home *** CD-ROM | disk | FTP | other *** search
- From: Kenneth R. van Wyk (The Moderator) <krvw@CERT.SEI.CMU.EDU>
- Errors-To: krvw@CERT.SEI.CMU.EDU
- To: VIRUS-L@IBM1.CC.LEHIGH.EDU
- Path: cert.sei.cmu.edu!krvw
- Subject: VIRUS-L Digest V4 #81
- Reply-To: VIRUS-L@IBM1.CC.LEHIGH.EDU
- --------
- VIRUS-L Digest Tuesday, 14 May 1991 Volume 4 : Issue 81
-
- Today's Topics:
-
- Joshi Virus questions (PC)
- Into the 1990's
- FLIP or OMICRON (PC)
- Stealth viruses (PC)
- Virii (sic) on Factory Software & Legal Issues
- re: The Shape of the World (PC)
- Re: TSR Virus Detector (PC)
- Gatekeeper 1.2 released (Mac)
- Comparing virus scanners (PC)
- Trojan version of VIRUSCAN version 78 (PC)
- Re: SCAN hangs while checking Window's SOL.EXE file (PC)
-
- VIRUS-L is a moderated, digested mail forum for discussing computer
- virus issues; comp.virus is a non-digested Usenet counterpart.
- Discussions are not limited to any one hardware/software platform -
- diversity is welcomed. Contributions should be relevant, concise,
- polite, etc. Please sign submissions with your real name. Send
- contributions to VIRUS-L@IBM1.CC.LEHIGH.EDU (that's equivalent to
- VIRUS-L at LEHIIBM1 for you BITNET folks). Information on accessing
- anti-virus, documentation, and back-issue archives is distributed
- periodically on the list. Administrative mail (comments, suggestions,
- and so forth) should be sent to me at: krvw@CERT.SEI.CMU.EDU.
-
- Ken van Wyk
-
- ----------------------------------------------------------------------
-
- Date: 13 May 91 14:05:12 +0000
- From: sph0301@utsph.sph.uth.tmc.edu (Kate Wilson)
- Subject: Joshi Virus questions (PC)
-
- After months of fighting the Stoned virus, we now have had at least one
- occurance of Joshi. There are a couple questions I have about this
- virus -
-
- First, the infected machine was checked (by me) using McAfee's Scan76 on
- Monday. On Tuesday the PC started having "real time clock errors". By
- Wednesday morning it wouldn't boot - hung up when it hit the first line
- of the config.sys file. After several hours of troubleshooting, we
- checked for viruses again, and this time Joshi showed up. The user
- swears she hadn't used ANY floppy disks in the last couple days (not even
- her own)...I don't known anything about this virus - what are the typical
- symptoms? Is there some time delay before it activates?
-
- Second question: according to VIRLIST.TXT included with the McAfee program,
- Joshi corrupts data files. Does this mean that it could reside in a data
- file, or just that it could damage them? I always thought that viruses
- only damaged executable files. If I had scanned the PC using SCAN /A (to
- scan all files, not just executables) might I have caught this sooner?
-
- Kate Wilson
- UT School of Public Health
- Houston, TX sph0301@utsph.sph.uth.tmc.edu
-
- ------------------------------
-
- Date: Mon, 13 May 91 11:21:18 -0400
- From: Padgett Peterson <padgett.tccslr.dnet@mmc.com>
- Subject: Into the 1990's
-
- First I would like to offer an apology to Ross Greenberg (Flu-Shot)
- and Fridrik Skulasson (F-Prot). You can count on your fingers the
- number of people who have made real contributions to the anti-viral
- scene and these are two of them. My choice of words ("You get what you
- pay for") in the circumstances was unfortunate.
-
- At the same time, I constantly deal with more and more users of PCs
- who could care less what kind of platform they are dealing with, all
- they are interested in is their spreadsheet/publications/
- communications capability. These people are not interested in which
- strain of the 4096 they have been infected with, their concern is that
- the machine is operating properly and without any hidden "extras".
-
- Consequently, those techniques that were developed when mere ownership
- of a PC qualified one as a "hacker" (in the original sense), are more
- suited to the technicians who are paid to understand the architecture.
- What the user needs to know is that SOMETHING has happened and that a
- technician is needed to interpret WHAT - wheter it be a problem caused
- by power supply (I see a lot of these), drive, ICs, or malicious
- software.
-
- Today, viruses seem to account for on the order of 10-20% of the
- trouble calls I get. They are significant enough to warrant avoidance
- measures, but not anything to panic about.
-
- The fact of the matter is that today EVERY "common" virus allocates
- resources to itself, most in obvious manners, and all are detectable
- to the user/program that bothers to look. Trojans & logic bombs as
- well as simple failures are another matter entirely but protection is
- possible (just not as "glamorous").
-
- Since the PC (and MAC) have only rudimentary integrity checking built
- in, the first order of business should be to add-on some additional
- measures to ensure the validity of the machine. Because problems
- (including malicious software) can begin at the BIOS level, so must
- integrity checking.
-
- The real point I have been trying to make for some time is that such
- checking IS NOT DIFFICULT, orders of magnitude less than what it takes
- to write a good word processor, it just has not been done yet.
-
- There are some guidelines and dead ends to be avoided: for example
- McAfee's SCAN /AV adds ten bytes of authentication to each program
- that can be retrieved by the resident VSHIELD program. Enigma-Logic's
- Virus-Safe stores the checksums in a single separate data file. Either
- is to be preferred to Norton's Anti-Virus method which reportedly
- creates a 77 byte file for each executable since given a disk like
- mine with 1100 executables and 2k clusters, this would take up over 2
- Mb for those 77 byte files. With an 8k cluster size such as I have
- seen on many machines, we would be talking almost 9 Mb (each file
- takes up at least one cluster). Few users could afford this.
-
- Consequently, IMHO the first priority should be given to a resident
- integrity checking package designed for the single user system that
- uses authenticated data paths to each peripheral, and adds the program
- validation and permission process that exists on mainframes. The major
- difference would be that instead of user privileges we would have a
- set of program privileges on record.
-
- In this way, if a program were permitted to go resident, this
- attribute would be recorded and the location, hooked vectors, size,
- and memory checksum would be kept on file. Similarly, a self modifying
- program such as WordPerfect would be permitted to do so, but only to
- its own executables.
-
- I also believe that in the near future, signature scanning programs
- will be limited to the technicians, researchers, and hobbyists who
- need such sophisticated tools, and will not be in general use by the
- average user.
- Comments welcome,
- Padgett
-
- ------------------------------
-
- Date: 13 May 91 11:32:00 +0200
- From: storck@yogi.vmsmail.unibas.ch
- Subject: FLIP or OMICRON (PC)
-
- Hello everybody
-
- I have an IBM Clone 386/25 and suddenly I detected a virus with the
- following outlook.It converted EXE-,COM- and BAT-Files to files with
- the name of the little greek letter GAMMA and the attributes
- Read-Only,System,Archive and Hidden, though the files couldn't be
- deleted. After having detected it with two different programs
- (VIRScan, TNTVirus) I had two different names of the virus: FLIP ,
- OMICRON.
-
- Now my questions:
- 1) Is 'FLIP' another name for 'OMICRON' ?
- 2) Infected files can be desinfected by TNTVirus 7.02. Are these
- files after desinfection 100% executable ?
-
- Many thanks in advance to everybody who can send me an answer !
-
- Pascal
-
- ------------------------------
-
- Date: Mon, 13 May 91 11:19:24 +0000
- From: frisk@rhi.hi.is (Fridrik Skulason)
- Subject: Stealth viruses (PC)
-
- I am working on an article on "stealth" viruses, and was wondering if I had
- missed any of them - here is my list:
-
- Boot sector stealth viruses: Azusa, Brain, EDV, Evil Empire, Joshi and
- Spanish Telecom (boot)
-
- Program stealth viruses: Fish6, Frodo, INT13, Number of the Beast, Whale
- ZeroHunt (Minnow)
-
- Note that I do not consider any of the following program viruses to
- belong to the "stealth" category, as they only fulfill one of the two
- necessary conditions (hiding increase in length), but make no attempt
- to hide the virus code, when an infected file is read.
-
- 3445, Diamond, Dir, Eddie-2000, Eddie-2100, Eddie-2, MG, PcVrsDs,
- Spanish Telecom (file), SVC 4.0 and Zero Bug.
-
- Did I overlook something ?
-
- - -frisk
-
- Fridrik Skulason Technical Editor of the Virus Bulletin (UK)
- (author of F-PROT) E-Mail: frisk@rhi.hi.is Fax: 354-1-28801
-
- ------------------------------
-
- Date: Mon, 13 May 91 13:56:58 -0400
- From: padgett%tccslr.dnet@mmc.com (A. Padgett Peterson)
- Subject: Virii (sic) on Factory Software & Legal Issues
-
- >From: p1@arkham.wimsey.bc.ca (Rob Slade)
- >Padgett: We must sue the vendors!
-
- Well, this isn't quite what I said, however what we have here is a
- simple lesson in perception and economics. Quality assurance, which
- includes sampling and integrity validation (what we are shipping is
- what we said we would ship), has a cost.
-
- Traditionally, the most difficult cost centers to justify are security
- and quality assurance since anything they find can keep the product
- from going out the door. In the case of security, the risk is
- apparent, but quality assurance is usually the result of contractual
- clauses that specify it.
-
- Most electrical appliances carry the Underwriters Laboratories seal of
- approval because vendors have discovered that the seal works both
- ways, protecting both the consumer and the vendor.
-
- The problem is that with software, there is no such seal, nor is there
- any demand for one. To the vendors, QA is not a justifiable expense at
- the disk level since there is no requirement for it. Similarly, if a
- problem is discovered, most vendors will try to sweep it under the rug
- since to admit that a problem exists would open them to liability and
- lost sales. Since at present there is no risk in doing so, it is the
- exceptional company that will "go public" with a problem.
-
- The only way this is going to change is if the risks of not "going
- public" becomes greater than the risks from "going public". Hopefully,
- the cost of either will also make effective QA cost effective. Hence
- my comment "bring in the lawyers", not necessarily to sue, but to
- explain such concepts as "culpable negligence" in such a way that
- no-one can plead ignorance & the corporate managers can go to their
- bosses for QA funding with some hope of success.
-
- Unfortunately, as with the SPA, it is probably going to take a few
- publicised civil actions before the vendors are going to do the "right
- thing", I was surprised a year ago that it had not already happened.
- Of course a full recall of all such software is a bitter and expensive
- pill for a company to swallow (and why most automotive recalls, while
- always publicised as "for our customer's safety" by the manufacturers,
- are often the result of a tooth & nail fight with NHTSA (did I get the
- letters right ?) before they become official.
-
- At the moment there is no computer industry "NHTSA" (and few qualified
- people who would be willing to serve on it).
-
- Having been in the corporate world since leaving the unfriendly skies
- of SouthEast Asia. I KNOW that there must be good people at companies
- like Packard-Bell who are being forced to follow a "party line"
- against their better judgement (incidently, from what I have seen, the
- equipment is pretty good and reasonably priced).
-
- However, this does not help the customer with their third largest
- investment (?) who finds their PC useless shortly after arriving home,
- something that is going ultimately to hurt the entire industry for
- some time to come (see below).
-
- >From: Peter Jones <MAINT@UQAM.BITNET>
- >Subject: Re: Packard-Bell (PC)
-
- >Perhaps the recent sightings are due to diskettes remaining in
- >storage for 6 months or so.
-
- Quite likely, though the reports of the Azusa are new. However,
- considering how these units are sold (department stores, mail order),
- that inventory is liable to be around for quite some time to come. You
- would think that the manufacturer could at least identify which lots
- and models are liable to have infected disks, certainly the two
- viruses involved (MusicBug & Azusa) are easy to identify & the
- distribution disks reported to be infected (COMBASE, TVGA, & SVGA) are
- limited.
-
- In short, while I am sure that Ken will be glad to see an end to this
- issue, to me it is a vital one that we can either learn from and
- insist on safeguards from those best able to provide them, or have the
- interesting experience of repeating it again in another six months or
- so.
-
- Warmly,
- Padgett
-
- ------------------------------
-
- Date: 13 May 91 09:50:26 -0400
- From: "David.M.Chess" <CHESS@YKTVMV.BITNET>
- Subject: re: The Shape of the World (PC)
-
- >From: microsoft!c-rossgr@uunet.uu.net
- >
- >This loud cry for protection against research-only viruses is quite
- >quite bothersome -- the numbers game we have to play (as a vendor) in
- >order to counter "my scanner can beat up your scanner" type of games
- >is sorta foolish -- yet we must play the game.
-
- Must we? Or rather, given that we must at the moment, must we always?
- Is there any hope that the anti-virus community might band together
- (for a moment, at least!) and decide that the numbers game shall be
- played ONLY with viruses that have appeared in reliably-confirmed
- real-world incidents? I'm not sure; the hope that we might is part of
- why I asked those questions. It would mean restraining ourselves in
- advertising and in talking to the press, getting publications like the
- Virus Bulletin (and others less respectable) to stop using 300+
- viruses, including losers like the Anti-Pascals, in their evaluations,
- and so on.
-
- It might be marketingly impossible, of course. On the other hand, is
- it possible that eventually people making buying decisions will get
- tired of "We Detect 100 More Viruses Than Our Competitors!!!" sorts of
- claims, and be more impressed by "We Detect Every Virus Known To Have
- Caused A Real Infection, and We're <faster, cheaper, easier to use,
- etc>"?
-
- DC
-
- ------------------------------
-
- Date: 12 May 91 09:25:06 +0000
- From: frisk@rhi.hi.is (Fridrik Skulason)
- Subject: Re: TSR Virus Detector (PC)
-
- esaholm@utu.fi (Esa Holmberg) writes:
- >RADAI@HUJIVMS.BITNET (Y. Radai) writes:
- >
- >> The programs which I compared were F-LOCK, FSP, SECURE, TSAFE, and
- >
- > I'm afraid you have tested a wrong program; F-DRIVER
- > would be the actual resident virus tester of the F-PROT
- > package, and not F-LOCK. I wonder, what the results
- > would look like with F-DRIVER instead of F-LOCK ?
-
- Well, no - Y. Radai tested the correct program - the important
- question was not how effective the programs were against KNOWN
- viruses, but rather how effective they were against the methods used,
- and how effective they would be against new viruses using those
- methods.
-
- I had a version of F-LOCK which was able to stop all the viruses from
- accessing the system directly, but I removed that feature in version
- 1.08, (I think) as it conflicted with some programs, including my
- cache program.
-
- Besides - I don't currently put much emphasis on the F-LOCK part of my
- package, for two reasons - it does not work with Windows (F-DRIVER
- will), and it is being rewritten for version 2.0
-
- Regarding version 2.0, which was originally scheduled to be released
- two months ago - I have been seriously considering to change the name
- of the product. The most likely new name is taken from the Greek
- mythology, 'Argus' - the name of the hundred-eye all-seeing giant.
-
- Any suggestions ?
-
- - -frisk
-
- Fridrik Skulason Technical Editor of the Virus Bulletin (UK)
- (author of F-PROT) E-Mail: frisk@rhi.hi.is Fax: 354-1-28801
-
- ------------------------------
-
- Date: 13 May 91 15:40:21 +0000
- From: rstewart@ccwf.cc.utexas.edu (Robert Stewart)
- Subject: Gatekeeper 1.2 released (Mac)
-
- Machine Name IP Number
- ------------ ---------
- ix1.cc.utexas.edu 128.83.1.21
- ix2.cc.utexas.edu 128.83.1.29
- bongo.cc.utexas.edu 128.83.186.13
- sumex-aim.stanford.edu 36.44.0.6
-
-
- I can vouch for its existence at bongo, having retrieved it from there
- this morning. In addition to this list of features in the announcement
- on comp.sys.mac.announce (very similar to the list I posted a week or
- so ago), the new versions do some self-validation checks in an attempt
- to determine whether they have been corrupted, and they also provide
- more informative error messages.
-
- Robert Stewart
- rstewart@ccwf.cc.utexas.edu
-
- ------------------------------
-
- Date: Mon, 13 May 91 19:05:53 +0000
- From: frisk@rhi.hi.is (Fridrik Skulason)
- Subject: Comparing virus scanners (PC)
-
- What follows is a table comparing several virus scanners. I am
- obviously not unbiased, being the author of one of the programs, but
- the table was not compiled by me, but rather Franz Swoboda in Austria.
-
- He does not list all anti-virus programs known today - only those on
- the market in Austria.
-
- Also, he is testing the programs against his personal collection,
- which may not represent accurately the world's virus scene.
-
- The table lists the programs, the "hit rate" and the time required for
- scanning.
-
- Findviru 2.0 (S&S) 97% 75 sec
- F-FCHK 1.14A 93% 259 sec
- Virusdet 3.00 (Puls) 85% 223 sec
- Watchdog 4.16 (KDT) 82% 512 sec
- Scanv75 (McAfee) 80% 260 sec
- Unvirus 3.08 (Elia Shim) 73% 65 sec
- Stopvir 2.31 73% 96 sec
- Virutest 1.0 (JP Landen) 66% 518 sec
- Pro-scan 2.1 65% 184 sec
- Norton 1.00 62% 130 sec
- VU-Advanced 1.03 61% 479 sec
- Viru-Spy 4.0 58% 178 sec
- AVsearch 2.23 57% 750 sec
- TBscan 1.7 46% 105 sec
- TNTvirus 7.00A (Carmel) 45% 190 sec
- Virscan 1.45 38% 200 sec
-
- Note that in many cases the products compared are not the latest
- versions, but according to Swoboda, they were the latest available in
- Austria.
-
- - -frisk
-
- Fridrik Skulason Technical Editor of the Virus Bulletin (UK)
- (author of F-PROT) E-Mail: frisk@rhi.hi.is Fax: 354-1-28801
-
- ------------------------------
-
- Date: Mon, 13 May 91 14:50:16 -0700
- From: Aryeh Goretsky <aryehg%darkside.com@apple.com>
- Subject: Trojan version of VIRUSCAN version 78 (PC)
-
- TROJAN VERSION OF VIRUSCAN VERSION 78
-
- We have received a trojan horse version of VIRUSCAN. The hacked SCAN
- has apparently been uploaded to BBSes in Michigan, USA under the
- filename SCANV78.ZIP. Running PKZIP -V on the file reveals:
-
- .PKUNZIP (R) FAST! Extract Utility Version 1.1 03-15-90
- .Copr. 1989-1990 PKWARE Inc. All Rights Reserved. PKUNZIP/h for help
- .PKUNZIP Reg. U.S. Pat. and Tm. Off.
- .
- .Searching ZIP: SCANV78.ZIP - Fantasia BBS (313)/788-0882
- .
- . Length Method Size Ratio Date Time CRC-32 Attr Name
- . ------ ------ ----- ----- ---- ---- ------ ---- ----
- . 12816 Implode 5255 59% 04-08-91 14:28 08a87ed8 --w AGENTS.TXT
- . 9406 Stored 9406 0% 02-03-91 17:04 42cf9931 --w REGISTER.DOC
- . 23008 Implode 12550 46% 05-06-91 18:15 f9735dd5 --w SCAN.EXE
- . 6495 Implode 1895 71% 10-31-89 16:16 0449b09d --w VALIDATE.COM
- . 3626 Implode 1802 51% 11-29-90 01:59 ab76470f --w README.1ST
- . 21257 Implode 5767 73% 05-06-91 19:35 a0728a17 --w VIRLIST.TXT
- . 2844 Implode 1406 51% 02-14-91 14:25 aa330b57 --w VALIDATE.DOC
- . 24515 Implode 9188 63% 05-06-91 19:34 172a967f --w SCAN78.DOC
- . ------ ------ --- -------
- . 103967 47269 55% 8
-
- The number listed for the Fantasia BBS is NOT a BBS number and has no
- connection with the trojan horse. I have called the phone number and
- asked the party at the other end to contact me.
-
- Running PKUNZIP on the file reveals the following:
-
- .PKUNZIP (R) FAST! Extract Utility Version 1.1 03-15-90
- .Copr. 1989-1990 PKWARE Inc. All Rights Reserved. PKUNZIP/h for help
- .PKUNZIP Reg. U.S. Pat. and Tm. Off.
- .
- .Searching ZIP: SCANV78.ZIP - Fantasia BBS (313)/788-0882
- . Exploding: AGENTS.TXT -AV
- . Extracting: REGISTER.DOC -AV
- . Exploding: SCAN.EXE -AV
- . Exploding: VALIDATE.COM -AV
- . Exploding: README.1ST -AV
- . Exploding: VIRLIST.TXT -AV
- . Exploding: VALIDATE.DOC -AV
- . Exploding: SCAN78.DOC -AV
- .
- . Authentic files Verified! # TJB859 Zip Source: McAFEE ASSOCIATES
-
- While the Authentic Files Verified Message appears, the Serial Number is
- NOT correct. McAfee Associate's Serial Number is NWM405.
-
- Examination of the AGENTS.TXT, README.1ST, VALIDATE.*, and VIRLIST.TXT
- files revealed that these are straight from VIRUSCAN Version 77--the
- version number in the VIRLIST.TXT file was still V77.
-
- The SCAN78.DOC file had been modified so that all occurrences of V77
- were switched to V78. Additionally, the following text was added for
- the validation data:
-
- . The validation results for Version 77 should be:
- .
- . FILE NAME: SCAN.EXE
- . SIZE: 23,008
- . DATE: 05-06-1991
- . FILE AUTHENTICATION
- . Check Method 1: 2C21
- . Check Method 2: 022E
- .
-
- For the What's New section, the following text was added:
-
- . WHAT'S NEW
- . Version 78 of SCAN removes a few small bugs and continues
- . to optimize the procedures SCAN uses to find viruses, as in Version 77,
- . as well as adding a few more to the list of known viruses. SCAN is now much
- . more compressed than was previously thought possible, so please enjoy the
- . shortened file size, it should still work just fine.
- . Refer to the enclosed VIRLIST.TXT file for a schematic
- . description of the new viruses. For a complete description, please
- . refer to Patricia Hoffman's VSUM document.
- .
-
- Examination of the SCAN.EXE file has show that it contains the help
- message that VIRUSCAN displays as well as the program information
- message. However, the program does not contain any of the other
- messages that VIRUSCAN has in it.
-
- The REGISTER.DOC file distributed with the trojan version of VIRUSCAN is
- not a text file, but rather another .ZIP file containing a file named
- TB1.COM:
-
- . PKUNZIP (R) FAST! Extract Utility Version 1.1 03-15-90
- . Copr. 1989-1990 PKWARE Inc. All Rights Reserved. PKUNZIP/h for help
- . PKUNZIP Reg. U.S. Pat. and Tm. Off.
- .
- . Searching ZIP: REGISTER.DOC
- . Extracting: TB1.COM -AV
- .
- . Authentic files Verified! # TJB859 Zip Source: McAFEE ASSOCIATES
- .
-
- When unZIPped, the REGISTER.DOC file displays the same Authentic Files
- Verified Message as the SCANV78.ZIP file did. Examination of the of the
- TB1.COM file revealed that it contains the Whale virus.
-
- This is all I currently know about the SCANV78.ZIP trojan. If you see
- any copies of this file, please ask the system administrator or sysop to
- remove it and ask them to contact the uploader to warn them that it
- contains a virus.
-
- Aryeh Goretsky
- McAfee Associates Technical Support
- - - - -
- aryehg@tacom-emh1.army.mil
-
- ------------------------------
-
- Date: 14 May 91 11:31:24 +0000
- From: icking@gmdzi.uucp (Werner Icking)
- Subject: Re: SCAN hangs while checking Window's SOL.EXE file (PC)
-
- SSIRCAR@ecs.umass.edu (Sant.) writes:
-
- >Has anyone had problems with SCANV77? When I scan my hard drive, the
- >program hangs on one particular file, SOL.EXE, Window's solitaire
- >program. I don't have problems with running the game and SCAN doesn't
- >have problems with any other file. In order to continue, I have to
- >press 'F' to accept the failure. Does anyone know why this is
- >happening?
-
- As far as I have seen, the problem does not depend on the version of SCAN.
- It depends on running SCAN under Windows in conjunction with SHARE.
- It seems to me that Windows opens a lot of files and the error occurs if
- SCAN attempts to open one of these files, too.
-
- The problem disappeared on my PC since I replaced loading SHARE by using
- NOSHARE (Simtel or mirror-sites: <MSDOS.SYSUTL>NOSHARE.ZIP)
- - --
- Werner Icking icking@gmdzi.gmd.de (+49 2241) 14-2443
- Gesellschaft fuer Mathematik und Datenverarbeitung mbH (GMD)
- Schloss Birlinghoven, P.O.Box 1240, D-5205 Sankt Augustin 1, FRGermany
- "Der Dativ ist dem Genitiv sein Tod."
-
- ------------------------------
-
- End of VIRUS-L Digest [Volume 4 Issue 81]
- *****************************************
-