1175 lines
61 KiB
Plaintext
1175 lines
61 KiB
Plaintext
![]() |
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|||
|
CRYPT NEWSLETTER #6 (or something like that) - still
|
|||
|
another in an occasional series of info-glutted,
|
|||
|
humorous monographs solely for the enjoyment of the
|
|||
|
virus programming pro or enthusiast interested in the
|
|||
|
particulars of cyber-electronic data replication and
|
|||
|
corruption.
|
|||
|
|
|||
|
-Edited by URNST KOUCH. [Oct. 1992]
|
|||
|
|
|||
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
This issue's top quote:
|
|||
|
******************************************************
|
|||
|
"Giveitaway, giveitaway, giveitaway now!"
|
|||
|
--long-haired, tattoo'd dolt from The
|
|||
|
Red Hot Chili Peppers, speaking out about
|
|||
|
viral source code at a recent computer
|
|||
|
security seminar.
|
|||
|
******************************************************
|
|||
|
|
|||
|
IN THIS ISSUE: Local NEWS...New Section: INCAPABILITIES - exposing the
|
|||
|
flaws in various a-v software packages with Urnst Kouch and other
|
|||
|
guest 'speakers' like Vesko Bontchev...Charles Bowen: Recipient
|
|||
|
of National Dummkopf Award...rehash of US NEWS & WORLD REPORT/IRAQI
|
|||
|
COMPUTER VIRUS imbroglio...The INSUFF/MtE spawning viruses...
|
|||
|
...COMPUFON trojan...'ARTIFICIAL LIFE' book review...ZCOMM & Hyper-
|
|||
|
ACCESS: more term programs (one with a-v scanning), definitely not for
|
|||
|
sissies...DIOGENES virus...sarcasm, trenchant wit, etc.
|
|||
|
|
|||
|
|
|||
|
NEWS! NEWS! NEWS! NEWS! NEWS!
|
|||
|
|
|||
|
IF THE SHOE FITS: Some users of the FidoNet's Virus echo have been seen
|
|||
|
referring to moderator Frans Hagelaars as "Dutch" ever since Crypt
|
|||
|
Newsletter renamed him back in August.
|
|||
|
|
|||
|
IN CONTINUING FIDO VIRUS ECHO NEWS, Sara Gordon, the e.e.cummings of
|
|||
|
antivirus-dom, has been seen flaming on baseball pro David Justice
|
|||
|
who provoked her by impugning her looks. We offer
|
|||
|
to settle this dispute at the Crypt Newsletter. If Sara and David
|
|||
|
will send cheap portraits of themselves (it must be the kind of photo
|
|||
|
obtained from an arcade photo booth - you know, the ones you see
|
|||
|
on the boardwalk in Ocean City, NJ.), Crypt Newsletter editors will
|
|||
|
judge them on the basis of "looks" and publish the results in a
|
|||
|
future issue. The address of the Crypt Newsletter is:
|
|||
|
|
|||
|
The heehee Desk
|
|||
|
Mr. Aggrieved, Assoc. Editor
|
|||
|
POB 1234
|
|||
|
Nether Poo-Stink, PA 18017
|
|||
|
|
|||
|
LATE BREAKING GOSSIP: Pro-ballplayer Dave Justice was just seen
|
|||
|
cursing Paul Ferguson's name in the Virus echo. This nullifies the
|
|||
|
Gordon/Justice 'looks' rate-down. It would have been unfair to
|
|||
|
exclude Ferguson from the contest but the editors of the
|
|||
|
newsletter are too busy to judge the expanded field of entrants,
|
|||
|
so we decided to cancel. Hey, cool it wontcha, guys??
|
|||
|
|
|||
|
But, on more serious matters, we excerpt a tiny segment of one of
|
|||
|
Sara Gordon's mid-September FIDO flames for further comment:
|
|||
|
|
|||
|
"...if you are interested in keeping information free, then learn
|
|||
|
to be responsible with its use. your freedom to information does
|
|||
|
not include the right to destroy it. its [sic] MY information too,
|
|||
|
and its [sic] not YOUR right to rip it up.
|
|||
|
|
|||
|
"if you think killing people is cool, and are aware of the
|
|||
|
implications of your actions,i.e. knowing that your virus could
|
|||
|
wipe out some hospital database in some third world country,
|
|||
|
or even in u.s.a. in appalachia, where they cant [sic] afford backups,
|
|||
|
and effectively be responsible for the deaths of innocent people,
|
|||
|
then write them."
|
|||
|
|
|||
|
WHoah! Whoah! Whoah! Sara! What a stretch. Let's entertain that
|
|||
|
fool claim for a moment. Do you think a backwoods hospital would
|
|||
|
have computers, but no hard copy system? (What if a fire broke out
|
|||
|
in "RECORDS"?) But even if we let that slide for the
|
|||
|
sake of the argument, let's consider a different tool of destruction.
|
|||
|
Arms. The U.S. sell arms to lunatics on the left and right in
|
|||
|
"Third World Countries." Does anyone who makes them in this country
|
|||
|
get held responsible, or even LOSE ANY SLEEP, when civilians get
|
|||
|
blown away by the same guns in any number of mindless civil wars?
|
|||
|
Of course not, BECAUSE IT'S THE AMERICAN WAY TO BE AN INCONSIDERATE,
|
|||
|
HYPOCRITICAL LOUSE.
|
|||
|
|
|||
|
So, jumping back to computer viruses, which are decidedly more trivial
|
|||
|
than the business end of a Claymore mine, it's totally ludicrous to even
|
|||
|
presume that virus programmers are "effectively responsible for the
|
|||
|
deaths of innocent people." Far better to waste your time, if you must
|
|||
|
Sara, arguing with the arms merchants than virus programmers, we think.
|
|||
|
|
|||
|
In fact, The Crypt Newsletter decided to back this up with a little
|
|||
|
research on virus strikes in hospitals. Now keep in mind, although our
|
|||
|
skills are much vaunted, we're still a relatively new publication
|
|||
|
and your results may differ. Still, this is the best we could come
|
|||
|
up with - two small newspieces purloined from CSERVE (who in turn
|
|||
|
purloined them from the New England Journal of Medicine) ca. 1989.
|
|||
|
|
|||
|
What follows is transcript:
|
|||
|
---------------------------------
|
|||
|
HOSPITAL STRUCK BY COMPUTER VIRUS
|
|||
|
---------------------------------
|
|||
|
(March 22) - 1989
|
|||
|
Data on two Apple Macintoshes used by a Michigan hospital was
|
|||
|
altered recently by one or more computer viruses, at least one of
|
|||
|
which apparently traveled into the system on a new hard disk that
|
|||
|
the institution bought.
|
|||
|
In its latest edition, the prestigious New England Journal of
|
|||
|
Medicine quotes a letter from a radiologist at William Beaumont
|
|||
|
Hospitals in Royal Oak, Mich., that describes what happened when two
|
|||
|
viruses infected computers used to store and read nuclear scans that
|
|||
|
are taken to diagnose patients' diseases.
|
|||
|
The radiologist, Dr. Jack E. Juni, said one of the viruses was
|
|||
|
relatively benign, making copies of itself while leaving other data
|
|||
|
alone. However, the second virus inserted itself into programs and
|
|||
|
directories of patient information and made the machines
|
|||
|
malfunction.
|
|||
|
"No lasting harm was done by this," Juni wrote, because the
|
|||
|
hospital had backups, "but there certainly was the potential."
|
|||
|
Science writer Daniel Q. Haney of The Associated Press quoted
|
|||
|
Juni's letter as saying about three-quarters of the programs stored
|
|||
|
in the two Mac II PCs were infected.
|
|||
|
Haney said Juni did not know the origin of the less harmful
|
|||
|
virus, "but the more venal of the two apparently was on the hard
|
|||
|
disk of one of the computers when the hospital bought it new. ...
|
|||
|
The virus spread from one computer to another when a doctor used a
|
|||
|
word processing program on both machines while writing a medical
|
|||
|
paper."
|
|||
|
Juni said the hard disk in question was manufactured by CMS
|
|||
|
Enhancements of Tustin, Calif.
|
|||
|
CMS spokesman Ted James confirmed for AP that a virus was
|
|||
|
inadvertently put on 600 hard disks last October.
|
|||
|
Says Haney, "The virus had contaminated a program used to format
|
|||
|
the hard disks. ... It apparently got into the company's plant on a
|
|||
|
hard disk that had been returned for servicing. James said that of
|
|||
|
the 600 virus-tainted disks, 200 were shipped to dealers, and four
|
|||
|
were sold to customers."
|
|||
|
James also said the virus was "as harmless as it's possible to
|
|||
|
be," that it merely inserted a small piece of extra computer code on
|
|||
|
hard disks but did not reproduce or tamper with other material on
|
|||
|
the disk. James told AP he did not think the Michigan hospital's
|
|||
|
problems actually were caused by that virus.
|
|||
|
--Charles Bowen [October's Crypt National Dummkopf]
|
|||
|
|
|||
|
|
|||
|
|
|||
|
------------------------------
|
|||
|
MORE HOSPITALS STRUCK BY VIRUS
|
|||
|
------------------------------
|
|||
|
(March 23) - 1989
|
|||
|
The latest computer virus attack, this one on hospital systems,
|
|||
|
apparently was more far- reaching than originally thought.
|
|||
|
As reported here, a radiologist wrote a letter to the New England
|
|||
|
Journal of Medicine detailing how data on two Apple Macintoshes used
|
|||
|
by the William Beaumont Hospital in Royal Oak, Mich., was altered by
|
|||
|
one or more computer viruses. At least one of the viruses, he said,
|
|||
|
apparently traveled into the system on a new hard disk the
|
|||
|
institution bought.
|
|||
|
Now Science writer Rob Stein of United Press International says
|
|||
|
the virus -- possibly another incarnation of the so-called "nVIR"
|
|||
|
virus -- infected computers at three Michigan hospitals last fall.
|
|||
|
Besides the Royal Oak facility, computers at another William
|
|||
|
Beaumont Hospital in Troy, Mich., were infected as were some desktop
|
|||
|
units at the University of Michigan Medical Center in Ann Arbor.
|
|||
|
Stein also quoted Paul Pomes, a virus expert at the University of
|
|||
|
Illinois in Champaign, as saying this was the first case he had
|
|||
|
heard of in which a virus had disrupted a computer used for patient
|
|||
|
care or diagnosis in a hospital. However, he added such disruptions
|
|||
|
could become more common as personal computers are used more widely
|
|||
|
in hospitals.
|
|||
|
The virus did not harm any patients but reportedly did delay
|
|||
|
diagnoses by shutting down computers, creating files of non-existent
|
|||
|
patients and garbling names on patient records, which could have
|
|||
|
caused more serious problems.
|
|||
|
Dr. Jack Juni, the radiology who reported the problem in the
|
|||
|
medical journal, said the virus "definitely did affect care in
|
|||
|
delaying things and it could have affected care in terms of losing
|
|||
|
this information completely." He added that if patient information
|
|||
|
had been lost, the virus could have forced doctors to repeat tests
|
|||
|
that involve exposing patients to radiation. Phony and garbled files
|
|||
|
could have caused a mix-up in patient diagnosis. "This was
|
|||
|
information we were using to base diagnoses on," he said. "We were
|
|||
|
lucky and caught it in time."
|
|||
|
Juni said the virus surfaced when a computer used to display
|
|||
|
images used to diagnose cancer and other diseases began to
|
|||
|
malfunction at the 250-bed Troy hospital last August. In October,
|
|||
|
Juni discovered a virus in the computer in the Troy hospital. The
|
|||
|
next day, he found the same virus in a similar computer in the
|
|||
|
1,200-bed Royal Oak facility.
|
|||
|
As noted, the virus seems to have gotten into the systems through
|
|||
|
a new hard disk the hospitals bought, then spread via floppy disks.
|
|||
|
The provider of the disk, CMS Enhancements Inc. of Tustin,
|
|||
|
Calif., said it found a virus in a number of disks, removed the
|
|||
|
virus from the disks that had not been sent to customers and sent
|
|||
|
replacement programs to distributors that had received some 200
|
|||
|
similar disks that already had been shipped.
|
|||
|
However, CMS spokesman Ted James described the virus his company
|
|||
|
found as harmless, adding he doubted it could have caused the
|
|||
|
problems Juni described. "It was a simple non-harmful virus," James
|
|||
|
told UPI, "that had been created by a software programmer as a
|
|||
|
demonstration of how viruses can infect a computer."
|
|||
|
Juni, however, maintains the version of the virus he discovered
|
|||
|
was a mutant, damaging version of what originally had been written
|
|||
|
as a harmless virus known as "nVIR." He added he also found a second
|
|||
|
virus that apparently was harmless. He did not know where the second
|
|||
|
virus originated.
|
|||
|
--Charles Bowen [October's Crypt National Dummkopf]
|
|||
|
--------------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
Hmmmmm. Pretty slim pickin's, Sara Gordon. No fatalities, no
|
|||
|
injuries, no nothing. A lot of 'but if's', though. But at the
|
|||
|
Crypt Newsletter we don't count 'but if's'. 'But if's' are the
|
|||
|
domain of mediocre bureaucrats, Pentagon nuclear war planners,
|
|||
|
corporate stiffs and American double-knit upper management types.
|
|||
|
|
|||
|
However, here at the editorial bungalow, we know you were riled
|
|||
|
on the FidoNet when you e-mailed the now deemed idiot observation
|
|||
|
about virus programmers being "effectively responsible for the deaths of
|
|||
|
innocent people," so we won't give you this issue's "National Dummkopf"
|
|||
|
award. It's Charles Bowen's (for reasons described below). Your
|
|||
|
rep remains unblemished.
|
|||
|
|
|||
|
All readers are invited to e-mail any evidence of "computer virus
|
|||
|
induced human death" to the Crypt Newsletter at any time. We'll put it
|
|||
|
in a news piece called, appropriately, "Computer Virus Induced Human
|
|||
|
Death (or Man Bites Dog)" That has a nice ring, don't you think?
|
|||
|
|
|||
|
***************************************************************************
|
|||
|
PITY CSERVE's CHARLES BOWEN, HE CAN'T TALK AND CHEW GUM AT THE SAME TIME.
|
|||
|
AND THAT'S WHY CRYPT NEWSLETTER REPRINTS THIS STORY WITHOUT PERMISSION BUT
|
|||
|
WITH A "BOWEN TRANSLATION" SO THAT YOU ALL MIGHT BENEFIT. YOU GOT IT,
|
|||
|
CHARLES BOWEN GET'S THIS ISSUE's 'NATIONAL DUMMKOPF' AWARD!! HE CAN SHARE IT
|
|||
|
WITH JEFFREY O. KEPHART OF IBM's HIGH INTEGRITY COMPUTING LAB, AS YOU
|
|||
|
SHALL SEE.
|
|||
|
{Comments in []'s by URNST KOUCH}
|
|||
|
**************************************************************************
|
|||
|
CSERVE's Online Today, Sept. 8, 1992
|
|||
|
|
|||
|
SPREAD OF VIRUSES SLOWER THAN SOME THINK, IBM RESEARCH SUGGESTS
|
|||
|
|
|||
|
(Sept. 8)
|
|||
|
A study conducted by an IBM computer scientist at the Thomas J.
|
|||
|
Watson Research Center suggests computer viruses may spread more
|
|||
|
slowly and less widely than some current estimates project.
|
|||
|
IBM said in a statement from Yorktown Heights, N.Y., that an
|
|||
|
immediate implication of the work "is that the computer virus
|
|||
|
problem will not become explosively rampant as some experts [WHO??] have
|
|||
|
predicted on the basis of conventional epidemiological models that
|
|||
|
overlook important constraining factors."
|
|||
|
IBM said the discrepancy in projections arises from "topology,"
|
|||
|
that is, the structure of the connectedness among individuals in the
|
|||
|
population through which infection spreads. [You said a
|
|||
|
mouthful.]
|
|||
|
Jeffrey O. Kephart of IBM's computer sciences department, said the
|
|||
|
importance of topology in analyzing the way things like viruses and
|
|||
|
rumors [What the Hell is this nonsense? Viruses are related to rumors?]
|
|||
|
Mebbe so, mebbe so. But you're gonna have to go back to Michelangelo
|
|||
|
for that story.] spread in a population is seldom taken into sufficient
|
|||
|
account.
|
|||
|
Kephart said most epidemiological projections of the spread of
|
|||
|
viral infections -- in people as well as in computers -- are based
|
|||
|
upon the assumption of a fully-connected world: in effect, a world
|
|||
|
in which everyone is connected to everyone else. [No, not true.
|
|||
|
"Epidemiology" generally deals with the spread of disease in living
|
|||
|
populations where every member of the affected group is thought to
|
|||
|
have some potential for contracting the "bug." This "everyone connected
|
|||
|
to everyone else" stuff is bogus.] For example, members the
|
|||
|
"homogenous-mixing" topology makes epidemiology easy, he observed,
|
|||
|
but is obviously not realistic. [Eh? Good jargon, though. Your guess is
|
|||
|
as good as mine and I KNOW something about this stuff.]
|
|||
|
Nonetheless, says IBM, Kephart's research "shows that it works
|
|||
|
rather well for certain kinds of infectious diseases, particularly
|
|||
|
air-borne ones like influenza." [Does it? Evidence? Where is it?]
|
|||
|
He says computer-virus infections present quite a different
|
|||
|
story, noting that they are usually spread by friends exchanging
|
|||
|
disks that contain the virus. [Isn't this rather reminiscent of
|
|||
|
the popular description sof how the AIDS virus is transmitted?
|
|||
|
So just how is computer virus spread different? It'c certainly
|
|||
|
not clear at all here.]
|
|||
|
Kephart, a member of IBM's High Integrity Computing Laboratory,
|
|||
|
says the kind of connectedness that characterizes the spread of
|
|||
|
computer viruses is thus not homogenous but local.
|
|||
|
In this topology, "individuals connect not to everyone else but
|
|||
|
only to their nearest neighbors who [have compatible computers, and] in
|
|||
|
turn, are connected [only] to their neighbors [who have compatible
|
|||
|
computers], and so on," says the statement. [I'm sure this is what
|
|||
|
Kephart really means.]
|
|||
|
"The effects of different topologies on the spread of an infection
|
|||
|
becomes striking when the homogenous-mixing and local models are
|
|||
|
compared. In a fully-connected, homogenous population, Kephart
|
|||
|
explained, an infectious disease spreads exponentially --
|
|||
|
explosively -- and all-encompassingly. [Bah. This is unadulterated horse
|
|||
|
shit. Most examples of disease never spread in
|
|||
|
this manner, but, then, there goes the story! The spread of disease
|
|||
|
in human populations is remarkable for its variability, not
|
|||
|
homogeneity. If what he says happens were true, we'd all die of
|
|||
|
cholera everytime there's an outbreak in Peru.] In a local topology,
|
|||
|
he said, infection is transmitted sparsely, from each individual to
|
|||
|
just a few others."
|
|||
|
--Charles Bowen
|
|||
|
|
|||
|
[While Kephart's research is doubtless interesting, you'd never know it
|
|||
|
from Bowen's short, tangled mess. Full of jargon and bullshit, all
|
|||
|
you can get from it is that computer viruses, on the whole, are restricted
|
|||
|
to local outbreaks. Big deal, didn't we already know that?
|
|||
|
|
|||
|
Perhaps a better word for characterizing computer virus infection is the
|
|||
|
term "smoldering." While this is only from personal experience, it seems
|
|||
|
virus infections "smolder" on a local basis, mostly unseen and untrackable,
|
|||
|
but very occasionally erupting into runaway outbreaks which disrupt school
|
|||
|
systems, corporate workplaces, and probably most often, the private
|
|||
|
home where some chowderhead is engaged in obsessive/compulsive software
|
|||
|
piracy. 'Smoldering,' BTW is a term epidemiologists often use to describe
|
|||
|
various natural infections.]
|
|||
|
|
|||
|
-*-
|
|||
|
|
|||
|
**************************************************************************
|
|||
|
AND IN CASE YOU DIDN'T KNOW WHERE WE GOT THE IDEA FOR THE 'NATIONAL
|
|||
|
DUMMKOPF' AWARD, THIS REPRINT OF THE US NEWS & WORLD REPORT/IRAQI
|
|||
|
COMPUTER VIRUS BOONDOGGLE MAY REFRESH YOUR MEMORY
|
|||
|
**************************************************************************
|
|||
|
|
|||
|
From CSERVE's OnLine Today, Sept 11, 1992 [No, I don't know why
|
|||
|
they've chosen to reprint it now.]: Monitor - {comments in [] by URNST}
|
|||
|
|
|||
|
US HIT IRAQI COMPUTERS WITH VIRUS BEFORE GULF WAR, MAGAZINE SAYS
|
|||
|
|
|||
|
(Jan. 11)
|
|||
|
A weekly news magazine is reporting US intelligence agents
|
|||
|
inserted a virus into a network of Iraqi computers tied to that
|
|||
|
country's air defense system several weeks before the start of the
|
|||
|
Persian Gulf War a year ago.
|
|||
|
US News and World Report, citing two unidentified senior US
|
|||
|
officials, reports in its issue dated next week the virus was
|
|||
|
designed by the supersecret National Security Agency at Fort Meade,
|
|||
|
Md., and was intended to disable a mainframe computer. The magazine
|
|||
|
says the virus appeared to have worked, but gave no details.
|
|||
|
The report is part of a book, based on 12 months of [somewhat
|
|||
|
shakey] research by US
|
|||
|
News reporters, called "Triumph Without Victory: The Unreported
|
|||
|
History of the Persian Gulf War," to be published next month.
|
|||
|
The magazine also said the virus operation may have been
|
|||
|
irrelevant because of the allies' overwhelming air superiority.
|
|||
|
It reported the secret operation began when US intelligence agents
|
|||
|
identified a French-made computer printer that was to be smuggled
|
|||
|
from Amman, Jordan, to a military facility in Baghdad.
|
|||
|
The Associated Press, quoting the magazine report, says, "The
|
|||
|
agents in Amman replaced a computer microchip in the printer with
|
|||
|
another microchip that contained the virus in its electronic
|
|||
|
circuits. By attacking the Iraqi computer through the printer, the
|
|||
|
virus was able to avoid detection by normal electronic security
|
|||
|
measures, the report said."
|
|||
|
The magazine goes on, "Once the virus was in the system, the US
|
|||
|
officials explained, each time an Iraqi technician opened a
|
|||
|
`window' on his computer screen to access information, the contents
|
|||
|
of the screen simply vanished."
|
|||
|
--Charles Bowen
|
|||
|
|
|||
|
|
|||
|
WAS REPORT OF US VIRUS ASSAULT ON IRAQI SYSTEM BASED ON A SPOOF?
|
|||
|
|
|||
|
(Jan. 14)
|
|||
|
A 1991 April Fools Day spoof in a computer magazine has writers
|
|||
|
and editors at US News and World Report rechecking sources on its
|
|||
|
report that the US inserted a virus into a network of Iraqi air
|
|||
|
defense computers several weeks before the start of the Persian Gulf
|
|||
|
War.
|
|||
|
As reported earlier, the news magazine cited two unidentified
|
|||
|
senior US officials in reporting the alleged virus was designed by
|
|||
|
the supersecret National Security Agency at Fort Meade, Md., and was
|
|||
|
transmitted by a printer smuggled into Baghdad. The magazine said
|
|||
|
the virus appeared to have worked, but gave no details.
|
|||
|
However, Associated Press writer Robert Burns reports today,
|
|||
|
"Trouble is, a computer industry publication, InfoWorld, sketched
|
|||
|
out a strikingly similar scenario in a column that ran in its April
|
|||
|
1, 1991, issue. That article was an April Fool's joke, pure fantasy
|
|||
|
dreamed up by writer John Gantz."
|
|||
|
This news has the folks at US News and World Report concerned. The
|
|||
|
main author of the magazine's report, Brian Duffy, told Burns, "I
|
|||
|
have no doubt" US intelligence agents carried out such an
|
|||
|
operation, though he acknowledged the similarities with the
|
|||
|
InfoWorld article were "obviously troubling."
|
|||
|
Duffy said the magazine is rechecking its sources to determine
|
|||
|
whether details from InfoWorld's spoof "leeched into our report."
|
|||
|
[No news on whether desktop PC's at US NEWS & WORLD REPORT were infected
|
|||
|
by a LEECH virus variant.]
|
|||
|
As noted, US News said in print it had learned from unidentified
|
|||
|
US officials that intelligence agents placed the virus in a computer
|
|||
|
printer being smuggled to Baghdad through Amman, Jordan. It said the
|
|||
|
printer, described as French made, spread the virus to an Iraqi
|
|||
|
mainframe computer that the magazine said was critical to Iraq's air
|
|||
|
defense system.
|
|||
|
Burns notes the InfoWorld article was not labeled as fiction but
|
|||
|
"the last paragraph made clear that it was an April Fool's joke."
|
|||
|
[What does this mean: Said [article] was not labeled as fiction
|
|||
|
but "the last paragraph made clear it was an April Fool's joke"?
|
|||
|
See Orwell's "1984" for other good examples of "newspeak/doublespeak."]
|
|||
|
Gantz, the InfoWorld author, told Burns his article was "totally a
|
|||
|
spoof," and that he had no knowledge of any such intelligence
|
|||
|
operation.
|
|||
|
Burns said questions about the accuracy of the US News story arose
|
|||
|
yesterday "when a number of readers called The AP to say the virus
|
|||
|
account was curiously like the InfoWorld article, which Duffy said
|
|||
|
he hadn't previously seen." [And monkeys are flying out my ass.]
|
|||
|
The InfoWorld spoof said the virus was designed by the National
|
|||
|
Security Agency for use against Iraq's air defense control system,
|
|||
|
and that the CIA had inserted the virus into a printer being
|
|||
|
smuggled into Iraq through Jordan before the Persian Gulf war began
|
|||
|
last January.
|
|||
|
The article continued, "Then the virus was on its own, and by
|
|||
|
Jan. 8, the allies had confirmation that half the displays and
|
|||
|
printers in the Iraqi air defense system were permanently out of
|
|||
|
commission."
|
|||
|
The US News report also said the virus was developed by the
|
|||
|
National Security Agency. Both the publications stressed the reason
|
|||
|
for placing the virus in the printer was to circumvent normal
|
|||
|
anti-tampering systems in mainframe computers.
|
|||
|
AP noted, however, some private computer experts said it seemed
|
|||
|
highly unlikely that a virus could be transferred to a mainframe
|
|||
|
computer from a printer.
|
|||
|
Winn Schwartau, executive director of the International
|
|||
|
Partnership Against Computer Terrorism, observed, "A printer is a
|
|||
|
receiving device. Data does not transmit from the printer to the
|
|||
|
computer." [Winn Schartau, obviously a cool guy, knows
|
|||
|
a line when he hears it.]
|
|||
|
--Charles Bowen
|
|||
|
|
|||
|
|
|||
|
MAGAZINE STICKS TO ITS GUNS ON ITS PERSIAN GULF WAR VIRUS STORY
|
|||
|
|
|||
|
(Jan. 17)
|
|||
|
Contending it has re-checked its sources, US News & World Report
|
|||
|
says it is standing behind its original story that US intelligence
|
|||
|
agents tried to disable an Iraqi military network with a computer
|
|||
|
virus transported to Baghdad in a printer just before the start of
|
|||
|
the Persian Gulf War.
|
|||
|
The Associated Press reports the magazine said it had confirmed
|
|||
|
the attempt was made, as reported in its Jan. 20 issue, but had not
|
|||
|
been able to determine whether the virus attempt was successful.
|
|||
|
That original story was called into question when journalists
|
|||
|
noted its striking [I saw both articles. "Striking similarity" aren't
|
|||
|
the words I would use. How about "so exact it's plagiarism."]
|
|||
|
similarity to a 1991 April Fools Day spoof
|
|||
|
published in the computer magazine, InfoWorld.
|
|||
|
AP quoted US News editors as saying in a statement, "We took
|
|||
|
seriously questions which were raised about the accuracy of this
|
|||
|
story and have re-reported it. We have confirmed that, as we
|
|||
|
reported, a high-level intelligence operation based in Jordan was
|
|||
|
targeted at Iraqi air defenses. As we reported, a computer virus was
|
|||
|
inserted into a French-made computer printer that was to be smuggled
|
|||
|
into Iraq to disable its air defense system. What cannot be
|
|||
|
confirmed is whether the operation was ultimately successful." [LIARS.]
|
|||
|
Brian Duffy, the magazine's assistant managing editor for
|
|||
|
investigative projects, told the wire service the original sources
|
|||
|
believed the system must have worked because Iraqi air defense guns
|
|||
|
opened up before any US airplanes had appeared. [Liar, liar, pants
|
|||
|
on fire. How does that prove anything? Mebbe the Iraqis were jumpy
|
|||
|
is a far better explanation.]
|
|||
|
Duffy said the magazine checked [Liar, liar, pants on fire.]
|
|||
|
with two senior Pentagon officers
|
|||
|
who confirmed the planting of the virus in the printer, but said it
|
|||
|
was not known whether the printer ever reached Iraq. [Hoho! That's an
|
|||
|
interesting way to get off the hook. I'll have to remember it.]
|
|||
|
--Charles Bowen
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
AND WE'RE STILL KEEPING AN EYE ON THE WORLD OF CORPORATE STIFFS (OR
|
|||
|
ANOTHER ONE SOURCE, STRONG BUT VAGUE NEWSPIECE):
|
|||
|
-------------------------------------------------------------------
|
|||
|
BEWARE OF THE INFESTED UNDERGROUND BBS - from LAN Times, Sept. 14, 1992
|
|||
|
|
|||
|
Virus-authoring toolkits for creating rogue code are working their way
|
|||
|
into the arsenals of the nation's top computer crackers.
|
|||
|
The initial distribution point for this new variety of CASE tool is an
|
|||
|
underground BBS sponsored by a select fraternity of highly intelligent, but
|
|||
|
socially inept, teens.
|
|||
|
Some experts fear the toolkits could increase the crackers' productivity
|
|||
|
exponentially, enabling them to generate viruses far faster than the security
|
|||
|
industry could detect each new strain and come up with antidotes or vaccines.
|
|||
|
"The current crop of virus-authoring tools have so far only produced only
|
|||
|
mediocre viruses, and some don't work at all," said one security expert who
|
|||
|
has examined the code. "However, some of these fledgling viruses could prove
|
|||
|
lethal. All the authors would have to do is simply alter one piece of the
|
|||
|
instruction code."
|
|||
|
The BBS fraternity is thus far confined to about 25 members, with dozens
|
|||
|
more "wanna-be's" trying to penetrate the inner circle. To gain acceptance,
|
|||
|
newcomers must establish their bona fides.
|
|||
|
First, they get the attention of the ringleaders with a creative login
|
|||
|
name. This is usually a historical character or an outlandish nickname, such
|
|||
|
as "Dr. Doom" or "Master Blaster."
|
|||
|
Next comes the initiation rite.
|
|||
|
"This usually consists of uploading a new, exotic virus that the crackers
|
|||
|
haven't seen or heard of," the security expert told LAN Times. If the new
|
|||
|
guys do indeed upload such a virus, the BBS ringleaders will usually let them
|
|||
|
download one of the virus writing tools.
|
|||
|
"The BBS is really the equivalent of a clubhouse or fraternity for these
|
|||
|
kids," said another source.
|
|||
|
Electronic bulletin boards are legitimate sources of information accessed
|
|||
|
by hundreds of thousands of users each day. And, ironically, the legitimate
|
|||
|
BBSes are often the best sources for the cracker network. There is one BBS in
|
|||
|
San Francisco whose members are made up almost entirely of security
|
|||
|
practitioners.
|
|||
|
Among the files it disseminates is 40HEX, which contains disassemblies of
|
|||
|
viruses. While the sponsors of this BBS are the good guys, anyone can get
|
|||
|
access by paying $45 for a membership in the National Computer Security
|
|||
|
Association (NCSA).
|
|||
|
The NCSA has about 1,000 members, and all of them - security professionals
|
|||
|
and crackers alike - can download virus code from the BBS. --L.D.
|
|||
|
|
|||
|
[This story was obviously 'leaked' by some holier-than-thou fink in
|
|||
|
the anti-virus community who's got a professional axe to grind with the
|
|||
|
NCSA. Christ, these people will eat themselves if left alone long
|
|||
|
enough.]
|
|||
|
|
|||
|
****************************************************************************
|
|||
|
INCAPABILITIES!! - a new Crypt column discussing plotted weaknesses
|
|||
|
INCAPABILITIES!! - in current editions of antivirus software.
|
|||
|
INCAPABILITIES!! - This month's kickoff report by Vesko Bontchev,
|
|||
|
INCAPABILITIES!! - culled from a Virus Digest/FidoNet transmission.
|
|||
|
Software pack (the INSUFF/MtE spawning viruses)
|
|||
|
and additional research by URNST KOUCH.
|
|||
|
|
|||
|
THE MTE, POLYMORPHIC VIRUSES AND SCANNING TECHNOLOGY (OR LACK OF IT)
|
|||
|
|
|||
|
VIRUS-L Digest Thursday, 10 Sep 1992 Volume 5 : Issue 150
|
|||
|
|
|||
|
|
|||
|
Date: 09 Sep 92 19:31:01 +0000
|
|||
|
>From: bontchev@fbihh.informatik.uni-hamburg.de (Vesselin Bontchev)
|
|||
|
Subject: Scanners and polymorphic viruses (PC)
|
|||
|
|
|||
|
Hello, everybody!
|
|||
|
|
|||
|
With the advent of the sophisticated polymorphic viruses like Dark
|
|||
|
Avenger's Mutating Engine, it is becoming more and more obvious that
|
|||
|
the scanners have really hard time to detect all infections. I have
|
|||
|
already posted several times articles about how well (or, more
|
|||
|
exactly, how bad) the different scanners detect the MtE-based viruses.
|
|||
|
Several people have asked me why I am testing only MtE detection
|
|||
|
capabilities, since none of the currently existing MtE-based viruses
|
|||
|
is intelligent enough to spread widely and to be a significant danger.
|
|||
|
|
|||
|
I am doing this because the MtE is one of the most sophisticated tool
|
|||
|
for building polymorphic viruses and presents a lot of trouble to the
|
|||
|
producers of scanning software. Therefore, the inability to detect the
|
|||
|
MtE-based viruses shows very well how limited the scanners are - the
|
|||
|
MtE has been available since almost a year, yet only about a dozen
|
|||
|
scanners achieve at least some success in detecting it. Of them about
|
|||
|
the half are unable to detect it reliably.
|
|||
|
|
|||
|
However, the MtE-based viruses are not the only polymorphic viruses
|
|||
|
which present problems to the scanners... I have tested several
|
|||
|
scanners on a lot of examples of some of the most polymorphic viruses.
|
|||
|
There is clear need to use a lot of examples, since some scanners are
|
|||
|
able to detect only one or two instances of some polymorphic viruses -
|
|||
|
the examples that the producer of the scanner has...
|
|||
|
|
|||
|
I used the following viruses during the tests:
|
|||
|
|
|||
|
Standard CARO name: Number of different mutants generated:
|
|||
|
/------------------- --------------------------------------
|
|||
|
|
|||
|
Andryushka.A 46
|
|||
|
Emmie 16
|
|||
|
Haifa.Haifa 105
|
|||
|
Haifa.Motzkin 101
|
|||
|
Involuntary.A 8
|
|||
|
Involuntary.B 89
|
|||
|
Maltese_Amoeba 39
|
|||
|
MtE_0_90.Dedicated 96
|
|||
|
MtE_0_90.Pogue 98
|
|||
|
MtE_0_90.Questo 101
|
|||
|
MVF 96
|
|||
|
Necros 115
|
|||
|
PC-Flu_2 35
|
|||
|
Silly_Willy 93
|
|||
|
Simulate 29
|
|||
|
Slovakia.2_02 81
|
|||
|
Slovakia.3_00 57
|
|||
|
StarShip 148
|
|||
|
Tequila 68
|
|||
|
Todor 101
|
|||
|
V2Px.V2P1 35
|
|||
|
V2Px.V2P2 8
|
|||
|
V2Px.V2P6 27
|
|||
|
V2Px.V2P6Z 61
|
|||
|
WordSwap.1391 3
|
|||
|
WordSwap.1495 10
|
|||
|
Whale 164 (covering mutants #00 to #33)
|
|||
|
|
|||
|
The following scanners were used during the tests:
|
|||
|
|
|||
|
Scanner: Version: Producer:
|
|||
|
/-------- -------- ---------
|
|||
|
|
|||
|
FindVirus 4.34 S & S International
|
|||
|
F-Prot 2.05 FRISK Software
|
|||
|
VIRUSCAN 95 McAfee Associates
|
|||
|
HTScan 1.8 Harry Thijssen
|
|||
|
VirX 2.4 Microcom
|
|||
|
AntiVir IV 4.04 H+BEDV
|
|||
|
Anti-Virus+ 4.20.01 IRIS
|
|||
|
CPAV 1.0 Central Point Software
|
|||
|
|
|||
|
Some comments. You all know the first three products; I used the
|
|||
|
latest versions available.
|
|||
|
|
|||
|
HTScan is a user-programmable scanner. It depends on a text file,
|
|||
|
containing wildcard scan strings. Since most polymorphic viruses
|
|||
|
cannot be detected this way (they need algorithmic approach), I
|
|||
|
tested another feature of the scanner - the so-called AVR modules.
|
|||
|
They are loadable at runtime small programs, which are executed by
|
|||
|
the scanner and are supposed to perform algorithmic detection of
|
|||
|
those polymorphic viruses, which cannot be detected with simple or
|
|||
|
even with wildcard scan strings. In this particular version, there
|
|||
|
are AVR modules for Maltese_Amoeba, MtE-based viruses, and the V2Px.*
|
|||
|
series.
|
|||
|
|
|||
|
VirX I couldn't test. It does something incredibly stupid - tries to
|
|||
|
keep the whole report file in memory. Of course, it soon runs out of
|
|||
|
memory, so not record is kept about what viruses are detected and
|
|||
|
which are not. I did only a partial test - on the MtE-based viruses
|
|||
|
only.
|
|||
|
|
|||
|
We have only a very ancient version of CPAV, so the test results for
|
|||
|
it are not up-to-date. That version tried to detect only V2Px.* and
|
|||
|
Whale. Unsuccessfully, on the top of that...
|
|||
|
|
|||
|
Here are the results of the tests. Note that when I say that a scanner
|
|||
|
reliably detects a virus, this holds only for these tests. It does not
|
|||
|
mean that it will be able to detect all possible instances of the
|
|||
|
virus; it just means that I have been unable to find an instance that
|
|||
|
it does not detect. However, when I say that a scanner does not detect
|
|||
|
a virus reliably, this means that it misses at least one example and I
|
|||
|
have proven this.
|
|||
|
|
|||
|
FindVirus detected all infected files. However, this result is not
|
|||
|
very fair towards the other scanners, since Dr. Solomon had access to
|
|||
|
the infected samples, before submitting that version of the scanner.
|
|||
|
This was not so with the other anti-virus producers.
|
|||
|
|
|||
|
F-Prot failed to detect at all Necros, Silly_Willy and Todor. It
|
|||
|
failed to detect reliably Andryushka.A, Whale (mutant #32), and
|
|||
|
V2Px.V2P6Z (only one example missed). It detected reliably all other
|
|||
|
viruses.
|
|||
|
|
|||
|
VIRUSCAN does not detect at all Andryushka.A and StarShip. The latter
|
|||
|
is rather strange, since I have submitted examples of this virus to
|
|||
|
McAfee Associates months ago. The scanner does not detect reliably
|
|||
|
MtE_0_90.Questo, MVF, Slovakia.2_02, Slovakia.3_00, V2Px.V2P6Z (only
|
|||
|
one example missed) and Whale (mutant #33 missed). It also sometimes
|
|||
|
misidentifies MtE_0_90.Pogue as 7thSon (when the virus is not
|
|||
|
encrypted), but SCAN is proverbial with its lack of exact
|
|||
|
identification. It succeeded to detect the other viruses reliably.
|
|||
|
|
|||
|
VirX tested on the MtE-based viruses only still does not recognize
|
|||
|
those viruses reliably. It missed 12 of the total 292 examples.
|
|||
|
|
|||
|
AntiVir IV (a German anti-virus product) does not detect at all
|
|||
|
Andryushka.A, Emmie, Haifa.Haifa, Haifa.Motzkin, Involuntary.A,
|
|||
|
Involuntary.B, MVF, Necros, PC-Flu_2, StarShip and Todor. It failed to
|
|||
|
identify correctly V2Px.V2P2 (one missed example) and Whale (several
|
|||
|
mutants). The other viruses were detected reliably - even the
|
|||
|
MtE-based one, with the exception that the non-encrypted files
|
|||
|
infected with an MtE-based virus were reported to contain two viruses.
|
|||
|
|
|||
|
HTScan's AVR module for Maltese_Amoeba (IRISH.AVR) doesn't detect the
|
|||
|
virus reliably. Surprisingly, the collection of wildcard scan strings
|
|||
|
for the same virus, which is present in the text database, -does-
|
|||
|
detect this virus reliably. So, my advice to the users of HTScan is to
|
|||
|
delete the file IRISH.AVR and to rely on the database of signatures.
|
|||
|
The module for Haifa.Haifa detected reliably all instances of the
|
|||
|
virus, but didn't detect even one instance of the related virus
|
|||
|
Haifa.Motzkin. The module which is supposed to detect MtE-based
|
|||
|
viruses (its version is 2.3) failed to detect the non-encrypted
|
|||
|
examples, infected with MtE_0_90.Pogue and MtE_0_90.Questo. The module
|
|||
|
for the V2Px viruses (called "Washburn") detects reliably V2Px.V2P1,
|
|||
|
but missed one instance of V2Px.V2P2, three instances of V2Px.V2P6 and
|
|||
|
lots of instances of V2Px.V2P6Z. The Whale virus was detected reliably
|
|||
|
by the collection of scan strings in the database.
|
|||
|
|
|||
|
Anti-Virus+ does not detect at all Andryushka.A, Emmie, MVF, Necros,
|
|||
|
Silly_Willy, Necros, Slovakia.2_02, Slovakia.3_00, StarShip, Tequila,
|
|||
|
Todor, WordSwap.1391 and WordSwap.1485. It did not detect reliably
|
|||
|
Involuntary.A (in SYS files), MtE_0_90.Dedicated, MtE_0_90.Questo,
|
|||
|
V2Px.V2P6, V2Px.V2P6Z and Whale (several mutants). The other viruses
|
|||
|
were detected reliably.
|
|||
|
|
|||
|
The above tests clearly show that most of the current scanners are
|
|||
|
still unable to cope with the existing polymorphic viruses. Even with
|
|||
|
such well known viruses like V2P6 and MtE. At least one scanner was
|
|||
|
unable to detect even Tequila! This virus is quite widespread and can
|
|||
|
be detected with a few wildcard scan strings (3-4, I believe). And in
|
|||
|
the near future we'll see more and more polymorphic viruses...
|
|||
|
|
|||
|
If some producer of scanning software thinks that his product is able
|
|||
|
to show better results but I have missed to test it, s/he is welcome
|
|||
|
to contact me and provide me a copy of their product (or tell me where
|
|||
|
to get it, if it is available through anonymous ftp). I am ready to
|
|||
|
test it and to publish the results, provided that:
|
|||
|
|
|||
|
1) The scanner is able to run without user intervention. I don't want
|
|||
|
to be prompted to "press any key" each time a virus is found.
|
|||
|
|
|||
|
2) The scanner is able to produce a report file.
|
|||
|
|
|||
|
3) The scanner is able to output in the report file the names of all
|
|||
|
files being scanned, not only those that it considers to be infected.
|
|||
|
|
|||
|
4) The scanner is requires a reasonable amount of memory. For
|
|||
|
instance, Norton Anti-Virus 2.1 refused to run in about 400 Kb free
|
|||
|
memory.
|
|||
|
|
|||
|
A description how to instruct the scanner to conform to the above
|
|||
|
requirements (i.e., secret options, etc.) is welcome.
|
|||
|
|
|||
|
Regards,
|
|||
|
Vesselin
|
|||
|
|
|||
|
Vesselin Vladimirov Bontchev Virus Test Center, University of
|
|||
|
Hamburg
|
|||
|
Tel.:+49-40-54715-224, Fax: +49-40-54715-226 Fachbereich Informatik -
|
|||
|
AGN
|
|||
|
** PGP public key available on demand. ** Vogt-Koelln-Strasse 30, rm. 107
|
|||
|
C
|
|||
|
e-mail: bontchev@fbihh.informatik.uni-hamburg.de D-2000 Hamburg 54,
|
|||
|
Germany
|
|||
|
-*-
|
|||
|
|
|||
|
Well, now, if only Vesko would clean up his English skills the report
|
|||
|
would have been damn near perfect.
|
|||
|
|
|||
|
In any case, the report gets right to the heart of this issue's software
|
|||
|
offering: the INSUFFICIENT MEMORY (or INSUFF/INSUFFERABLE) viruses.
|
|||
|
|
|||
|
If you're a virus collector, you know MtE loaded programs are a hot
|
|||
|
item. Even though the Engine is a genuine White Elephant (hobbled
|
|||
|
by incredibly poor documentation), because of judicious media
|
|||
|
attention and perfect p.r. timing by anti-virus software developers,
|
|||
|
it remains an object of keen interest to many rather poorly informed
|
|||
|
individuals.
|
|||
|
|
|||
|
So, for your educational pleasure the Crypt Newsletter has worked up a
|
|||
|
number of simple MtE-loaded companion viruses, unique if only because
|
|||
|
no one but us has come up with the stupid idea of using the MtE in
|
|||
|
a spawning program.
|
|||
|
|
|||
|
In keeping with Vesko's results, these viruses are not detected by
|
|||
|
the SCAN 95b, CPAV, VIREX or NAV's most recent roll-outs. In regards,
|
|||
|
to the latter I include a press release from SYMANTEC, for your
|
|||
|
review:
|
|||
|
|
|||
|
"Our AntiVirus Labs tested the detection capabilities of The Norton
|
|||
|
AntiVirus v2.1 against the Mutation Engine, which created over
|
|||
|
900,000 mutations during our test. The Norton AntiVirus v2.1
|
|||
|
detected all 900,000, and will detect them on your system too,
|
|||
|
before they destroy your data."
|
|||
|
|
|||
|
Here at the Crypt Newsletter we feel fortunate to have gotten those
|
|||
|
900,001st, 900,002nd and 900,003rd MtE mutations that NAV 2.1 cannot
|
|||
|
detect. Ruh-hemmmhmmmm. Perhaps SYMANTEC shouldn't be so hasty in
|
|||
|
jobbing out these tasks to Gary Watson in the future.
|
|||
|
|
|||
|
[It's an inside joke.]
|
|||
|
|
|||
|
In any case, F-PROT 2.05, tbSCAN (ThunderByte) and AVScan v.097 (beta)
|
|||
|
(DataTechnik) do detect the MtE variants spawned from the viruses
|
|||
|
in this issue. tbSCAN, according to its documentation, disassembles
|
|||
|
the virus on the fly. It's easy to see why developer Frans Veldman
|
|||
|
may have decided to go this route if you load the INSUFF viruses into
|
|||
|
a debugger like ZanySoft's ZD86 and 'proc' step through them. (Or if
|
|||
|
you're ballsy, just 'Go.') It takes only an instant for the virus to
|
|||
|
'unspool' in memory; a 'step through' through the MtE decryption key
|
|||
|
follows a distinct pattern for every 'mutant.' AVScan v. 097 did a
|
|||
|
nice job on them, too, even correctly identifying encrypted and
|
|||
|
unencrypted forms. However, only the techies will be using tBSCAN and
|
|||
|
AVScan. Your average mook lashes himself to SCAN, CPAV, VIRX, or NAV
|
|||
|
and these programs remain sadly inadequate when engaging 'new' MtE
|
|||
|
viruses. In our benchtop tests, all four failed to detect any mutants
|
|||
|
generated by our closely related school of spawning viruses.
|
|||
|
|
|||
|
|
|||
|
And that brings the discussion around to "Why SPAWNING, for crying
|
|||
|
out loud?"
|
|||
|
|
|||
|
We shall tell you. The current edition of CPAV and a number of
|
|||
|
other no-name retail a-v packages are COMPLETELY vulnerable to
|
|||
|
penetration by companion viruses even with default resident
|
|||
|
protection and integrity checking enabled. To understand this,
|
|||
|
you must recall the spawning viruses don't actually touch your
|
|||
|
files. Instead, the average spawner goes out at infection time,
|
|||
|
looks for a target .EXE file and creates a duplicate of itself
|
|||
|
as a 'companion' .COM file to the targeted .EXE. Then when you
|
|||
|
call that .EXE, DOS looks around, finds a .COM (the virus) with
|
|||
|
the same name and loads it instead. Usually, the virus stores
|
|||
|
itself as a hidden, read-only, system file to elude casual
|
|||
|
observation and this is what the INSUFF programs do.
|
|||
|
|
|||
|
In bench-top tests, CPAV DID NOT DETECT ANY of our companion
|
|||
|
virus infections. In fact, it added the 'companion' files
|
|||
|
to its .CPS integrity listings without a squeak.
|
|||
|
(CPAV was installed on our test system using the
|
|||
|
recommended defaults.) In comparison, Stiller Research's
|
|||
|
INTEGRITY MASTER 1.12 easily followed companion infections on
|
|||
|
our machine and notified the user with a warning screen which
|
|||
|
gave proper advice for removal.
|
|||
|
|
|||
|
The Crypt Newsletter reader gets a lesson in simple virus
|
|||
|
design with the INSUFF programs. Spawning sneaks through a big
|
|||
|
back door in CPAV, the MtE polymorphic encryption targets
|
|||
|
many scanners directly.
|
|||
|
|
|||
|
The INSUFF viruses still remain quite simple. The source code
|
|||
|
supplied will only give you a virus which searches the
|
|||
|
current directory. INSUFF1, then, illustrates the principle
|
|||
|
but will hardly get very far - probably not beyond a primary
|
|||
|
infection (although I never underestimate viruses). It is not even
|
|||
|
particularly dangerous since it doesn't touch your files and is
|
|||
|
easily removed by deletion. INSUFF2 is a little more interesting,
|
|||
|
for the reader impatient with INSUFF1. INSUFF2 will drop the NOIZ
|
|||
|
Trojan onto .EXE's in the current directory anytime after 4:00 pm.
|
|||
|
If INSUFF has already created 'companions' for these files,
|
|||
|
the user may see nothing initially. The NOIZ Trojan does not
|
|||
|
scan. However, when INSUFF2 is removed or eliminated as a 'companion'
|
|||
|
for the altered .EXE, the NOIZ Trojan will be unmasked. Calling the
|
|||
|
.EXE will install NOIZ in RAM where it takes up about 8k and
|
|||
|
compells the PC to make frequent, strange farting noises until
|
|||
|
the machine is rebooted. NOIZ will not install itself more than
|
|||
|
once in RAM, it is a semi-intelligent 'zombie.' Of course,
|
|||
|
it goes without saying that files altered by the NOIZ Trojan
|
|||
|
are permanently ruined and must be restored from back-up.
|
|||
|
The NOIZ trojan hooks a hardware interrupt when it becomes
|
|||
|
resident. We leave it to the reader as an insignificant academic
|
|||
|
exercise to find interrupt.
|
|||
|
|
|||
|
Since INSUFF1 and INSUFF2 are 'direct-action' infectors of
|
|||
|
their current directory, they are FAST. If called on a system
|
|||
|
they will search and write to the drive in less than a fraction
|
|||
|
of a second. In most case, the drive light flicker will be
|
|||
|
analogous to what is seen when an "Unknown command or file name"
|
|||
|
error is produced. So, when a 'spawn-infected' program misfires
|
|||
|
because the virus is doing its business, it's quite possible the
|
|||
|
mystified user will repeat the command once or twice before
|
|||
|
giving up, putting the viruses well into the directory. [This
|
|||
|
is exactly the worst thing to do.] If called from a different
|
|||
|
directory in the path, INSUFF can get out of hand. Keep in mind
|
|||
|
that if INSUFF2 is on a system and called after 4 in the
|
|||
|
afternoon many executables may silently suffer 'zombie-fication.'
|
|||
|
This is frustratingly destructive and difficult to overlook.
|
|||
|
|
|||
|
The newsletter also contains the DEBUG script for INSUFF3. INSUFF3
|
|||
|
will jump out of the current directory once it has infected all
|
|||
|
files in it. This simple directory span increases its potential
|
|||
|
for fast spread considerably. INSUFF3, like INSUFF2, will
|
|||
|
trojanize selected .EXE files with the NOIZ 'zombie' in the directory
|
|||
|
it is called from anytime after 4:00 pm.
|
|||
|
|
|||
|
[If the reader needs the source code for INSUFF2 and INSUFF3, both
|
|||
|
can be obtained, no-questions-asked, from the DARK COFFIN BBS,
|
|||
|
listed at the end of this document. Codes are located in
|
|||
|
the Crypt Newsletter directory in the Files section of the BBS.]
|
|||
|
|
|||
|
Next issue: The poor man's guide to making multi-partite viruses.
|
|||
|
Maybe. (I tend to change my mind a lot.)
|
|||
|
*****************************************************************************
|
|||
|
|
|||
|
|
|||
|
KRYPT KONSUMER KORNER (Guide to Term addendum):
|
|||
|
|
|||
|
ZCOMM (Omen Technology) v. HyperACCESS/5 (Hilgraeve) --
|
|||
|
|
|||
|
ZCOMM, the shareware subset of Chuck Forsberg's Pro-YAM comm tool
|
|||
|
ain't for everyone. It doesn't beep and boop, it's got no menus
|
|||
|
to speak of; it is spare, spare, spare in 'looks.'
|
|||
|
|
|||
|
But you, the assertive, manly Crypt newsletter reader don't crave
|
|||
|
'looks' now, do you? You want performance - raw, uncompromised power!
|
|||
|
ZCOMM has it in spades.
|
|||
|
|
|||
|
Enter ZCOMM in DOS. Up comes a command prompt. Type
|
|||
|
'call koolwarez' and if you've had the wit to add the number of the
|
|||
|
KOOLWAREZ BBS to ZCOMM's master script, PHOMAST.T, with a simple
|
|||
|
ASCI editor, you're gone. (ZCOMM comes with a public domain editor,
|
|||
|
CSE, very similar in function to Semware's QEdit. CSE is from the
|
|||
|
Colorado School of Mines. You know they must have real men there!)
|
|||
|
|
|||
|
For transfers, Forsberg gives you X/Y/ZModems in all their flavors,
|
|||
|
KERMIT, Clink, Telink, MODEM7 and WXModem. If that's not good enough,
|
|||
|
time to flee to Mars. As for performance, none of the ZModem
|
|||
|
implementations in the packages reviewed last issue (PCPlus 2.01,
|
|||
|
Telemate, QModem 5.0, COM-AND 2.8) approached that of ZCOMM.
|
|||
|
|
|||
|
And if you're spying on someone's BBS or just remembered that you want
|
|||
|
to save something that scrolled by 5 minutes ago, ZCOMM
|
|||
|
will save your butt. Toggle its capture file and ZCOMM will write
|
|||
|
everything to disk from its ridiculously oversized
|
|||
|
scrollback buffer. Scrutinize a hex/ASCI dump of that raw virus
|
|||
|
you just downloaded with ZCOMM's display command! ZCOMM will
|
|||
|
remove noxious ESC sequences from screen captures polluted by the
|
|||
|
work of brain-damaged FelonyNet ANSI-artists, too, thus saving you
|
|||
|
and your printer much grief. Forget these features with ANY
|
|||
|
OTHER PACKAGE!
|
|||
|
|
|||
|
In truth, though, many will not feel up to the ZCOMM/Pro-YAM challenge.
|
|||
|
These users will be easily befuddled by ZCOMM's UNIX-like instruction
|
|||
|
set and look. They will be bullied into submission by ZCOMM's stark
|
|||
|
command line and nettled at the prospect of doing all configuration
|
|||
|
from the master script with nothing but a text editor and a meager amount
|
|||
|
of cerebrum as safety nets.
|
|||
|
|
|||
|
They will crash and curse ZCOMM's author savagely when
|
|||
|
attempting as simple a task as logging on to a "local" pd BBS.
|
|||
|
(Of course, The Crypt Newsletter reader is no such craven swine.)
|
|||
|
|
|||
|
But such is the ZCOMM/Pro-YAM price of excellence.
|
|||
|
|
|||
|
|
|||
|
Another program vieing for dominance with ZCOMM/Pro-YAM in the
|
|||
|
brute power category is Hilgraeve's HyperACCESS/5 3.0. It is of
|
|||
|
interest here at the Crypt because it's the first instance of a
|
|||
|
comm program which incorporates virus scanning in its file
|
|||
|
transfer suite.
|
|||
|
|
|||
|
That said, we did an off the cuff evaluation of HyperACCESS's anti-
|
|||
|
virus ability. The program will unpack .ZIPfiles on the fly and
|
|||
|
scan executables archived within them or scan your system
|
|||
|
as a stand-alone. A quick test revealed HyperACCESS could detect
|
|||
|
common viruses; in fact, it was rather efficient at picking up STONED
|
|||
|
'droppers', JERUSALEM strains, numerous wearisome BURGER perversions
|
|||
|
and even the odd image file of a TELEFONICA boot infector. On the
|
|||
|
other hand, the scanner was sacked repeatedly the common
|
|||
|
MtE viruses as well as all Crypt newsletter formulations. It did not
|
|||
|
detect MALTESE AMOEBA, STARSHIP, COMMANDER BOMBER, SUOMI (eh?) or any
|
|||
|
VCL or PS-MPC creations or derivatives. Our consumer advice: you won't
|
|||
|
be buying HyperACCESS as an a-v scanner anytime soon.
|
|||
|
|
|||
|
This simple a-v utility does suggest itself for one virus-hunting use.
|
|||
|
It might be a nice exercise to enable HyperACCESS's 'unzip-on-the-
|
|||
|
fly' option when downloading new virus samples from boards you suspect
|
|||
|
of having nothing but BURGER, VIENNA and AMSTRAD hacks. HyperACCESS
|
|||
|
can flag such archives as they arrive on your end, name the virus,
|
|||
|
and log the results to a file for later browsing. Then you have a
|
|||
|
nice report verifying the 'quality' of the audited Vx BBS.
|
|||
|
|
|||
|
But even if we overlook its a-v features, HyperACCESS offers many handy
|
|||
|
utilities thought to be almost exclusively the domain of ZCOMM.
|
|||
|
It's got a fast, efficient file manager and its DOS gateway is
|
|||
|
supremely efficient. The capture buffer is generous and looks deep
|
|||
|
into the scrollback if you ask nice. HyperACCESS includes
|
|||
|
an extravagant text editor every bit the equal of QEdit with
|
|||
|
only a rather crippled spell-checker to mar the picture. (The
|
|||
|
first time I used it on the Crypt newsletter it crashed when
|
|||
|
confronted by all the 50-buck words.)
|
|||
|
|
|||
|
In contrast to ZCOMM, HyperACCESS has been designed with an eye
|
|||
|
to luring away the average ProComm cripple from his favorite
|
|||
|
software. It will convert PCPlus 2.01 .FON directories for its
|
|||
|
own use although its documentation sneers at the 'look and feel' of
|
|||
|
the Datastorm product. HyperACCESS/5 can also be used by point-and-shoot
|
|||
|
premature ejaculators and has slippery-looking sliding menus and
|
|||
|
terminal screens which even I enjoyed in a corrupt sort of way.
|
|||
|
|
|||
|
But Hilgraeve knows its limitations, too. While its ZModem
|
|||
|
implementation is adequate, HA/5 includes two macros for utilizing
|
|||
|
Omen's DSZ program as an instant drop-in. No figuring out stupid
|
|||
|
external batch files, hey, hey! On my disk, it's a toss-up between
|
|||
|
HyperACCESS/5 and ZCOMM/Pro-YAM.
|
|||
|
---------------------
|
|||
|
|
|||
|
ZCOMM 17.96 is $45 cash money shareware from Omen Technology. That's
|
|||
|
good for a diskette containing the ZCOMM programs and a daunting
|
|||
|
manual written in a style opaque to anyone even close to being a
|
|||
|
lip-reader. The unregistered ZCOMM is downloadable from just about
|
|||
|
everywhere, but I found it in the COMM Programs software library
|
|||
|
in CSERVE's IBMCOMM special interest group. (Type 'Go: IBMCOMM').
|
|||
|
|
|||
|
Hilgraeve's HyperACCESS/5 v. 3.0 is retail only, for a short time
|
|||
|
available at $49.95, not including shipping and handling.
|
|||
|
You can reach Hilgraeve at: 1-800-826-2760.
|
|||
|
*****************************************************************************
|
|||
|
|
|||
|
|
|||
|
-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-
|
|||
|
|
|||
|
|
|||
|
THE READING ROOM: BOOKS OF INTEREST TO THE VIRUS COMMUNITY
|
|||
|
|
|||
|
"Artificial Life" by Steven Levy (Pantheon)
|
|||
|
|
|||
|
"Computer viruses, then, stand on the cusp of life - and soon will
|
|||
|
cross over." - Steven Levy in "AL"
|
|||
|
|
|||
|
And here in Central Schnookville, PA, gravity drops to zero come noon
|
|||
|
and all the corporate stiffs lunching on the village common float
|
|||
|
through the air plucking startled birds out of the sky with their bare
|
|||
|
hands.
|
|||
|
|
|||
|
A good portion of "Artifical Life" has Levy expounding that computer
|
|||
|
viruses fill what is known as the "strong claim" toward artificial life.
|
|||
|
It is the very essence of neo-intellectual flatus - the kind of prose
|
|||
|
that makes the ocassional reading of Scientific American such an
|
|||
|
unpleasant experience.
|
|||
|
|
|||
|
Levy comes up with interesting descriptive jargon for viruses, too.
|
|||
|
"Add-on" which I suppose means "appending"; "shell" for God knows
|
|||
|
what. The "diabolical" Brain virus comes in for special attention;
|
|||
|
it hides a portion of itself in clusters marked "BAD," "a cluster
|
|||
|
stretches over 2 sectors of a 9 sector disk," writes Levy. (Hmmmm.
|
|||
|
Doesn't leave too much room for anything else, does it?)
|
|||
|
|
|||
|
Plenty of minor stupid technical errors of this nature pepper Levy's
|
|||
|
book. Of course, they've flown by any number of dumbbell editors
|
|||
|
in the publishing business and they'll repeat the job on almost
|
|||
|
anyone who reads this book. But don't think that because no one
|
|||
|
will know, somehow it's right. It's not and, unfortuately, its
|
|||
|
typical of the modern 'science' journalist who thinks that simply
|
|||
|
by interviewing experts like Fred Cohen for three hours, he can
|
|||
|
magically obtain understanding.
|
|||
|
|
|||
|
The skeptical Crypt newsletter reader will find "Artificial Life" is
|
|||
|
total crap. However, he may be amused by quotes like:
|
|||
|
|
|||
|
"Machines, being a form of life, are in competition with
|
|||
|
carbon-based life. Machines will make carbon-based life extinct."
|
|||
|
(page 336)
|
|||
|
|
|||
|
or
|
|||
|
|
|||
|
"A rock would certainly be low on any continuum of aliveness . . ."
|
|||
|
(page 6).
|
|||
|
|
|||
|
or
|
|||
|
|
|||
|
"Steven Levy needs help finding his ass with both hands." (Oops,
|
|||
|
how'd that get in here???)
|
|||
|
|
|||
|
Levy's previous work includes "Hackers," but "AL" WILL only be enjoyed
|
|||
|
by those who like the concept of "edu-tainment" or think that a
|
|||
|
library full of comic books, cyberpunk novels and cuttings from
|
|||
|
OMNI magazine constitute a national resource.
|
|||
|
|
|||
|
The Crypt Newsletter gives "Artificial Life" a solid thumbs down!
|
|||
|
|
|||
|
|
|||
|
"ACCIDENTAL EMPIRES" by Robert X. Cringely (Addison-Wesley paperback)
|
|||
|
|
|||
|
After wincing your way through "AL" you may want to head out to the
|
|||
|
local mall and pop for Cringely's worldview/thumbnail history of American
|
|||
|
computerland, now in paperback. Guaranteed, you'll be on the floor
|
|||
|
inside the first six pages when you read "Hate group number three . . .
|
|||
|
will just hate [this] book because somewhere I write that object-
|
|||
|
oriented programming was invented in Norway in 1967, when they
|
|||
|
know it was invented in BERGEN, Norway, on a rainy afternoon
|
|||
|
in late 1966. I never have been able to please these folks, who are
|
|||
|
mainly programmers and engineers, but I take some consolation in
|
|||
|
knowing that there are only a couple hundred thousand of them."
|
|||
|
|
|||
|
Recognize the type? Yup, Robert, we see 'em every day here at the
|
|||
|
newsletter, too. Fuck 'em.
|
|||
|
|
|||
|
The shrewd Crypt newsletter reader will guess that we give
|
|||
|
"Accidental Empires" a solid thumbs up!
|
|||
|
|
|||
|
|
|||
|
***********************************************************************
|
|||
|
***********************************************************************
|
|||
|
|
|||
|
Crypt Newsletter Software: Additional documentation, lamentation and
|
|||
|
user notes for the terminally stupid. Why? Because we care!
|
|||
|
|
|||
|
DIOGENES virus: Enclosed in this archive is a DEBUG script of DIOGENES
|
|||
|
virus. Created by Seeker, DIOGENES is a second generation VCL 1.0
|
|||
|
derived, appending .COM infector. DIOGENES is encrypted and will do its
|
|||
|
virus thing until the 31st of any month. On that day, it will spoil
|
|||
|
the data and valuable programming on your hard drive in a quick,
|
|||
|
professional manner.
|
|||
|
|
|||
|
DIOGENES is not scanned by the current editions of F-PROT (2.05),
|
|||
|
VIREX-PC, SCAN, CPAV, AVSCAN, NORTON ANTIVIRUS, INTEGRITY MASTER
|
|||
|
and tbSCAN. F-PROT 2.05 will flag it as being 'self-modifying'
|
|||
|
in heuristic mode, definitely a 'weak' warning.
|
|||
|
|
|||
|
User documentation for DIOGENES is listed in DIOGENES.DOC; source
|
|||
|
code for the virus is archived on the DARK COFFIN BBS.
|
|||
|
|
|||
|
To produce the software in the Crypt Newsletter, ensure that the DOS
|
|||
|
program, DEBUG, is in your path. At the C: prompt, type
|
|||
|
|
|||
|
DEBUG <*.scr,
|
|||
|
|
|||
|
where *.scr is the name of the .scr file of interest included with the
|
|||
|
newsletter. DEBUG will assemble the program from which the script
|
|||
|
is derived and write it to disk in the current directory.
|
|||
|
|
|||
|
Also included as DEBUG scripts are the INSUFF viruses. INSUFF1's
|
|||
|
source listing, INSUFF.ASM, accompanies the archive but it
|
|||
|
cannot be assembled directly without possession of the MtE091b
|
|||
|
OBJECT files. We assume the average Crypt newsletter reader interested
|
|||
|
in the code will have a general idea on how to come by the MtE
|
|||
|
archive if he doesn't possess it already.
|
|||
|
|
|||
|
In our continuing series of public domain and 'porn' trojan programs
|
|||
|
is the DEBUG script for COMPUFON, a pop-up auto-dialer and corporate
|
|||
|
phonebook complete with the usual utterly convincing yet COMPLETELY
|
|||
|
BOGUS documentation. COMPUFON is an assembly coded comms utility that
|
|||
|
will store a phone directory for you and will dial the phone. It
|
|||
|
will also smash the C; drive just before it dials your selected
|
|||
|
number. It is instructive because it demonstrates an easy source
|
|||
|
of trojan code: utility listings published and placed into public
|
|||
|
circulation by organizations like BYTE, PC MAGAZINE or Ziff-Davis.
|
|||
|
COMPUFON can be recognized as a hacked version of PC-DIAL.
|
|||
|
|
|||
|
***********************************************************************
|
|||
|
***********************************************************************
|
|||
|
|
|||
|
END NOTES: This issue's acknowledgements go to Seeker for tossing
|
|||
|
DIOGENES virus our way with nice attention to deadline. And I
|
|||
|
can't forget Nowhere Man who patiently answered some stupid
|
|||
|
questions on spawning viruses and MtE encryption.
|
|||
|
|
|||
|
This issue of the Crypt newsletter should come in the archive
|
|||
|
CRPTLET6.ZIP. And the archive should contain:
|
|||
|
|
|||
|
CRPTLET.TR6 - this electronic document
|
|||
|
INSUFF.ASM - TASM 2.5 source code for the basic
|
|||
|
INSUFF MEMORY viruses.
|
|||
|
INSUFF.SCR - DEBUG script for INSUFF virus
|
|||
|
INSUFF2.SCR - DEBUG script for INSUFF2 virus
|
|||
|
INSUFF3.SCR - DEBUG script for INSUFF3 virus
|
|||
|
DIOGENES.SCR - DEBUG script for DIOGENES virus, a
|
|||
|
third generation VCL 1.0 designed program
|
|||
|
DIOGENES.DOC - additional notes for DIOGENES virus
|
|||
|
CMPUFON.SCR - DEBUG script for the COMPUFON trojan
|
|||
|
CMPUFON.DOC - BOGUS documentation for COMPUFON
|
|||
|
WARNING.TXT - additional documentation for COMPUFON
|
|||
|
MAKE.BAT - .BAT file to assist in generation of INSUFF
|
|||
|
viruses
|
|||
|
|
|||
|
If any of these files are missing demand upgrade at any of the BBS's
|
|||
|
listed in the tail of this file.
|
|||
|
|
|||
|
In addition, you should realize that the programming examples in the
|
|||
|
Crypt newsletter are quite capable of folding, spindling and mutilating
|
|||
|
the valuables on your machine. Handle them stupidly or irresponsibly,
|
|||
|
and that's just what they'll do.
|
|||
|
|
|||
|
Readers should feel free to send e-mail to editor URNST KOUCH
|
|||
|
on any of the BBS's listed in this file. On Hell Pit, I can be
|
|||
|
reached as COUCH.
|
|||
|
|
|||
|
To ensure you don't miss an issue of the newsletter, I invite you
|
|||
|
to come to DARK COFFIN and e-mail me with a data number of your
|
|||
|
favorite BBS. I'll include it in my database and begin delivery if
|
|||
|
they'll have it. This guarantees you'll be the first on your block
|
|||
|
to get fresh issues.
|
|||
|
|
|||
|
The Crypt newsletter is distributed first at the following sites:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
|||
|
<20> This V/T info phile brought to you by <20>瘞, <20>
|
|||
|
<20> Makers/Archivists/Info Specialists on Viruses/Trojans. <20>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20> Dark Coffin <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> HQ/Main Support <20><><EFBFBD> 215.966.3576 <20>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ķ
|
|||
|
<20> VIRUS_MAN <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> Member Support <20><><EFBFBD><EFBFBD> ITS.PRI.VATE <20>
|
|||
|
<20> Callahan's Crosstime Saloon <20><><EFBFBD><EFBFBD> Southwest HQ <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> 314.939.4113 <20>
|
|||
|
<20> Nuclear Winter <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> Member Board <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> 215.882.9122 <20>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
|||
|
|