home *** CD-ROM | disk | FTP | other *** search
- ==Phrack Inc.==
-
- Volume Two, Issue 22, File 10 of 12
-
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
- PWN PWN
- PWN P h r a c k W o r l d N e w s PWN
- PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
- PWN Issue XXII/Part 2 PWN
- PWN PWN
- PWN Created by Knight Lightning PWN
- PWN PWN
- PWN Written and Edited by PWN
- PWN Knight Lightning and Taran King PWN
- PWN PWN
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
-
-
- Computer Network Disrupted By "Virus" November 3, 1988
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By John Markoff (New York Times)
-
- In an intrusion that raises new questions about the vulnerability of the
- nation's computers, a nationwide Department of Defense data network has been
- disrupted since Wednesday night by a rapidly spreading "virus" software program
- apparently introduced by a computer science student's malicious experiment.
-
- The program reproduced itself through the computer network, making hundreds of
- copies in each machine it reached, effectively clogging systems linking
- thousands of military, corporate and university computers around the country
- and preventing them from doing additional work. The virus is thought not to
- have destroyed any files.
-
- By late Thursday afternoon computer security experts were calling the virus the
- largest assault ever on the nation's computers.
-
- "The big issue is that a relatively benign software program can virtually bring
- our computing community to its knees and keep it there for some time," said
- Chuck Cole, deputy computer security manager at Lawerence Livermore Laboratory
- in Livermore, Calif., one of the sites affected by the intrusion. "The cost is
- going to be staggering."
-
- Clifford Stoll, a computer security expert at Harvard University, added, "There
- is not one system manager who is not tearing his hair out. It's causing
- enormous headaches."
-
- The affected computers carry routine communications among military officials,
- researchers and corporations.
-
- While some sensitive military data are involved, the nation's most sensitive
- secret information, such as that on the control of nuclear weapons, is thought
- not to have been touched by the virus.
-
- Computer viruses are so named because they parallel in the computer world the
- behavior of biological viruses. A virus is a program, or a set of instructions
- to a computer, that is deliberately planted on a floppy disk meant to be used
- with the computer or introduced when the computer is communicating over
- telephone lines or data networks with other computers.
-
- The programs can copy themselves into the computer's master software, or
- operating system, usually without calling any attention to themselves. From
- there, the program can be passed to additional computers.
-
- Depending upon the intent of the software's creator, the program might cause a
- provocative but otherwise harmless message to appear on the computer's screen.
- Or it could systematically destroy data in the computer's memory.
-
- The virus program was apparently the result of an experiment by a computer
- science graduate student trying to sneak what he thought was a harmless virus
- into the Arpanet computer network, which is used by universities, military
- contractors and the Pentagon, where the software program would remain
- undetected.
-
- A man who said he was an associate of the student said in a telephone call to
- The New York Times that the experiment went awry because of a small programming
- mistake that caused the virus to multiply around the military network hundreds
- of times faster than had been planned.
-
- The caller, who refused to identify himself or the programmer, said the student
- realized his error shortly after letting the program loose and that he was now
- terrified of the consequences.
-
- A spokesman at the Pentagon's Defense Communications Agency, which has set up
- an emergency center to deal with the problem, said the caller's story was a
- "plausible explanation of the events."
-
- As the virus spread Wednesday night, computer experts began a huge struggle to
- eradicate the invader.
-
- A spokesman for the Defense Communications Agency in Washington acknowledged
- the attack, saying, "A virus has been identified in several host computers
- attached to the Arpanet and the unclassified portion of the defense data
- network known as the Milnet."
-
- He said that corrections to the security flaws exploited by the virus are now
- being developed.
-
- The Arpanet data communications network was established in 1969 and is designed
- to permit computer researchers to share electronic messages, programs and data
- such as project information, budget projections and research results.
-
- In 1983 the network was split and the second network, called Milnet, was
- reserved for higher-security military communications. But Milnet is thought
- not to handle the most classified military information, including data related
- to the control of nuclear weapons.
-
- The Arpanet and Milnet networks are connected to hundreds of civilian networks
- that link computers around the globe.
-
- There were reports of the virus at hundreds of locations on both coasts,
- including, on the East Coast, computers at the Massachusetts Institute of
- Technology, Harvard University, the Naval Research Laboratory in Maryland and
- the University of Maryland and, on the West Coast, NASA's Ames Research Center
- in Mountain View, Calif.; Lawrence Livermore Laboratories; Stanford University;
- SRI International in Menlo Park, Calif.; the University of California's
- Berkeley and San Diego campuses and the Naval Ocean Systems Command in San
- Diego.
-
- A spokesman at the Naval Ocean Systems Command said that its computer systems
- had been attacked Wednesday evening and that the virus had disabled many of the
- systems by overloading them. He said that computer programs at the facility
- were still working on the problem more than 19 hours after the original
- incident.
-
- The unidentified caller said the Arpanet virus was intended simply to "live"
- secretly in the Arpanet network by slowly copying itself from computer to
- computer. However, because the designer did not completely understand how the
- network worked, it quickly copied itself thousands of times from machine to
- machine.
-
- Computer experts who disassembled the program said that it was written with
- remarkable skill and that it exploited three security flaws in the Arpanet
- network. [No. Actually UNIX] The virus' design included a program designed to
- steal passwords, then masquerade as a legitimate user to copy itself to a
- remote machine.
-
- Computer security experts said that the episode illustrated the vulnerability
- of computer systems and that incidents like this could be expected to happen
- repeatedly if awareness about computer security risks was not heightened.
-
- "This was an accident waiting to happen; we deserved it," said Geoffrey
- Goodfellow, president of Anterior Technology Inc. and an expert on computer
- communications.
-
- "We needed something like this to bring us to our senses. We have not been
- paying much attention to protecting ourselves."
-
- Peter Neumann, a computer security expert at SRI International Inc. in Menlo
- Park International, said, "Thus far the disasters we have known have been
- relatively minor. The potential for rather extraordinary destruction is rather
- substantial."
-
- "In most of the cases we know of, the damage has been immediately evident. But
- if you contemplate the effects of hidden programs, you could have attacks going
- on and you might never know it."
- _______________________________________________________________________________
-
- Virus Attack November 6, 1988
- ~~~~~~~~~~~~
- >From the Philadelphia Inquirer (Inquirer Wire Services)
-
- ITHACA, N.Y. - A Cornell University graduate student whose father is a top
- government computer-security expert is suspected of creating the "virus" that
- slowed thousands of computers nationwide, school officials said yesterday.
-
- The Ivy League university announced that it was investigating the computer
- files of 23-year-old Robert T. Morris, Jr., as experts across the nation
- assessed the unauthorized program that was injected Wednesday into a military
- and university system, closing it for 24 hours. The virus slowed an estimated
- 6,000 computers by replicating itself and taking up memory space, but it is not
- believed to have destroyed any data.
-
- M. Stuart Lynn, Cornell vice president for information technologies, said
- yesterday that Morris' files appeared to contain passwords giving him
- unauthorized access to computers at Cornell and Stanford Universities.
-
- "We also have discovered that Morris' account contains a list of passwords
- substantially similar to those found in the virus," he said at a news
- conference.
-
- Although Morris "had passwords he certainly was not entitled to," Lynn
- stressed, "we cannot conclude from the existence of those files that he was
- responsible."
-
- FBI spokesman Lane Betts said the agency was investigating whether any federal
- laws were violated.
-
- Morris, a first-year student in a doctoral computer-science program, has a
- reputation as an expert computer hacker and is skilled enough to have written
- the rogue program, Cornell instructor Dexter Kozen said.
-
- When reached at his home yesterday in Arnold, Md., Robert T. Morris, Sr., chief
- scientist at the National Computer Security Center in Bethesda, Md., would not
- say where his son was or comment on the case.
-
- The elder Morris has written widely on the security of the Unix operating
- system, the target of the virus program. He is widely known for writing a
- program to decipher passwords, which give users access to computers.
- _______________________________________________________________________________
-
- New News From Hacker Attack On Philips France, 1987 November 7, 1988
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- A German TV magazine reported (last week) that the German hackers which
- attacked, in summer 1987, several computer systems and networks (including
- NASA, the SPANET, the CERN computers which are labeled "European hacker
- center," as well as computers of Philips France and Thompson-Brandt/France) had
- transferred design and construction plans of the MegaBit chip having been
- developed in the Philips laboratories. The only information available is that
- detailed graphics are available to the reporters showing details of the MegaBit
- design.
-
- Evidently it is very difficult to prosecute this data theft since German law
- does not apply to France based enterprises. Moreover, the German law may
- generally not be applicable since its prerequit may not be true that PHILIPS'
- computer system has "special protection mechanisms." Evidently, the system was
- only be protected with UID and password, which may not be a sufficient
- protection (and was not).
-
- Evidently, the attackers had much more knowledge as well as instruments (e.g.
- sophisticated graphic terminals and plotters, special software) than a "normal
- hacker" has. Speculations are that these hackers were spions rather than
- hackers of the Chaos Computer Club (CCC) which was blamed for the attack.
- Moreover, leading members of CCC one of whom was arrested for the attack,
- evidently have not enough knowledge to work with such systems.
-
- Information Provided By
- Klaus Brunnstein, Hamburg, FRG
- _______________________________________________________________________________
-
- The Computer Jam: How It Came About November 8, 1988
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By John Markoff (New York Times)
-
- Computer scientists who have studied the rogue program that crashed through
- many of the nation's computer networks last week say the invader actually
- represents a new type of helpful software designed for computer networks.
-
- The same class of software could be used to harness computers spread around the
- world and put them to work simultaneously.
-
- It could also diagnose malfunctions in a network, execute large computations on
- many machines at once and act as a speedy messenger.
-
- But it is this same capability that caused thousands of computers in
- universities, military installations and corporate research centers to stall
- and shut down the Defense Department's Arpanet system when an illicit version
- of the program began interacting in an unexpected way.
-
- "It is a very powerful tool for solving problems," said John F. Shoch, a
- computer expert who has studied the programs. "Like most tools it can be
- misued, and I think we have an example here of someone who misused and abused
- the tool."
-
- The program, written as a "clever hack" by Robert Tappan Morris, a 23-year-old
- Cornell University computer science graduate student, was originally meant to
- be harmless. It was supposed to copy itself from computer to computer via
- Arpanet and merely hide itself in the computers. The purpose? Simply to prove
- that it could be done.
-
- But by a quirk, the program instead reproduced itself so frequently that the
- computers on the network quickly became jammed.
-
- Interviews with computer scientists who studied the network shutdown and with
- friends of Morris have disclosed the manner in which the events unfolded.
-
- The program was introduced last Wednesday evening at a computer in the
- artificial intelligence laboratory at the Massachusetts Institute of
- Technology. Morris was seated at his terminal at Cornell in Ithaca, N.Y., but
- he signed onto the machine at MIT. Both his terminal and the MIT machine were
- attached to Arpanet, a computer network that connects research centers,
- universities and military bases.
-
- Using a feature of Arpanet, called Sendmail, to exchange messages among
- computer users, he inserted his rogue program. It immediately exploited a
- loophole in Sendmail at several computers on Arpanet.
-
- Typically, Sendmail is used to transfer electronic messages from machine to
- machine throughout the network, placing the messages in personal files.
-
- However, the programmer who originally wrote Sendmail three years ago had left
- a secret "backdoor" in the program to make it easier for his work. It
- permitted any program written in the computer language known as C to be mailed
- like any other message.
-
- So instead of a program being sent only to someone's personal files, it could
- also be sent to a computer's internal control programs, which would start the
- new program. Only a small group of computer experts -- among them Morris --
- knew of the backdoor.
-
- As they dissected Morris's program later, computer experts found that it
- elegantly exploited the Sendmail backdoor in several ways, copying itself from
- computer to computer and tapping two additional security provisions to enter
- new computers.
-
- The invader first began its journey as a program written in the C language.
- But it also included two "object" or "binary" files -- programs that could be
- run directly on Sun Microsystems machines or Digital Equipment VAX computers
- without any additional translation, making it even easier to infect a computer.
-
- One of these binary files had the capability of guessing the passwords of users
- on the newly infected computer. This permits wider dispersion of the rogue
- program.
-
- To guess the password, the program first read the list of users on the target
- computer and then systematically tried using their names, permutations of their
- names or a list of commonly used passwords. When successful in guessing one,
- the program then signed on to the computer and used the privileges involved to
- gain access to additonal computers in the Arpanet system.
-
- Morris's program was also written to exploit another loophole. A program on
- Arpanet called Finger lets users on a remote computer know the last time that a
- user on another network machine had signed on. Because of a bug, or error, in
- Finger, Morris was able to use the program as a crowbar to further pry his way
- through computer security.
-
- The defect in Finger, which was widely known, gives a user access to a
- computer's central control programs if an excessively long message is sent to
- Finger. So by sending such a message, Morris's program gained access to these
- control programs, thus allowing the further spread of the rogue.
-
- The rogue program did other things as well. For example, each copy frequently
- signaled its location back through the network to a computer at the University
- of California at Berkeley. A friend of Morris said that this was intended to
- fool computer researchers into thinking that the rogue had originated at
- Berkeley.
-
- The program contained another signaling mechanism that became its Achilles'
- heel and led to its discovery. It would signal a new computer to learn whether
- it had been invaded. If not, the program would copy itself into that computer.
-
- But Morris reasoned that another expert could defeat his program by sending the
- correct answering signal back to the rogue. To parry this, Morris programmed
- his invader so that once every 10 times it sent the query signal it would copy
- itself into the new machine regardless of the answer.
-
- The choice of 1 in 10 proved disastrous because it was far too frequent. It
- should have been one in 1,000 or even one in 10,000 for the invader to escape
- detection.
-
- But because the speed of communications on Arpanet is so fast, Morris's illicit
- program echoed back and forth through the network in minutes, copying and
- recopying itself hundreds or thousands of times on each machine, eventually
- stalling the computers and then jamming the entire network.
-
- After introducing his program Wednesday night, Morris left his terminal for an
- hour. When he returned, the nationwide jamming of Arpanet was well under way,
- and he could immediately see the chaos he had started. Within a few hours, it
- was clear to computer system managers that something was seriously wrong with
- Arpanet.
-
- By Thursday morning, many knew what had happened, were busy ridding their
- systems of the invader and were warning colleagues to unhook from the network.
- They were also modifying Sendmail and making other changes to their internal
- software to thwart another invader.
-
- The software invader did not threaten all computers in the network. It was
- aimed only at the Sun and Digital Equipment computers running a version of the
- Unix operating system written at the University of California at Berkeley.
- Other Arpanet computers using different operating systems escaped.
-
- These rogue programs have in the past been referred to as worms or, when they
- are malicious, viruses. Computer science folklore has it that the first worms
- written were deployed on the Arpanet in the early 1970s.
-
- Researchers tell of a worm called "creeper," whose sole purpose was to copy
- itself from machine to machine, much the way Morris's program did last week.
- When it reached each new computer it would display the message: "I'm the
- creeper. Catch me if you can!"
-
- As legend has it, a second programmer wrote another worm program that was
- designed to crawl through the Arpanet, killing creepers.
-
- Several years later, computer researchers at the Xerox Corp.'s Palo Alto
- Research Center developed more advanced worm programs. Shoch and Jon Hupp
- developed "town crier" worm programs that acted as messengers and "diagnostic"
- worms that patrolled the network looking for malfunctioning computers.
-
- They even described a "vampire" worm program. It was designed to run very
- complex programs late at night while the computer's human users slept. When
- the humans returned in the morning, the vampire program would go to sleep,
- waiting to return to work the next evening.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- Comments from Mark Eichin (SIPB Member & Project Athena "Watchmaker");
-
- The following paragraph from Markoff's article comes from a telephone
- conversation he had with me at the airport leaving the November 8, 1988 "virus
- conference":
-
- "But Morris reasoned that another expert could defeat his program by
- sending the correct answering signal back to the rogue. To parry
- this, Morris programmed his invader so that once every 10 times it
- sent the query signal it would copy itself into the new machine
- regardless of the answer.
-
- The choice of 1 in 10 proved disastrous because it was far too
- frequent. It should have been one in 1,000 or even one in 10,000
- for the invader to escape detection."
-
- However, it is incorrect (I did think Markoff had grasped my comments, perhaps
- not). The virus design seems to have been to reinfect with a 1 in 15 chance a
- machine already infected.
-
- The code was BACKWARD, so it reinfected with a *14* in 15 chance. Changing the
- denominator would have had no effect.
- _______________________________________________________________________________
-
- US Is Moving To Restrict Access To Facts About Computer Virus Nov. 11, 1988
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By John Markoff (New York Times)
-
- Government officials are moving to bar wider dissemination of information on
- techniques used in a rogue software program that jammed more than 6,000
- computers in a nationwide computer network last week.
-
- Their action comes amid bitter debate among computer scientists. One group of
- experts believes wide publication of such information would permit computer
- network experts to identify problems more quickly and to correct flaws in their
- systems. But others argue that such information is too potentially explosive
- to be widely circulated.
-
- Yesterday, officials at the National Computer Security Center, a division of
- the National Security Agency (NSA), contacted researchers at Purdue University
- in West Lafayette, Indiana, and asked them to remove information from campus
- computers describing internal workings of the software program that jammed
- computers around the nation on November 3, 1988. (A spokesperson) said the
- agency was concerned because it was not certain that all computer sites had
- corrected the software problems that permitted the program to invade systems in
- the first place.
-
- Some computer security experts said they were concerned that techniques
- developed in the program would be widely exploited by those trying to break
- into computer systems.
- _______________________________________________________________________________
-
- FBI Studies Possible Charges In "Virus" November 12, 1988
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- >From the Los Angeles Times
-
- WASHINGTON -- FBI Director William S. Sessions on Thursday added two more laws
- that agents are scrutinizing to determine whether to seek charges against
- Robert T. Morris Jr. for unleashing a computer "virus" that shut down or slowed
- computers across the country last week.
-
- One of the laws - malicious mischief involving government communication lines,
- stations or systems - appears not to require the government to prove criminal
- intent, a requirement that lawyers have described as a possible barrier to
- successful prosecution in the case.
-
- Sessions told a press conference at FBI headquarters that the preliminary phase
- of the investigation should be completed in two weeks and defended the pace of
- the inquiry in which Morris, a Cornell University graduate student, has not yet
- been interviewed. Friends of Morris, age 23, have said he told them that he
- created the virus.
-
- Sources have said that FBI agents have not sought to question Morris until they
- obtain the detailed electronic records of the programming he used in setting
- loose the virus - records that have been maintained under seal at Cornell
- University.
-
- In addition to the malicious mischief statue, which carries a maximum penalty
- of 10 years in prison, Sessions listed fraud by wire as one of the laws being
- considered.
- _______________________________________________________________________________
- =========================================================================
-
-