home *** CD-ROM | disk | FTP | other *** search
- #######################################
- # #
- # #
- # ======== =\ = ====== #
- # == = \ = = #
- # == = \ = ====== #
- # == = \ = = #
- # == = \= ====== #
- # #
- # #
- # <Tolmes News Service> #
- # ''''''''''''''''''''' #
- # #
- # #
- # > Written by Dr. Hugo P. Tolmes < #
- # #
- # #
- #######################################
-
-
- Issue Number: 36
- Release Date: May 2, 1988
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- TITLE: Is Your Computer Infected?
- FROM: Newsweek
- DATE: February 1, 1988
-
-
- Systems fall to silent- and contagious - killers
-
-
- Last fall nurses at an Eastern medical center noticed an alarming
- problem- patients' records were mysteriously disappearing from the
- hospital's computer system. After several weeks experts found the
- culprit: a small, maliciouls program known as a computer "virus" had been
- injected into the system where it proceeded to destory nearly 40 percent
- of the records. The person who apparently had planted it left his name
- and phone numbers (in Pakistan) with a message embedded in the software:
- "Beware of this virus, contact us for vaccination." Though they haven't
- nabbed the culprit, officials stopped the destruction, but computers at a
- nearby university remain infected.
- Computer viruses are silent killers. Usually there are no obvious
- signs of infection until the damage has already been done. Hence some are known
- as "Trojan horses," while "logic bombs" come equipped with long fuses. The
- viruses are highly contagious. They can travel unnoticed though the electronic
- networks that link machines. They can also spread every time a contaminated
- floppy disc is loaded; the virus will remain in the machine's memory (as long
- as the power is on) and will damage other discs that are inserted. As a
- result, computer with many users, such as dealer demonstration machines, are
- especially prone to trouble. "In a matter of minutes, an entire system can
- be infected," says security expert Robert Courtney.
- Like other social disease, these viruses cut across all classes. Just
- before Christmas, a virus attacked IBM's worldwide electronic-message
- network. The program sent a holiday greetings to computer users and then
- passed the same message to everyone on that person's mail-distribution list.
- In a matter of hours, the massive electronic chain letter overloaded the
- network. A different virus recently hit the University of Bethelhem, Pa.,
- destroying data on students' computer diskettes. Another, spread by floppy
- discs, has plagued some owners of Amiga computers. There are also rumors that
- IRS computers have been attacked, though officials insist those rumors
- are unfounded. "We've known about viruses for over 10 years, but we've
- just started to really see them in action," says Donn Parker, a computer-security expert at SRI International
- in Menlo Park, Calif.
-
- Immune System:
-
- Scientists worry that viruses could cripple a c
- control computers. Building up their immune systems will be costly. "It will
- require major changes in operating-system design," says computer security
- expert David R. Wilson, of Ernst & Whinney.
- In the meantime, experts are scrambling to cope with the problem.
- "We shared information with the IRS, the Department of Defense, the National
- Security Agency, the Federal Reserve Bank, the nuclear power industry...
- anyone who has enemies," says Eric Hansen, a Minneapolis computer
- scientist who wrote the Data Physician, software designed to protect against
- viruses. Many fear that the electronic vandalism will only get worse. "It's
- like mass murders or freeway shootings," says Peter Neumann, a researcher
- at SRI. "You get one and then you get a whole raft of them."
-
-
-
- WILLIAM D. MARBACH with
- RICHARD SANDZA in Washington and
- MICHAEL ROGERS in San Francisco
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
- NOTA:
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- "The person who apparently had planted it left his name and phone
- numbers (in Pakistan) with a message embedded in the software:"
-
-
- I have to wonder what has happened to this guy. This is the same virus that
- has been mentioned in several other magazines with the same message. His
- little message helps explain what computers are infected with that same virus.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- "Just before Christmas, a virus attacked IBM's worldwide electronic
- message network. The program sent a holiday greetings to computer users and
- then passed the same message to everyone on that person's mail distribution
- list."
-
-
- This incident has been covered in previous issues of TNS and will be
- covered in future issues.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- "'We've known about viruses for over 10 years, but we've just started
- to really see them in action,' says Donn Parker, a computer-security expert
- at SRI International in Menlo Park, Calif."
-
-
- Ahhhh yess... the ever-present quote from Donn Parker. An article on viruses
- or hackers just wouldn't be right without a quote from Donn.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- One last thing that I would like to note. The writer of the article is
- Richard Sandza along with others. Mr. Sandza is well known in the hacking
- community for other articles on hacking which I won't mention.
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- TNS QuickNotes
- --------------
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- I'm still trying to locate that article in the Houston Chronicle about Jack
- the Ripper's bust. Even though I can't get ahold of it... it is established
- that Jack the Ripper was busted.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- PC Pursuit is taking steps against hackers. They have established an
- anti-hacker team to stop intruders from using the system. It is unknown at the
- present time how effective it will be. Many people continue to use PC Pursuit
- illegally.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- The long-distance service known as NTS is cracking down. NTS was a service that
- accepted almost anything as a valid code and had codes that lasted for a
- long time. Many people have received bills from the service.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- The rumor that has been spreading that 950-1055 has ANI is most likely false.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- There is a new underground magazine. It is:
-
- Iron Feather Journal Magazine
- PO BOX 4035
- East Lansing, MI
-
- The magazine is said to be similar to TAP and 2600. It deals with subjects
- relating to hacking/phreaking/anarchy/carding/etc.
-
- It costs about $1.00 for 3-5 issues (I'm told). I know very little about this
- magazine so I suggest that people write first for information.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Golden Hawk called up Allnet claiming that he was writing a paper. He found
- out that they are losing about $400,000 a month due to hackers and general
- fraud.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Allnet has switched to 7 digits in SOME areas. Some areas also accept both
- six and seven digits and are gradually eliminating the six digit codes.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Dragon Slayer has written an MCI Hacker that defeats MCI anti-hacker software
- through the use of multiple port selection.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Crimson Death has become an editor of Phrack Inc. and it is said that
- Shooting Shark will no longer be an editor of Phrack.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Thunder Seven is collecting wierd numbers for a list. People with strange
- numbers might want to contact him.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Pennsylvania Magazine had a recent article all about John Maxfield. In the
- article, Maxfield insulted all hackers and called them various names. He
- claimed to know 5000 hackers.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- A file entitled "Amtrak" is going around from board to board. It is all about
- getting free train fare. The techniques stated in the file do work and people
- might be interested in reading it.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Telenet has begun changing all high level passwords as a security measure.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Turbo Transfe TCA's West Coast HQ.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Techninja called up one of his favorite boards and discovered that the sysop
- had been nailed for hacking 950s. All of the sysop's equipment was taken
- and the sysop was said to be liable for up to $20,000 worth of damage. This
- is the third bbs that Techninja has been a member of and has gotten busted.
-
- Bad luck.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- ABC's Nightline reportedly had a show on hackers. The show was broadcast
- sometime around April 11, 1988.
-
- I've been unable to get any details on the show.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Saber's Edge is helping to put together a magazine entitled "Insider Trading."
- The magazine, an on-line magazine, is supposed to be very similar to Phrack.
- They are currently looking for articles.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- People are encouraged to join in on the StoryBook at Turbo Transfers to find
- out about Oryan Quest... very humerous.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
-