home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker 2
/
HACKER2.mdf
/
virus
/
virusl2
/
virusl2.221
< prev
next >
Wrap
Text File
|
1995-01-03
|
23KB
|
488 lines
VIRUS-L Digest Tuesday, 24 Oct 1989 Volume 2 : Issue 221
VIRUS-L is a moderated, digested mail forum for discussing computer
virus issues; comp.virus is a non-digested Usenet counterpart.
Discussions are not limited to any one hardware/software platform -
diversity is welcomed. Contributions should be relevant, concise,
polite, etc., and sent to VIRUS-L@IBM1.CC.LEHIGH.EDU (that's
LEHIIBM1.BITNET for BITNET folks). Information on accessing
anti-virus, document, and back-issue archives is distributed
periodically on the list. Administrative mail (comments, suggestions,
and so forth) should be sent to me at: krvw@SEI.CMU.EDU.
- Ken van Wyk
Today's Topics:
Re: Gatekeeper false alarm? (Mac)
Re: SAM vs. Gatekeeper (Mac)
RE: Superclock non-virus... (Mac)
Re: INIT 29 question from Jim Bradley...
IBM Virus Scan program (PC)
Virus source available in Toronto
IBM's Virscan Program (PC)
VIRUSCAN test (IBM PC)
---------------------------------------------------------------------------
Date: 23 Oct 89 21:27:20 +0000
From: ut-emx!chrisj@cs.utexas.edu (Chris Johnson)
Subject: Re: Gatekeeper false alarm? (Mac)
In VIRUS-L Digest V2 #217, Richard Kennaway (kennaway@sys.uea.ac.uk) writes:
>Paranoid speculation follows.
Paranoia, being a disease, is an inherently bad thing. What follows is, I
believe, an unfortunate illustration.
>Maybe someone is using the Joker's trick. There could be several
>infected applications out there, all quietly spreading harmless-looking
>things like STR 801 that dont ring GateKeeper's alarms, but when they
>all come together in one application, the real virus is triggered...
More likely, there's no virus *at*all*. I do believe this is pure paranoia.
Further, there's a good reason that things like STR resources look harmless:
they are. Period. They aren't executable, so they don't get executed. In
and of themsleves they are *utterly* harmless. The end.
For a virus to spread executable code has to move. Although *no* anti-virus
scheme is perfect, that is exactly the kind of thing that Gatekeeper watches
for. There's no such dichotomy as "real virus" versus un-real virus - either
it is a virus, or it isn't.
That means that this "Jocker's trick" is essentially nonsense - in order for
the "harmless-looking things like STR 801" to spread there has to be a real-
live virus *doing* the spreading - a virus which, in all probability, systems
like Gatekeeper will stop.
>Plug for Virus Detective: with this it was easy to search for all files
>containing STR 700 (legitimate MacWrite resource) or STR 801. All the
>other virus detectors I've seen have the symptoms to look for
>hard-wired. I have no relationship with the author other than being a
>satisfied customer.
Philosophical Point: The problem with tools is that the users have to under-
stand how they work, what they do, and how to use them. A failure of the
user on any of these points results in the tool being unable to accomplish its
intended purpose.
Virus Detective is a fine tool, but it's not being correctly employed here.
Sure enough, most MacWrite files have STR 700 and 801 resources, but just
because Virus Detective will allow a person to discover this, *doesn't*
in any way indicate the presence or involvement of a virus.
Like any tool Virus Detective can be used correctly or incorrectly -- in this
case it is being used in an incorrect manner, since the key issue,
whether or not there is any reason to believe a virus is involved, has
been sidestepped. Virus Detective is now merely serving as a tool to "confirm"
baseless fears and assertions.
Gatekeeper being more a "system" than a "tool", is less prone to feeding
wild speculation, since it has its own means of identifying the presense of
a virus and, as a result, does not require that the user be a skilled Mac
programmer capable of searching out and analyzing would-be new viruses. Of
course, Gatekeeper is fallible... but that usually means that users are merely
required to tell it what *isn't* a virus, rather than having to search out
new viruses from scratch like searching for needles that may-or-may-not be
hidden in hay stacks.
STRs 801 and 700 are good examples of strands of hay mistaken for needles.
Returning to Gatekeeper, the symptoms are not quite "hard-wired". Gatekeeper's
philosophy is, basically, that if a virus can't move, add, modify or delete
executable resources (there are about 24 types), then it can't spread.
And a virus that can't spread isn't really a virus anymore. Of course, you'll
still want something like Disinfectant to remove the effectively sterilized
virus.
The list of executable resources is certainly not hard-wired - it's easily
edited by following the instructions in the on-line help. The type of
monitoring that Gatekeeper does *is* hard-wired, but in order to establish
that this is a problem, a way must first be found to spread a virus without
moving, adding, modifying or deleting executable resources.
In short, the hard-wired aspects of Gatekeeper are not a problem - they are
*fundamental* protections. This is why Gatekeeper has been able to stop
every Mac virus discovered to date, including totally new viruses like
ANTI and INIT 29 which were developed *after* Gatekeeper was written.
I should add that Gatekeeper's security system has not had to change since
it was first released on 2-Jan-89, precisely because it is such a fundamental
approach to stopping viruses.
Gatekeeper isn't perfect - no anti-virus system is - but it's very good.
I, personally, tend to be a bit defensive with regard to Gatekeeper because
I've observed a number of misconceptions that do it sad injustices, while
johnny-come-lately packages like SAM and the Virex INIT, etc. are heralded
as the first and only fundamental solutions to the Macintosh virus problem.
Since Gatekeeper was discussed here in a misleading manner I thought it was
important to try to put an end to, at least, the misconceptions illustrated
here.
As to the alleged MacWrite virus - paranoia tends to spread... and I've
seen a number of postings to other newsgroups from people scared because
they've discovered perfectly normal STR resources in their MacWrite documents.
This never should have happened.
The fact is, the burden of proof is on he who asserts the positive. Yet, for
all the talk about this new virus, there's still been no offer of proof of
the virus's existence. Nonetheless, the paranoia spreads due to these
baseless assertions. If there's some proof, we *need* it and blessings upon
whoever provides it, but, for lack of that proof, this discussion should
have been terminated long ago.
Given that there's been a delay in the VIRUS-L news recently, maybe this
discussion has already died, and I've ranted on needlessly. I certainly
hope that's the case.
- ----Chris (Johnson)
- ----Author of Gatekeeper
- ----chrisj@emx.utexas.edu
------------------------------
Date: 23 Oct 89 22:09:00 +0000
From: ut-emx!chrisj@cs.utexas.edu (Chris Johnson)
Subject: Re: SAM vs. Gatekeeper (Mac)
In VIRUS-L Digest V2 #216, Henry C. Schmitt writes:
>I have used both GateKeeper and SAM Intercept and I prefer the
>latter. The main reason? When "something suspicious" happens,
>GateKeeper says "you can't do that!" then if you want to override,
>you must open the Control Panel select GateKeeper and set up the
>permission; with SAM Intercept, at the time of the happening you can
>allow the action once or LEARN the action then and there!
The reason Gatekeeper does not bring up a custom dialog that would
let the user allow an operation, is neither sloth, nor indifference to
the plight of the user. The reason is *compatibility*. Apple will
guarantee that the Notification Manager, which Gatekeeper uses to display
its alerts, will be compatible with virtually all software and will certainly
be compatible with all future versions of the System. SAM's custom dialog
may break in future releases of the System - or it may not. For myself,
I can't think of any method that's worth the risk.
Since the author of SAM probably had support from Apple DTS, he may have
been provided with techniques that would make a safe implementation possible.
I, regrettably, have no real access to DTS (becoming a registered developer
requires money I just don't have). If anyone at DTS would be willing to
offer some advice on safe ways of approaching the custom-alert problem, I'd
*love* to hear it. (Hint, hint.) :-)
One other point though (and please correct me if I'm wrong), I've been told
that SAM doesn't provide a way to view all of the privileges that have been
granted to various applications, let alone a method of editing them. If this
is the case, I have to view it as a far greater problem with SAM, than on-the-
fly configuration is with Gatekeeper. If someone using your machine inadvert-
antly or unwittingly clicks on the LEARN button when a virus attack is
detected, your copy of SAM will have been programmed to let a virus attack
succed in that case, and you'll probably never find out.
Like I said, though, please correct me if I'm mistaken.
On the subject of the Gatekeeper Log file:
>I only see this as being useful if you're trying to track the
>propagation of a virus, but then you have to allow the "suspicious
>action" which GateKeeper doesn't do (unless you gave permission, in
>which case it isn't logged!)
Depends what you mean by "propagation." If you mean the successful spread
of a virus, then yes, Gatekeeper won't tell you much simply because it won't
permit the spreading to occur in the first place. :-)
But consider what the log file *does* do for you... it will tell you where
all of the infection attempts originated from, when they started, what
characterized the infection attempt, and it'll even tell you whether or not
your machine was booted on a floppy disk and infected that way. Furthermore,
if you're a person attempting to quickly gain an understanding of a virus'
infection mechanism, running Gatekeeper on a test machine in its "notify only"
mode will give you an immediate run-down on how the virus works.
Also, each virus has its own "signature" - even when Gatekeeper stops the
virus' spread - in the log file. It is easy, for instance, to tell INIT 29
from Scores merely by looking at the records of their failed attempts at
infection as recorded in the Gatekeeper Log. This makes it equally easy
to indentify both new strains of existing viruses, and totally new
viruses.
The log file provides an incredible amount of documentation that can be,
I believe, extremely useful in protecting an individual or an entire
corporation from the influx of viruses.
>I'm not trying to put down GateKeeper, if you want to fight viruses
>cheaply, it's a must! Keep up the good work Chris!
>
> Henry C. Schmitt
Thanks! Gatekeeper 1.2 is in the works.
In the same spirit, I'm not trying to put down SAM - I'm just trying to make
sure that Gatekeeper gets full credit where it's due.
- ----Chris (Johnson)
- ----Author of Gatekeeper
- ----chrisj@emx.utexas.edu
------------------------------
Date: Tue, 24 Oct 89 08:32:07 -0400
From: dmg@lid.mitre.org (David Gursky)
Subject: RE: Superclock non-virus... (Mac)
Superclock (in the general case) is not a virus. It is a legitimate
cdev that displays the current time-of-day in the upper right hand
corner of your Mac's screen. The current version is 3.5 (although I
thought I saw a 3.6 yesterday).
It is more likely that the "Superclock" virus is simply an occurance
of (if I have to pick one) the INIT 29 virus, or a strain therof.
Superclock is not a stand-alone application; it is a "control panel
device" that is loaded into RAM at start-up. In the MS-DOS world,
Superclock would belong to the class of applications called "TSR"s
(Terminate and Stay Resident). In the Macintosh world however, cdev's
(and their sister's RDEVs (Chooser devices) and INITs (classic TSRs))
contain their code in resources called (appropriately) INIT. Classic
Macintosh viruses (such as nVIR and strains, Scores, Peace, and ANTI)
infect code in CODE resources. Only INIT 29 infects code stored in
INIT resources.
Another possibility is that the "Superclock" virus is a wholly new
strain. While this is not impossible, I find this less likely. The
Mac is a not as easy a machine to program and acquire expertise on as
MS-DOS platforms. Consequently, there is simply a smaller number of
potential virus-writers (proportionally) than in the MS-DOS world.
David M. Gursky
Member of the Technical Staff
Special Projects Department, W-143
The MITRE Corporation
------------------------------
Date: Tue, 24 Oct 89 08:50:37 -0400
From: dmg@lid.mitre.org (David Gursky)
Subject: Re: INIT 29 question from Jim Bradley...
In Virus-L V2 #220, Jim Bradley asked if an application on a clean
disk opened a data file infected with INIT 29, would the application
then become infected.
No. While INIT 29 is capable of infecting data files, the virus is
"dormant" essentially. Code in INIT resources is only executed at
startup, and no other point. Data files infected with INIT 29 only
represent a threat to your system if they are kept in the same folder
as your System and Finder files.
------------------------------
Date: Tue, 24 Oct 89 11:09:00 -0400
From: "Gerry Santoro - CAC/PSU 814-863-4356" <GMS@PSUVM.BITNET>
Subject: IBM Virus Scan program (PC)
I like the fact that the IBM virus scanning program reads its strings
from an ASCII file provides the capability for updating this program
for new viruses. (I still like McAfee's SCAN program too, and would
recommend that a user have BOTH, just to be safe.)
My question, are there any plans to add updated virus scan strings to
the IBM virus scan data file and have this string file available on
one of the anti-virus servers? This could help a lot of people avoid
duplication of effort.
- -----------------------------------------------------------------------------
gerry santoro, ph.d. *** STANDARD DISCLAIMER ***
center for academic computing This posting is intended to
penn state university | represent my personal opinions.
gms @ psuvm.psu.edu -(*)- It is not representative of the
gms @ psuvm.bitnet | thoughts or policies of anyone
...!psuvax1!psuvm.bitnet!gms else here or of the organization.
(814) 863-4356 ---- "I yam what I yam!" ----
- -----------------------------------------------------------------------------
------------------------------
Date: Tue, 24 Oct 89 12:01:49 -0400
From: Russell Herman <rwh@me.utoronto.ca>
Subject: Virus source available in Toronto
Disassembled source code for the PC virus producing a bouncing ball
onscreen just appeared on a major Toronto BBS. It does not appear to
be quite correct, nor will it assemble nonfatally with either MASM 5.1
or TASM 1.0.1 (small comforts). Furthermore, the comments are in
Portugese, although the file was dubbed "italiano.asm".
Now the world has been given the template for an infector (sigh).
[Ed. The book "Computer Viruses: A High Tech Disease", published by
Abacus, contains several (functional) source code examples, in various
languages on various hardware/software platforms, of viruses. This
book is readily available in bookstores and from the publisher.]
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Russ Herman | Internet: rwh@me.utoronto.ca | University of Toronto
Comp. Sys. Mgr. | UUCP: uunet!utai!me!rwh | Dept. of Mech. Eng.
(416)978-4987 | | 5 King's College Rd.
(416)978-7753fax| | Toronto, ON M5S 1A4 Canada
------------------------------
Date: Tue, 24 Oct 89 12:38:00 -0400
From: <90_PENNYPAB@UNION.BITNET>
Subject: IBM's Virscan Program (PC)
I just subscribed to this list, so this posting may be redundant.
Bear with me...
I worked for IBM over the summer and had a chance to take a look at
their VIRSCAN program, which others have discussed on this list.
Unfortunately the version I used is listed as "IBM Internal Use Only",
meaning that It is only to be used for IBM related purposes.
According to the Forums I read on the IBM network while working there,
VIRSCAN is supposed to be one of the better programs for detecting
known viruses. What I would like to know is if there is a similar
version of this program available to the general public, and if so how
to get a copy of it. Also, if a public version of this program is
available, how are updates to the virus signature files (SIGFILE.LST
and SIGBOOT.LST for VIRSCAN) kept up to date, if they are at all?
Bruce Pennypacker
90_PENNY@UNION.BITNET
90_PENNYPAB@GAR.UNION.EDU
------------------------------
Date: Tue, 24 Oct 89 07:41:08 -0700
From: portal!cup.portal.com!cpreston@Sun.COM
Subject: VIRUSCAN test (IBM PC)
These results apply to versions through V38. The current version at
this time is V45. Changes are made at least once per week, it seems,
to keep up with new viruses, and I finished the work about the time
this digest went off for a couple weeks.
VIRUSCAN, for the IBM PC, from McAfee Associates, was tested using 23
actual viruses or strains of virus. These included boot or partition
viruses such as Stoned, Ping Pong, and Brain, and .COM or .EXE viruses
such as Datacrime (1168, 1280, Datacrime II) Jerusalem, Icelandic
(several varieties) and Fu Manchu.
In each case, with two exceptions (noted below) VIRUSCAN correctly
identified the viruses after they had infected programs or disks, and
located all instances of infection in all subdirectories of the hard
disks.
One version of the program, before V35, failed to detect the 405
virus, but this was corrected in later versions. Suriv 300, a
Jerusalem variant, was not detected in an .EXE file, but was caught in
a .COM file.
Based on the testing I did, VIRUSCAN appears to be a well-written and
effective program for locating specific known viruses, and is a very
useful part of an anti-virus program.
Next question: How good are scanning programs?
There seems to be a perception, at least as written in several sources, that
scanning for known viruses is the weakest method of detecting viruses. This
is probably based partly on the assumption that the slightest change in a
virus will defeat the effort to detect it using byte strings. Experience
shows that minor changes are frequently made to microcomputer viruses.
Perhaps the most freqent change is to imbedded, non-encrypted, text strings.
Changes are also made to the infection trigger or activation conditions or
dates.
Obviously, changes can be made to any virus to defeat any particular scan
string. This has already occurred in the Macintosh world, but most changes
made so far have been on the same level of difficulty as changing ASCII
strings.
Inspection of a search string in VIRUSCAN and/or its location in the virus
code can show that a particular search string is not based on imbedded text,
and that changing the text will not interfere with detection. A number of
viruses were checked for this.
Also, it is easy to determine that text added to a boot sector in the
Yale/Alameda virus, for example, to make it look more like a normal boot
sector would not interfere with its detection. If the search string used in
the scanning program is at a different location than the added text, it
won't interfere.
On other changes, I found that with a partial disassembly, or one that was
perhaps incorrectly interpreted by me, changes to what appeared to be an
infection trigger did not replicate with the virus, or did not cause the
anticipated change in virus behavior.
For this reason, it seemed more efficient, and probably more accurate, just to
make a common type of change to a virus, and test VIRUSCAN again.
Each virus was modified by patching it, making minor changes in the
executable code on the disk. Each modified virus was allowed to infect at
least one other program to produce a second generation virus. The final
infected program was inspected and run to ascertain that the modification
was correctly transmitted with the virus. This established that there was
a viable new strain of virus. VIRUSCAN was run to see if it still found the
modified virus.
- --------
Viruses modified and detected by VIRUSCAN version 0.5V34 or later versions
through V38.
-Virus name- -Type of modification-
Ping Pong boot Virus (Italian) Activation window time was
increased
Jerusalem Virus - Version D Activation date changed
1280 Virus (Datacrime) Activation (destruction)
date changed
1168 Virus (Datacrime) Activation (destruction)
date changed
Vienna (DOS 62) Virus - Version A Manipulation task to move
5 bytes to corrupt
infected program was
changed.
405 virus Changed to seek and infect
hidden files
- -------------
Conclusion:
A well-chosen search string for a virus can survive at least some of the
common changes to viruses that are made as they pass through different
hands. A good scanning program can provide better protection than it might
appear at first glance.
VIRUSCAN is available from BIX, CompuServe, and other sources, including the
Homebase BBS, at 408-988-4004. On Homebase, the latest version is
SCANV45.ZIP.
Disclaimer: I am a computer security consultant and have been
working with PC and Macintosh microcomputer viruses and anti-
virus products for about 18 months. I have no obligation to John
McAfee except to report the outcome of the tests. Information Integrity is
a member of the Computer Virus Industry Association, which is operated by
John McAfee.
Charles M. Preston 907-344-5164
Information Integrity MCI Mail 214-1369
Box 240027 BIX cpreston
Anchorage, AK 99524 cpreston@cup.portal.com
------------------------------
End of VIRUS-L Digest
*********************
Downloaded From P-80 International Information Systems 304-744-2253