home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker 2
/
HACKER2.mdf
/
virus
/
virusl2
/
virusl2.60
< prev
next >
Wrap
Text File
|
1995-01-03
|
10KB
|
217 lines
VIRUS-L Digest Wednesday, 8 Mar 1989 Volume 2 : Issue 60
Today's Topics:
Bouncing Ball (PC)
Bouncing balls, Falling letters, et cetra...
notorizing
re: Macs with wills of their own...
Re: Macs with wills of their own
PC Bouncing Ball virus (or is it?!)
[Ed. There's been quite a rash of messages sent to the list lately
that were intended for the LISTSERV (e.g., INDEX, LIST VIRUS-L, GET
VIRUS-L LOG8811A). This is a reminder to everyone that LISTSERV
commands have to be sent to the LISTSERV, not to the list itself. The
address of the LISTSERV is LISTSERV@LEHIIBM1.BITNET or
LISTSERV@IBM1.CC.LEHIGH.EDU (either will work).]
---------------------------------------------------------------------------
Date: 6 March 1989, 16:48:47 EST
From: David M. Chess <CHESS@YKTVMV.BITNET>
Subject: Bouncing Ball (PC)
Well, I've seen a boot-sector virus that did that. It didn't seem to
be related to any other virus I've seen (code very different from the
Brain and so on). It would infect both hard and floppy disks, and the
only obvious effect was the little bouncing face. No EXE or COM file
involvement found or suspected. Of course, what you have may be an
entirely different virus, with the same screen effect!
DC
------------------------------
Date: Mon, 6 Mar 89 17:04 EDT
From: <MJBURGE@OWUCOMCN.BITNET>
Subject: Bouncing balls, Falling letters, et cetra...
Joseph asked if the author of the Bouncing Ball virus wrote
any new code, or just simply spliced a previously written routine to
the (c)Brain virus. Well the bouncing ball routine has been floating
around in Public Domain for awhile, and other routines used in viri
tend to be culled from similar sources. The falling letter routine,
which is also available in the public domain, is another example of
public domain code that has been added to viri. The authors of these
viri do not even posses the creativity to code their own "joke"
routines. A collection of such routines is available on a disk called
"Jokes" from Public Brand Software. I am in no way affiliated with
PBS, and I am certain many other public domain clearing houses have
such a disk, I am just more familiar with PBS's catalogue.
Rushdie lives and is hiding in the Mark James Burge
Chi Phi Fraternity@OWU MJBURGE@OWUCOMCN.Bitnet
------------------------------
Date: Mon, 6 Mar 89 17:55 EST
From: Lambert@DOCKMASTER.ARPA
Subject: notorizing
Cryptography can provide very strong tools for protecting computer
systems from virus attacks. One particularly useful cryptographic
tool for eliminating viruses would be "cryptographic notarization".
The notorization would provide a strong sealing of the integrity of a
file or disk. Software could be notarized by "certification
authorities". The certification authorities would be distributed and
hierarchical. This would allow every commercial software house to be
its own notorizing authority.
The notorization would not prevent the distribution of malicious
code, but would provide strong integrity and traceability of the code.
For example, the integrity of a copy of LETUS-123 could be verified by
any user with this scheme. This would provide strong proof of the
softwares origin and that it had not been modified. If the LETUS-123
had any flaws or virus within it, it would be traceable to the
originating software house.
In the ongoing discussion in this forum I have noticed several
misconceptions about cryptography.
>.................... a simple virus like Brain will spread regard-
>less of program encryption, because it attaches to code that could be
>stored encrypted.
First cryptography is not just encryption. Cryptography is
mechanism to provide many "security services" that include -
confidentiality, integrity, peer entity authentication, and data
origin authentication (see ISO 7498-2). Contrary to the following
comment, any mechanism for a cryptographic protection mechanism must
be based on standards.
>Such an encryption system would only be useful if it were not
>standard. If it became standard, or at least widely distributed,
>viruses would work their way around it .....
To support the development of real cryptographic devices,
standards must be available to ensure interoperability. The issues of
a virus working their way around an implementation are not relevant to
the development of the standards. Only the local implementation of a
verification mechanism must be conserned with these issues.
Standards already exist that could be used for these mechanisms.
Considerable work is available as a foundation from ISO (DIS 9594-8),
ECMA (TR/46), FIPS, ANSI, CCITT, and IEEE (802.10). The challenge at
hand is then to integrate these existing mechanisms into a complete
system solution. I would strongly recommend as a start for the
notorization system the ISO DIS 9594-8 specification, in combination
with RSA, and a DES MAC.
Paul A. Lambert | Motorola GEG | Secure Network Section |
| 8201 E. McDowell | Scottsdale, Az. 85252 |
docmaster.arpa | (602) 441-3646 |
------------------------------
Date: Tue, 7 Mar 89 00:03 EST
From: <SYSTEM@CRNLNS.BITNET>
Subject: re: Macs with wills of their own...
John,
You recently asked in the Virus mailing list about Macs throwing
things in the trashcan on their own.
Farralon Computing (sp?) now has available a product called "Timbuktu"
for networked Macs. This lets a user on one Mac watch and/or
manipulate any other Mac on the network that is also running Timbuktu.
It is a godsend for Mac network managers who have to clean up after
people who leave things in disarray, particularly when the Macs are in
several buildings. It is a disaster when the users start using it on
their own. Passwords are optional.
Your reporter may have seen this in use without being aware of it.
Selden E. Ball, Jr.
(Wilson Lab's network and system manager)
Cornell University Voice: +1-607-255-0688
Laboratory of Nuclear Studies FAX: +1-607-255-8062
Wilson Synchrotron Lab BITNET: SYSTEM@CRNLNS
Judd Falls & Dryden Road Internet: SYSTEM@LNS61.TN.CORNELL.EDU
Ithaca, NY, USA 14853 HEPnet/SPAN: LNS61::SYSTEM = 44283::SYSTEM
------------------------------
Date: Tue, 7 Mar 89 01:42 EST
From: "Mark H. Anbinder" <THCY@VAX5.CCS.CORNELL.EDU>
Subject: Re: Macs with wills of their own
Your description of the Macintosh cursor picking up files and dragging
them to the trash with no user action sounds like Timbuktu may be
involved. Timbuktu is a program that allows a user on one Macintosh
to control ANOTHER Macintosh across a network.
If, when this is happening, there is a small "hand" icon in the upper
right hand corner of the screen (in the menu bar) then it IS Timbuktu,
and someone else on the network is playing a stupid joke. If not, you
may have stumbled across an interesting problem.
Any chance someone set up a macro that the users are playing back
without realizing they're doing it?
Mark H. Anbinder
Department of Media Services
Cornell University
------------------------------
Date: 7-MAR-1989 15:43:42 GMT
From: Jason Brown <BROWNJS@VAXB.ASTON.AC.UK>
Subject: PC Bouncing Ball virus (or is it?!)
I remember a program like this, only it wasn't a virus. (Note that I'm
not saying that *this* one isn't a virus!).
When the program was run, a smiley face would start bouncing around
the screen, rebounding off any text that was displayed. When the
screen scrolled, sometimes the face would get stuck between a bunch of
letters.
By pressing various combinations of keys you could increase or
decrease the number of faces. If you got rid of all of the faces, they
would come back after a period of activity (about half an hour, I
think). I seem to remember that it was supposed to survive a warm
reboot, but I can't be certain.
This was all a fair while ago. I think the program was called
FACE.COM, or something similar. It either came with a small document
file describing the various keys used, or it printed them up when the
program was run.
Sorry I can't be more precise. I still have a copy of the program, but
it is at home. If you are still interested, I can check up when I go
back in a couple of weeks for Easter. If this is the program you are
experiencing, then there is no need to worry - it is not a virus.
Turning the machine off will get rid of it. (Check the AUTOEXEC.BAT
file to check that it is not loaded when the machine is booted).
- -NOTE- The program described in this message may not be the one you are
experiencing. Do not relax your security measures.
- -- Jason --
+------------------------------------------------------------------------+
|Jason Brown |
| JANET : BrownJS@uk.ac.aston.vaxb |
| BITNET/EARN : BrownJS@vaxb.aston.ac.uk |
| Internet/ARPAnet: BrownJS%vaxb.aston.ac.uk@cunyvm.cuny.edu |
| EAN/X400 : BrownJS@vaxb.aston.ac.uk |
| uucp : ...psuvax1!cunyvm.bitnet!vaxb.aston.ac.uk!BrownJS |
+------------------------------------------------------------------------+
------------------------------
End of VIRUS-L Digest
*********************
Downloaded From P-80 International Information Systems 304-744-2253