home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker 2
/
HACKER2.mdf
/
virus
/
virusl2
/
virusl2.218
< prev
next >
Wrap
Text File
|
1995-01-03
|
16KB
|
357 lines
VIRUS-L Digest Monday, 23 Oct 1989 Volume 2 : Issue 218
VIRUS-L is a moderated, digested mail forum for discussing computer
virus issues; comp.virus is a non-digested Usenet counterpart.
Discussions are not limited to any one hardware/software platform -
diversity is welcomed. Contributions should be relevant, concise,
polite, etc., and sent to VIRUS-L@IBM1.CC.LEHIGH.EDU (that's
LEHIIBM1.BITNET for BITNET folks). Information on accessing
anti-virus, document, and back-issue archives is distributed
periodically on the list. Administrative mail (comments, suggestions,
and so forth) should be sent to me at: krvw@SEI.CMU.EDU.
- Ken van Wyk
Today's Topics:
Comments on IBM Virus Scanner (PC)
Article pre-Datacrime
New anti-viral software (PC)
Yale / Alameda Virus (PC)
Vacsina virus + Den Zuk virus. (PC)
OHIO Virus (PC)
Virus infection report (PC)
Worms again.... (VAX/VMS)
Want suggestions on how to delete virus (PC)
---------------------------------------------------------------------------
Date: Thu, 12 Oct 89 11:41:49 -0400
From: Peter Jaspers-Fayer <SOFPJF%UOGUELPH.BITNET@VMA.CC.CMU.EDU>
Subject: Comments on IBM Virus Scanner (PC)
We got a copy of IBM's virus scanner. It is much like McAfee's SCAN,
with these differences:
- - It is out of date. McAfee's product is disseminated via network (a
fact which is looked upon with scorn - or at least with distrust -
by many corporate people) so it is very current. IBM's checks for 20+
viruses which are mostly fairly old, vs 40+ for John's program, some
of them only weeks old. I feel this is an important point, as viruses
CAN spread as fast as eMail.
- - IBM's says it checks the "master boot" (partition) record. Does
McAfee's? The documentation says so, but the 'running commentary'
does not mention it.
- - The 'characteristic code signatures' are in plain text, in separate,
easily editable files. This allows one to easily add new viruses
with any DOS text editor. So when you read (here for instance)
that the new 'garble' virus can be located by scanning for '00486921FF'
it is trivial to edit your copy of the table to add scanning for that
type of virus. You can also use the same program in a 'grep-like'
way to scan for any arbitrary string on the disk. (eg 'Copyright')
To my mind, this has it's advantages and disadvantages. I like the
idea of publishing 'code signatures', and having people configure
their own scanners. Unfortunately, this also makes it easier for
virus/modifiers to see how they are being caught (like bank robbers
monitoring Police radio, I guess), and make small mods to make the
virus 'undetectable' with that particular signature.
I certainly have nothing against John and all the work he's done for us,
but it seems to me IBM's way moves control into the hands of the people,
and is more 'open' (gee, come to think of it, that's pretty strange,
considering origin ;-) (N.B. 'smiley', IBM!) Any other thoughts on the
pro's and con's of having the search strings in pain human-editable
text? Could someone CC this to John McAfee and post his reply?
/PJ
How did a fool and his money ever get together in the first place? - Anon
------------------------------
Date: Thu, 12 Oct 89 12:17:31 -0400
From: "Bruce Guthrie" <BGU%NIHCU.BITNET@VMA.CC.CMU.EDU>
Subject: Article pre-Datacrime
[Ed. Well, this is a bit late, but...]
"'Friday the 13th' Virus Bugging Computer Users"
by Evelyn Richards
Washington Post, pg E1, Oct 12 1989
Just a hair after midnight tonight, or soon thereafter, as
unsuspecting computer users log on, malicious programs now lying
dormant inside IBM and IBM-compatible personal computers will be
unleashed to begin a reign of terror, scrambling the information
stored on the computers' hard disk.
Or so some computer-security experts say. Others believe
such fears are nothing more than a false alarm. Whether the
virus turns out to be a real threat or not, one this is
certain--the prospect of a destructive virus attack tomorrow has
sent thousands of computer users into a panic and turned up more
news reports of the virus than actual sighting of the virus
itself.
An official at International Business Machines Corp., which
is pooh-poohing the prospects of widespread havoc, reported
yesterday that the firm is getting "more press calls than
customer calls." And John McAfee, a computer security expert in
Santa Clara, Calif., has taken to calling this "a media virus."
McAfee, who spent yesterday dashing from one ringing phone to
another, is reassuring callers that "nothing is going to happen.
The virus is a phantom."
But PC czars aren't taking any chances. The wheels of
Washington have been busy grinding out warnings that the rogue
computer program, best known as the "Friday the 13th" virus,
could wrest control of a PC and effectively destroy months of
information carefully stored within it. The General Services
Administration and the Department of Veterans Affairs, for
example, have distributed internal memos admonishing users to
take certain precautionary steps, among them: backing up their
data so that anything destroyed can be replaced, avoiding
software programs obtained from friends or from public
computerized "bulletin boards", and storing diskettes behind lock
and key when they're not in use.
Companies are taking similar precautions.
In McLean [Virginia], Planning Research Corp. refrained from
issuing a special advisory but instead put out the word at
departmental meetings. "We thought it would be remiss not to
warn people, but we also didn't want them to go overboard," said
Jude Franklin, general manager of the technology division.
Dennis Steinauer heads the computer security forces at the
National Institute of Standards and Technology (nee the National
Bureau of Standards), which issued an early advisory about the
virus and is partly responsible for coordinating computer
security throughout the federal government. Is Steinauer
worried?
"I'm leaving on Friday the 13th, and I haven't changed my
plans," said Steinauer, who plans to attend a conference in
Brussels.
Steinauer isn't the only computer security expert who will
be out of touch tomorrow. Some 2,300 such experts are gathered
in Baltimore this week for their annual meeting.
------------------------------
Date: Thu, 12 Oct 89 12:50:24 -0500
From: jwright@atanasoff.cs.iastate.edu (Jim Wright)
Subject: New anti-viral software (PC)
More anti-viral software. Datacure was sent to me from the
Netherlands with the author's permission, the other three came
from HomeBase. A note on the DataCrime virus. By the time
most of you read this, Friday, October 13 1989 will have passed.
Unfortunately this doesn't mean that the DataCrime worry is
over. Please keep in mind that all the information I have
indicates this virus is uncommon in all places except press
reports. Nonetheless, better safe than sorry. Remember,
DataCrime is set to go off ANY DAY between Columbus day and
New Year's, not inclusive. So any latent infection could show
up with unpleasant consequences. Now, on with the show...
datacure.arc
One program that will identify files infected with
DataCrime and optionally cure them. A second memory
resident program that will block the destructive
effects of DataCrime and warn you. Only works on
DataCrime II virus. Shareware. No version #.
[ I was unable to get datacure.com to perform ]
[ properly. I'm trying to find out why, and ]
[ will post any updates. It isn't destructive, ]
[ just ineffective. -- jrw ]
dc89scan.arc
A program to identify the DataCrime virus. This
package was released largely as a bit of public
relations for the company involved, but is useful
despite this. Only works on the two strains of
DataCrime I (1168 and 1280). Freely redistributable.
No version #.
scanrs42.arc
Resident program which checks each program for viruses
before it is allowed to execute. Update to previous
version. Shareware. Version 0.9v42.
scanv42.arc
Program to scan a disk, directory or file for viruses.
Will work with SHEZ to scan archives also. Update to
previous version. Shareware. Version 0.7v42.
DATACURE.ARC Detect and disable the DataCrime II virus
DC89SCAN.ARC Detect the two strains of DataCrime I virus
SCANRS42.ARC Resident program to scan for many viruses
SCANV42.ARC Program to scan files for many viruses
Jim
------------------------------
Date: 13 Oct 89 20:18:15 +0000
From: news@acsu.buffalo.edu
Subject: Yale / Alameda Virus (PC)
Has anyone heard of the Yale/Alameda virus, and know what it does?
A friend here at school found 3 of his floppies (he's lucky he
doesn't have a hard drive) infected with this by using Viruscan.
Apparently it had only infected the hidden boot files so by
using the SYS command he feels as if his is rid of it. The real
question though is if this is a safe assumption, and how does it
duplicate itself (ie, could it possibly be hidden in other files).
Doug McKee
@relay.cs.net:mckee@canisius.edu
[Ed. Here's what I have (from Joe Hirst's list, which should be
available from the documentation archive site(s)):
15. Yale - AKA Alameda, Merritt
Boot virus - floppy only
Type description:
This virus consists of a boot sector only. It infects floppies in the
A-drive only and it occupies 1K of memory. The original boot sector is
held in track thirty-nine, head zero, sector eight. It hooks into INT
9, and only infects when Ctrl-Alt-Del is pressed. It will not run on
an 80286 or an 80386 machine, although it will infect on such a
machine. It has been assembled using A86. It contains code to format
track thirty-nine, head zero, but this has been disabled.
]
------------------------------
Date: 15 Oct 89 07:50:12 +0000
From: munnari!minyos.xx.rmit.oz.au!s864292@uunet.UU.NET (F.S. Seow)
Subject: Vacsina virus + Den Zuk virus. (PC)
The IBM computer of a friend of mine, has just been attacked by
Vacsina and Den Zuk simultaneously.
Would anyone know where in Metropolitan Victoria,
can my friend get the antidotes ( affordable commercial,
shareware or public domain ) for these viruses ?
Even better is there such a thing as an all-purpose-multi-virus
antidote existing ?
F.S.
------------------------------
Date: Mon, 16 Oct 89 11:33:00 -0400
From: <rwmira01%ULKYVX.BITNET@jade.Berkeley.EDU> (Rob Miracle)
Subject: OHIO Virus (PC)
Does anyone have any information on the Ohio virus? What does it do? How is
it triggered etc?
Any information would be helpful.
Thanks in advance
Rob Miracle
- --
Rob Miracle | Bitnet : RWMIRA01@ULKYVX CIS: 74216,3134
Programmer/Analyst-II | INTERNET : rwmira01%ulkyvx.bitnet@cunyvm.cuny.edu
University of Louisville | UUCP : ...psuvax1!ulkyvx.bitnet!rwmira01
"Greed Kills" -- Anton Devious
------------------------------
Date: Mon, 16 Oct 89 11:49:28 -0500
From: Bill Hobson <X043BH%TAMVM1.BITNET@VMA.CC.CMU.EDU>
Subject: Virus infection report (PC)
We had one lab hit at Texas A&M University in out Architecture
department. Unfortunately, I found about it AFTER they low level formatted
all of their hard disks. There are probably many student disks out there
with the infections still present, but unfortunately I can't get my hands
on them to find out what they had. It happened on THE DAY (Friday 13th),
but there are two viruses that blow up on that day. I have personally
eradicated the Jerusalem virus from two departments on campus, so I
suspect that is it. More later as I find out more!
------------------------------
Date: Mon, 16 Oct 89 15:59:21 -0500
From: Gene Spafford <spaf@CS.PURDUE.EDU>
Subject: Worms again.... (VAX/VMS)
If you have not yet heard, another network worm incident is in
progress.
The following bits of information have been collected from multiple
sources. I am mailing this so that people don't tie up the phone
lines only to get the same information. The folks at SPAN & CERT
will issue a report when more details are known.
Please refer members of the press and other callers to the SPAN NIC @
(301) 286-7251. DO NOT have them call the CERT -- the folks there are
busy enough as is right now, and they won't respond to questions
without a need-to-know. The folks at DEC probably won't respond
either -- if you can find anyone who knows what it happening in this
incident. The folks at NASA will issue formal reports when appropriate.
The story so far:
Around 4:30 this morning, a worm program was found on machines in the
SPAN network. The worm is apparantly similar to the worm that hit
SPAN in December (on Christmas eve) in that it is spreading on Decnet
and affecting VMS systems. According to a few of the people I talked
with, it is not clear what the program is doing other than printing a
message labelling the program as "Worms Against Nuclear Killers" and
spreading to other machines. There are NO CONFIRMED reports at this
time that the worm is doing damage to machines or data. If the worm
is still spreading, it is spreading VERY slowly -- only about a half
dozen machines have been detected as infected (so far).
All of the appropriate authorities have been notified. CERT, DEC,
NASA, & various Federal agencies are involved. The problem is being
examined by experts in the area, and as soon as the situation is
clarified, a public report will be issued.
In the meantime, we can all help with the situation:
* DON'T PANIC -- it is limited in scope and machine type.
Unless you have a Decnet link to SPAN, your machine is in no
danger,
* Copies of the code are under analysis by experts, so fixes
are undoubtedly on the way. If you run Decnet and installed
the fixes last December, you are *probably* immune already.
* Don't call the CERT, DEC or SPAN about this -- they'll be sure
to release details when they are certain enough about them to be
sure that they won't cause problems.
* Refer any members of the press to the SPAN number. PLEASE be
careful what you say to members of the press -- remember that
the press doesn't understand the difference between DECnet, the
Internet, VMS, Unix, etc, and we don't need another media scare
about network invasions.
- --spaf
------------------------------
Date: Mon, 16 Oct 89 20:29:26 -0400
From: Elizabeth Caruso <LIZBB%CUNYVM.BITNET@VMA.CC.CMU.EDU>
Subject: Want suggestions on how to delete virus (PC)
Today, our Novell LAN reported a hardware error when users tried to
access programs stored on our File Server. At first we did not know
it was a virus because the same programs would run for one user and
not run for another. I had a feeling it might be a virus when I
performed a Novell Netware command "NCOPY" and the screen messages
where overwritten by characters that did not make sense. We decided
to run "VIRSCAN" to check for viruses. 39 files where infected with
the JERUSALEM virus including the "NCOPY" file.
HAS ANYONE ENCOUNTERED THE JERUSALEM VIRUS ON THEIR LOCAL AREA
NETWORKS?
We would like to delete the infected files and replace them with clean
copies but we don't know if this will be a correct action to take.
Will recoping be enough or do we have to format our File Server? IF
ANYONE HAS DELETED JERUSALEM FROM THEIR SYSTEM, (LAN OR PC SYSTEM) WE
WOULD LOVE SOME ADVICE!!!! HOW DOES THIS VIRUS INFECT A SYSTEM AND
SPREAD?
------------------------------
End of VIRUS-L Digest
*********************
Downloaded From P-80 International Information Systems 304-744-2253