein
-
- DiskDupe Professional DDPRO339 John Van Eekelen
-
- Disk Manager 5.0 DM50 Philip Perlman (1:278/709)
-
- Double Disk DDISK214 Ronald McGill (1:167/149)
-
- DoubleDos v5.5 DDOS55 Ove Lorentzon (2:203/403.6)
-
- DSZ (registered) DSZ0503R HW Nemrod Kedem
-
- Duke Nukem parts 2 & 3 DUKEZIP2.EXE Steve Hodsdon (1:132/199),
- #2DUKE Craig Demarsh (1:260/213),
- DUKEZIP3.EXE and Hal Thompson (1:353/220)
- DUKETRIL Harold Stein (WildNet)
- (also under various other names - only the first game in the trilogy
- is shareware: #2 & #3 are for registered users only and are pirated.)
-
- Duke Nukem (registered) DNUKEM Jason Sabshon (Internet,
- jsabshon@mindvox.phantom.com)
-
- Dune (game) DUNEFLT1 Michael Toth (1:115/220)
- DUNEFLT2
- DUNEFLT3
-
- Eagle's Nest (game) EAGLE Mike Headley (1:362/112)
- Frank R Pizer (5:71/0)
-
- EMM386 EMM386 Jeff Hancock (1:3600/7)
- George Staikos
- via Mark Evans (1:382/87)
- | Thomas Ryan (1:228/28)
- EMM441 John Van Eekelen
- EMM445 Dennis Moore (1:123/81)
-
- Fatal Challenge FATAL Mark Visser (1:221/76)
-
- Fastback Plus v2.0 FBPL200 Bogie Bugsalewicz (1:115/738)
-
- Flashlink MNP Emulator FLASHLNK Several
- FLINK Jason Sabshon (Internet,
- jsabshon@mindvox.phantom.com)
-
- Gauntlet (game) GAUNTLET Cimarron Mittlesteadt
- (via Ken Whiton, WildNet)
-
- GIFLite v1.40 GIFLT14R Stephen Kawamoto
- (Registered Version) (1:153/7004)
-
- GSZ GSZ0410 Arthur Taber (1:125/28)
- (via Stuart Kremsky)
- GSZ1214R Harold Stein,
- via HW Ken Whiton
- | GSZ611R Scott Raymond (1:278/624)
- NOTE: GSZ is a shareware program,
- but these particular archives were
- the registered versions.
-
- Harmony (game) EMOTION John Van Eekelen
-
- HIMEM.SYS (from HIMEM307 John Van Eekelen
- Microsoft)
-
- | Home Lawyer HOMELAWY Kim Miller (1:103/700)
-
- | Hunt for Red October HUNTRED Ted Sanft (1:282/1012)
-
- IronMan off-road racing IRONMAN Jon Jasiunas (WildNet, via
- HW Ken Whiton)
-
- The Jetsons (game) JETSONS Harold Stein
-
- Jill of the Jungle JILL2 Harold Stein
- (non-shareware files) $JILL2 HW Bert Bredewoud
- $JILL3
-
- Kiloblaster $KILO2 HW Bert Bredewoud
- (Missions 2 and 3) $KILO3
-
- LotusWorks v1.0 LWORKS Brian Luker (1:167/149)
-
- Mac-in-Dos CLINK Arthur Taber (1:125/28)
- (not the SEALink protocol)
- MAC-DOS Ron Bass (1:128/13.3)
- Leslie Meehan, original
- reporter (unknown)
- MACON-5 Kimberly Avery (1:324/278)
-
- Microsoft Mouse Driver MOUSE810 Bat Lang (1:382/91)
-
- | Mah Jongg for Windows MJWIN Bill Lambdin (1:343/45)
- (registered)
-
- Monopoly MONINC Chris Nelson
- MONOPOLY Jason Sabshon (Internet,
- jsabshon@mindvox.phantom.com)
-
- MS-DOS 6.0 Beta DOS6BETA Chris Astorquiza (1:250/316)
- DOS60B-1 Michael Toth (1:115/220)
- DOS60B-2
- DOS60B-3
- DOS60B-4
-
- MTE MNP Emulator 4800BAUD George Staikos,Trenton,ON,
- via Mark Evans (1:382/87)
- MNPEMUL Larry Dinkoff (1:115/622)
- MTE215 Bat Lang (1:382/91)
- MTE210E
- MTE210F
- MTE210G
- MX5 Wolfgang Fritz
- Verified by Steve Lieberman
- of MagicSoft, Inc.
- MX6
-
- MTEZ (MagicSoft) MTZ115B1 Kim Miller (1:103/700)
-
- Nederlandse Spoorwegen NS9293 John Van Eekelen
- (Dutch Railroad NS_92_93
- System Info Book)
-
- Nightmare on Elm FREDDY Chris Nelson (1:238/500)
- Street (game)
-
- Off-Line Express v2.2 OLX22 Jason Sabshon
- (registered)
-
- Optune OPTUNE Bat Lang (1:382/91)
- OPTUNE11
- OPTUNE12 Jeff Dunlop (1:203/16)
- OPTUNE13 Michael Toth (1:115/220)
-
- Paganitzu part 2 #2PAGA Harold Stein
- (via Ken Whiton, 1:132/152)
-
- Paperboy (Game) PAPERBOY Carlos Bazan (1:102/753)
-
- PC-Hooker PCHOOKER Larry Dinkoff (1:115/869)
- (Brown Bag Software)
-
- Physician's Desk PDR-1 Bret Dunning (1:123/85)
- Reference PDR-2
- PDR-3
- PDR-4
-
- PKLite Professional PKLT_PRO Eric Vaneberck (2:291/712)
- Version 1.13
- Version 1.20 PKL120R HW Bert Bredewoud
- PKLT120R Jason Sabshon (Internet,
- jsabshon@mindvox.phantom.com)
-
- PMCamera (IBM) PMCAMERA Jan Scoonenberg(2:512/4.1080)
- via HW Matt Kracht
-
- Print Shop PRINTSHP Harold Stein
-
- Print Shop Deluxe PSDLX1 Harold Stein
- PSDLX2
- PSDLX3
-
- QEdit 2.15 (registered) QED215R Jason Sabshon (Internet,
- jsabshon@mindvox.phantom.com)
-
- | QEMM v6.02 QEMM602 Jason Sabshon
-
- QModem 5.0 QM50 Daniel Hagerty (1:208/216)
- QMODEM50 Larry Owens (1:280/87)
- QMODEM1 Jon Jasiunas (WildNet, via
- QMODEM2 HW Ken Whiton)
- QMODEM3
- QMODEM4
-
- Quicken 4.0 QUICKEN4 Wes Meier, the WCBBS,
- via Joe Morlan
-
- Rambo (game) RAMBO Cimarron Mittlesteadt
- (via Ken Whiton, WildNet)
-
- Rampage (game) RAMPAGE HW Bill Dennison
-
- Red Baron game unknown Nolan Taylor (1:157/537)
- (by Dynamix)
-
- Reversi (Win3 file) REVERSI Wes Meier, the WCBBS,
- via Joe Morlan
-
- Robin Hood (game) ROBNHOOD HW Bill Dennison
-
- SimCGA SIMCGA40 Joe Morlan (1:125/28)
- SIMCGA41
- NOTE: SimCGA went commercial with release 4.0, according to the
- publisher (via Joe Morlan). Versions prior to this were copyrighted
- free programs.
-
- SimCity (by Maxis) SIMCITY Mark Visser
- SHRCTY-1 Richard Steiner,
- SHRCTY-2 HW
-
- Smartdrive Disk Cache SMTDRV40 Michael Toth (1:115/220)
-
- Solitare (Win3 file) SOLITARE Wes Meier, the WCBBS,
- via Joe Morlan
-
- Solitare Royale SOLITRYL Dan Brady (1:282/108)
- SOLIT Bud Webster (1:264/165.7)
-
- Sourcer disassembler SOURCER Bill Lambdin (1:343/45)
-
- Space Quest (game by SQUEST1 Chris Nelson
- Sierra On-Line)
-
- | Spear of Destiny SODINC1 Mario Degryse (2:291/1600)
- | SODINC2 verified by Jay Wilbur,
- | SODINC3 Id Software (1:124/6300)
-
- Spidey (game) SPIDEY Brian Henry (ILink,
- via Richard Steiner,
- HW
-
- Spot (7-Up game) SPOT Steve Hodsdon (1:132/199)
- COOLSPOT Jason Arthurs (WildNet,
- via HW Ken Whiton)
-
- Squish 2.1 SQUISH21 Several
- (verified by Joe Morlan)
-
- Squish Plus 2.01 SQUISH21 Stephen Kawamoto
- (Sundog Software) (1:153/7004)
-
- StormLord STRMLORD Mark Visser (1:221/76)
- (game)
-
- Supaplex Unknown Kevin Donald (1:123/54)
- Rick Rosinski (1:239/1004)
- Dennis Matney (1:230/12)
-
- SuperStor SSTOR204 John Van Eekelen (2:500/228)
-
- System Control PCSSCC Ken Whiton, HW
- Commander (from
- PC Sources Mag)
-
- Tetris (the original) #1TETRIS Harold Stein (WildNet)
-
- The Bard's Tale pt. 3 BARDS-1 Chris Nelson (1:238/500)
- (game) BARDS-2
-
- Tidbits TIDBITS Art Taber
- (game? from Softdisk) via Stuart Kremsky
- (1:125/28)
-
- Times of Lore (game) LORE Chris Nelson
-
- Toobin' (game) TOOBIN Joseph Lowe (1:387/1201)
-
- Top Gun TOPGUN Cimarron Mittelsteadt
- (WildNet, via Ken Whiton)
-
- Tunnels of Armageddon TUNNELS1 Wolfgang Fritz (1:249/140)
- TUNNELS2
-
- UTscan UTSCAN Bill Lambdin (1:343/45)
- (part of the Untouchable package by Fifth Generation Systems)
-
- VGA-Copy v4.6 VGACPY46 Bert Bredewoud (2:281/703)
- (Registered Copy)
-
- Virex-PC VIREX Wes Meier, via Joe Morlan
- VIREX1 Glenn Jordan (1:3641/1.201)
- VIREX2
-
- Virhunt 2.0 VIRHUNT2 Bill Lambdin (1:343/45)
- VRHUNT20
-
- Virus_Safe VSCHECK Bill Lambdin (1:343/45)
-
- Wolfenstein-3D WOLFSINC Jeff Kaplow (1:120/364)
- (Non-Shareware modules)
-
- =========================================================================
-
- ?????Questionable Programs?????
-
- | Glenn Jordan verifies that a file called VIREX30 (reported by someone
- | whose name I didn't catch - if you're reading this, please correct me!)
- | is not a legitimate file. He has not seen it, so he is not sure if it is
- | a hack of the commercial Virex-PC, or a hoax of the shareware VIRx
- | program. (Glenn works for the company that produces both.) In the
- | latter case, the latest official release of VIRx is version 2.5.
-
-
- | Jeff Hancock (1:3600/7) forwarded a thread from the C-GAMING echo (net
- | unknown) about a "demo" version of the Lemmings! game. This demo, in
- | excess of 500k archived, is said to have more than the three levels that
- | the real demo has. The real demo is about 250k archived. Warren
- | Zatwarniski (1:140/44) confirms the "crack," presenting documentation
- | from the file that mentions the alias of the group that cracked it.
- |
- | Do be aware that at least 2 legitimate demos of Lemmings! have been
- | released, one using the same filename as the crack. To tell the
- | difference, look for text files in the archive that mention "trainers" or
- | other such copy-protection bypass schemes.
-
-
- James FitzGibbon (1:250/428) forwarded a message from a local SysOp
- conference about a potential problem with a file that came down the
- Utilnet and SOFTDIST file distribution networks. The file, Vern Buerg's
- LIST v7.7a, came through both nets, but the file sizes were different.
- Here is an excerpt of James' message:
-
- The 2 versions contain the same FILES, but not the same internal
- sizes. 4 files are different in the 2 versions.
-
- NAME SIZE DATE TIME LENGTH METHOD
- =======================================================
- In the one from Softdist these 4 files are:
- ARCE DOC 4048 04/12/92 04:10 12165 IMPLOD
- FV DOC 2711 03/10/92 01:40 7323 IMPLOD
- LIST DOC 28839 10/07/92 07:07 99429 IMPLOD
- LISTMOD DOC 5829 10/07/92 07:07 19472 IMPLOD
-
- In the one from UtilNet these 4 files are:
- ARCE DOC 3868 04/12/92 04:10 11829 COMP1
- FV DOC 2571 03/10/92 01:40 7144 COMP1
- LIST DOC 26814 10/07/92 07:07 96308 COMP1
- LISTMOD DOC 5590 10/07/92 07:07 18802 COMP1
-
- Note the LENGTH Column is actual size, SIZE is the compressed size.
-
- I have contacted James for further information about the file that came
- through SOFTDIST. It seems that it may have been altered in transit,
- possibly accidentally. In the meanwhile, I have verified that the
- version that came through Utilnet matches the version posted on Vern
- Buerg's official BBS.
-
- | HW Ken Whiton received a message from Phillip Mann over the WildNet about
- | the differences in the documentation sizes. Phillip contacted the folks
- | at Mr. Buerg's headquarters, who were unaware of any size differences
- | until they looked at their own copies: apparently, the LIST.DOC file in
- | the registered archive is 99429 bytes, the shareware version is 96308,
- | and the version on their own BBS is 91203 bytes. The Buerg
- | representative couldn't explain the differences, Phillip says, but
- | Phillip was assured that all three were "OK."
-
- In summary, LIST 7.7a is legitimate, but there may be an isolated
- incident of a truncated archive out there. Please forward any
- information you may have on this.
-
-
- Michael Toth (1:115/220) reports that he has a copy of the VIRTUAL file
- listed in The Trojan Wars section of this report. His copy is a Virtual
- Reality demo, and is not infected or dangerous. He was unable to find
- the text strings (mentioned above) in his copy. Sounds like the Trojan
- version might be an isolated incident.
-
-
- Cory Daehn (1:395/12) reports in the FidoNet PDREVIEW echo that there are
- three versions of our old friend XTRATANK. A recent message circulating
- in FidoNet about XTRATANK placing a two-part virus (half when installed,
- half when uninstalled) on your HD is true for the third version of
- XTRATANK, according to Cory. I have not seen this version, nor have I
- received any file sizes to compare to the version I sent to Bill Logan.
- However, I will report these when received.
-
-
- HW Matt Kracht forwarded a message from Stu Turk in the DR_DEBUG
- echo about possible Trojans going around as PKZIP 2.21 and/or 2.22. Stu
- also says that there is a warning about these in circulation. If you
- have a copy of this warning, please send a copy to Hack Central Station
- (1:382/95).
-
-
- On the game front, some official information about which Apogee releases
- are shareware. According to Jay Wilbur (1:124/6300) of Id Software,
- episodes 1 and 4 of Commander Keen, along with the demo version of
- episode 6 are distributable, as is episode 1 of Wolfenstein 3-D. Other
- versions of these games are not supposed to be posted for download.
-
-
- Jan Welch (1:382/87) has reported in the FidoNet VIRUS echo a file called
- W3DEDIT.ZIP, which she claims is a Trojan that will attack your hard
- drive's boot sector. At first glance, this looks like a renamed
- WLFCHEAT, but I can't be sure. I've sent NetMail for more information,
- so be on the lookout and report anything you know about it, if you would.
-
-
- Steve Klemetti (1:228/19) has found an archive of the Apogee game
- Paganitzu (#1PAGA.ZIP) that may either be a hack or a corrupted archive.
- The file size is 281K, and the .EXE file within is 8K (vs 11K for the
- official archive. Steve says the opening screens go by "too fast," then
- the program puts your hard drive in "a constant seek mode." The file
- passed viral scanning. Like I said, this could just be a corrupt
- archive, but you never know. Just be on the lookout for an archive that
- meets these specs, and avoid it. The real thing is a pretty decent game,
- though, according to my 6-year old son, so don't avoid _all_ #1PAGA.*
- files just because of a bad version.
-
-
- BiModem is the subject this time, but the situation doesn't quite fit
- into any of the other categories of this report. A few users have seen a
- version called BIMOD125.* floating around, and wondered if it was a hack.
- Steve Baker (1:114/116.0) called the support BBS and verified your Hack
- Squad's information: v1.25 is a closed beta. Version 1.24 is the latest
- public release. This information was also verified by the Hack Squad (in
- lurk mode over in the BIMODEM echo) through a message posted by Michael
- Ingram (1:114/151). In short, if you see BIMOD125, delete it - it's a
- beta that shouldn't be out yet.
-
-
- Yet another one that doesn't seem to fit anywhere is a Windows program
- called WinSpeed. Bill Eastman (1:382/35) relayed a message from Alan
- Zisman (1:153/9) in the WINDOWS echo about this file, and Piyadaroon
- Kalayanamit (1:382/87) quickly cleared the confusion. Apparently, there
- are _two_ different programs called WinSpeed: one is a commercial package
- of Windows video drivers, which should not be posted for download on any
- BBS. The other is a small utility that will report your system speed
- from within Windows, and is a legitimate shareware file.
-
- James Brown (1:266/22.0) has reported in the WINDOWS echo that the
- shareware WinSpeed has been renamed to WINDSOCK. According to James, the
- author(s) took the original off of CompuServe, renamed it, and
- resubmitted it. Hopefully, this will ease the confusion, but there
- _will_ be copies floating around under the old name. So, be careful with
- this one. If you get a copy of the video driver file from someone,
- delete it: it is not shareware.
-
-
- Finally, several people have been wondering whether a shareware version
- of XTreeGold has been released. According to XTree Support (in the XTREE
- forum on CompuServe), the last shareware release of XTree was version
- 2.00E (XTREE20E). This is _not_ XTreeGold: in fact, no shareware release
- of XTreeGold has ever been made. It is unclear as to whether a copy of
- XTreeGold has spread beyond the "pirate boards," but this much is clear:
- if you receive a version later than 2.00E that is described as shareware,
- delete it. It's pirated.
-
- =========================================================================
-
- Information, Please
-
- This the section of The Hack Report, where your Hack Squad asks for
- _your_ help. Several reports come in every week, and there aren't enough
- hours in the day (or fingers for the keyboards) to verify them all. Only
- with help from all of you can The Hack Report stay on top of all of the
- weirdness going on out there in BBSLand. So, if you have any leads on
- any of the files shown below, please send it in: operators are standing
- by.
-
-
- | First, an update on a file reported in the second update to the November
- | full report. Bill Lambdin (1:343/45) reported a "working copy" of
- | Microsoft's Visual Basic on a local BBS. The two files were over 1meg
- | each, so they seemed a bit suspicious. However, Margaret Romao
- | (1:3603/150) reports that the working demo is a file which does
- | everything that the real program does except create executable files.
- | She also says that the file has been around for some while now. Mark
- | Allan (1:259/431) verifies this, having seen it on Microsoft's BBS.
- | Thanks for the clarifications, folks - that's what this report is all
- | about!
-
-
- | Now, for this month's "help wanted" notices. The first one is again from
- | Bill Lambdin, who forwarded a message from Mario Giordani in the ILink
- | Virus Conference about two files. The archives, called PHOTON and NUKE,
- | are possibly droppers, containing a file called NUKE.COM which "will
- | trash your HD." Bill has asked Mario for further information, and I
- | would like to echo his call for help. If you know of this, please lend a
- | hand.
-
-
- | Another one forwarded by Bill comes from Michael Santos in the Intelec
- | Net Chat conference, concerning a screen saver named IM. This is only a
- | "hearsay" report from one of Michael's friends, who says he downloaded it
- | and wound up with a virus. There is no way to tell if the infection came
- | from the file itself or if it was already present on his friend's system.
- | Once again, if anyone can clear this up, please do so.
-
-
- | One more such warning comes from Mark Stansfield (1:115/404) concerning
- | the files KILL and PROTECT. He claims that these delete the user's hard
- | drive when run. I have received no confirmation of these, and would
- | appreciate some if anyone has any.
-
-
- | Ned Allison (1:203/1102) forwarded a report into the FidoNet DIRTY_DOZEN
- | echo from a user of The Mailbox BBS in Cleveland (216/671-7534) named
- | Rich Bongiovanni. Rich reports that there is a file floating around
- | called DEMON WARS (archive name DMNWAR52) that is "infected with a
- | virus." If true, this may be an isolated incident. I would appreciate
- | confirmation on this.
-
-
- | Brian Keahl (1:133/524) stated in the VIRUS_INFO echo that a program
- | called PC-Mix (no archive name given) is a commercial program that is
- | being erroneously distributed as shareware. I had not heard this before,
- | and would appreciate confirmation.
-
-
- | Greg Walters (1:270/612) reports a possible isolated incident of a
- | problem with #1KEEN7. When he ran the installation, he began seeing on
- | his monitor "what looked like an X-rated GIF." The file apparently
- | scanned clean. Any information on similar sightings would be
- | appreciated.
-
-
- | A report from Todd Clayton (1:259/210) concerns a program called
- | ROBO.EXE, which he says claims to apparently "make RoboBoard run 300%
- | faster." He says he has heard that the program fools around with your
- | File Allocation Table. I have not heard any other reports of this, so I
- | would appreciate some confirmation from someone else who has seen similar
- | reports.
-
-
- | Kelvin Lawson (2:258/71) posted a message in the SHAREWRE echo about a
- | possible hack of FEBBS called F192HACK. I have not seen this file, nor
- | has the author of FEBBS, Patrik Sjoberg (2:205/208). He forwards the
- | file sizes in the archive, reported here:
- |
- | Name Length Mod Date Time CRC
- | ============ ======== ========= ======== ========
- | FEBBS.EXE 220841 09 Mar 92 21:17:00 96D2E08D
- | 014734.TXT 1403 26 Aug 92 01:59:18 3B9F717F
- | ============ ======== ========= ======== ========
- | *total 2 222244 26 Aug 92 01:59:24
- |
- | Kelvin says the .TXT file is just an advert for a BBS, so it is "not
- | relevant!". As I said, the author of FEBBS has never seen this file, so
- | I've asked Kelvin to forward a copy of it to him.
-
-
- Mark Draconis (1:120/324) has found a file called TELE214R, claiming to
- be the latest version of Teledisk. He asked for verification in the
- FidoNet SHAREWRE echo of its status. On this same line, Kelvin Lawson
- reports TELE215R. Steve Quarrella (1:311/405) believes that the program
- has gone commercial, perhaps after version 2.12 or 2.13. Your Hack Squad
- has no idea, and has not yet had a chance to call Sydex by voice. Please
- help.
-
-
- An update on the report from James Collins (1:102/1013) on Virus
- Simulator 2.0 (archive name unknown) - if you remember, he says the
- documentation looks authentic, but the program "looks like someone has
- hacked it so that it crashes purposefully." The file performs a
- self-check at startup, then crashes.
-
- George C. Smith (CompuServe 70743,1711) says this sounds like a hack of
- the Rosenthal Engineering Virus Simulator. George explains that this
- program performs an integrity check at startup and will abort if it has
- been modified. He says his information comes from the file's
- documentation.
-
- I found a copy of this file on the IBMSYS forum of CompuServe under the
- filename VIRSIM.COM. This program does perform an integrity check at
- startup and will abort if it has been modified.
-
- So, it would appear that James has found a copy of Virus Simulator that
- was tampered with. Fortunately, the program is smart enough to know the
- difference.
-
-
- | Your Hack Squad has seen several references to a release of Scorched
- | Earth calling itself v2.0 (SCORCH20). The latest official version I am
- | aware of is v1.2. If someone can verify the latest release number,
- | please do so.
-
-
- Andrew Owens (3:690/333.11) forwarded a report of a "Maximus BBS
- Optimiser (sic)," going under the filenames MAX-XD and MAXXD20. Scott
- Dudley, the author of Maximus, says he did not write any programs that
- have these names, but he does not know whether they are or are not
- legitimate third party utilities. I have requested further information
- from Andrew on this topic, and would appreciate anyone else's
- information, if they have any.
-
-
- Stephen Furness (1:163/273) left a short message in the FidoNet VIRUS
- echo about a file called RUNME. He says it claims to be a VGA ad for a
- BBS, but actually trashes your hard drive's boot sector. Now, a file
- with a name like RUNME makes me raise an eyebrow immediately, but this is
- still a single sighting. Please forward details if you see this file.
-
-
- Yet another short warning comes from David Bell (1:280/315), posted in
- the FidoNet SHAREWRE echo, about a file called PCPLSTD2. All he says is
- that it is a Trojan, and that he got his information from another
- "billboard" and is merely passing it on. Again, please help if you know
- what is going on here.
-
-
- Bud Webster (1:264/165.7) reports an Apogee game being distributed under
- the filename BLOCK5.ZIP. He says that the game displayed a message that
- said, "This game is not in the public domain or shareware." There was
- only an .EXE file in the archive, and no documentation. I need to know
- what the real name of this game is so that I can include it in the
- pirated files section (if necessary).
-
-
- Now, a sensitive subject. Arthur Shipkowski (1:260/213.2) forwarded a
- message from Kenny Root (GT-Net Shareware Forum), about a file called
- SHAMpage (SHMPG310.*). Kenny claims he downloaded this from a Door
- Distribution Network board, unzipped and ran it, and wound up with
- thousands of directories and the 1260 virus. This is the only report I
- have of this, and it is unconfirmed.
-
- I posted a question about this in a local echo in Austin, and found no
- one who had experienced the same symptoms. I also consulted George
- Vandervort (1:382/8), a beta tester for SHAMpage, and learned that the
- file that went out over the Door Distribution Network was perfectly
- legitimate and not harmful in any way.
-
- Rich Waugh, the author of SHAMpage, posted a message in the SHAREWRE echo
- about this: according to him, he hatches the latest releases from his
- system into the DDSDOORS file distribution net. All copies of SHAMpage
- hatched from his system contain a "DrawBridge" ZIP comment. For
- reference, the latest version (as of September 8, 1992) is v3.24.
-
- Mr. Waugh further states (and I agree) that he has "a lot of faith in the
- various file distribution networks," and he finds it hard to believe that
- the file picked up any sort of infection in the net itself.
-
- In summary, SHAMpage 3.10 is a legitimate file, but a tampered archive of
- it may be floating around. How it was tampered with is anyone's guess.
- If anyone sees an altered archive of this file, please forward the
- information so that I can post specifics on it.
-
-
- A message in the FidoNet ASIAN_LINK echo from Choon Hwee (1:3603/263)
- grabbed my attention the moment I saw it: in capital letters, it said,
- "DO NOT RUN this file called MODTEXT.EXE, cause it is a TROJAN!!!". He
- goes on to say that two BBSs have been destroyed by the file. However,
- that's about all that was reported. I really need more to go on before I
- can classify this as a Trojan and not just a false alarm (i.e., archive
- name, what it does, etc.). Please advise.
-
-
- Greg Mills (1:16/390) posted a question to Robert Jung in the ARJ Support
- Echo (FidoNet) about a version of ARJ called 2.33. It was unclear as to
- whether or not Mr. Mills had seen the file. Mr. Jung has repeated that
- the latest version of ARJ is v2.30 (however, there is a legitimate public
- beta version numbered 2.39b). It is possible that the references Greg
- saw about 2.33 were typos, but you never know. Please help your Hack
- Squad out on this one - if you see it, report it.
-
-
- I still have no further confirmation of MTG2400, reported by Zach Adam of
- 1:2200/103. The description says this program will run a 2400bps modem
- like a 4800bps modem, which sounds a bit like the MTE program listed in
- the Pirated Commercial Software section. Any information would be
- appreciated.
-
-
- As the last item in this report, your Hack Squad could use some info on
- the TUNNEL screen saver. Ove Lorentzon (2:203/403.6) reports that this
- is an internal IBM test program for VGA monitors. HW Richard Steiner
- forwarded a message from Bill Roark (RIME address BOREALIS, Shareware
- Conference) that had some quoted text strings from the executable. One
- says, "IBM INTERNAL USE ONLY."
-
- This file is extremely widespread, however, so I need to hear from
- someone who knows what IBM's position on this is. Has IBM changed its
- mind and made it legal to distribute this via BBS? If you know for
- certain, please advise.
-
- =========================================================================
-
- The Meier/Morlan List
-
- | A couple of updates: first, Jeff Hancock (1:3600/7) states that KAEON is
- | "freeware, a scrolling horizontal space shootemup, requires VGA and
- | supports Adlib/SB. Size 423k, about 301 arjed." Jeff says that if there
- | is another Kaeon out there, he hasn't heard of it. HW Matt Kracht
- | confirms this, saying that the game was written by a guy named "Tran,"
- | and is freeware. So, with this, Kaeon comes off the list.
-
-
- | Also from the Meier/Morlan list, HW Nemrod Kedem reports that TDWIN31,
- | TF386, and TLINK4 were made available by Borland International on their
- | public download BBS. Nemrod is a Borland support site in Israel, and he
- | has all of these on his board with the "permission of the Israeli
- | representative of Borland International." With this, these files also
- | come off the list.
-
-
- | Kevan McWhorter (1:3637/1) and Jerry Murphy (1:157/2) report that the
- | file SYSID602 is a legitimately distributable file. It is a utility that
- | generates several screens of information about the machine it is run on,
- | similar to Norton's SI program. Again, two confirmations, and the file
- | comes off the list. Thanks to Kevan and Jerry for their help!
-
-
- For those of you who missed it last time, here is the list of files that
- were forwarded by Joe Morlan (1:125/28), as compiled by Wes Meier, SysOp
- of the WCBBS (1-510-937-0156) and author of the AUNTIE BBS system. Joe
- says Wes keeps a bulletin of all rejected files uploaded to him and the
- reasons they were rejected. Joe also says he cannot confirm or deny the
- status of any of the files on the list.
-
- I have included some of the files I can verify from this list in the
- Pirated Commercial Files section of this report. However, there are some
- that I am not familiar with or cannot confirm. These are listed below,
- along with the description from Wes Meier's list.
-
- Due to the unconfirmed nature of the files below, the filenames are not
- included in the HACK1192.COL file. I would appreciate any help that
- anyone can offer in verifying the status of these files. Until I receive
- some verification on them, I will not count them as either hacks or
- pirated files. Remember - innocent until proven guilty.
-
- My thanks go to Joe and Wes for their help.
-
- Filename Reason for Rejection
- ======== =============================================
- BARKEEP Too old, no docs and copyrighted with no copy
- permission.
- HARRIER Copyrighted. No permission to copy granted.
- SLORGAME Copyrighted. No docs. No permission to copy
- granted.
- NOVELL Copyrighted material with no permission to
- BBS distribute
- DRUMS I have no idea if these are legit or not. No
- docs.
- SPACEGOO STARGOSE in disguise. Copyrighted.
- GREMLINS No documantation or permission to copy given.
- NAVM Copyrighted. No permission to copy granted.
- TESTCOM Copyrighted. No permission to copy granted.
- CLOUDKM A hacked commercial program.
- ANTIX Couldn't make this work. No docs.
- MEGAMAN Copyrighted. No docs. No permission to copy
- granted.
- MENACE Copyrighted. No docs. No permission to copy
- granted.
- AIRBALL A hacked commercial program.
- WIN_TREK No documentation. No permission to copy.
- SNOOPY Copyrighted. No docs. No permission to
- copy granted.
- SLORDAX Copyrighted. No docs. No permission to
- copy granted.
- ESCAPE Copyrighted. No docs. No permission to
- copy granted.
- AFOX A cracked commercial program.
- BANNER Copyrighted. No docs. No permission to
- copy granted.
- FIXDOS50 Copyrighted. No permission to copy granted.
- WINGIF14 The author's documentation specifically
- requests this file to not be distributed.
- INTELCOM Copyrighted. No docs. No permission to
- copy granted.
- 3DPOOL Copyrighted. No docs. No permission to
- copy granted.
- 387DX Copyrighted. No docs or permission to
- copy granted.
- WINDRV Copyrighted. No permission to copy granted.
-
- =========================================================================
-
- Clarifications/Acknowledgements
-
- | When I put the last full report together, I apparently missed a couple of
- | "latest version" listings. First, I neglected to update the latest
- | version of Vern Buerg's LIST.COM, now at v7.7a. (A later release,
- | LIST77A2, may be in circulation, and is also legitimate.)
- |
- | Also, I missed an item concerning McAfee's ViruScan. The latest version
- | of this file is now 99.
- |
- | Thanks to those who wrote in and caught these - quite embarassing, but I
- | needed it.
-
-
- | Also, in the last report, I listed a crack of Id Software's Spear of
- | Destiny under the filename !SOD!. However, I have since been informed
- | by Jay Wilbur of Id Software that there is a legitimate demo of Spear of
- | Destiny going around under this filename. Jay says that the legitimate
- | file quite clearly identifies itself as a demo when run. However, Jay
- | does confirm that there is a crack of the full commercial game out there
- | somewhere - I just used the wrong filename. My apologies.
-
-
- | In the second November update, there was some confusion about the latest
- | version of Con>Format by Sydex. Jeff White (1:300/23) has verified that
- | the latest official release is v1.08a. My thanks go out to him.
-
-
- | Thanks also to Bill Logan of The Pueblo Group for his assistance in the
- | research of the GSZ611R file (listed in the Pirated files section). He
- | has verified that this is simply a registered version of the GSZ
- | protocol, and not a dropper or Trojan as had been feared.
-
-
- | Finally, in the last issue, I managed to misspell the name of one of the
- | reporters. To Warren Zatwarniski, I also extend my apologies.
-
- =========================================================================
-
- Notes
-
- FidoNet Node 1:382/87, The ECS BBS, referenced several times in this
- report, is no longer an active node. Reports from that node and its
- SysOp, Mark Evans, will not be removed from this report. Mark may now be
- contacted at 1:382/91.1.
-
- Malte Eppert (2:240/500.6) wishes it to be known that the report he
- forwarded from Dick Hazeleger about EARLYWA was just that, a forwarding,
- and not an agreement with or confirmation of the forwarded report. The
- report he forwarded does not express or include his opinions.
-
- *************************************************************************
-
- Conclusion
-
- If you see one of these on a board near you, it would be a very friendly
- gesture to let the SysOp know. Remember, they can get in just as much
- trouble as the fiend who uploads pirated files, so help them out if you
- can.
-
- ***HACK SQUAD POLICY***
-
- The intent of this report is to help SysOps and Users to identify
- fraudulent files. To this extent, I give credit to the reporter of a
- confirmed hack. On this same note, I do _not_ intend to "go after" any
- BBS SysOps who have these programs posted for d/l. The Shareware World
- operates best when everyone works together, so it would be
- counter-productive to "rat" on anyone who has such a file on their board.
- Like I said, my intent is to help, not harm. SysOps are strongly
- encouraged to read this report and remove all files listed within from
- their boards. I can not and will not take any "enforcement action" on
- this, but you never know who else may be calling your board. Pirated
- commercial software posted for d/l can get you into _deeply_ serious
- trouble with certain authorities.
-
- Updates of programs listed in this report need verification. It is
- unfortunate that anyone who downloads a file must be paranoid about its
- legitimacy. Call me a crusader, but I'd really like to see the day that
- this is no longer true. Until then, if you _know_ of a new official
- version of a program listed here, please help me verify it.
-
- On the same token, hacks need to be verified, too. I won't be held
- responsible for falsely accusing the real thing of being a fraud. So,
- innocent until proven guilty, but unofficial until verified.
-
- Upcoming official releases will not be included or announced in this
- report. It is this Co-Moderator's personal opinion that the hype
- surrounding a pending release leads to hacks and Trojans, which is
- exactly the opposite of what I'm trying to accomplish here.
-
- If you know of any other programs that are hacks, bogus, jokes, hoaxes,
- etc., please let me know. Thanks for helping to keep shareware clean!
-
- Lee Jackson, Co-Moderator, FidoNet International Echo SHAREWRE (1:382/95)