home *** CD-ROM | disk | FTP | other *** search
- From: Kenneth R. van Wyk (The Moderator) <krvw@CERT.SEI.CMU.EDU>
- Errors-To: krvw@CERT.SEI.CMU.EDU
- To: VIRUS-L@IBM1.CC.LEHIGH.EDU
- Path: cert.sei.cmu.edu!krvw
- Subject: VIRUS-L Digest V4 #27
- Reply-To: VIRUS-L@IBM1.CC.LEHIGH.EDU
- --------
- VIRUS-L Digest Wednesday, 13 Feb 1991 Volume 4 : Issue 27
-
- Today's Topics:
-
- Observation On An Observation
- BOOTCOMP.ZIP - Use BIOS-ints to compare bootsector with saved (PC)
- Translation of POLIMER VIRUS (PC)
- Is this a virus? (PC)
- Re: Boot Sector/Partition Table Protection (PC)
- Viruses Via Radio
- IBM Virus Scanner. (PC)
- Observations & Comments
- Request for info on the Ohio virus (PC)
- Disinfecting an Appleshare fileserver (Mac)
- Leprosy virus signature error (PC)
- University Lab Protection (PC)
- Viruses in text files
- MSDOS built in anti-viral for 40 meg or up hard drive (PC)
-
- VIRUS-L is a moderated, digested mail forum for discussing computer
- virus issues; comp.virus is a non-digested Usenet counterpart.
- Discussions are not limited to any one hardware/software platform -
- diversity is welcomed. Contributions should be relevant, concise,
- polite, etc. Please sign submissions with your real name. Send
- contributions to VIRUS-L@IBM1.CC.LEHIGH.EDU (that's equivalent to
- VIRUS-L at LEHIIBM1 for you BITNET folks). Information on accessing
- anti-virus, documentation, and back-issue archives is distributed
- periodically on the list. Administrative mail (comments, suggestions,
- and so forth) should be sent to me at: krvw@CERT.SEI.CMU.EDU.
-
- Ken van Wyk
-
- ---------------------------------------------------------------------------
-
- Date: Mon, 11 Feb 91 15:47:42 -0700
- From: rtravsky@CORRAL.UWyo.Edu (Richard W Travsky)
- Subject: Observation On An Observation
-
- An observation on an observation...
- David Gursky dg@titanium.mitre.org writes
-
- > Observation 2: Mac viruses are not easier to write than PC viruses for
- > [...various reasons deleted...]
- > that infect each platform. When I last checked (and this was awhile
- > ago), there were some 5 different Mac viruses, with no more than five
- > variations on a particular strain: total of about a dozen Mac viruses.
- > At the time, the number of PC viruses numbered 23 distinct strains and
- > over a 100 total viruses. Alot of has to do with the number of
- > vandals writing viruses for the Mac vs. DOS, but it also has to do the
- > relative ease with which viruses can be written for DOS vs. the Mac.
-
- There are possibly more practical reasons as to why there are more pc viruses
- than mac viruses: There are MORE pcs than macs, not just more "vandals
- writing", tho the two quantities are clearly related. I saw a blurb a while
- back in PC Week saying there were around 45 million pcs in the US (apparently
- not counting Europe and elsewhere). Unfortunately, there was not a
- corresponding figure for macs. Be that as it may, more pcs means more people
- working on them (for one reason or another - some to do work, some to write
- viruses). Something else of note that I've learned from this list is that most
- recent viruses have been written in (eastern) Europe. What is the ratio of pcs
- to macs in Europe? Predominance of the platform easily leads to more viruses.
- And if it's easier to do on a pc...well, it's a frightening scenario.
- Richard Travsky Bitnet: RTRAVSKY @ UWYO
- Division of Information Technology Internet: RTRAVSKY @ CORRAL.UWYO.EDU
- University of Wyoming (307) 766 - 3663 / 3668
-
- ------------------------------
-
- Date: Mon, 11 Feb 91 11:36:00 +0700
- From: AMBASE%RUG.NL@CUNYVM.CUNY.EDU
- Subject: BOOTCOMP.ZIP - Use BIOS-ints to compare bootsector with saved (PC)
-
- Summary: Reposted by Keith Petersen
-
- I have uploaded to SIMTEL20:
-
- pd1:<msdos.virus>
- BOOTCOMP.ZIP Use BIOS-ints to compare bootsector with saved
-
- This package uses the original BIOS interrupts to get the "current"
- bootsector and partitiontable and compare it with a previously saved copy.
- Since the original interrupts are used, no virus can mislead the program.
-
- Arjen Merckens (ambase@rugr86.rug.nl)
-
- ------------------------------
-
- Date: Mon, 11 Feb 91 00:00:00
- From: "Richard Budd" <KLUB@MARISTB.BITNET>
- Subject: Translation of POLIMER VIRUS (PC)
-
- In answer to Fridrik Skulason's request in VIRUS-L last month for a
- translation of a sentence appearing on the POLIMER Virus:
-
- A le' jobb kazetta a POLIMER kazetta! Vegye ezt!
-
- I. Szarka at IBM's Budapest office confirmed to me today that the
- sentence is in Magyar. It translates as:
-
- The best cassette is the POLIMER cassette! Buy this!
-
- As a systems engineer with our Budapest office, he is very interested in
- knowing as much information about this POLIMER virus as possible. Could
- Mr. Skulason please forward details of the POLIMER virus to klub@maristb
- on BITNET. At this time, my IBM account is unfortunately not connected
- with any outside networks.
-
- ======================================================================
- Richard Budd | E-Mail: IBMers - rcbudd@rhqvm19.ibm
- VM Systems Programmer | All Others- klub@maristb.bitnet
- IBM - Sterling Forest, NY | Phone: (914) 578-3746
- - ----------------------------------------------------------------------
- IBM and Marist College don't ask me for my opinions. They just let me
- play with their computers.
-
- ------------------------------
-
- Date: Tue, 12 Feb 91 09:33:00 +0700
- From: MIKAEL LINDBERG MORTENSEN <MIKAEL@vax.psl.ku.dk>
- Subject: Is this a virus? (PC)
-
- I Would like some good advice on VIRUS. I am trying to figure out
- whether a computer has a virus or the computer is just sick, here
- goes:
-
- While being inside a word processor (MS-Word 5.0) the computer
- suddenly hung up, at least the keyboard was disabled. The speaker
- started pipping realy madly. The mouse still worked though.
- If the computer was hung the mouse would not work, if the computer
- was hung the speaker would not be beeping, but just make a tone,
- Have I got a known Virus on my hand or what?
- Any suggestions are welcomed.
- *******************************************
- * Mikael Lindberg Mortensen *
- * University of Copenhagen DDBD? *
- * Psychological Laboratory @EY *
- * Denmark. @D *
- * mikael@vax.psl.ku.dk *
- *******************************************
-
- ------------------------------
-
- Date: 12 Feb 91 12:01:30 +0000
- From: frisk@rhi.hi.is (Fridrik Skulason)
- Subject: Re: Boot Sector/Partition Table Protection (PC)
-
- Regarding the subject of automatically detecting infections by boot
- sector viruses, I just wanted to point out that F-DRIVER.SYS (a part
- of my F-PROT package) will detect all known boot sector viruses, and
- is also designed to detect new/unknown boot sector and partition table
- viruses. I will, however include an option in version 1.15 to disable
- this check, as it may cause problems on machines with network boot
- ROMs.
-
- - -frisk
-
- ------------------------------
-
- Date: Mon, 11 Feb 91 11:41:04 -0700
- From: rtravsky@CORRAL.UWyo.Edu (Richard W Travsky)
- Subject: Viruses Via Radio
-
- The January 28th edition of Computer World has an article in the
- viewpoint section entitled "Fighting Terminal Terroism". The appears
- within:
-
- Radio frequency interception is a nearly trivial task today. Using an
- "intercept/transmit" model, viruses can be injected into communications
- systems with relative ease. The U.S. government has issued contracts
- for studies on methods of infecting enemy military computers with
- viruses...
-
- I was not aware virus transmission by radio had been accomplished. I
- recall a news blurb a few months or so ago about the contracts for
- radio transmission of viruses, but I also vaguely remember that the
- general conscensus was that it was not possible ('course, that
- wouldn't stop the government! ;). So, fact or hype? Anyone have any
- information?
-
- Richard Travsky Bitnet: RTRAVSKY @ UWYO
- Division of Information Technology Internet: RTRAVSKY @ CORRAL.UWYO.EDU
- University of Wyoming (307) 766 - 3663 / 3668
-
- ------------------------------
-
- Date: Tue, 12 Feb 91 11:08:55 +0000
- From: "Pete Lucas" <PJML@ibma.nerc-wallingford.ac.uk>
- Subject: IBM Virus Scanner. (PC)
-
- Can anyone tell me whether any new signature files have been released
- for the IBM Virus Scanner? I currently have release 1.2 of this
- program, which is at a guess around 6 months old; has there been any
- update of the program??
-
- Pete Lucas PJML@UK.AC.NWL.IA G6WBJ@GB7SDN.GBR.EU
-
- ------------------------------
-
- Date: 12 February, 1991
- From: Padgett Peterson <padgett%tccslr.dnet@uvs1.orl.mmc.com>
- Subject: Observations & Comments
-
- From: millerje@holst.tmc.edu (jeffrey scott miller)
-
- >Artifical intelligence? For what purpose. 99% of scanning for
- >viruses just requires looking for a "search string".
-
- However, scanners are only one form of integrity protection for a PC.
- A good AI program will be able to "learn" a system configuration,
- which programs are allowed to do what, and flag the user if something
- unusual takes place. The prime problem with such schemes today result
- from too many "false positives" to avoid any "false negatives".
- Enigma-Logics VIRUS-SAFE, Certus Int'l's CERTUS, and Mr. McAfee's
- VSHIELD are good second generation products available today, but the
- third generation is going to have to include some form of AI as
- described above.
-
- - ---------------------------------------------------------------
-
- From: merckens@dbf.kun.nl (Merckens A)
-
- >The solution, which can be found in BOOTCOMP.ZIP, is based on methods used
- >by these viruses (to catch a thief ....)
-
- >After this has been done, the computer should be booted from this floppy.
- >The code in the bootsector then catches the original BIOS
- >interrupts and patches them to the file BOOTCOMP.exe.
-
- >When the program BOOTCOMP.exe is called, it uses the original
- >interrupts to get the "current" bootsector and partition table. So even
- >if a virus has taken the interrupts, we will indeed get the true
- >information, and comparison is correct.
-
- This certainly is a better answer than exists under DOS alone but
- there are methods that can be used to achieve tha same result with
- much less effort.
-
- First, the "booting from floppy" requirement was found to be
- unacceptable to most users: it was easier to perform the integrity
- checking at the BIOS level as suggested and then pass the BIOS "hooks"
- in memory. Additional problems are that you will not be notified of an
- infection until you run BOOTCOMP after DOS has loaded and each machine
- must have its own floppy making maintenance more complicated. Also
- this is a difficult proposition when coupled with a "never boot from
- floppy" policy or any sort of paswword protection for the hard disk.
-
- - -----------------------------------------------------------------------
-
- From: dg@titanium.mitre.org
-
- >Observation 2: Mac viruses are not easier to write than PC viruses for
- >the same reason Mac application are not easier to write than PC
- >applications...Alot of has to do with the number of
- >vandals writing viruses for the Mac vs. DOS, but it also has to do the
- >relative ease with which viruses can be written for DOS vs the Mac.
-
- The real point is not the difficulty of writing the application,
- either is simple in comparison to writing a good word processor,
- rather it is the total lack of integrity checking in either platform.
- Larger systems were forced to design in such systems (and accept the
- impact on performance) so that accidental (or malicious) actions by
- one user could not take down an entire system. IBM learned this in the
- '50s as has every other multi-user system manufacturer, but the
- original 4.77 mHz PC could not compete with the CP/M machines if the
- overhead of a "real" OS was added. MACs are the same way - performance
- takes precidence over protection. This is neither good nor bad, just a
- fact.
-
- Today with 40 mHz 68040s and 33 mHz 80386s, the performance it there
- to allow effective integrity assurance unnoticably (in fact it can be
- done on a 4.77 mHz PC), there just has not been much of a market for
- it. MS DOS 5.00 does not seem to have any more than 1.00 did and I
- would be surprised to find anything in MAC 7. On both platforms, if
- you can write a properly constucted executable file, the CPU will
- happily execute it even if it causes self-destruction.
-
- Today, what development has been done has largely been by a small
- group of dedicated people such as Frisk, Ross Greenberg, Chip Hyde,
- Dennis Yelle, Morgan Schweers, Kelly Goen, John Norstad, and Andy
- Hopkins (I know this isn't complete) who have taken the time and
- trouble to really understand the architecture before making an attempt
- at a solution.
-
- As far as viruses are concerned, it is difficult to have twenty years
- experience in a field that has only existed for four (Yes, Fred C.
- wrote one in 1984 on the VAX but I start PCs with the Brain). From one
- standpoint, It is amazing that we have come so far in a short time -
- the trouble is that we all want more and know that it can be done.
-
- Warmly, Padgett
-
- ps Have sent a beta copy of DISKSECURE to Ken since my "baroque" system
- prevents binary uploads. This is the partition table replacement experiment
- mentioned earlier. No promises or guarentees nor does it have anything
- to do with my employer. It just seems to work. app
-
- ------------------------------
-
- Date: Tue, 12 Feb 91 13:03:16 -0400
- From: BOWMAN@morekypr.bitnet
- Subject: Request for info on the Ohio virus (PC)
-
- Hello virus-l,
-
- I just joined the list and I am interested in finding out information
- regarding the "Ohio" virus.
-
- I've been told it only hits 360K floppies and it infects the boot sector.
-
- What I would like to know is what the virus does. Does it destroy data?
- Does it destroy FATs? etc...
-
- We have discovered a large number of floppies infected with this virus and
- are in the process of cleaning it up.
-
- Please respond directly to me. I will summarize if appropriate.
-
- Thanks in advance.
-
- Todd Bowman bowman@morekypr.bitnet
- Manager of Academic Computing
- Morehead State University
- Morehead, Kentucky
-
- ------------------------------
-
- Date: Tue, 12 Feb 91 11:07:37 -0700
- From: James Fish <ISTJWF@ASUVM.INRE.ASU.EDU>
- Subject: Disinfecting an Appleshare fileserver (Mac)
-
- Can anyone give me some advice on how to disinfect an Appleshare
- fileserver and protect it from further infection? The machine is a
- Mac SE/30, 4MB RAM, 80MB HD that is used in a computer lab open to
- general student use.
-
- Thanks!
-
- Jim Fish
- Student Information Systems
- Arizona State University
- istjwf@asuvm.inre.asu.edu
- >>*<<
- Advice to the Arizona Legislature: "Beware of things you might step in...
- that foot may later wind up in your mouth."
- >>*<<
-
- ------------------------------
-
- Date: Tue, 12 Feb 91 09:48:00 -0500
- From: John Perry KG5RG <PERRY@UTMBEACH.BITNET>
- Subject: Leprosy virus signature error (PC)
-
- It has been brought to my attention that the virus signature
- in the file VIRUS.NEW on beach.gal.utexas.edu for the Leprosy virus is
- in error. VIRUS.NEW is an addendum to SIGN.TXT used by FPROT114.
- Fridrik Skulason has verified that this new signature may cause a
- false alarm in some instances. If you have downloaded VIRUS.NEW from
- beach.gal.utexas.edu and receive a warning pertaining to the Leprosy
- virus it is probably a false alarm. An updated/corrected version of
- the file will be available shortly and I will announce it's
- availabilty in VIRUS-L.
-
- John Perry KG5RG
- University of Texas Medical Branch
- Galveston, Texas 77550-2772
-
- You can send mail to me at any of the following addresses:
-
- DECnet : BEACH::PERRY
- THEnet : BEACH::PERRY
- Internet : perry@beach.gal.utexas.edu
- Internet : john.perry@f365.n106.z1.fidonet.org
- BITNET : PERRY@UTMBEACH
- SPAN : UTSPAN::UTADNX::BEACH::PERRY
- FIDOnet : 1:106/365.0
-
- ------------------------------
-
- Date: Tue, 12 Feb 91 10:11:51 -0800
- From: p1@arkham.wimsey.bc.ca (Rob Slade)
- Subject: University Lab Protection (PC)
-
- ACRAY@ECUVM1.BITNET (RAY) writes:
-
- > virus protection packages. We have a copy of Virex for our use but
- > would like to implement something in the labs. We have look at SCAN
- > but McAfee shareware site licences prices are exceptionally high. The
- > minimum purchase is for use on 100 machines for $3250. We would
-
- I would suggest you get a copy of F-PROT from one of the server sites
- or a local bulletin board. We just purchased a site license for 100
- machines in a government office for $200, the same for your university
- would be $100, I believe.
-
- Vancouver p1@arkham.wimsey.bc.ca _n_
- Insitute for Robert_Slade@mtsg.sfu.ca H
- Research into (SUZY) INtegrity /
- User Canada V7K 2G6 O=C\
- Security Radical Dude | O- /\_
- /-----+---/ \_\
- / | ` ||/
- "A ship in a harbour is safe, but that / ||`----'||
- is not what ships are built for." || ||
- - John Parks `` ``
-
- ------------------------------
-
- Date: Tue, 12 Feb 91 11:21:24 +0000
- From: Anthony Appleyard <XPUM04@prime-a.central-services.umist.ac.uk>
- Subject: Viruses in text files
-
- With reference to this message:-
- ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
- Date: 11 Feb 91 01:16:47 +0000
- From: millerje@holst.tmc.edu (jeffrey scott miller)
- Subject: Re: Virus questions (PC)
- ...........
- True. Viruses cannot infect text files, as they are never executed. Viruses
- CAN look to see if a certain filetype is being accesses (i.e. .DBF), but
- since there is no executable code in a text file, there is no way a virus
- can "latch" onto the file.
- ...........
- ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
- There was a long discussion in Virus-L in the past about viruses infecting
- text files. Some systems and programs when reading text files treat some
- character sequences as escape sequences to tell them to obey the following
- characters specially, e.g. reading them as binary into store, or
- trojanizing keyboard keys by altering what those keys do. So viruses <can>
- infect or trojanize text files.
- {A.Appleyard} (email: APPLEYARD@UK.AC.UMIST), Tue, 12 Feb 91 11:14:56 GMT
-
- ------------------------------
-
- Date: 13 Feb 91 11:34:04 -0600
- From: cosc13gb@jetson.uh.edu
- Subject: MSDOS built in anti-viral for 40 meg or up hard drive (PC)
-
- using a well known MSDOS 3.2 problem of not recognize 40 megabytes
- hard drives I run suspicous program on floppies only
- Now can any know virus infect my hard drive anyway?
- thanks in advance
- bye (sp.) the way, University of Houston can disable boot up from
- drive A: no matter that you has turn the machine off that is pretty
- impressive hu? But I don't how they do it
- please reply to this message or email cosc13gb.jetson.uh.edu
-
- ------------------------------
-
- End of VIRUS-L Digest [Volume 4 Issue 27]
- *****************************************
-