home *** CD-ROM | disk | FTP | other *** search
- ┌─────────────────────────────┐
- │ VIRUS REPORT │
- │ Typo (COM infector) │
- └─────────────────────────────┘
-
- Synonyms: Fumble virus, 867 virus
-
- Date of Origin: summer, 1989.
-
- Place of Origin: Israel.
-
- Host Machine: PC compatibles.
-
- Host Files: Remains resident. Infects COM files.
-
- Increase in Size of Infected Files: 867 bytes.
-
- Nature of Damage: Affects system run-time operation; corrupts program or
- overlay files.
-
- Detected by: Scanv48+, F-Prot, IBM Scan, Pro-Scan.
-
- Removed by: CleanUp, Scan/D, F-Prot, or delete infected files.
-
- First detected in Israel during the summer of 1989 (Some experts
- attribute first detection to Joe Hirst of Brighton, U.K., in November,
- 1989.) It creates errors in printouts, by (sometimes) replacing some
- characters or digits. It is closely related to the Ping-Pong or Italian
- virus, which is one of the most common viruses. In fact, the viruses are
- so similar that some anti-virus programs even identify Typo as the
- Italian virus. This is not so surprising, since the boot sectors are
- almost identical. The differences between the boot sectors are:
-
- * Some local variables have been moved. For example, the word
- containing the location of the original boot sector is now located
- two bytes earlier than before.
-
- * The signature (two bytes that the virus uses to see if a diskette has
- already been infected) has been changed.
-
- * The activation times have been changed. Ping-Pong had an "activation
- window" (a second or so long) every half hour. Typo will become active
- 112.5 seconds after power-on, and will stay active most of the time.
-
- * The major differences between the two viruses are in the other part
- of the virus code, which is not stored in the boot sector, but in the
- cluster the viruses mark as "bad" in the FAT.
-
- Of course, there are quite a few interesting things the viruses have
- in common. For instance, Typo contains the same "bug" as Ping-Pong does,
- that prevents it from working on '286 and '386 machines.
-
- It is possible to remove Typo with some programs designed to remove
- Ping-Pong. Since the signature is stored in the same place on both
- viruses, it is possible to inoculate diskettes against one of them, but
- not both.
-
- Typo will only infect COM files on even-numbered days.
-
-
- ╔════════════════════════════════════════════════════════════════════╗
- ║ This document was adapted from the book "Computer Viruses", ║
- ║ which is copyright and distributed by the National Computer ║
- ║ Security Association. It contains information compiled from ║
- ║ many sources. To the best of our knowledge, all information ║
- ║ presented here is accurate. ║
- ║ ║
- ║ Please send any updates or corrections to the NCSA, Suite 309, ║
- ║ 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS ║
- ║ and upload the information: (202) 364-1304. Or call us voice at ║
- ║ (202) 364-8252. This version was produced May 22, 1990. ║
- ║ ║
- ║ The NCSA is a non-profit organization dedicated to improving ║
- ║ computer security. Membership in the association is just $45 per ║
- ║ year. Copies of the book "Computer Viruses", which provides ║
- ║ detailed information on over 145 viruses, can be obtained from ║
- ║ the NCSA. Member price: $44; non-member price: $55. ║
- ║ ║
- ║ The document is copyright (c) 1990 NCSA. ║
- ║ ║
- ║ This document may be distributed in any format, providing ║
- ║ this message is not removed or altered. ║
- ╚════════════════════════════════════════════════════════════════════╝
-
-