962 lines
48 KiB
Plaintext
962 lines
48 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer underground Digest Wed June 16 1993 Volume 5 : Issue 44
|
|||
|
ISSN 1004-044X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Copy Editor: Etaoin Shrdlu, Seniur
|
|||
|
|
|||
|
CONTENTS, #5.44 (June 16 1993)
|
|||
|
File 1--Interview with a Virus Writer (Gray Area Excerpt)
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
|||
|
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
|
|||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|||
|
60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
On Delphi in the General Discussion database of the Internet SIG;
|
|||
|
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
|||
|
WHQ) 203-832-8441 NUP:Conspiracy
|
|||
|
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
|||
|
nodes and points welcome.
|
|||
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
|||
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|||
|
|
|||
|
ANONYMOUS FTP SITES:
|
|||
|
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
|||
|
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
|
|||
|
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
|||
|
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
|||
|
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
|||
|
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Authors hold a presumptive copyright, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: 16 Jun 93 22:22:43 CDT
|
|||
|
From: GRAY AREAS <grayarea@well.sf.ca.us>
|
|||
|
Subject: File 1--Interview with a Virus Writer (Gray Area Excerpt)
|
|||
|
|
|||
|
((MODERATORS' NOTE: The following reprint from GRAY AREAS (Issue #3,
|
|||
|
1993) is an edited summary of an interview with a writer of computer
|
|||
|
viruses. The summary constitutes less than 20 percent of the entire
|
|||
|
interview, so considerable detail has been omitted. We apologize if
|
|||
|
we inadvertently over-truncated parts of the discussion for space
|
|||
|
constraints.
|
|||
|
|
|||
|
GRAY AREAS is a new hard-copy magazine (see CuD 4.65 for a review)
|
|||
|
that improves with each issue. Each issue addresses topics in "cutting
|
|||
|
edge" culture, including technology, art, music, and leisure. The
|
|||
|
current issue (#3) includes an interview with controversial musician
|
|||
|
G.G. Allin. Netta Gilboa impresses us as one of the most competent
|
|||
|
interviewers on the 'Zine scene, and does for print media what Mike
|
|||
|
Wallace and Barbara Walters do for television: She brings incisive
|
|||
|
questions to bear on her topic and elicits uncompromising information
|
|||
|
(in the Wallace tradition) while never losing sight of the subjects'
|
|||
|
humanity (in the Walters tradition). In our view, it's definitely
|
|||
|
something worth looking at.
|
|||
|
|
|||
|
A one year (four issue) subscription is available for $18 from Gray
|
|||
|
Areas, Inc. / P.O. Box 808 / Broomall, PA (19008-008). More
|
|||
|
information can be obtained from grayarea@well.sf.ca.us))
|
|||
|
|
|||
|
NOTE: THE FOLLOWING COPYRIGHT MATERIAL MAY NOT BE SEPARATELY
|
|||
|
RE-DISTRIBUTED OR CITED WITHOUT EXPLICIT PERMISSION FROM GRAY AREAS
|
|||
|
|
|||
|
+++++
|
|||
|
|
|||
|
GETTING GRAY WITH URNST KOUCH, COMPUTER VIRUS WRITER
|
|||
|
By Netta Gilboa
|
|||
|
|
|||
|
Many people will dismiss Urnst before they hear what he has to say.
|
|||
|
Others will hear what they want to instead of what he actually said.
|
|||
|
Those of you who are willing to listen to his reasoning will find the
|
|||
|
complex subject of viruses simplified and demystified. Viruses may
|
|||
|
never again seem as scary.
|
|||
|
|
|||
|
I was surprised to learn writing and exchanging viruses is not
|
|||
|
illegal. I was surprised to learn virus writers (for the most part)
|
|||
|
look down on pirate files and pirate computer BBSs. I also learned
|
|||
|
about several new viruses before the anti-virus community did which
|
|||
|
seemed strange to me since it was their full time job and just one of
|
|||
|
many stories to me.
|
|||
|
|
|||
|
Whatever you think about Urnst's actions, you'll probably agree with
|
|||
|
him that viruses are here to stay with new ones being created every
|
|||
|
day. There's material here for everyone. Whether your main interest is
|
|||
|
in how to avoid getting stung by a virus, learning how to write one,
|
|||
|
or in understanding people who do this for fun, read on.
|
|||
|
|
|||
|
We're certainly interested in your reactions, pro and con. Did you get
|
|||
|
hit by a virus that was more than a minor inconvenience? Did your
|
|||
|
opinion about viruses change at all as a result of reading this? Would
|
|||
|
you like to hear from other, more malicious virus writers and/or from
|
|||
|
the experts who defeat these viruses? We'll print as much of your
|
|||
|
mail as we can. Viruses are surely as gray a topic as topics get...
|
|||
|
|
|||
|
Gray Areas: What is a computer virus?
|
|||
|
|
|||
|
Urnst Kouch: A computer virus, in simplest terms, is a small program
|
|||
|
that must generally have two features associated with it. It has to
|
|||
|
be able to find another executable program, so it has to have a search
|
|||
|
mechanism, and it has to be able to duplicate itself and attach itself
|
|||
|
to a program. So that the next time that program is executed, the
|
|||
|
virus executes first. You can think of it as a very small piece of
|
|||
|
code that when executed like any program goes out and attaches itself
|
|||
|
to another program on your computer such as your word processor. When
|
|||
|
you next fire up your word processor, the virus will execute first
|
|||
|
because it has placed an instruction at the beginning of your program.
|
|||
|
There are many more primitive forms of viruses which don't bother
|
|||
|
preserving the integrity of your original program. When they are
|
|||
|
executed the first time, they go out and search for another program
|
|||
|
and they just write themselves down on top of it. They don't care
|
|||
|
about preserving the functionality of the program that they've found.
|
|||
|
They essentially just destroy the portion that they have taken up
|
|||
|
residence in, and then the next time you would execute your word
|
|||
|
processor, it has been infected by this virus, called an overwriting
|
|||
|
virus. The virus will then execute again and then look for another
|
|||
|
program and your word processor won't execute because it's been
|
|||
|
destroyed. You will get a cryptic error message which generally is
|
|||
|
generated by the virus.
|
|||
|
|
|||
|
GA: Oops!
|
|||
|
|
|||
|
UK: Oops, usually there is an oops message in there. This is something
|
|||
|
people notice right away. Oh, it's not working. Occasionally, some
|
|||
|
virus programmers get a little more clever and put a little message in
|
|||
|
the virus so the virus when it's done finding other programs to infect
|
|||
|
prints a message to the screen that says out of memory or some other
|
|||
|
DOS error message.
|
|||
|
|
|||
|
GA: Any particular reason you chose the handle Urnst Kouch?
|
|||
|
|
|||
|
UK: No. (Laughs) Just a name.
|
|||
|
|
|||
|
GA: So in other words, it is not someone's name from history or
|
|||
|
anything?
|
|||
|
|
|||
|
UK: No. I got tired of seeing the same names. I've seen so many Count
|
|||
|
Zeros and Kilgore Trouts.
|
|||
|
|
|||
|
GA: So it was an attempt to be unusual?
|
|||
|
|
|||
|
UK: I don't know if it was an attempt to be unusual. It was just a
|
|||
|
name that popped into my head. If you really want to know where it
|
|||
|
came from, there used to be a jeans or a sneakers commercial. It said
|
|||
|
life is short so play hard, so I just thought, oh well, there's a
|
|||
|
great commercial, change it to what most Americans wish it would be,
|
|||
|
life is short, lay on the couch. So, that's how the Kouch came about.
|
|||
|
Now I needed something to go in front of that. I thought Kouch
|
|||
|
sounded vaguely dramatic. Urnst is kind of German. That's where it
|
|||
|
came from, just a name. People could almost think that it's a real
|
|||
|
name, normally. Stretching.
|
|||
|
|
|||
|
GA: What demographics about yourself can you share with our readers?
|
|||
|
|
|||
|
UK: I'm about 35. I have a Ph.D. in chemistry.
|
|||
|
|
|||
|
GA: How did you personally get interested in viruses?
|
|||
|
|
|||
|
UK: Well, part of it came out of 1992 when the general media began
|
|||
|
covering Michelangelo in such a hysterical panic. I smelled a rat.
|
|||
|
This seemed absurd so, knowing something about computers, I started
|
|||
|
researching. I eventually wound up writing on it. During my course of
|
|||
|
research I wanted to dig up some viruses so that I could have a look
|
|||
|
see for myself and, of course, the people in the anti-virus
|
|||
|
communities did not turn out to be very forthcoming when I asked for a
|
|||
|
few samples of viruses.
|
|||
|
|
|||
|
GA: They don't even seem to want to answer theoretical questions.
|
|||
|
|
|||
|
UK: No, they don't even like to do that. So I just went out and
|
|||
|
assumed that there was probably a lot of virus code lying around in
|
|||
|
underground channels. And this was the case. This leads to a kind of
|
|||
|
leveraging effect whereby once you accumulate certain things and start
|
|||
|
talking about them, then the more respected avenues begin to open up
|
|||
|
for you and the anti-virus researchers take you seriously which is
|
|||
|
kind of hypocritical, but it's the way things are. To get access to
|
|||
|
some of the virus archives on underground sites, you have to come up
|
|||
|
with an original virus that they don't already have. You can either go
|
|||
|
out and try and find one, which isn't that hard, or you can write one
|
|||
|
yourself and upload it. So that's what I did. It's not hard to write a
|
|||
|
virus, and I somehow found a copy of the Mutation Engine which I
|
|||
|
thought was interesting.
|
|||
|
|
|||
|
GA: You should explain what that is, especially for people who don't
|
|||
|
own computers.
|
|||
|
|
|||
|
UK: The Mutation Engine was briefly mentioned around the time of
|
|||
|
Michelangelo as a product by a Bulgarian programmer known as The Dark
|
|||
|
Avenger. He's famous in the virus community, well-known to anti-virus
|
|||
|
people too. He's written a series of viruses which have found their
|
|||
|
way into the West and he's known for trying to make challenging codes.
|
|||
|
I guess that would be the best way to express it. Then last year he
|
|||
|
uploaded something called Mutation Engine which was a segment of code
|
|||
|
which provided any virus that included it with variable encryption.
|
|||
|
Now when I am saying variable encryption, some viruses use encryption.
|
|||
|
All encryption does is when the virus is done doing it's thing,
|
|||
|
finding a file to infect, it will copy itself into that file at this
|
|||
|
point, and will encrypt its instructions so that it looks like a hunk
|
|||
|
of nonsense attached to the end of the file. The only part of the
|
|||
|
virus that remains constant is the decryptor which the encryption
|
|||
|
routine adds. The decryptor is the portion that the virus needs to
|
|||
|
ungarble all the instructions.
|
|||
|
|
|||
|
When the infected file is executed, the decryptor is the first thing
|
|||
|
to begin to work in it. Now, if you hide suspicious messages in your
|
|||
|
virus, when someone is looking at a suspected infected program under a
|
|||
|
file viewer which are pretty common tools in utility programs, you
|
|||
|
don't want a dead giveaway like, "Ha, Ha, I've got you or f--- you
|
|||
|
lamer," sorry for my French but we will be blunt. That's what's in a
|
|||
|
lot of stupidly written viruses. And so a simple encryption routine
|
|||
|
allows you to hide those kinds of things.
|
|||
|
|
|||
|
How the Mutation Engine differs is that it provides variable
|
|||
|
decryption that has a complex mechanism in which it changes the scheme
|
|||
|
of encryption so every time the virus copies itself it adds a
|
|||
|
different decryptor on a random basis. The decryptor will change the
|
|||
|
content of its instructions; it could change in size, this makes
|
|||
|
finding a constant set of instructions impossible because it's
|
|||
|
constant. It is a very sophisticated piece of programming and in
|
|||
|
comparison to the viruses that it's used in, it is much larger: about
|
|||
|
2,000 bytes in size, where most viruses are about 200 or 300 bytes in
|
|||
|
size. Mutation Engine viruses benefit from this variable encryption
|
|||
|
since scanners, at the time of its release, could not detect viruses
|
|||
|
using it. Some still do have some difficulty doing that because a
|
|||
|
whole different approach to virus scanning had to be programmed into
|
|||
|
the utilities that the manufacturers were making. Now they had to be
|
|||
|
able to disassemble the infected file, looking for sets of
|
|||
|
instructions, characteristic of the decryptor that the Mutation Engine
|
|||
|
used. Without getting too technical, you can use statistical methods
|
|||
|
to do this. If you load it into a symbolic debugger and step through
|
|||
|
it, you can see that the decryptor follows a pattern. It always
|
|||
|
changes every generation, but there is always a constant pattern going
|
|||
|
on there.
|
|||
|
|
|||
|
Good programmers can see this and program that into their software so
|
|||
|
that the pattern characteristic of the Mutation Engine code can be
|
|||
|
flagged. Then we know that the Mutation Engine is there. It was blown
|
|||
|
out of proportion because it has a sexy name. The significance I think
|
|||
|
of the Mutation Engine is the inspiration it has provided for virus
|
|||
|
programmers worldwide.
|
|||
|
|
|||
|
GA: So, basically, you have been involved and interested in this for
|
|||
|
about a year?
|
|||
|
|
|||
|
UK: Yeah. To get access to virus libraries you had to upload an
|
|||
|
original virus and the first one that I came up with was Crypt Lab
|
|||
|
virus which was a hack. I uploaded it to a couple of virus exchange
|
|||
|
BBSs in this country and then got access to their virus libraries.
|
|||
|
From there it is simple to start building. My library just kind of
|
|||
|
snowballed. It's a mistake to think that virus exchanges are a threat
|
|||
|
and run by geniuses. That's just not always the case, although some
|
|||
|
are.
|
|||
|
|
|||
|
GA: How would you define your role presently in the virus world?
|
|||
|
|
|||
|
UK: Just someone who publishes them in an electronic newsletter which
|
|||
|
looks at the virus community just as it would look at the anti-virus
|
|||
|
community. There are no other publications that just look at both
|
|||
|
sides of the coin rather squarely, provide real technical as well as
|
|||
|
general information. It covers a broad spectrum of the computer
|
|||
|
reading audience. Someone who is almost completely computer
|
|||
|
illiterate can at least recognize some things in the Crypt Newsletter,
|
|||
|
but not everything. That's it. As a functional part of that I have
|
|||
|
to continue to provide semi-interesting code samples that actually
|
|||
|
work as well as other things. I think it gets boring really, really
|
|||
|
fast, if you're just in the processor pumping out viruses. That's the
|
|||
|
hard part. The interesting part for me is actually putting in the
|
|||
|
other things: the analysis, the news, the commentary and that kind of
|
|||
|
stuff.
|
|||
|
|
|||
|
GA: Do you want to mention that you are running a BBS (computer
|
|||
|
bulletin board)?
|
|||
|
|
|||
|
UK: Yeah, sure. Call anytime. It exists for people to come and get the
|
|||
|
Crypt Newsletter if they are interested in finding it without going
|
|||
|
through the usual hassles of underground channels like the cool, elite
|
|||
|
bulletin board systems. The underground world has become very
|
|||
|
exclusive. In a sense it is cliquey, and if you are not associated
|
|||
|
with the right people you don't get entrance. It seems to be totally
|
|||
|
opposite of what the computer underground started out as, but this is
|
|||
|
what it is now. So if you don't want to go to your local pirate BBS
|
|||
|
where they stock it, and get through their new user voting screen
|
|||
|
whereby a like-minded bunch of buddies decide if a complete stranger
|
|||
|
that they've never heard of before should get entrance to this
|
|||
|
exclusive domain; if you don't want to put up with that fuss or have
|
|||
|
to come up with some virus before you get it; on my BBS, you just get
|
|||
|
it. Which is how you should get it everywhere, but I can't control
|
|||
|
that, I can't care about it that much. You don't have to be cool to
|
|||
|
get it.
|
|||
|
|
|||
|
GA: What skills are required to write a virus?
|
|||
|
|
|||
|
UK: Almost none. It's a myth that you have to be a programming genius
|
|||
|
to write a virus at this point. That may have been true when the idea
|
|||
|
was novel. It certainly hasn't been true for the last two or three
|
|||
|
years. There's so much source code lying about that anyone with a
|
|||
|
passing knowledge of the computer and a little bit of determination, a
|
|||
|
desire to do it, can take a stab at hacking an existing virus. This is
|
|||
|
rather common when coming up with an original virus which can be
|
|||
|
cobbled together with segments of or ideas from others. Writing one
|
|||
|
from scratch is the hardest way to do it.
|
|||
|
|
|||
|
GA: Aren't they all written in programming languages?
|
|||
|
|
|||
|
UK: Assembly mostly. By far most viruses are written in assembly
|
|||
|
language.
|
|||
|
|
|||
|
GA: So you have to understand what assembly language is?
|
|||
|
|
|||
|
UK: Yes, you have to know assembly language, be able to recognize
|
|||
|
assembly language code and have a general understanding of what
|
|||
|
assembly language instructions do. You have to be able to recognize
|
|||
|
within a sample of code what the instructions are doing, so that you
|
|||
|
can follow the virus. In that sense you do have to immerse yourself
|
|||
|
in assembly language coding. But it's not as hard as one would
|
|||
|
believe. There are good books, and there's plenty of virus source code
|
|||
|
around, so with books in hand and looking at virus code in a dedicated
|
|||
|
fashion, you can get the hang of what is going on rather quickly.
|
|||
|
Viruses all share a commonality, there's just not a lot of variability
|
|||
|
there in terms of what they do.
|
|||
|
|
|||
|
Some people write viruses in higher languages like C or Pascal. Those
|
|||
|
are few and far between because it is difficult to make the virus
|
|||
|
agile enough in those languages for them to function efficiently on a
|
|||
|
machine. A virus has to be small and quick to do the best job. It is
|
|||
|
difficult to do that with languages like C and Pascal simply because
|
|||
|
there is a great deal of overhead involved in the languages when they
|
|||
|
are compiled. If you look at a program that is written in C to do a
|
|||
|
certain function on a computer and then you look at a program that is
|
|||
|
written in assembly, the assembly program would be much, much smaller
|
|||
|
than the program written in C. C is conversely a language that is
|
|||
|
easier for people to understand because it is closer to English.
|
|||
|
Whereas assembly language just has a bunch of, at first, what would
|
|||
|
appear cryptic instructions.
|
|||
|
|
|||
|
GA: But it is basically the type thing that anybody with a degree in
|
|||
|
computer science can do?
|
|||
|
|
|||
|
UK: Oh, I would think so, certainly. I don't even think you need a
|
|||
|
degree in computer science. I think fifteen year old kids who are
|
|||
|
really into computers can write viruses.
|
|||
|
|
|||
|
GA: And I bet they do.
|
|||
|
|
|||
|
UK: I'm sure they do.
|
|||
|
|
|||
|
GA: So how many viruses have you made and which ones are they?
|
|||
|
|
|||
|
UK: I don't know all of them. Well, there was the Encroacher. That was
|
|||
|
in one of the Newsletters. That was a Mutation virus that attacks
|
|||
|
Central Point Software's anti-virus program. There might have been
|
|||
|
three variants to that. There was the Insufficient virus which is
|
|||
|
another Mutation Engine companion virus. You know what a companion
|
|||
|
virus is?
|
|||
|
|
|||
|
GA: No.
|
|||
|
|
|||
|
UK: Most viruses function by attaching, we are talking about file
|
|||
|
infecting viruses purely here, and most of them attach themselves to
|
|||
|
those files. Companion viruses are spawning viruses. A spawning virus
|
|||
|
or a companion virus will look for a program on your computer that is
|
|||
|
an .EXE and it will make a duplicate of itself. Then it will rename
|
|||
|
itself as that program except the extension will be .COM. Because of
|
|||
|
the rules of DOS, when you call a certain program which might be your
|
|||
|
word processor or something like that, DOS will execute a .COM file
|
|||
|
before it will execute an .EXE file. Well, the virus just simply
|
|||
|
renamed itself, made a copy of itself, renamed as your word processor.
|
|||
|
The virus will execute first and then it will hand off to the word
|
|||
|
processor program or the infected target program, and things will
|
|||
|
function normally and the virus will, if it is a direct acting run
|
|||
|
time virus, it will go off and search for another program to infect.
|
|||
|
If it is a resident virus it will now be installed in memory and it
|
|||
|
won't have actually changed the infected file at all, so anti-virus
|
|||
|
software that checks for changes made in files won't detect a
|
|||
|
companion virus unless it is smart enough to look for identical file
|
|||
|
names. Very few anti-virus software programs do that.
|
|||
|
|
|||
|
GA: Certainly when you wrote that one, they probably didn't!
|
|||
|
|
|||
|
UK: I believe they still don't. Companion virus infections can be
|
|||
|
easily removed and the machine restored to total health, simply by
|
|||
|
looking for all the small .COM file duplicates that reside next to .EXE's
|
|||
|
and deleting them. The virus creates these files as hidden
|
|||
|
system read only files. So if you do a simple directory, uneducated
|
|||
|
people won't see them. They are going to be hidden like the system
|
|||
|
files in your root directory. You won't see them when you do a
|
|||
|
directory search. You have to change the attributes on them to see
|
|||
|
them so that they are not hidden and read only, or else you have to
|
|||
|
have some kind of file manager like X-Tree or PC Tools that
|
|||
|
automatically lets you see even the hidden files on your system. It is
|
|||
|
a minor annoyance but it does a little bit of stealthiness there.
|
|||
|
Almost all companion viruses create themselves hidden files.
|
|||
|
Eventually some people start to notice because they start losing disk
|
|||
|
space, the disk is filling up with hidden files which are the virus.
|
|||
|
|
|||
|
GA: Then there was the Crypt Lab virus, right?
|
|||
|
|
|||
|
UK: Yeah.
|
|||
|
|
|||
|
GA: And that was recently mentioned in Discover magazine?
|
|||
|
|
|||
|
UK: Yes, that was at the end of the article. I got the Virus Creation
|
|||
|
Laboratory, and I spent a lot of time going through it and creating
|
|||
|
some variants to that just to see what it could do. One of those was
|
|||
|
Diarrhea.
|
|||
|
|
|||
|
Anyway, if you execute the virus, there are three forms to that virus.
|
|||
|
One will infect all files until it can't find anymore files to infect.
|
|||
|
It will put on a display that says, "Eat My Diarrhea," which I think
|
|||
|
it is one of his favorite phrases. Another variant of the virus goes
|
|||
|
about doing it's business and while it is infecting other files, it
|
|||
|
drops a small program onto files. That does not infect. This destroys
|
|||
|
those programs, essentially creating what I call zombies. The zombies
|
|||
|
merely display the neon "Eat My Diarrhea - GG Allin and the Texas
|
|||
|
Nazis," in neon color. As soon as you run one of those things you know
|
|||
|
you've been the victim of a prank or something like that. So that's
|
|||
|
what the Diarrhea viruses do. They are created with the Virus Creation
|
|||
|
Laboratory.
|
|||
|
|
|||
|
And then there was another virus creation type tool that's been
|
|||
|
produced by the members of Phalcon/Skism virus programming group.
|
|||
|
There was the virus I made using code from the Virus Creation
|
|||
|
Laboratory and the Phalcon/Skism Mass Production Coder I think it's
|
|||
|
called. That was called the Mimic virus. And the Mimic virus came in a
|
|||
|
couple of flavors. It was a file infecting virus which created a mimic
|
|||
|
of the Jerusalem virus. The screen is characteristic of Jerusalem.
|
|||
|
|
|||
|
Another one I created was the Den Zuk Mimic. With the original Den
|
|||
|
Zuk, when the person does the three finger salute (hitting
|
|||
|
control-alt-delete keys at the same time) to reboot the computer, this
|
|||
|
graphic comes up on the screen and shows Den Zuk. It's kind of a nice
|
|||
|
graphic too I must admit. I like that. I put that into Den Zuk Mimic
|
|||
|
to make programs show that graphic.
|
|||
|
|
|||
|
GA: I thought there was some other virus.
|
|||
|
|
|||
|
UK: Is it recent? In a recent issue of the newsletter?
|
|||
|
|
|||
|
GA: No, I'm getting it from the VSUM listing. There were four viruses
|
|||
|
in the December 1992 issue that listed "Kouch."
|
|||
|
|
|||
|
UK: I tend to be only really familiar with the recent ones that have
|
|||
|
been published. Maybe it will come to me.
|
|||
|
|
|||
|
GA: What's so exciting about viruses and source codes?
|
|||
|
|
|||
|
UK: I like the word "interesting" more.
|
|||
|
|
|||
|
GA: Okay.
|
|||
|
|
|||
|
UK: Well, particularly interesting because of the misinformation that
|
|||
|
goes around concerning the viruses. There's a great deal of it.
|
|||
|
There's a great deal of mystery that shrouds. I don't think there's a
|
|||
|
lot of mystery associated with viruses. Viruses, in my opinion, are
|
|||
|
rather trivial programs that, once you're thoroughly cognizant of what
|
|||
|
a virus can and can't do, become more like a pest if you ever run into
|
|||
|
one. You should be able to get rid of it rather quickly in your
|
|||
|
machine. And it might interest you to know that one of the anti-virus
|
|||
|
software programs in its own virus database in that program displays
|
|||
|
the severity of damage that viruses can do. Fully 95 percent of the
|
|||
|
viruses listed in that database, are characterized as trivial. It
|
|||
|
takes three minutes to reset the machine to proper working order. And
|
|||
|
that's fairly accurate, I think, and that's not something that's
|
|||
|
common knowledge. People think it's a major catastrophe when they are
|
|||
|
hit by a virus. I do not take seriously claims of people being set
|
|||
|
back for hours. If they are completely ignorant of a virus, yes. But
|
|||
|
someone in the department or in the household knows about viruses. No,
|
|||
|
that's just an exaggeration. So viruses are interesting to me because
|
|||
|
of that. Because of the great variations in opinions that surround
|
|||
|
them.
|
|||
|
|
|||
|
GA: And also the myths.
|
|||
|
|
|||
|
UK: The myths on them and the controversies associated with a virus.
|
|||
|
When anyone speaks up about viruses.
|
|||
|
|
|||
|
GA: That's becoming very interesting to me.
|
|||
|
|
|||
|
UK: Politically incorrect terms. There's always been a great deal of
|
|||
|
controversy surrounding this. And so for this reason alone, viruses to
|
|||
|
me are interesting. For example, on Prodigy it is okay for dozens of
|
|||
|
people to advertise adult bulletin boards, with gigs of pornographic
|
|||
|
files available for download. These are not expunged from the Prodigy
|
|||
|
computer club as inappropriate. However, if anyone posted a note on
|
|||
|
Prodigy saying they want to find a virus, can someone help them locate
|
|||
|
a virus, that is immediately spiked. Why is that? I'm not sure. But
|
|||
|
it's interesting.
|
|||
|
|
|||
|
GA: I've had a lot of trouble getting in touch with the Virus-L
|
|||
|
Newsletter from the WELL.
|
|||
|
|
|||
|
UK: The Virus-L publication is pretty much dogma. I've seen it a lot,
|
|||
|
I've never thought very highly of it. There are bright people that
|
|||
|
contribute to it. It is not particularly useful.
|
|||
|
|
|||
|
GA: Well, it is a major place that people who don't know anything
|
|||
|
about viruses go to turn to when they think they've been hit.
|
|||
|
|
|||
|
UK: Well, they won't find out a lot from that publication. (Laughs)
|
|||
|
People only talk about viruses in general terms.
|
|||
|
|
|||
|
GA: I asked several people to contribute questions. The number one
|
|||
|
question people had for you was what gratification or satisfaction do
|
|||
|
you get from this?
|
|||
|
|
|||
|
UK: Well, I enjoy publishing the Crypt Newsletter. It's a challenge to
|
|||
|
make it interesting to a lot of different people and I enjoy the
|
|||
|
response that comes in. Some of the people that I've met through it
|
|||
|
have been rewarding. I don't meet a lot of stumps. I wouldn't continue
|
|||
|
to do it if there was absolutely no response and people didn't show
|
|||
|
some curiosity and the desire to see more of it. I want to give them
|
|||
|
more for their trouble, so that makes it an evolving thing. You want
|
|||
|
to see if you can top yourself and make it more interesting. There is
|
|||
|
a great need for this kind of look at viruses. I don't think you can
|
|||
|
get that from Virus-L to be quite honest with you.
|
|||
|
|
|||
|
GA: Or from anything else.
|
|||
|
|
|||
|
UK: You'll get it from some other underground publications, of course.
|
|||
|
They are hard to find. Some people are turned off by the smoke and
|
|||
|
brimstone they come packaged with. My newsletter is a little bit
|
|||
|
different than trying to be so blatantly sociopathic. And I'm sure
|
|||
|
there are people who read it and think that I am a sociopath. I don't
|
|||
|
think I am, I think that's clear in the newsletter.
|
|||
|
|
|||
|
GA: I think most people who think you are a sociopath wouldn't read
|
|||
|
it.
|
|||
|
|
|||
|
UK: Probably. They would read it once and then toss it. I really like
|
|||
|
the work of Mark Ludwig. The Little Black Book of Computer Viruses, to
|
|||
|
me, was extremely interesting. It was the first book that I was able
|
|||
|
to get ahold of on computer viruses that had any good information in
|
|||
|
it and he's continued to do that kind of thing.
|
|||
|
|
|||
|
GA: Right, he has a new edition coming out and a newsletter which
|
|||
|
prints virus code.
|
|||
|
|
|||
|
UK: And, so, why is that interesting? Well, he explains why viruses
|
|||
|
are interesting for a number of reasons. Part of it because of the
|
|||
|
controversy that the concepts brings up. In a way, I think studying
|
|||
|
viruses gives you a good understanding of the computer on a really low
|
|||
|
level basis, and that's worthwhile. For some people that makes the
|
|||
|
computer much more enjoyable as they start to unlock some of its
|
|||
|
secrets or understand what is actually going on inside it a little
|
|||
|
better. Viruses are kind of an indirect way of getting at that
|
|||
|
information. Maybe you're bored in your computer class listening to
|
|||
|
the dogma of understanding the operating system of the PC, but maybe
|
|||
|
you are interested in computer viruses because you like the concept
|
|||
|
associated with practical jokes and want to start to look at computer
|
|||
|
viruses a little more. You become more curious, it becomes more
|
|||
|
involved and now you are starting to get a better grasp of what
|
|||
|
someone is trying to teach you in the computer course at the same
|
|||
|
time. It is an indirect method, it's not an obvious way, but I think
|
|||
|
that it does happen.
|
|||
|
|
|||
|
GA: Nowhere Man.
|
|||
|
|
|||
|
UK: Nowhere Man. He's an interesting individual. He spends a lot of
|
|||
|
time programming different things.
|
|||
|
|
|||
|
GA: So basically there is a social aspect to this too.
|
|||
|
|
|||
|
UK: Yeah, yeah. Talking to different people around the country,
|
|||
|
through the computer and meeting different people, getting their
|
|||
|
ideas. They're interesting people.
|
|||
|
|
|||
|
GA: How much of your time does this take up in an average week?
|
|||
|
|
|||
|
UK: It depends. I tend to do a lot of it late at night. I think it's
|
|||
|
hard to say. Right now I'm spending more time on the BBS than I have
|
|||
|
on the Crypt Newsletter.
|
|||
|
|
|||
|
GA: And regardless of what the BBS was about there's just maintenance
|
|||
|
that takes time every week.
|
|||
|
|
|||
|
UK: Yeah. I'm uncomfortable with quantifying things, so, as much time
|
|||
|
as it takes to do it right.
|
|||
|
|
|||
|
GA: About how many groups are there in the virus world? Active and
|
|||
|
inactive.
|
|||
|
|
|||
|
UK: There's Phalcon/SKISM, NuKe, there's YAM. There was Rabid. They
|
|||
|
supposedly disbanded, but I got a virus the other day that said Rabid
|
|||
|
lives again, so maybe they do. The virus doesn't work. (Laughs) You
|
|||
|
know what I mean. It's hard for me to tell. There was a British group
|
|||
|
called ARCV. The Association of Really Cruel Viruses, that's what it's
|
|||
|
called. And they pumped out a bunch of viruses over the summer and the
|
|||
|
fall. Their leader was busted by the authorities in England for a
|
|||
|
phone fraud related kind of thing. So I have no idea of what the
|
|||
|
status of that is. They certainly made quite a few viruses. They have
|
|||
|
one resident virus that they subsequently modified quite a bit and
|
|||
|
they have a model of a direct action virus which they've also
|
|||
|
modified.
|
|||
|
|
|||
|
GA: So about a half a dozen groups more or less?
|
|||
|
|
|||
|
UK: Yeah, but I'm sure there are smaller groups that I haven't
|
|||
|
mentioned here.
|
|||
|
|
|||
|
GA: And individuals?
|
|||
|
|
|||
|
UK: And individuals. I think that the lone virus programmers are
|
|||
|
actually more common than the groups because the groups are never as
|
|||
|
monolithic or as united in anything as they're portrayed. They are
|
|||
|
just a couple of individuals who have a loose association with each
|
|||
|
other. Like NuKe. One of the members of NuKe, Rock Steady, is French
|
|||
|
Canadian. Nowhere Man is from the Midwest. They may talk a lot but
|
|||
|
obviously they are separated by geographic locations. So how tight can
|
|||
|
that organization be? And then NuKe has a division in Australia and
|
|||
|
some people there who run the BBSs and do virus programming in
|
|||
|
Australia. There's a Scandinavian group, I forgot about them, called
|
|||
|
Demoralized Youth who apparently created the Hitler virus which I
|
|||
|
included in the Crypt Newsletter. And they produced things like the
|
|||
|
PC Byte Bandit which you see on a lot of bulletin boards.
|
|||
|
|
|||
|
GA: Do such groups exist for other computer types like Mac, and Atari?
|
|||
|
|
|||
|
UK: Well, that's a good question. I know there are a lot of Commodore
|
|||
|
viruses but I don't know if they are groups or the infrastructure is
|
|||
|
quite the same. As for Mac, I would think probably not because you
|
|||
|
know there aren't many Macintosh viruses.
|
|||
|
|
|||
|
GA: Are any of those differences between the computer types worth
|
|||
|
noting? Like is there a reason why there are fewer Mac viruses, does
|
|||
|
it have something to do with their operating system?
|
|||
|
|
|||
|
UK: Yeah, the operating system on a Macintosh is less open, for the
|
|||
|
simplest explanation, than the IBM PC, therefore fewer people are
|
|||
|
writing programs that will operate as viruses will on it. It's a more
|
|||
|
cryptic system shall we say.
|
|||
|
|
|||
|
GA: Do some of these groups that you are aware of try to make money or
|
|||
|
is all this being done for free?
|
|||
|
|
|||
|
UK: Well, Aristotle is the sysop of the Black Axis Virus Exchange.
|
|||
|
He's the fellow who informally put together, who is formally the head
|
|||
|
of what is known as the Vx, like in Rx. It's a loose network of virus
|
|||
|
exchanges around this country, about twenty, maybe a little less than
|
|||
|
that now. He has a really large collection of viruses, something like
|
|||
|
over 2,500. 600 samples of source codes, there's lots of duplications
|
|||
|
in there, so he's packaged it up rather neatly and gotten the word out
|
|||
|
in almost formal advertisements that he will sell his collection for a
|
|||
|
lump sum. I forget what it is. Somewhere between $100-250 dollars. He
|
|||
|
tells me he's gotten 40 takers. So there you have someone who is
|
|||
|
trying to sell the viruses for money. I've seen advertisements to
|
|||
|
this effect on other virus exchange bulletin board systems. Others
|
|||
|
would like to sell their virus collections, depending on what the
|
|||
|
market will bear, I guess.
|
|||
|
|
|||
|
GA: How big would you estimate that the virus community is? Can you
|
|||
|
estimate the total number of virus exchange boards or the total number
|
|||
|
of users?
|
|||
|
|
|||
|
UK: I can't identify the number of users. I can make a rough estimate
|
|||
|
of the virus exchange boards. At least 20.
|
|||
|
|
|||
|
GA: In the whole world?
|
|||
|
|
|||
|
UK: No, in this country. What do you mean by virus exchange? We've got
|
|||
|
to set some rules here. Let's count all the ones that specialize in
|
|||
|
this, that have collections of over 1,000 viruses. I'd say at least 20
|
|||
|
BBSs.
|
|||
|
|
|||
|
....................
|
|||
|
|
|||
|
GA: My interest in this comes from the Michelangelo scare, which of
|
|||
|
course we are taking in retrospect with a grain of salt, but they
|
|||
|
reported that the people in other countries such as India or wherever,
|
|||
|
had so little access to U.S. anti-virus programming. In some of those
|
|||
|
countries they don't sell anything legally to remove viruses. So if
|
|||
|
they were hit by something, they don't even know where to go to get
|
|||
|
something that will clear it up.
|
|||
|
|
|||
|
UK: You don't need anti-virus software to get rid of something like
|
|||
|
Michelangelo or Stoned. You can do it with undocumented commands. If
|
|||
|
you've talked to someone who does know something about viruses, and
|
|||
|
you didn't have anti-virus software, you could use that and dispatch
|
|||
|
something like Michelangelo and Stoned rather quickly.
|
|||
|
|
|||
|
GA: So you think the reports about problems in other countries are
|
|||
|
over exaggerated?
|
|||
|
|
|||
|
UK: Well, there's an article which analyzes the media coverage of
|
|||
|
|
|||
|
....................
|
|||
|
|
|||
|
Michelangelo and I think that really puts it into perspective. It
|
|||
|
really shows the people that tried to actually come up with hard data
|
|||
|
after March 6. They just weren't able to come up with anything that I
|
|||
|
consider serious data. I remember them coming up with things like
|
|||
|
South Africa was reportedly hard hit. Says who? You know what I mean.
|
|||
|
You know how journalists work. They get on the telephone for like five
|
|||
|
minutes with someone in South Africa and the guy says we've been hit
|
|||
|
by a thousand. How does he know? And there was one that was even
|
|||
|
funnier. I think it was some military computer in Uruguay or Paraguay.
|
|||
|
|
|||
|
The virus does exist but I just don't think that it was common. I got
|
|||
|
one call from some kid and he's concerned he might have that virus
|
|||
|
because he's had floppy disks that are dying right and left on him.
|
|||
|
Well, I said, "Do you have any anti-virus software?" I'm trying to
|
|||
|
help him over the phone. He says "No." I said, "Do you use bulletin
|
|||
|
board systems?" He says "Yes." "Alright, what you want to do is call
|
|||
|
up one of these and get some anti-virus program and download it and
|
|||
|
copy it immediately to a right-protected floppy disk. Without doing
|
|||
|
anything else and once you've got it on there, execute it until it is
|
|||
|
all laid out on a diskette for you and then write protect that and
|
|||
|
then put it in your floppy drive and scan your hard drive." So that's
|
|||
|
what he did and he found out he had the Disk Killer virus, completely
|
|||
|
a bird of a different feather. Actually, it is more annoying. It is a
|
|||
|
boot sector infector like Michelangelo but once you discover it, you
|
|||
|
usually don't have much time left before it activates. It has a very
|
|||
|
short activation period after it has been first placed on a disk and
|
|||
|
then it encrypts the information on a disk which essentially makes it
|
|||
|
useless to you. So he removed it, but it wasn't Michelangelo, he had a
|
|||
|
different virus. So where were all the Michelangelo infections? Were
|
|||
|
there any? I think it was vastly overstated.
|
|||
|
|
|||
|
....................
|
|||
|
|
|||
|
GA: You mentioned before that people who work for software
|
|||
|
corporations write viruses.
|
|||
|
|
|||
|
UK: And they program viruses or collect. There just doesn't seem to be
|
|||
|
any motivation to them other than that they are what I call stamp
|
|||
|
collectors. They just like to have a large collection of viruses, like
|
|||
|
people have large collections of baseball cards. That's a big thing,
|
|||
|
baseball card collecting. Why do people want a huge collection of
|
|||
|
baseball cards? I don't know. But I have a large collection of
|
|||
|
viruses. So, there's that collecting thing and that's not the same
|
|||
|
motivation as other people who write viruses. And then there's a
|
|||
|
mischief maker, a hell raiser, an angry young man kind of guy. He
|
|||
|
wants to put his mark on the world and have revenge on his school or
|
|||
|
something like that and maybe he's going to write a virus. I just
|
|||
|
don't think that there's any common denominator. Trying to write it
|
|||
|
off to one segment of the population is idiotic. Quite frankly, you
|
|||
|
can talk about different segments of virus programmers. To judge them
|
|||
|
all based upon one set of rules, disgruntled and angry at the world,
|
|||
|
is just absurd.
|
|||
|
|
|||
|
GA: The media does portray that whole image at the Bulgarian virus
|
|||
|
factories.
|
|||
|
|
|||
|
UK: Another sexy story.
|
|||
|
|
|||
|
GA: Why Bulgaria? You are basically saying it's lots of other places
|
|||
|
too and that's just a myth?
|
|||
|
|
|||
|
UK: Well, there are a lot of viruses that came out of Bulgaria. You
|
|||
|
can't discount that fact. There were Bulgarian virus programmers and
|
|||
|
there is The Dark Avenger and you don't want to minimize that, but
|
|||
|
that's not the whole spectrum of it. Maybe they are more serious and
|
|||
|
dedicated or they were for a time. But, no, Germany has virus writers,
|
|||
|
Poland has virus writers.
|
|||
|
|
|||
|
GA: Right, Canada.
|
|||
|
|
|||
|
UK: There are callers to my BBS from Lisbon, South Africa, Canada. I
|
|||
|
would assume anywhere there are computers, there are virus
|
|||
|
programmers.
|
|||
|
|
|||
|
GA: And any place there are disks, there are collectors.
|
|||
|
|
|||
|
UK: That's right. I mean Scandinavia, India, Thailand have virus
|
|||
|
programmers. I would be hard pressed to think of a place that doesn't.
|
|||
|
|
|||
|
....................
|
|||
|
|
|||
|
GA: We kind of touched on this before, but how can people best protect
|
|||
|
themselves from viruses?
|
|||
|
|
|||
|
UK: I would say that since virus code and viruses are going to be with
|
|||
|
us just as long as computers are going to be with us and if you are
|
|||
|
really concerned about it, then you should try to find out some of the
|
|||
|
basics of virus behavior so you can rule out a lot of things that
|
|||
|
aren't going to affect you. You've got to know that a virus is
|
|||
|
dependent upon an executable program to spread on your machine. You
|
|||
|
must execute it first. Knowing that, any executable program that comes
|
|||
|
into your machine then becomes, if we are not talking about boot
|
|||
|
sector infectors here, a possible virus candidate and I would just say
|
|||
|
that you should get a perfunctory anti-virus scanner. Find the
|
|||
|
cheapest one you can. A lot of companies are now letting the scanner
|
|||
|
portion of their software go for free. Don't get a lousy scanner. You
|
|||
|
are going to have to do some reading. I can't make it easy for you.
|
|||
|
I'm not going to make product recommendations, obviously, but you can
|
|||
|
get some for extremely cheap if not free.
|
|||
|
|
|||
|
GA: So you recommend that people have something?
|
|||
|
|
|||
|
UK: Yeah, at this point. If you want the least amount of work
|
|||
|
involved, get a cheap scanner or an almost free scanner if you can,
|
|||
|
and by doing a little reading you will find out what the best product
|
|||
|
is. You are just going to have to go a little deeper than the glossy
|
|||
|
magazines. Be a good consumer, okay. The chances that you are going to
|
|||
|
come across a very clever and totally new virus which is going to
|
|||
|
become resident upon your machine and stay invisible for a long period
|
|||
|
of time, are exceedingly rare, and I just don't think that you should
|
|||
|
concern yourself with that. I have just never been victimized by
|
|||
|
anything. I'm more educated so I don't worry about it. I take some
|
|||
|
precaution but nothing like some. So get yourself a cheap scanner if
|
|||
|
you feel you must have something, and as you go along in your
|
|||
|
computing, try to get a good idea of what viruses do. Ignore the hype
|
|||
|
associated with them. Most viruses are not 100% transparent. They will
|
|||
|
misbehave in a manner that is repeatable. So if you have something on
|
|||
|
your machine that's going wrong and it seems to be random, it's
|
|||
|
probably not a virus because viruses are made out of discreet
|
|||
|
instructions, and they are going to do the same thing. The problem
|
|||
|
will repeat itself. So either you have buggy software that is
|
|||
|
repeating the same bug or you could have a virus.
|
|||
|
|
|||
|
If you are going in harm's way, where you might have to worry about
|
|||
|
possibly getting a virus infection; like if you are an obsessive,
|
|||
|
compulsive downloader, if you use places or services that have a lot
|
|||
|
of public flow of disks in and out, if you buy a lot of retail
|
|||
|
software from someone that you suspect is rewrapping software that has
|
|||
|
been used in someone else's home already, there's a possibility that
|
|||
|
you could occasionally become infected, but still it's just not real
|
|||
|
common. For boot sector infectors, try to keep those diskettes from
|
|||
|
staying in the slot on the A drive at night after you turn your
|
|||
|
computer off. If you did that and then your computer starts behaving
|
|||
|
weirdly, then you might worry.
|
|||
|
|
|||
|
....................
|
|||
|
|
|||
|
GA: You also mentioned the virus that attacks Central Point's
|
|||
|
software. If you don't have Central Point that virus isn't going to do
|
|||
|
anything.
|
|||
|
|
|||
|
UK: Yeah, right, so what? And then you program to attack something
|
|||
|
that presupposes a level of technical understanding which may not be
|
|||
|
in your average disgruntled employee. You've got to have someone who
|
|||
|
has an ax to grind for a long time to think of a really finely crafted
|
|||
|
virus to destroy something. There are one or two viruses like the Dark
|
|||
|
Avenger which are extremely destructive on business systems.
|
|||
|
|
|||
|
GA: What's the scoop with the Proto-T virus?
|
|||
|
|
|||
|
UK: Oh, that's just a joke. This happens periodically on the networks,
|
|||
|
and I first noticed it on the Fidonet. Some prankster or a group of
|
|||
|
pranksters uploaded this completely bogus story about an unknown virus
|
|||
|
hidden in the archives of one of the numerous PKZip hacks and it was
|
|||
|
like science fiction, it described things which were impossible for
|
|||
|
viruses.
|
|||
|
|
|||
|
GA: Destroying the video card was one.
|
|||
|
|
|||
|
UK: That's an old one, or writing itself to video memory is completely
|
|||
|
nonsensical because the virus would crash almost immediately. Just
|
|||
|
from what I know of how people react on the networks, I knew that
|
|||
|
there would be hundreds of people beginning to think that there was
|
|||
|
some credence to it. This spread all around the world.
|
|||
|
|
|||
|
GA: Well, with Michelangelo, the news traveled. In 24 hours everybody
|
|||
|
knew about Proto-T.
|
|||
|
|
|||
|
UK: I was just about ready to publish an issue of the Crypt Newsletter
|
|||
|
so I had a generic resident virus that I was including in it. I
|
|||
|
thought I would just customize it and have Proto-T as the name. I
|
|||
|
figured that people would not read the documentation. The real story
|
|||
|
is that this was just a name. These Proto-T pranksters came up,
|
|||
|
whoever they are, with this stupid Proto-T story; we might as well
|
|||
|
give them something to go along with it. It spread, it really spread.
|
|||
|
I saw people on Prodigy, some of the hackers that show up on there,
|
|||
|
saying that they swore they had copies of source code of Proto-T from
|
|||
|
some virus programming newsletter, which means to me that they
|
|||
|
stripped the code right out of the Newsletter almost immediately, and
|
|||
|
didn't even bother to read the note that came with it. It didn't even
|
|||
|
come close to imitating fictitious achievements of the real Proto-T
|
|||
|
which were flatly impossible anyway. And it just spread all around.
|
|||
|
|
|||
|
....................
|
|||
|
|
|||
|
GA: What about YAM (Youngsters Against McAfee), the name is used
|
|||
|
against McAfee so it kind of implies...
|
|||
|
|
|||
|
UK: You ought to look at their stuff! They spelled McAfee wrong a
|
|||
|
couple of times. I don't know, I just don't know. What can I tell you.
|
|||
|
I wouldn't have chosen that name but I can understand perhaps why they
|
|||
|
might have. For a long time, the thing was to elude Scan. I noticed
|
|||
|
this early on. It was an achievement to create a virus that Scan
|
|||
|
couldn't catch. Actually it is not much of an achievement.
|
|||
|
|
|||
|
GA: No, it only lasts a month or two at most until they get a copy.
|
|||
|
|
|||
|
UK: What's the point? Why is McAfee a whipping boy? He just happens to
|
|||
|
be better at public relations than the rest of the anti-virus people.
|
|||
|
|
|||
|
GA: That's one reason, and the other reason is that because his is
|
|||
|
shareware and so many more people have it then the other ones.
|
|||
|
|
|||
|
UK: Well, it's not just shareware. There are quite a few of his
|
|||
|
products that are cross-licensed as retail software. He's got a really
|
|||
|
big stake in anti-virus software. He's also the best at dealing with
|
|||
|
the reporters like during the Michelangelo scare.
|
|||
|
|
|||
|
GA: Early viruses used to attack institutions with power, now they
|
|||
|
seem to mostly affect individuals. Do you think that's true and, if
|
|||
|
so, why the change?
|
|||
|
|
|||
|
UK: What institutions with power?
|
|||
|
|
|||
|
GA: Colleges and corporations.
|
|||
|
|
|||
|
UK: No, I think colleges are still pretty vulnerable, don't you? They
|
|||
|
are always going to have computer labs, where people can bring stuff
|
|||
|
in indiscriminately. That really hasn't changed and maybe it has
|
|||
|
moved a little more to the individuals because computers have moved
|
|||
|
more into the homes of individuals.
|
|||
|
|
|||
|
GA: That's true.
|
|||
|
|
|||
|
UK: So, before high end PCs were the domain of a small or a medium
|
|||
|
size business with one or two individuals who knew how to use them as
|
|||
|
the selected employees. Now the computer has become more of a
|
|||
|
household appliance, still not totally widespread, of course, but
|
|||
|
moving more and more into the household where people can use it as a
|
|||
|
glorified typewriter.
|
|||
|
|
|||
|
GA: Anything that you would recommend to people who would want to read
|
|||
|
more, learn more?
|
|||
|
|
|||
|
UK: I'll give them my sole plug for Mark Ludwig's book on computer
|
|||
|
viruses. It is not an evening's read. You get a lot out of that
|
|||
|
especially if you come back to it. It impresses upon you the idea of
|
|||
|
learning something about assembly language programming, which after
|
|||
|
you look at it a couple of times starts to make some sense to you
|
|||
|
whether you become an assembly language programmer or not. Probably
|
|||
|
not. Springer-Verlag has an academic text on computer viruses but it
|
|||
|
costs about $40, probably not something the average person is seeking
|
|||
|
to get a hold of.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #5.44
|
|||
|
************************************
|
|||
|
|
|||
|
|