home *** CD-ROM | disk | FTP | other *** search
Text File | 1989-11-12 | 52.6 KB | 1,033 lines |
- ----------------------------------------------------------------
- | THE GUARDIAN LIST |
- | |
- | -- An Uploaded Trojan/Virus Program Alert List. |
- | This list is distributed thru FidoNet and |
- | LCRNET. |
- ----------------------------------------------------------------
- | Issue #1: Sept 25, 1989 |
- | |
- | Revision Stage 'B' |
- | |
- |Compiled by Sysops of FidoNet and LCRNET and other sources |
- |Edited by Tom Sirianni of FidoNet 105/301 |
- ----------------------------------------------------------------
-
- Introductory Note:
-
- This Trojan Alert List is dedicated to the efforts of the End User
- and the Sysop who have had very little support. Now, through The
- Guardian List, those Users/Sysops stand a chance in the fight
- against worms, trojans, and viruses, reporting the results to you,
- the User. It is because of the efforts of many Sysops who have
- spent countless hours to have a BBS online and because of the End
- Users who love PD and ShareWare programs that this list is
- presented and aggressively maintained.
-
- Although there are other lists available, the Guardian is the only
- list that is constantly maintained and distributed through
- FidoNet's SDS network, assuring its distribution internationally in
- a matter of days. Much of what goes into The Guardian List comes
- from the DIRTY_DOZEN echo conference. Within this conference are
- Sysops and Users from around the world who help in the
- determination of what are and are not trojans/virii. There are also
- groups in Colleges abd Universities around the country
- participating in the List's development and maintenance.
-
- What's in the future? As the SDNet/Works! (The Shareware
- Distribution Network) takes affect, you will see fewer attacks on
- Sysops as files are distributed through a controlled source, direct
- from the Authors. Until this concept is fully mobilized, The
- Guardian List will be here to help you, the Usesr and the Sysops,
- including those Sysops not in FidoNet or LCRNET.
-
- Tom Sirianni
- SCP Business BBS
- FidoNet 105/301
- LCRNET 1010/0
-
- SCP Business BBS, nor its Sysop or Editor, assumes any
- responsibility for the validity or completeness of this list. Many
- sources contribute to the list, and it is very possible that one of
- the reported files works perfectly and is in the Public Domain.
-
- But all the same, it is quite possible that a mistake will slip in
- somewhere. Since this is the case, please keep in mind while
- reading this list that, however unlikely, it is possible that I am
- (or my sources are) incorrect in any accusation.
-
-
- Note: ** Some TROJANS are designed to work only on [Hard] Drives **
-
-
- HELP FROM USERS REQUESTED:
-
- Users upload bad software to hundreds of boards every day, and
- often times, the software is not yet in this list, or the file may
- have been corrupted due to a bad ARCHIVE. However, if you run a
- trojan horse program that is not listed here, please don't send it
- to SCP Business BBS. Instead, give me a call (SCP Business BBS
- phone 1-503-648-6687 9600-v42/2400/1200/300 baud supported) and
- leave me a message about the program (with a complete filename and
- any other information you may have) so that I can get the
- destructive program in the next issue. It is important to verify
- that the program is a TROJAN and not an OPERATOR error. If anyone
- is unsure whether or not a file is a Trojan, and it's not listed in
- the GL, I recommend using a utility like BOMBSQAD.COM or
- CHK4BOMB.EXE to prevent any mishaps. For VIRUSES, use VirusScan or
- FlusShot+. After your call, I may want you to upload it just to
- verify it myself if you are unable to.
-
-
- A WORD FROM TOM SIRIANNI: TYPE OF TROJAN -- THE VIRUS...
-
- A Virus is a trojan which attaches itself to certain files and at
- predetermined time attacks your FAT, DIR, and/or BOOT areas, CROSS-
- LINKing files and looking for ways to attach itself to diskettes and
- other disks containing files such as IBMDOS, IBMBIO, COMMAND.COM,
- etc. This type of virus spreads its dirty work to other systems much
- like the flu or a cold, relying on the user to spread the VIRUS.
- Protection (to a limited degree) from these virus strains is avail-
- able with ShareWare programs SENTRY, SCAN (VirusScan), and FSP
- (FluShot Plus), which are all available on the SCP Business BBS,
- 105/301 FidoNet, 1-503-648-6687 (PC-Pursuit ORPOR), or through SDS
- nodes within FidoNet (note that SDS and SDN are two separate
- enities).
-
- The best program, called SCAN, better know as VirusScan, can check
- any physical or logical drive or diskette for any file infected by
- a Virus. It will tell what type of Virus and where it is located.
-
-
- WHAT TO DO IF YOU THINK YOU ARE INFECTED WITH A TROJAN/VIRUS
-
- There are three ways to tell if you are infected:
-
- 1) First, have a GOOD DOS diskette with COMMAND.COM on it, PLUS
- put a WRITE-PROTECT TAB on your DOS disk. Then, from your system,
- do a DIR on the good DOS diskette. If you get a WRITE-ERROR, you
- are infected -- DIR does not do any writing of any kind, whereas
- the VIRUS does.
-
- 2) Another way is to check and compare the time-date stamp of
- COMMAND.COM. The Virus writes to the COMMAND.COM thereby changing
- the time-date stamp.
-
- 3) Use SCAN to tell if you are infected and it will tell you
- what type.
-
-
- The psychologically unbalanced individuals writing and uploading
- these programs will change their viral methods, so beware. Many
- new viral detection programs are in the works, both commercially
- and in the public domain, to keep up with the viral programs we
- have available, to confirmed SYSOPS, Virus/Trojan information
- texts on SCP Business BBS. The Virus text files are ZIPed and can
- be File-Requested thru FidoNet BBS's as VIRUS-1.ARC & VIRUS-2.ARC.
-
-
- Simple precautions:
-
- The thing to do is to check the contents of your downloads via the
- verbose command of the type of archiving program used, making sure
- ANSI.SYS is disbaled first. DO NOT DOWNLOAD any files without any
- available or known documentation unless you are assured it is safe
- by the SYSOP. Also, do not accept any ARCHIVE or diskette
- containing a file named COMMAND.COM. Use VirusScan!!!
-
- Remember -- these new TROJANS are no laughing matter. Without
- causing mass hysteria, use your best judgment, and check your
- procedures first!
-
- Final note: There is a commercial program called C-4 by
- InterPath Corp. which will (to date) detect and contain ALL known
- PC-VIRUSES. So for the ultimate 100 percent protection, get C-4.
-
- C-4 by InterPath Corp.
- 4423 Cheeney St.
- Santa Clara, Calif.
- 95054
- 1-408-988-3832
- was $40.00
-
- ----------------------
-
-
- A word on TROJANS -
-
- In the course of time trojans/viruses have gained MEDIA attention.
- Unfortunately, RUMORS have always played a major factor in its
- notoriety. The truth is, of all those reported are minimal compared
- to the vast amounts of programs out there in the BBS community.
- Some are designed to defame people or companies. As an example,
- Dorn Stickel has been noted to be a supposed Author of several
- TROJANS. But in real life, he is not that person. So, until
- verified, do not think it is real and, at the same time, do not
- ignore the existence either. Be cautious with all types of file
- transfers and all types of media used.
-
-
- ANSI TEXT FILES/DOC FILES:
-
- Did you know a TROJAN can be used in DOC and TEXT files? If your
- system is configured for ANSI.SYS in your CONFIG.SYS file, your
- keyboard could be redirected or the keys reconfigured.
-
- For example, you could hit the F1 key and the trojan could do a
- High Level Format; or hit ALT-X and it will say "del *.* and yes".
- It can answer to the prompts and before you say, "What the
- '(&^(~*%' is going on?", your system is deleted. And it can also
- hide those commands.
-
- USE A BROWSER OR LISTER PROGRAM WHEN LOOKING AT ANY TEXT/DOC FILE;
- even an editor or PC Tools Edit or word process will work. This
- way, no redirection can take place.
-
-
- ANSI IN ARC FILES:
-
- It has been noted that it is possible to put ANSI redirection codes
- within several types of ARCers used to archive files in the BBS
- community. To be safe, do not do a VERBOSE listing of an ARC unless
- you make sure ANSI.SYS is disabled in your system's CONFIG.SYS.
- Also, there are several utilites available through SDS nodes in
- FidoNet such as STRIPZIP which will take those ANSI codes out of
- the ARCed file. Current versions of LHARC, PAK, and PKZIP now
- default to ANSI display turned OFF, so this helps.
-
- Final Note:
-
- Before we go into the listing as of the current date of this issue,
- it seems that the Jerusalem Virus is the most natorious or the
- most promient. When infected, the way to get rid of the Virus is to
- run VirusScan to determine which file it is then delete that and
- replace it with known GOOD file.
-
- ------------------------------------------------------------------
-
-
- TITLE DEFINITIONS:
-
- TROJAN These programs PURPOSEFULLY damage a
- user's system upon their invocation.
- They usually aim to disable [Hard] disks,
- although they can destroy other
- equipment, too.
-
- VIRUS These programs are the ultimate TROJAN
- designed to infect as well as destroy
- the User's and other systems that it
- infects. Its sole purpose is to
- replicate itself while destroying the
- system. This term will be used in
- conjunction with those files that are
- infected as well as those files that
- start the virus.
-
- CAREFUL Programs labeled in this manner may
- may not be trojans; the question is
- how it's used. Use caution when running
- these programs!
-
- * The asterisks will be used to show that
- the file may or may not be "BAD" or
- unresolved.
-
-
- NOTE: If a file extension is not supplied, that means that the
- file circulates under many different extensions. For instance,
- users commonly upload with extensions of .ARC, .PAK, .LZH, .SDN,
- .ZOO, .ZIP, or as .EXE or .COM files.
-
- -----------------------------------------------------------------
- | TROJAN HORSE PROGRAMS: |
- -----------------------------------------------------------------
-
- NAME CATEGORY NOTES
- -------------- -------- ---------------------------------------
-
- 3X3SHR *TROJAN Time Bomb type trojan wipes the [Hard]
- Drive clean. File size is 78,848.
-
- ANTI-PCB *TROJAN The story behind this trojan horse is
- sickening. Apparently one RBBS-PC
- sysop and one PC-BOARD sysop started
- feuding about which BBS system was
- better, and in the end the PC-BOARD
- sysop wrote a trojan and uploaded it to
- the rbbs SysOp under ANTI-PCB.COM. Of
- course the RBBS-PC SysOp ran it, and
- that led to quite a few accusations and
- a big mess in general. Let's grow up!
- Every SysOp has the right to run the
- type of BBS they please, and the fact
- that a SysOp actually wrote a trojan
- ntended for another sysop simply
- blows my mind.
-
- ARC2ZIP.EXE VIRUS This Lehigh Virus strain that attacks
- the COMMAND.COM and is used in
- converting ARCed files to ZIPed files.
- This file also copies itself into the
- ZIPed file while remaining a TSR within
- COMMAND.COM. Also it is always looking
- for COMMAND.COM on a FLOPPY diskette, so
- it has two ways to infect.
-
- ARC513.EXE *TROJAN This hacked version of ARC appears
- normal, so beware! It will write over
- track 0 of your [hard] disk upon usage,
- destroying the disk.
-
- ARC514.COM *TROJAN This is very similar to ARC version
- 5.13 in that it will overwrite track 0
- (FAT Table) of your [Hard] disk. Also, I
- have yet to see an .EXE version of this
- program.
-
- ARC533.EXE VIRUS This is a new Virus program designed to
- emulate Sea's ARC program. It infects
- OMMAND.COM. Lehigh Virus Type.
-
- BACKTALK *TROJAN This program used to be a good PD
- utility, but someone changed it to be
- trojan. Now this program will write/
- destroy sectors on your [hard] disk
- drive. Use this with caution if you
- acquire it, because it's more than
- likely that you got a bad copy.
-
- B30012A.ARC *TROJAN Was supposed to be a Quick BBS utilty
- to handle 300 baud Users. But what it
- really does is delete many of the
- general directories used by a Quick
- BBS system.
-
- CDIR.COM *TROJAN This program is supposed to give you a
- color directory of files on your disk,
- but it in fact will scramble your disk's
- File Allocation Table (FAT).
-
- D-XREF60.COM TROJAN A Pascal Utility used for Cross-
- Referencing, written by the infamous
- Dorn Stickel. It eats the FAT and
- BOOT sector after a time period has
- been met and if the [Hard] Drive is more
- than half full.
-
- DANCERS.BAS *TROJAN This trojan shows some animated dancers
- in color, and then proceeds to wipe out
- your [hard] disk's FAT table. There is
- another perfectly good copy of DANCERS.
- BAS on BBS's around the country; appar-
- ently the idiot trojan author altered a
- legitimate program to do the dirty work.
-
- DISKSCAN.EXE TROJAN This was a PC-MAGAZINE program to scan
- a [hard] disk for bad sectors, but then
- a joker edited it to WRITE bad sectors
- Also look for this under other names
- such as SCANBAD.EXE and BADDISK.EXE. A
- good original copy is availble on SCP
- Business BBS.
-
- DMASTER *TROJAN This is yet another FAT scrambler.
-
- DOSKNOWS.EXE *TROJAN I'm still tracking this one down --
- apparently someone wrote a FAT killer
- and renamed it DOSKNOWS.EXE, so it
- would be confused with the real,
- harmless DOSKNOWS system-status
- utility. All I know for sure is that
- the REAL DOSKNOWS.EXE is 5376 bytes
- long. If you see something called
- DOSKNOWS that isn't close to that size,
- sound the alarm.
-
- DOS-HELP TROJAN This trojan, when made memory-resident,
- is supposed to display a DOS command
- that the User needs help with. Works fine
- on a Diskette system, but on a [Hard]
- DRIVE system, it tries to format the
- [Hard] Disk with every access of
- DOS-HELP.
-
- DPROTECT *TROJAN Apparently someone tampered with the
- original, legitimate version of
- DPROTECT and turned it into a FAT
- eater. A good version is available
- on SCP Business BBS.
-
- DRAIN2 *TROJAN There really is a DRAIN program, but
- this revised program goes out does a Low
- Level Format while it is playing the
- funny program.
-
- DROID.EXE *TROJAN This trojan appears under the guise of
- a game. You are supposedly an architect
- who controls futuristic droids in search
- of relics. In fact, PC-Board sysops (if
- they run this program from C:\PCBOARD)
- will find that it copies C:\PCBOARD\
- PCBOARD.DAT to C:\PCBOARD\HELP\HLPX. The
- .EXE file is 54,272 bytes.
-
- DRPTR.ARC TROJAN File found on two boards in the 343
- Net. After running unsuspected file,
- the only things left in the Sysop's
- root directory were the subdirectories
- and two of the three DOS System files,
- along with a 0-byte file named
- WIPEOUT.YUK. The Sysop's COMMAND.COM
- was located in a different directory;
- the file date and CRC had not changed.
-
- DSZ (Patch) *CAREFUL The author of this protocol program,
- Chuck Forsberg, warns that anyone using
- an Unregistered version of DSZ that was
- HACKED with a downloaded PATCH to make
- it work fully, might get a SCRAMBLED FAT.
- Seems someone created the HACK PATCH and
- then uploaded it to BBS's. *BEWARE* of
- the PATCH! It is not the DSZ program that
- does the dirty work, but the invalid PATCH.
-
- EGABTR *TROJAN BEWARE! Description says something like
- "improve your EGA display," but when
- run, it deletes everything in sight and
- prints, "Arf! Arf! Got you!"
-
- EMMCACHE *CAREFUL This program is not exactly a trojan,
- but it (v. 1.0) may have the capability
- of destroying [Hard] disks by:
- A) Scrambling every file modified after
- running the program.
- B) Destroying boot sectors.
- This program has damaged at least two
- [Hard] disks; yet there is a base of
- happily registered users. Therefore,
- extreme caution is advised if you decide
- to use this program.
-
- FILER.EXE *TROJAN One SysOp complained a while ago that
- this program wiped out his 20 Megabyte
- [Hard] disk. I'm not so sure that he was
- correct and/or telling the truth any
- more. I have personally tested an
- excellent file manager also named
- FILER.EXE, and it worked perfectly.
- Also, many other SysOp's have written
- to tell me that they have like me used
- a FILER.EXE with no problems. If you
- get a program named FILER.EXE, it is
- probably alright, but better to test it
- first using some security measures.
-
- FILES.GBS CAREFUL When an OPUS BBS system is installed
- improperly, this file could spell
- disaster for the Sysop. It can let a
- user of any level into the system.
- Protect yourself. Best to have a
- sub-directory in each upload area
- called c:\upload\files.gbs (this is an
- example only). This would force Opus to
- rename a file upload of files.gbs and
- prevent its usage.
-
- FINANCE4.ARC *CAREFUL This program is not a verified trojan;
- there is simply a file going around
- BBS's warning that it may be a trojan.
- In any case, exercise extreme care with
- it.
-
- FLU4TXT.COM TROJAN Man, when I thought we had it licked!
- This Trojan was inserted into the
- FluShot4.ARC and uploaded to many
- BBS's. FluShot is a protector of your
- COMMAND.COM. The author of FluShot
- posted this Trojan warning, and I am
- posting it here in the GL. If you need
- a good copy, you can get it from here--
- SCP Business BBS--or on COMPUSERVE.
-
- FOX2.ARC TROJAN The show program was put into the FOX
- (SHOW.COM) archive to display a porono on VGA.
- While doing so it corrupts the FAT of
- the HD. Even NU can not recover it. A
- FAT recover program like MIRROR has
- not yet been tested for it.
- Name Size Date
- Show.com 14562 06/02/85
-
- FUTURE.BAS *TROJAN This "program" starts out with a very
- nice color picture (of what, I don't
- know) and then proceeds to tell you
- that you should be using your computer
- for better things than games and
- graphics. After making that point, it
- trashes your A: drive, and B:, C:, D:
- drives until it has erased all drives.
- It does not go after the FAT alone; it
- also erases all of your data. As far
- as I know, however, it erases only one
- sub-directory tree level deep, thus
- [Hard] disk users should only be
- seriously affected if they are in the
- "root" directory. I'm not sure about
- this one either, though.
-
- GATEWAY2 *TROJAN Someone tampered with version 2.0 of
- the CTTY monitor GATEWAY. What it
- does is ruin the FAT. If you need a
- good copy, you can file-request it or
- pick one up from 105/301--SCP Business
- BBS.
-
- GRABBER TROJAN This program is supposed to be a SCREEN
- CAPTURE program that copies the screen
- to a .COM to be run later from the DOS
- command line. As a TSR, it will also
- attempt to do a DISK WRITE to the [Hard]
- drive when you do not want it to. It
- will wipe whole Directories when doing
- a normal DOS command. One sysop who
- ran it lost all of his ROOT directory
- including his SYSTEM files. The file
- status is :
- Name Size Date Time
- GRABBER.COM 2583 05/28/87 22:10
-
- GRASPRT.EXE VIRUS This file was in a porno file called
- SEXSHOE.LZH originating from PC-EXEC
- BBS. The Sysop took it off, but it had
- been downloaded by a few people. This is
- one of the Jerusalem-B Virus strains.
- The status is:
- Name Size Date Time
- GRASPRT.EXE 73376 06/03/86 09:49
-
- G-MAN TROJAN Another FAT killer.
-
- HEART.EXE VIRUS Infected with the Israeli Virus.
- Displays the HEART logo on CGA monitor
- while infecting the HD. File is found
- on some SHAREWARE houses watch for it.
- Name Size Date
- HEART.EXE 13744 ?????
-
- JIV40.LZH VIRUS Hacked propgram of JIV - current real
- program is v3.3 NOT v4.0 - It is also
- infected by a Virus which attaches to
- any .COM file it can find.
-
- KC-PAL.COM TROJAN Infects the COMMAND.COM and then attaches
- to any .COM file afterward using the
- COMMAND.COM during its use of Internal
- commands (COPY, DIR, TYPE, etc.). The
- COMMAND.COM files are enlarged in size
- by 1538 bytes, and in the Time column
- of the directory, listing the seconds
- is reset from :00 to :62.
-
- LM TROJAN Deletes the COMMAND.COM and other
- files from the ROOT directory of the
- [Hard] Drive when the program runs.
-
- MAP TROJAN This is another trojan horse written by
- the infamous Dorn Stickel. Designed
- to display what TSR's are in memory and
- works on FAT and BOOT sectors. Also
- seems towork only when the [Hard] Drive
- is 50 percent full or more.
-
- MATHKIDS.ARC *TROJAN This is a fairly benign trojan that
- will not reformat your [Hard] disks or
- do any system-level damage. Instead,
- it is designed to crack a BBS system. It
- will attempt to copy the USER file on
- a BBS to a file innocently called
- FIXIT.ARC, which the originator can
- later call in and download. Believed
- to be designed for PCBoard BBS's.
-
- MOUSEKEY.COM VIRUS Mouse device program infected with the
- CASCADE type virus.
-
- NORTSHOT.ZIP TROJAN A supposed VIRUS checker - while
- NORTSTOP.ZIP listing the DIR during its check
- displays that the disk is Virus Free -
- but during Dec. 24th and Dec. 31st it
- will ERASE files in several DIR's
- based on their extension. NORTSHOT.ZIP
- and NORTSTOP.ZIP are same file.
- Name Size Date
- NORTSTOP.EXE 38907 ?????
-
- NOTROJ.COM *TROJAN This "program" is the most sophisti-
- cated trojan horse that I've seen to
- date. All outward appearances indicate
- that the program is a useful utility
- used to FIGHT other trojan horses.
- Actually, it is a time bomb that erases
- any [Hard] disk FAT IT can find and,
- at the same time, it warns: "another
- program is attempting a format, can't
- abort! After erasing the FAT(s),
- NOTROJ then proceeds to start a low
- level format. One extra thing to note:
- NOTROJ only damages FULL [Hard] drives;
- if a [Hard] disk is under 50 percent
- full, this program won't touch it!
- If you are interested in reading a
- thorough report on NOTROJ.COM, James H.
- Coombes has written an excellent text
- file on the matter named NOTROJ.TXT.
- If you have trouble finding it, you
- can get it from SCP Business BBS.
-
- PACKDIR *TROJAN This utility is supposed to "pack"
- (sort and optimize) the files on a
- [hard] disk, but apparently it
- scrambles FATs.
-
- PCW271xx.ARC *TROJAN A modified version of the popular
- PC-WRITE word processor (v. 2.71) has
- now scrambled at least 10 FAT tables
- that I know of. If you want to
- download version 2.71 of PC-WRITE, be
- very careful! The bogus version can be
- identified by its size; it uses 98,274
- bytes whereas the good version uses
- 98,644. For reference, version 2.7 of
- PC-WRITE occupies 98,242 bytes.
-
- PKX35B35.ARC } *TROJAN This was supposed to be an update to
- PKB35B35.ARC } *VIRUS PKARC file compress utility. When it is
- run, it *EATS your FATS* and is said to
- to infect other files so it can spread.
- Possible VIRUS.
-
- PKPAK/PKUNPAK *CAREFUL There is a TAMPERED version of 3.61
- v3.61 that interferes with PC's interrupts.
-
- PKFIX361.EXE *TROJAN Supposed patch to v3.61. What it really
- does when it is extracted from the .EXE
- file is do DIRECT access to the DRIVE
- CONTROLLER to perform a Low-Level format,
- thereby bypassing checking programs.
-
- PK362.EXE *CAREFUL This is a NON-RELEASED version and is
- suspected as being a *TROJAN*. Not
- verified.
-
- PK363.EXE *CAREFUL This is a NON-RELEASED version and is
- suspected as being a *TROJAN*. Not
- verified.
-
- PKZ100.EXE TROJAN Supposed to be a new release of PKZIP,
- but what it really does is fill up
- your [Hard] drive with many directories
- until the system no longer functions.
- The current version is PKZIP v.092.
-
- PKZ120.EXE TROJAN Modeifies the AREAS.BBS of BBS's that
- use such a file. Replaces addreses in
- that file with dummy addreses. then
- deletest itself to avoid any way to
- desipher how it works.
- Name Size Date
- PKZ120.EXE 172,000approx. 09/13/89
-
- QUIKRBBS.COM *TROJAN This Trojan horse advertises that it
- will install a program to protect your
- RBBS but it does not. It goes and eats
- away at the FAT instead.
-
- QUIKREF *TROJAN This ARChive contains ARC513.COM.
- It is supposed to load RBBS-PC's message
- file into memory two times faster than
- normal. What it really does is copy the
- RBBS-PC.DEF into an ASCII file named
- HISCORES.DAT.
-
- RCKVIDEO *TROJAN This is another trojan that does what
- it's supposed to do, and then wipes out
- [Hard] disks. After showing some simple
- animation of a rock star ("Madonna," I
- think), the program will go to work on
- erasing every file it can lay it's
- hands on. After about a minute of this,
- it will create three ASCII files that
- say, "You are stupid to download a
- video about rock stars," or something
- of the like.
-
- SECRET.BAS *TROJAN BEWARE!! This may be posted with a note
- saying it doesn't seem to work, and
- would someone please try it; when you
- do, it formats your disks.
-
- SIDEWAYS.COM *TROJAN Be careful with this trojan; there is a
- perfectly legitimate version of
- SIDEWAYS.EXE circulating. Both the
- trojan and the good SIDEWAYS advertise
- that they can print sideways, but
- SIDEWAYS.COM will trash a [hard] disk's
- boot sector instead. The trojan .COM
- file is about 3 KB, whereas the
- legitimate .EXE file is about 30 KB
- large.
-
- STAR.EXE *TROJAN Beware RBBS-PC SysOps! This file puts
- some stars on the screen while copying
- RBBS-PC.DEF to another name that can be
- downloaded later!
-
- STRIPES.EXE *TROJAN Similar to STAR.EXE, this one draws an
- American flag (nice touch), while it's
- busy copying your RBBS-PC.DEF to
- another file (STRIPES.BQS) so the joker
- can log in later, download STRIPES.BQS,
- and steal all your passwords. Nice, huh?
-
- SUG.COM TROJAN This one is supposed to go out and
- unprotect copy protected programs disks
- by Softguard Systems, Inc. After it
- trashes your disk, it comes back and
- displays:
- "This destruction constitutes a prima
- facie evidence of your violation. If
- you attempt to challenge Softguard
- Systems Inc..., you will be vigorously
- counter-sued for copyright infringement
- and theft of services."
- AND it by-passes any attempt by CHK4BOMB
- to search for the any hidden messages
- that tell you, "YOU BEEN HAD... or
- GOTCHA>>> Ar..Ar..Ar... It encrypts the
- Gotcha message so no Trojan checker can
- scan for it.
-
- TIRED *TROJAN Another scramble-the-FAT trojan by Dorn
- W. Stickel.
-
- TOPDOS *TROJAN This is a simple high level [hard] disk
- formatter.
-
- TSRMAP *TROJAN This program does what it's supposed to
- do: give a map outlining the location
- (in RAM) of all TSR programs, but it
- also erases the boot sector of drive
- "C:".
-
- ULTIMATE.EXE TROJAN Another FAT eater. File status:
- Name Size
- ULTIMATE.EXE 3090
- ULTIMATE.ARC 2432
-
- UNIX VIRUS The UNIX operating system by Berkley,
- verson 4.3, is an INTERNET virus. A
- Patch is available on SCP Business
- BBS. This is the MAIL PACKET VIRUS.
-
- VDIR.COM *TROJAN This is a disk killer that Jerry
- Pournelle wrote about in BYTE Magazine.
- I have never seen it, although a
- responsible friend of mine has.
-
- VGA2CGA.ARC VIRUS CGA converter - infected with the
- AIDS/Hahaha - has been found on many
- USA West Coast BBS's.
-
- VU.EXE *VIRUS Infected with the 1704-B Virus. Has not
- been confirmed. And is unkown what the
- file is supposed to do.
-
- WOW *VIRUS Also known as the 1701 Virus. This
- is a new strain of the Lehigh Virus
- as it not only looks for COMMAND.COM,
- but any .COM file. As it does it, the
- infected file is enlarged 1,701 bytes
- in SIZE. The infection takes as you
- run the .COM. WOW is a TSR. What happens
- when you run WOW is that it displays an
- advertisement:
- ""The Wizards of Warez"
- in assocoation with
- the copycats
- the Pirates Unlimited
- OUTRUN
- WOW 1989 "
- The virus is also known as WOWTITLE.
-
-
- -----------------------------------------------------------------
- | If you run a trojan horse..... |
- -----------------------------------------------------------------
-
- While reading this, bear in mind that there is no better remedy
- for a drive that has run a trojan horse and been damaged than a
- recent backup.
-
- The first thing to do after running what you think to be a trojan
- horse is to diagnose the damage. Was your [hard] drive formatted?
- Did the trojan scramble your FAT table? Did every file get
- erased? Did your boot sector on the [hard] drive get erased/
- formatted? Odds are that the trojan incurred one of these four
- disasters. After the initial diagnosis, you are ready to remedy
- the problem.
-
- 1) If the trojan low-level formatted your [hard] disk:
- Hope that you have a recent backup; that's the only sure
- remedy for this disease.
-
- 2) If the trojan high-level formatted your [hard] disk:
- There is only one way out of this mess, and that is to use
- the MACE+ utilities by Paul Mace. MACE+ has two devices in
- it to recover formatted disks, and believe me, they work! I
- will talk more about the MACE+ utilities later.
-
- 3) If the trojan scrambled your FAT table:
- Once again, there is nothing to do. However, there is a
- program called FATBACK.COM (available on my board named as
- FATBACK.ZIP) that will back up your FAT table in under a
- minute to floppy. Using FATBACK, it is easy and non time-
- consuming to back up your FAT regularly.
-
- 4) If the trojan erased file(s), and the FAT table is undamaged:
- There are many packages to undelete deleted files. Norton
- Utilities, PC-Tools, MACE+, and many others will do the
- job. I recommend the first three, they are commercially
- available at most computer software stores or mail-order
- stores. Mace Utilities can also be purchased from SOFTEX on
- CompuServe. When you are undeleting, be sure to undelete files
- in the order of last time written to disk.
-
- 5) If the boot sector on your [hard] disk gets erased/formatted:
- There are four things to do if this happens, and the worst
- that can happen is that you will go without a [hard] disk for
- a while. To be on the safest side, back up everything before
- even proceeding to step "A," although I cannot see why it
- would be necessary.
-
- A) Try doing a "SYS C:" (or "SYS A:") from your original
- DOS disk, and copy COMMAND.COM back onto the [hard]
- drive after that. Try booting, and if that doesn't
- work, try step B.
-
- B) If you have the MACE+ utilities, go to the "other
- utilities" section and "restore boot sector." This
- should do the job if you have been using MACE+
- correctly. If using PCTOOLS Delux us the MIRROR
- REBUILD utility function.
-
- C) If you are still stuck, BACK UP EVERYTHING and proceed
- to do a low-level format. Instructions on how to
- perform a low-level format should come with your [hard]
- disk controller card. Be sure to map out bad sectors
- using either SCAV.COM by Chris Dunford or by manually
- entering the locations of bad sectors into the low-level
- format program. After the low level format on your hard
- disk, run FDISK.COM (it comes with DOS) and create a DOS
- partition. Refer to your DOS manual for help in using
- FDISK. Then put your original DOS diskette in drive A:
- and do a FORMAT <drive letter>:/S/V. Drive letter can
- stand for "C" or "B" depending on whether you are
- reformatting a [Hard] disk or not. Finally you are ready
- to attempt a reboot.
-
- D) If you are still stuck, either employ some professional
- computer repair person to fix your drive, or live with a
- non-bootable [hard] drive.
-
-
- A few words of caution on prevention:
-
- 1) Get the protection programs from a RELIABLE source. Always ask
- about any unknown program - virus protection or otherwise - before
- downloading or running it. Know your source! Get it from
- SDNet/Works! FidoNet nodes if they come through SDN.
-
- 2) Don't let down your guard! Most virus protection programs
- intercept specific types of activities (disk writes, for example)
- or specific viruses (such as Apple's VirusRX targeting the Scores
- virus). So USE A VIRAL CHECKER when running new BBS programs. Use
- ** VirusScan! **
-
- 3) Make periodic file listings and compare them regularly to prior
- listings. Look for unusual changes or unfamiliar files like Hidden
- or System files. INVESTIGATE ANYTHING OUT OF THE ORDINARY! Is your
- system slowing down or failing all the time?
-
- 4) BACKUP - BACKUP - BACKUP! Keep current backups. I know, I
- know. Everyone tells you, even your mom (smile). At least make
- regular copies of your most important databases and files, and
- most important, KEEP your OLD COPIES around a little longer
- just to be on the safe side. I have a set devoted strictly to a
- MASTER BACKUP in case my system's current backup is bad. Then all
- is not lost as I have a MASTER to put me back up.
-
- 5) Don't run programs that you got off a BBS on your BOSS's
- machine! Use your own PC first. This could save you the
- embarrassment of facing his ugly mug (smile) and loosing your
- job. Many companies now have policies regarding this.
-
- 6) Never run or access a diskette that might contain the SYSTEM
- files. These may be contaminated and could infect your system.
- Know your source! The same goes for the COMMAND.COM.
-
- 7) USE WRITE PROTECT TABS! A virus can't infect something it
- can't write to. Use them; they are the cheapest method of
- prevention.
-
- * REMEMBER: The Best Defense is Good * BACKUP *
-
-
- ---------------------------------------------------------------
- | Update History: |
- ---------------------------------------------------------------
-
- Version 1.0a The first list of The Guardian compiled from the
- Dirty Dozen List and from the DIRTY_DOZEN echo
- conference. The Guardian List will be distributed
- thru FidoNet and LCRNET. It, unlike the Dirty
- Dozen List, is comprised of only Trojans and
- Viruses and is sent out more often than The Dirty
- Dozen List. Added PK100.EXE, B30012A.ARC.
-
- Version 1.0b Added plug for SDNet/Works!, and a plug for
- VirusScan utility. Added GRASPRT.EXE, KC-PAL.COM
-
- Version 1.0c Added FOX2.ARC(Show.com), HEART.EXE, JIV40.LZH,
- JIV.COM, MOUSEKEY.COM, NORTSTOP.ZIP/NORTSHOT.ZIP,
- PKZ120.EXE, VGA2CGA.ARC, VU.EXE - also reworded
- text file by Sally Nueman.
-
- -----------------------------------------------------------------
- | Glossary: |
- -----------------------------------------------------------------
-
-
- I have intended this glossary for the beginning to intermediate
- user; all experienced BBS users will be bored to death with this.
-
- ?Q? -- (? standing for any character). File
- extension for SQueezed files. Squeezed files
- are unusable until unsqueezed by a utility
- such as NUSQ.COM or USQ.COM. The advantage of
- a SQueezed file is that it is smaller than a
- regular UnSQueezed file, thus saving disk
- space and download time. ARChives are more
- efficient than Squeezed files; that's why
- there are so many more ARChives on BBS's these
- days. Example of the extensions of SQueezed
- files: .EQE, .CQM, .LQR, .TQT, .DQC, etc.
- ABBRV -- Abbreviation for the word: "abbreviation".
- ARC -- File extension for an ARChive file -- many
- files combined together to save space and
- download time that require ARC.EXE,
- PKXARC.COM, ARCE.COM, or ARCLS.EXE to separate
- the files in to runnable and readable (in the
- case of text) form.
- BAS -- Abbrv for "BASIC," as in the programming
- language.
- BBS -- Abbrv for "Bulletin Board System".
- BBS's -- Abbrv for "Bulletin Board Systems".
- BOARD -- Also "Bulletin Board System".
- BOGUSWARE -- Software that is damaging to one or more
- parties.
- BOOT or -- To boot a computer is to restart it from
- REBOOT scratch, erasing all TSR programs. One
- reboots by either powering off and then back
- on, or pressing ctrl-alt-del at the same time.
- BYTES -- Bytes measure the length of a file, with one
- byte equaling one character in a file.
- CACHE [disk] -- Area of memory set aside to hold recent data.
- All programs then read recent data from that
- memory rather than from disk.
- CLUSTER -- A physical block on all [hard] disks
- composed of sectors that hold data.
- COM -- File extension for a file that is executable
- from DOS level.
- DD -- Abbrv for "dirty dozen".
- DOC -- Abbrv for "documentation".
- EMS -- Enhanced Memory Specification. An EMS card
- holds 2 MB extra memory.
- EXE -- File extension for a file that is executable
- from DOS level.
- FIDONET -- A network designed and created by Tom
- Jennings and his software. A TRADEMARK.
- HACKED -- A program that has been changed in some way by
- another person or program.
- HIGH-LEVEL -- This type of format is what most computer
- FORMAT users view as a regular DOS-format. That is,
- formatting a disk using FORMAT.COM (included
- with DOS) is a high-level format.
- IBM -- Abbrv for International Business Machines
- IBM OR COMP -- IBM computer or a 99% or greater IBM
- Compatible computer.
- KB OR K -- Abbrv for "KiloBytes." One Kb equals 1024
- bytes.
- LBR -- Extension on Library files. Library files are
- really many combined files like ARChives, but
- they require different utilities to extract
- the individual files. Some examples of such
- utilities are LUU.EXE, LUE.EXE, LAR.EXE, AND
- ZIP.EXE. See "ARC".
- LOW-LEVEL -- This type of format is only executed on a
- FORMAT [Hard]disk; therefore, most [Hard] disk low-
- level format programs come only with a [Hard]
- disk controller card. There are a few PD low-
- level formatting packages, though. Most
- manufacturers low level format their [Hard]
- drives at the factory. Low level formatting
- is the first step in the three-part formatting
- process; the second step is to use FDISK, and
- the third is to execute a high-level format.
- MB -- Abbrv for "Megabytes," or "millions of bytes."
- MISC -- Abbrv for "miscellaneous".
- OPTIMIZE -- To make all files on a disk "contiguous," or
- physically linked together on a [hard] drive.
- PAK -- An alternate ARCer used in the BBS community.
- PATCH -- A file that is patched (combined) into another
- file to change the original file in some way.
- PD -- Abbrv for "Public Domain".
- PIRATED -- An altered program that normally is sold but
- hacked to resemble a PD program.
- RAM -- Abbrv for "Random Access Memory" (memory
- used by software).
- RBBS -- Abbrv for RBBS-PC, a type of BBS (Remote
- Bulletin Board System).
- ROM -- Abbrv for "Read Only Memory" (memory used by
- hardware to boot).
- SDN -- File extension used by SDNet/Works! to
- identify an SDNet/Works! published ShareWare
- files. These files are direct from the Author
- and are be Virus/Trojan free if obtained from
- participating SDNetWorks! BBS.
- SDS -- System Distribution System. A FidoNet
- subsystem that is used to distribute BBS
- software, utilities, and newsletters.
- SYSOP -- Abbrv for SYStem OPerator of a BBS.
- TROJAN -- Program used to destroy or hamper a computer
- in some manner.
- TSR -- Abbrv for "Terminate and Stay Resident";
- Synonym = "Memory Resident".
- TXT -- Abbrv for "text".
- USU -- Abbrv for "usually".
- UNP -- Abbrv for "unprotect".
- UNPROTECT -- An "unprotect file" is a patch file that
- results in the breaking of copy protection (no
- doubt for backup purposes).
- UTIL -- Abbrv for "utility".
- VIRUS/WORM -- The Ultimate Trojan! Designed to infect the
- computer system and to replicate itself to
- survive.
- ZIP -- An alternate ARCer used by the BBS community.
- ZOO -- All files compressed with ZOO.EXE bear this
- file extension. ZOO-compressed files are NOT
- compatible with ARC.EXE.
-
-
- << End of file >>
-