5239 lines
183 KiB
Plaintext
5239 lines
183 KiB
Plaintext
|
Msg#: 2473 *Virus Info*
|
|||
|
08-19-90 09:46:00 (Read 11 Times)
|
|||
|
From: PATRICIA HOFFMAN
|
|||
|
To: KEN DORSHIMER
|
|||
|
Subj: RE: CRC CHECKING
|
|||
|
<KD>the deal is that the invading program would have to know how the CRC
|
|||
|
<KD>your
|
|||
|
<KD>program uses works. otherwise it would have a (bytes changed!/bytes in
|
|||
|
<KD>file!)
|
|||
|
<KD>chance of succeeding, or somewhere in that neighborhood...
|
|||
|
<KD>
|
|||
|
|
|||
|
Except in the case of Stealth Viruses....CRC checking doesn't work with them.
|
|||
|
|
|||
|
Patti
|
|||
|
|
|||
|
|
|||
|
--- msged 1.99S ZTC
|
|||
|
* Origin: Sir Dep's Dungeon 714-740-1130 Adult Links Network (1:103/158)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2474 *Virus Info*
|
|||
|
08-19-90 09:50:00 (Read 9 Times)
|
|||
|
From: PATRICIA HOFFMAN
|
|||
|
To: SHEA TISDALE
|
|||
|
Subj: FILE ECHO?
|
|||
|
<ST>Hey, what happened to connecting my system to the file echo?
|
|||
|
<ST>
|
|||
|
<ST>I have sent numerous netmail messages to you since you sent the info
|
|||
|
<ST>on setting it up and have not had a reply yet.
|
|||
|
|
|||
|
Recheck your netmail, I sent a reply after receiving the message "What is
|
|||
|
Tick?" indicating that you need to be running Tick in order to be able to
|
|||
|
participate in the file echo since that is how the files are processed and
|
|||
|
extra files go with the .zip files that carry the description. Tick is
|
|||
|
available from most SDS nodes.
|
|||
|
|
|||
|
Patti
|
|||
|
|
|||
|
|
|||
|
--- msged 1.99S ZTC
|
|||
|
* Origin: Sir Dep's Dungeon 714-740-1130 Adult Links Network (1:103/158)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2475 *Virus Info*
|
|||
|
08-16-90 11:56:00 (Read 8 Times)
|
|||
|
From: MIKE DURKIN
|
|||
|
To: WARREN ANDERSON
|
|||
|
Subj: RE: INTERNET WORM
|
|||
|
> I am interested in obtaining the list of passwords used by the
|
|||
|
> Internet worm in the US. I am the administrator of several
|
|||
|
|
|||
|
The list is in the McAfee/Haynes book ("computer viruses,
|
|||
|
worms...threats to your system") (pgs 89-91)...
|
|||
|
I'll type it in for you if you can't find the book locally...
|
|||
|
|
|||
|
Mike
|
|||
|
|
|||
|
--- RBBSMail 17.3A
|
|||
|
* Origin: The TeleSoft RBBS (RBBS 1:143/204)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2476 *Virus Info*
|
|||
|
08-19-90 14:51:00 (Read 9 Times)
|
|||
|
From: MIKE DURKIN
|
|||
|
To: JAMES DICK
|
|||
|
Subj: REPLY TO MSG# 2473 (RE: CRC CHECKING)
|
|||
|
> You might want to take a look at McAfee's FSHLD*.ZIP. This is a new
|
|||
|
> anti-virus program from the creator of SCAN that is designed
|
|||
|
> specifically for developers. It will build a 'shield' into an
|
|||
|
> application such that the application _cannot_ be infected and if it
|
|||
|
> does become infected, will remove that infection after execution but
|
|||
|
> prior to running. You will find it in the virus scanners area of many
|
|||
|
|
|||
|
Jim... this is a little mis-leading... all programs will become infected
|
|||
|
but FSHLD will remove it for most viruses.. for viruses like 4096, FSHLD
|
|||
|
won't remove or even know/announce that the file is infected...
|
|||
|
|
|||
|
When FSHLD can remove a virus, 'after execution but before running'
|
|||
|
really makes no difference since a resident virus will still go TSR and
|
|||
|
a direct action virus will still do it's infecting of other programs...
|
|||
|
|
|||
|
But all things considered... I definately agree that FSHLD is a must
|
|||
|
have...
|
|||
|
|
|||
|
Mike
|
|||
|
|
|||
|
--- RBBSMail 17.3A
|
|||
|
* Origin: The TeleSoft RBBS (RBBS 1:143/204)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2477 *Virus Info*
|
|||
|
08-20-90 04:44:00 (Read 8 Times)
|
|||
|
From: KEN DORSHIMER
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: RE: SCANV66B RELEASED
|
|||
|
|
|||
|
On 19-Aug-90 with bulging eyes and flailing arms Patricia Hoffman said:
|
|||
|
|
|||
|
<KD>>does this mean i should erase the old scanv66 that i just d/l'd from
|
|||
|
<KD>>SDN?
|
|||
|
<KD>>:-(
|
|||
|
<KD>>
|
|||
|
|
|||
|
PH> Yep, ScanV66 has a bug or two in it involving the validate codes it
|
|||
|
PH> can add to the end of files. The validate codes were not being
|
|||
|
PH> calculated correctly in
|
|||
|
PH>
|
|||
|
|
|||
|
swell. think i'll wait for the next release.
|
|||
|
ps, you have net-mail waiting. :-) BTW why on earth would anyone take time
|
|||
|
off from a disneyland vacation to call a bbs? <grin>
|
|||
|
...Your attorney is in the mail...
|
|||
|
|
|||
|
|
|||
|
--- ME2
|
|||
|
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2478 *Virus Info*
|
|||
|
08-20-90 04:46:00 (Read 9 Times)
|
|||
|
From: KEN DORSHIMER
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: REPLY TO MSG# 2476 (RE: CRC CHECKING)
|
|||
|
|
|||
|
On 19-Aug-90 with bulging eyes and flailing arms Patricia Hoffman said:
|
|||
|
|
|||
|
<KD>>the deal is that the invading program would have to know how the CRC
|
|||
|
<KD>>your
|
|||
|
<KD>>program uses works. otherwise it would have a (bytes changed!/bytes in
|
|||
|
<KD>>file!)
|
|||
|
<KD>>chance of succeeding, or somewhere in that neighborhood...
|
|||
|
<KD>>
|
|||
|
|
|||
|
PH> Except in the case of Stealth Viruses....CRC checking doesn't work
|
|||
|
PH> with them.
|
|||
|
PH>
|
|||
|
|
|||
|
i'd have to see that for myself. i think a complex enough algorithm would
|
|||
|
keep them at bay. the probability factor is just too low for such a stealth
|
|||
|
scheme to work.
|
|||
|
|
|||
|
...Your attorney is in the mail...
|
|||
|
|
|||
|
|
|||
|
--- ME2
|
|||
|
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2479 *Virus Info*
|
|||
|
08-20-90 04:50:00 (Read 9 Times)
|
|||
|
From: KEN DORSHIMER
|
|||
|
To: MIKE DURKIN
|
|||
|
Subj: REPLY TO MSG# 2478 (RE: CRC CHECKING)
|
|||
|
|
|||
|
On 19-Aug-90 with bulging eyes and flailing arms Mike Durkin said:
|
|||
|
|
|||
|
>> You might want to take a look at McAfee's FSHLD*.ZIP. This is a new
|
|||
|
>> anti-virus program from the creator of SCAN that is designed
|
|||
|
>> specifically for developers. It will build a 'shield' into an
|
|||
|
>> application such that the application _cannot_ be infected and if it
|
|||
|
>> does become infected, will remove that infection after execution but
|
|||
|
>> prior to running. You will find it in the virus scanners area of many
|
|||
|
MD> Jim... this is a little mis-leading... all programs will become
|
|||
|
MD> infected but FSHLD will remove it for most viruses.. for viruses like
|
|||
|
MD> 4096, FSHLD won't remove or even know/announce that the file is
|
|||
|
MD> infected... When FSHLD can remove a virus, 'after execution but before
|
|||
|
|
|||
|
i have some misgivings about this particular protection scheme myself. i
|
|||
|
don't like embedding someone else's stuff into my executables, partly for
|
|||
|
licensing reasons. not to knock what is probably a good idea...
|
|||
|
|
|||
|
|
|||
|
...Your attorney is in the mail...
|
|||
|
|
|||
|
|
|||
|
--- ME2
|
|||
|
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2653 *Virus Info*
|
|||
|
08-20-90 17:09:00 (Read 10 Times)
|
|||
|
From: TALLEY RAGAN
|
|||
|
To: MIKE MCCUNE
|
|||
|
Subj: RE: REMOVING JOSHI
|
|||
|
|
|||
|
|
|||
|
In a message to Philip Laird <08-16-90 14:09> Mike Mccune wrote:
|
|||
|
|
|||
|
MM>> Just be sure to boot off a clean diskette to remove the
|
|||
|
MM>>virus from memory, otherwise the virus will not be removed.
|
|||
|
MM>> If RMJOSHI is used on an unifected hard drive, it will
|
|||
|
MM>>destroy the partition table. This next program, RETURN.COM
|
|||
|
MM>>will restore the partition table.
|
|||
|
MM>> I will post this program in my next listing...<MM>.
|
|||
|
|
|||
|
Does this mean that RMJOSHI.COM, if run on an uninfected hard
|
|||
|
drive by it self is a virus?
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Talley
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- ZAFFER v1.01
|
|||
|
--- QuickBBS 2.64 [Reg] Qecho ver 2.62
|
|||
|
* Origin: Southern Systems *HST DS* Tampa Fl (813)977-7065 (1:377/9)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2654 *Virus Info*
|
|||
|
08-21-90 09:32:00 (Read 10 Times)
|
|||
|
From: PATRICK TOULME
|
|||
|
To: MIKE MCCUNE
|
|||
|
Subj: RE: HAVE ANYONE TRIED SECURE ?
|
|||
|
|
|||
|
MM> I have tried Secure and have found it to be the only interrupt moniter
|
|||
|
MM> that will stop all the known viruses.
|
|||
|
|
|||
|
Mike perhaps you should add a caveat to that statement. Secure
|
|||
|
neither detects, nor does it stop, Virus-101.
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2655 *Virus Info*
|
|||
|
08-21-90 12:11:00 (Read 8 Times)
|
|||
|
From: PAUL FERGUSON
|
|||
|
To: HERB BROWN
|
|||
|
Subj: KEYBOARD REMAPPING (AGAIN)...
|
|||
|
Herb,
|
|||
|
I stand corrected on that last bit of dialogue....You are
|
|||
|
correct, indeed.....But, you know what I mean along those lines of
|
|||
|
getting what you don't expect, whether damaging or not, NO ONE wants
|
|||
|
the unexpected on thier system.....Touche!
|
|||
|
-Paul ^@@^........
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2656 *Virus Info*
|
|||
|
08-21-90 22:29:00 (Read 10 Times)
|
|||
|
From: PATRICIA HOFFMAN
|
|||
|
To: YASHA KIDA
|
|||
|
Subj: AKA AND BBS HANDLES
|
|||
|
YK> What is the rule in this message echo concerning BBS HANDLES?
|
|||
|
YK> Would like some clarification, I have users expressing interest in
|
|||
|
YK> using bbs handles in this echo, since they are seeing them used .
|
|||
|
YK> As you can see I have not allowed this, feeling this echo to be
|
|||
|
YK> professial in nature.
|
|||
|
YK>
|
|||
|
YK> I understand the use of AKA names in this echo maybe needed.
|
|||
|
YK>
|
|||
|
YK> Example :
|
|||
|
YK> After my SITE Manager saw my interest in viruses, I was called in to
|
|||
|
YK> his office. After explaining my reseach, was to protect not to infect,
|
|||
|
YK> he relaxed.
|
|||
|
YK>
|
|||
|
|
|||
|
[Note: the above quote is muchly editted....]
|
|||
|
|
|||
|
Yasha, Aliases are ok in this echo, as long as the Sysop of the system where
|
|||
|
the messages originate knows who the user is and can contact him if the need
|
|||
|
arrises. I fully understand the sitation that you describe about your Site
|
|||
|
Manager...which is a fully valid reason to use an alias here. I used to use
|
|||
|
the alias of "Merry Hughes" for exactly that reason!
|
|||
|
|
|||
|
Patti
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2657 *Virus Info*
|
|||
|
08-21-90 22:32:00 (Read 9 Times)
|
|||
|
From: PATRICIA HOFFMAN
|
|||
|
To: KEN DORSHIMER
|
|||
|
Subj: REPLY TO MSG# 2477 (RE: SCANV66B RELEASED)
|
|||
|
KD> swell. think i'll wait for the next release.
|
|||
|
KD> ps, you have net-mail waiting. :-) BTW why on earth would anyone take
|
|||
|
KD> time
|
|||
|
KD> off from a disneyland vacation to call a bbs? <grin>
|
|||
|
|
|||
|
<laughing> I was eating dinner or lunch while entering those messages, then we
|
|||
|
went back to Dizzyland and Knott's. Besides, I had to see what you guys were
|
|||
|
up to while I was gone.....Mom instinct....what can I say?
|
|||
|
|
|||
|
Patti
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2658 *Virus Info*
|
|||
|
08-22-90 18:21:00 (Read 8 Times)
|
|||
|
From: HERB BROWN
|
|||
|
To: PAUL FERGUSON
|
|||
|
Subj: REPLY TO MSG# 2655 (KEYBOARD REMAPPING (AGAIN)...)
|
|||
|
With a sharp eye <Aug 21 12:11>, Paul Ferguson (1:204/869) noted:
|
|||
|
PF>Herb,
|
|||
|
PF> I stand corrected on that last bit of dialogue....You are
|
|||
|
PF>correct, indeed.....But, you know what I mean along those lines of
|
|||
|
PF>getting what you don't expect, whether damaging or not, NO ONE wants
|
|||
|
PF>the unexpected on thier system.....Touche!
|
|||
|
PF>-Paul ^@@^........
|
|||
|
|
|||
|
I knew what you meant. Glad to know you do too. :-) ( No flame intended )
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Delta Point (1:396/5.11)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2659 *Virus Info*
|
|||
|
08-22-90 05:37:00 (Read 8 Times)
|
|||
|
From: KEN DORSHIMER
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: REPLY TO MSG# 2657 (RE: SCANV66B RELEASED)
|
|||
|
|
|||
|
On 21-Aug-90 with bulging eyes and flailing arms Patricia Hoffman said:
|
|||
|
|
|||
|
KD>> swell. think i'll wait for the next release.
|
|||
|
KD>> ps, you have net-mail waiting. :-) BTW why on earth would anyone take
|
|||
|
KD>> time
|
|||
|
KD>> off from a disneyland vacation to call a bbs? <grin>
|
|||
|
|
|||
|
PH> <laughing> I was eating dinner or lunch while entering those
|
|||
|
PH> messages, then we went back to Dizzyland and Knott's. Besides, I had
|
|||
|
PH> to see what you guys were up to while I was gone.....Mom
|
|||
|
PH> instinct....what can I say?
|
|||
|
PH>
|
|||
|
|
|||
|
did you go on the roller coaster at Knotts that looks like a corkscrew? my
|
|||
|
personal favorite after a big dinner. <erp!>
|
|||
|
in other news there was a report <<unconfirmed>> that there is a hack of
|
|||
|
lharc floating around called lharc190. might want to keep an eyeball open for
|
|||
|
it. what am i doing up at this hour? just got thru writting the docs for a
|
|||
|
program <yawn>. as usual, the program looks better than the docs. have fun,
|
|||
|
see ya.
|
|||
|
|
|||
|
...All of my dreams are in COBOL...
|
|||
|
|
|||
|
|
|||
|
--- ME2
|
|||
|
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2660 *Virus Info*
|
|||
|
08-20-90 15:40:00 (Read 9 Times)
|
|||
|
From: RON LAUZON
|
|||
|
To: PAUL FERGUSON
|
|||
|
Subj: RE: KEYBOARD REMAPPING....
|
|||
|
yes, it is possible to re-map the keyboard from a remote system. However, most
|
|||
|
people are protected by this because the term program rather than ANSI.SYS is
|
|||
|
handling the ANSI escape sequences.
|
|||
|
|
|||
|
If you are using a "dumb" terminal that has no terminal emulation and allowing
|
|||
|
ANSI.SYS to handle your screen formatting, you may be in trouble.
|
|||
|
|
|||
|
--- Telegard v2.5i Standard
|
|||
|
* Origin: The Flight of the Raven (313)-232-7815 (1:2200/107.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2661 *Virus Info*
|
|||
|
08-21-90 20:29:00 (Read 8 Times)
|
|||
|
From: MARTIN NICHOL
|
|||
|
To: MICHAEL TUNN
|
|||
|
Subj: WHAT'S THE SOLUTION?
|
|||
|
mt said => It seems to me our Virus checking programs will just
|
|||
|
mt said => get bigger and bigger as more viruses and strains of
|
|||
|
mt said => the same viruses are discovered. If so (and if their
|
|||
|
mt said => development is excelerating) then we may find in the
|
|||
|
mt said => near future that it has become impossiable to deal
|
|||
|
mt said => with the outbreaks!
|
|||
|
mt said => Do we do develop new Operating Systems which are far
|
|||
|
mt said => more secure!
|
|||
|
|
|||
|
Develope different virus scanning programs. Make them more generic where virus
|
|||
|
signatures/characteristics can be kept in a seperate file and the virus scanner
|
|||
|
just reads the file and interprets it accordingly.
|
|||
|
|
|||
|
---
|
|||
|
* Origin: JoJac BBS - (416) 841-3701. HST Kettleby, ON (1:250/910)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2683 *Virus Info*
|
|||
|
08-22-90 22:55:00 (Read 8 Times)
|
|||
|
From: FRED ENNIS
|
|||
|
To: ALL
|
|||
|
Subj: VIRUS-486COMP.*
|
|||
|
|
|||
|
FORWARDED BY James Dick of 1:163/118
|
|||
|
|
|||
|
QUOTE ON
|
|||
|
|
|||
|
I've been informed by "reliable sources" that there's a file floating around
|
|||
|
called 486COMP.* (select your favourite packing method) which claims to "show
|
|||
|
you the difference between your machine and a 486".
|
|||
|
.
|
|||
|
When run, the program flashes a "too big for memory" message, and aborts.
|
|||
|
.
|
|||
|
Then, the next time you boot, you're informed that you have the "Leprosy 1.00"
|
|||
|
virus which then hangs the machine.
|
|||
|
.
|
|||
|
After you manage to boot from a floppy, you find that COMMAND.COM has been
|
|||
|
altered, although the date, time, and size appear not to have been changed.
|
|||
|
|
|||
|
Just thought you'd like to know.
|
|||
|
|
|||
|
Cheers!
|
|||
|
Fred
|
|||
|
|
|||
|
|
|||
|
--- msged 1.99S ZTC
|
|||
|
* Origin: Page Six, POINT of order Mr. Speaker (1:163/115.5)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2684 *Virus Info*
|
|||
|
08-22-90 11:07:00 (Read 8 Times)
|
|||
|
From: SHEA TISDALE
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: REPLY TO MSG# 2474 (FILE ECHO?)
|
|||
|
Thanks Patricia...
|
|||
|
|
|||
|
I am all ready to go now. Just poll your board?
|
|||
|
|
|||
|
---
|
|||
|
* Origin: >- c y n o s u r e -< 919-929-5153 <XRS> <HST> (1:151/501)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2685 *Virus Info*
|
|||
|
08-20-90 21:50:00 (Read 9 Times)
|
|||
|
From: TOM PREECE
|
|||
|
To: PAUL FERGUSON
|
|||
|
Subj: RE: KEYBOARD REMAPPING VIA COMMUNICA
|
|||
|
I can't help but wonder if Herb was experiencing something that suggested that
|
|||
|
kind of remapping. Lately I have been experiencing keyboard problems that seem
|
|||
|
to act like that. When I use my down or left arrow the \ and | symbols toggle.
|
|||
|
I can correct this when it happens by hitting the left hand shift key - but not
|
|||
|
the right. And tonight it seems as if I am occaissionaly transposing caps on
|
|||
|
and off.
|
|||
|
|
|||
|
If either of you hears a virus like this I'd like to know. Q&A tested my
|
|||
|
memory and keyboard fine. Scanv66 detected nothing.
|
|||
|
--- TBBS v2.1/NM
|
|||
|
* Origin: G.A.D.M. Multi-User TBBS Hayward,CA.(415) 581-3019 (1:161/208)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2738 *Virus Info*
|
|||
|
08-23-90 23:49:00 (Read 7 Times)
|
|||
|
From: PHILLIP LAIRD
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: ONTARIO VIRUS
|
|||
|
Patty, have you heard of such a Virus? I was in the TAG Support Echo and saw
|
|||
|
a message about a TAG Sysop who contracted that virus. Any Info? Supposedly
|
|||
|
the Virus is scanned in version SCANV66.ZIP.
|
|||
|
|
|||
|
????
|
|||
|
|
|||
|
--- TAGMAIL v2.20
|
|||
|
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2739 *Virus Info*
|
|||
|
08-22-90 12:55:00 (Read 7 Times)
|
|||
|
From: PAUL FERGUSON
|
|||
|
To: EVERYONE
|
|||
|
Subj: MOM!
|
|||
|
Patti-
|
|||
|
Mom, huh?...What can you say?..It seems it has already been said!
|
|||
|
|
|||
|
-Paul <wide grin on this one>
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2740 *Virus Info*
|
|||
|
08-23-90 12:06:00 (Read 8 Times)
|
|||
|
From: PAUL FERGUSON
|
|||
|
To: TOM PREECE
|
|||
|
Subj: REMAPPING...
|
|||
|
Hello, Tom...
|
|||
|
.
|
|||
|
More than likely there was nothing like that at all. Keyboard
|
|||
|
remapping is an extremely complicated process and would take more than
|
|||
|
forethought on the part of the programmer. What you have seen us
|
|||
|
talking about here is figurative at best and personally, I would have
|
|||
|
to see it to believe it. (you know the old saying: "Believe none of
|
|||
|
what you hear and only half of of what you see."?) Although I do
|
|||
|
believe that is quite possible under the proper circumstances, it would
|
|||
|
indeed be a rare occurance. Sometimes when receiving odd characters
|
|||
|
during telecommunications or not getting the exact same keys that you
|
|||
|
typed could be attributed to disparity (parity differences), differing
|
|||
|
data bits, stop bits, or even simply ANSI interpretation problems
|
|||
|
between Comm Programs. I've seen the smallest, simplest things like
|
|||
|
that have people pulling their hair out by the roots!
|
|||
|
.
|
|||
|
.....Clarke's Third Law
|
|||
|
Any sufficiently advanced technology is indistinguishable from
|
|||
|
magic.
|
|||
|
.
|
|||
|
.
|
|||
|
-Paul ^@@^........
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2741 *Virus Info*
|
|||
|
08-17-90 01:51:00 (Read 8 Times)
|
|||
|
From: YEN-ZON CHAI
|
|||
|
To: DOUG BAGGETT
|
|||
|
Subj: ANTI VIRUS VIRUSES
|
|||
|
DB> well..here is a question..where exactly did viruses originate
|
|||
|
DB> anyway..was it in this country or others?
|
|||
|
|
|||
|
Probably where hacker exists, virus exists.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- outGATE v2.10
|
|||
|
# Origin: SIGnet International GateHost (8:7501/103)
|
|||
|
* Origin: Network Echogate (1:129/34)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2742 *Virus Info*
|
|||
|
08-22-90 17:49:00 (Read 8 Times)
|
|||
|
From: KEVIN HIGGINS
|
|||
|
To: MIKE MCCUNE
|
|||
|
Subj: REPLY TO MSG# 2654 (RE: HAVE ANYONE TRIED SECURE ?)
|
|||
|
I took a look at it, but to be realistic, when you run a BBS, or are
|
|||
|
continuously updating your files as new releases come out, you could easily get
|
|||
|
to the point where you spend more time reconfiguring the anti-virus program
|
|||
|
than you would getting any work done. I find it much more efficient to scan
|
|||
|
every file for viruses as soon as I get it on my system, then rezip it, if I'm
|
|||
|
not going to use it... a simple .bat file can be used such that if you want to
|
|||
|
check multiple files, you can just feed the file names on the command line and
|
|||
|
let the .bat file take care of unzipping, scanning and rezipping the file.
|
|||
|
Be best if someone would write a program that would do this, but I haven't
|
|||
|
found one yet.
|
|||
|
Kevin
|
|||
|
|
|||
|
--- TAGMAIL v2.40.02 Beta
|
|||
|
* Origin: The Hornet's Nest BBS (1:128/74)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2743 *Virus Info*
|
|||
|
08-22-90 21:52:00 (Read 8 Times)
|
|||
|
From: CY WELCH
|
|||
|
To: PAUL FERGUSON
|
|||
|
Subj: REPLY TO MSG# 2660 (KEYBOARD REMAPPING....)
|
|||
|
In a message to Everyone <16 Aug 90 6:32:00> Paul Ferguson wrote:
|
|||
|
|
|||
|
PF> Isn't it possible to remap some (or any) keyboard functions via
|
|||
|
PF> communications with some funky ANSI control characters?....I seem to
|
|||
|
PF> remember mention of this somewhere.....I really can't remember if was
|
|||
|
PF> in the form of a question, though, or an answer.....It also made
|
|||
|
PF> mention of PKWares' Safe-ANSI program...Somebody help us out here...
|
|||
|
|
|||
|
I think most of the "FAST" ansi replacements do not have the keyboard remapping
|
|||
|
so that danger is removed in those cases.
|
|||
|
|
|||
|
--- XRS! 3.40+
|
|||
|
* Origin: Former QuickBBS Beta Team Member (99:9402/1.1) (Quick 1:125/122.1)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2744 *Virus Info*
|
|||
|
08-24-90 15:14:00 (Read 8 Times)
|
|||
|
From: PATRICIA HOFFMAN
|
|||
|
To: ALL
|
|||
|
Subj: VIRUS RESCUE & F-PROT RELEASES
|
|||
|
The latest version of Fridrik Skulason's F-PROT anti-viral program is now
|
|||
|
available for download from my system as FPROT112.ZIP. The program can also be
|
|||
|
file requested as F-PROT, which will always return the latest copy I have
|
|||
|
available. This program is actually a "suite" of programs for use in
|
|||
|
preventing and detecting viruses and trojans. The program originates in
|
|||
|
Iceland, and so updates to it reaching my system for distribution have been
|
|||
|
rather sporatic.
|
|||
|
|
|||
|
The other new anti-viral program available on my system is Virus Rescue. Virus
|
|||
|
Rescue is from Tacoma Software, and is a shell for invoking ViruScan, CleanUp,
|
|||
|
and VCopy from McAfee Associates. Unlike other shell programs I've seen, this
|
|||
|
one should not require updates every time a new release of Scan comes out. It
|
|||
|
picks up its virus information from the VIRLIST.TXT file which is packaged with
|
|||
|
Scan and CleanUp. It will be handy for those who have trouble with the Scan
|
|||
|
and CleanUp command line switches, or who want the VIRLIST.TXT information
|
|||
|
converted to english sentences. This is a first public release, so I expect we
|
|||
|
may see some changes in this product in the future. Virus Rescue can be
|
|||
|
downloaded from my system as RESQ01.ZIP.
|
|||
|
|
|||
|
Both programs are also file requestable by other systems. File requests should
|
|||
|
ask for magic file names as follows:
|
|||
|
|
|||
|
F-PROT for the latest copy of F-PROT (currently FPROT112.ZIP)
|
|||
|
RESCUE for the latest version of Virus Rescue
|
|||
|
|
|||
|
Patti
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2745 *Virus Info*
|
|||
|
08-24-90 23:37:00 (Read 9 Times)
|
|||
|
From: KEN DORSHIMER
|
|||
|
To: KEVIN HIGGINS
|
|||
|
Subj: REPLY TO MSG# 2742 (RE: HAVE ANYONE TRIED SECURE ?)
|
|||
|
|
|||
|
On 22-Aug-90 with bulging eyes and flailing arms Kevin Higgins said:
|
|||
|
|
|||
|
KH> I took a look at it, but to be realistic, when you run a BBS, or are
|
|||
|
KH> continuously updating your files as new releases come out, you could
|
|||
|
KH> easily get to the point where you spend more time reconfiguring the
|
|||
|
KH> anti-virus program than you would getting any work done. I find it
|
|||
|
KH> much more efficient to scan every file for viruses as soon as I get it
|
|||
|
KH> on my system, then rezip it, if I'm not going to use it... a simple
|
|||
|
KH> .bat file can be used such that if
|
|||
|
KH>
|
|||
|
KH> you want to check multiple files, you can just feed the file names on
|
|||
|
KH> the command line and let the .bat file take care of unzipping,
|
|||
|
KH> scanning and rezipping the file. Be best if someone would write a
|
|||
|
KH> program that would do this, but I haven't found one yet. Kevin
|
|||
|
KH>
|
|||
|
|
|||
|
sounds like a plan to me. it would actually be fairly simple to write a
|
|||
|
program to look at all the files in your upload directory, unpack them based
|
|||
|
on the extension, scan them, then re-compress them (if needed). of course
|
|||
|
you'd still have to manually put the now scanned files into the proper
|
|||
|
catagory directories yourself. when do you need it and what's it worth? :-)
|
|||
|
|
|||
|
...All of my dreams are in COBOL...
|
|||
|
|
|||
|
|
|||
|
--- ME2
|
|||
|
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2746 *Virus Info*
|
|||
|
08-23-90 15:23:00 (Read 8 Times)
|
|||
|
From: MIKE MCCUNE
|
|||
|
To: TALLEY RAGAN
|
|||
|
Subj: REPLY TO MSG# 2653 (RE: REMOVING JOSHI)
|
|||
|
No, it just modifies the partition record to remove the virus.
|
|||
|
If the virus isn't there, it still modifies the partition
|
|||
|
record. Return.com just reverses the modifications done to the
|
|||
|
partition table. I will post an improved version of RMJOSHI that
|
|||
|
scans the partition record for the virus before modifying
|
|||
|
it...<MM>.
|
|||
|
|
|||
|
|
|||
|
--- KramMail v3.15
|
|||
|
* Origin: The Slowboat BBS (404-578-1691) Atlanta, GA (1:133/311.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2747 *Virus Info*
|
|||
|
08-23-90 15:26:00 (Read 8 Times)
|
|||
|
From: MIKE MCCUNE
|
|||
|
To: PATRICK TOULME
|
|||
|
Subj: REPLY TO MSG# 2745 (RE: HAVE ANYONE TRIED SECURE ?)
|
|||
|
Maybe I should say all virus that are in the "public domain".
|
|||
|
Virus 101 is a research virus that only a few people have (and
|
|||
|
you wrote). Nothing is fool proof but Secure is better than any
|
|||
|
other interrupt moniter.
|
|||
|
|
|||
|
|
|||
|
--- KramMail v3.15
|
|||
|
* Origin: The Slowboat BBS (404-578-1691) Atlanta, GA (1:133/311.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2748 *Virus Info*
|
|||
|
08-23-90 07:01:00 (Read 8 Times)
|
|||
|
From: YASHA KIDA
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: REPLY TO MSG# 2656 (AKA AND BBS HANDLES)
|
|||
|
In a message of <21 Aug 90 22:29:34>, Patricia Hoffman (1:204/869) writes:
|
|||
|
|
|||
|
PH>
|
|||
|
PH> Yasha, Aliases are ok in this echo, as long as the Sysop of the system
|
|||
|
PH> where the messages originate knows who the user is and can contact him
|
|||
|
PH> if the need arrises. I fully understand the sitation that you
|
|||
|
PH> describe about your Site Manager...which is a fully valid reason to
|
|||
|
PH> use an alias here. I used to use the alias of "Merry Hughes" for
|
|||
|
PH> exactly that reason!
|
|||
|
PH>
|
|||
|
PH> Patti
|
|||
|
|
|||
|
|
|||
|
I understand AKA names like "MERRY", but I speak of HACKER HANDLES.
|
|||
|
like "LINE RUNNER", "DATA BYTE" etc... I must have misunderstood FIDO ECHO
|
|||
|
POLICY either way I will drop the subject.
|
|||
|
|
|||
|
Yasha Kida
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- msged 1.99S ZTC
|
|||
|
* Origin: Bragg IDBS, (FT. Bragg, NC - we're gonna kick some booty)
|
|||
|
(1:151/305)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2749 *Virus Info*
|
|||
|
08-08-90 23:23:00 (Read 7 Times)
|
|||
|
From: ALAN DAWSON
|
|||
|
To: DAVID SMART
|
|||
|
Subj: RE: VIRUS SCANNERS....
|
|||
|
DS> You can't win on this! I've been downloading for quite a while
|
|||
|
DS> - always running a virus checker on the information. So, where
|
|||
|
DS> did our virus come from? Off a shrink-wrapped anti-virus
|
|||
|
DS> diskette one of our guys picked up in the US!
|
|||
|
|
|||
|
Nothing new about this, as people learn all the time. One MAJOR
|
|||
|
company (really big, really well known) has shipped shrink-wrapped
|
|||
|
viruses twice -- once on purpose! Shrink wrap doesn't keep the bugs
|
|||
|
out.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- Opus-CBCS 1.13
|
|||
|
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2750 *Virus Info*
|
|||
|
08-08-90 23:31:00 (Read 7 Times)
|
|||
|
From: ALAN DAWSON
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: SCAN WEIRDNESS
|
|||
|
(All answers gratefully received despite the TO: line)
|
|||
|
Anybody heard of this? I've got a floppy with some viruses on it,
|
|||
|
among them a SCAN-known Dark Avenger. I SCAN this floppy from the C
|
|||
|
drive, and the "hey, nothing to worry about there" report comes back.
|
|||
|
Strange. I SCAN it again. This time 'round, SCAN barfs after 64K of
|
|||
|
the memory check, telling me Dark Avenger is in memory, power down,
|
|||
|
load the .45, get the cyanide tablet ready and so on.
|
|||
|
But DA of course is NOT in memory or active in any way. It is,
|
|||
|
however, on the floppy, unrun.
|
|||
|
The above occurred with SCANV64. Out of curiosity, I cranked up
|
|||
|
SCAN-54 and -- EXACTLY the same result.
|
|||
|
AST Bravo 286, no TSRs, nothing else loaded, clean (normal) boot
|
|||
|
just performed.
|
|||
|
I have a bunch of viruses that I don't expect SCAN to find --
|
|||
|
ever. But this kind of thing has never happened to me before. Can
|
|||
|
anyone match this story, or event?
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- Opus-CBCS 1.13
|
|||
|
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2751 *Virus Info*
|
|||
|
08-26-90 00:59:00 (Read 7 Times)
|
|||
|
From: STEVEN TREIBLE
|
|||
|
To: KEN DORSHIMER
|
|||
|
Subj: VOICE NUMBER
|
|||
|
|
|||
|
Ken,
|
|||
|
I haven't mailed the disk yet as you can see. I'd like to have your voice # so
|
|||
|
I can talk to instead of sending Net Mail.
|
|||
|
Thanks,
|
|||
|
Steve.
|
|||
|
|
|||
|
--- ZMailQ 1.12 (QuickBBS)
|
|||
|
* Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2752 *Virus Info*
|
|||
|
08-25-90 06:10:00 (Read 8 Times)
|
|||
|
From: SANDY LOCKE
|
|||
|
To: HERB BROWN
|
|||
|
Subj: RE: COMMUNICATION VIRALS
|
|||
|
|
|||
|
|
|||
|
PH> However, unless one of the above is occurring, just connecting via
|
|||
|
PH> telecom to a system won't directly transmit a virus....
|
|||
|
PH>
|
|||
|
|
|||
|
|
|||
|
HB> Well, that is not exactly what I meant. Sorry for the miscommunicatio
|
|||
|
HB> should have used an example. I'll have to dig for some old documentat
|
|||
|
HB> about z-modem when it first came out. I seem to remember it stating t
|
|||
|
HB> locked the directory that a file was able to go to when being download
|
|||
|
HB> has something to do with the structure of a .EXE file, or something.
|
|||
|
HB> to also remember that it was possible to have the .exe "go were it wan
|
|||
|
HB> as defined by this structure. Thus, having some of the file go to a c
|
|||
|
HB> part of a drive or memory. It seems wild, but without the docs I read
|
|||
|
HB> can't give any details. Thought maybe you could shed some light on th
|
|||
|
|
|||
|
Well considering that I am hosting chuck forsberg today ... hes down
|
|||
|
here for the sco developer forum I will put the question to him
|
|||
|
directly... but as one of the suggestors for feature addition to the
|
|||
|
protocol in another personna... ZMODEM will INDEED allow one to
|
|||
|
transmit a FULL path name... however this is mitigated by the ability
|
|||
|
on the receiving end to override the transmitted pathname spec... I
|
|||
|
dont really see a problem here... and when I put the question to chuck
|
|||
|
I dont see where he will see one either... btw READ the DSZ DOCS and
|
|||
|
register the product... that will turn on ALL the neat zmodem
|
|||
|
features...
|
|||
|
sandy
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2753 *Virus Info*
|
|||
|
08-25-90 06:18:00 (Read 15 Times)
|
|||
|
From: SANDY LOCKE
|
|||
|
To: SKY RAIDER (Rcvd)
|
|||
|
Subj: RE: VIRUS ORIGINALS
|
|||
|
SR> Doug,
|
|||
|
|
|||
|
SR> It is my belief that viruses originated in the early days of computing
|
|||
|
SR> effort to see what kind of stuff could be done with them, a group of
|
|||
|
SR> programmers (financed by the US government as I recall) institued a se
|
|||
|
SR> programs that would attempt to 'beat' others in taking over a computer
|
|||
|
SR> system. These programs led to a gaming system known as the CORE WARS.
|
|||
|
SR> today there is an International Core Wars Society.
|
|||
|
|
|||
|
SR> I think it can be easily seen how a program to destroy/circumvent a st
|
|||
|
SR> operating system can develope into a virus.
|
|||
|
|
|||
|
SR> I tried to double check this information for accuracy, names, dates, e
|
|||
|
SR> but it seems I have deleted this file. I will try to get further info
|
|||
|
SR> you, but beleive this info is shrouded in secrecy, and may be hard to
|
|||
|
SR> relocate.
|
|||
|
|
|||
|
SR> So, the original viruses did come from the US (and even possibly with
|
|||
|
SR> government help).
|
|||
|
|
|||
|
SR> Ivan Baird
|
|||
|
SR> * Origin: Northern Connection, Fredericton, N.B. Canada <HST 14.4K>
|
|||
|
SR> (1:255/3)
|
|||
|
WHAT a LOAD of UNADULTERATED CRAP... redcode is simply a GAME created by
|
|||
|
bored programmers... ORIGINAL CORE WARS games were created as far back
|
|||
|
as 1969 back on the OLD IBM 360 architectures under both OS/MFT and
|
|||
|
OSMVT OS's... neither had anything to do with so-called secret
|
|||
|
financing by the US government...BTW I was AROUND and A Systems
|
|||
|
Programmer during that period... we created our own versions when we
|
|||
|
heard of the rumours... it was an old system programmers game designed
|
|||
|
to give Egotistal programmers some lighthearted fun... at this point
|
|||
|
ALL code ran in real Address space and redcode hadnt even been though
|
|||
|
of... the MUCH later article by Scientific American in 1979 gave this
|
|||
|
fun with out harm via the redcode interpreter implemented on early 6502
|
|||
|
and 8080 systems... really... I am going to have to move to canada...
|
|||
|
sounds like there are some really potent and fun drugs in circulation
|
|||
|
up there... jeese... what a simp...
|
|||
|
sandy
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2754 *Virus Info*
|
|||
|
08-25-90 06:19:00 (Read 14 Times)
|
|||
|
From: SANDY LOCKE
|
|||
|
To: STEVE HOKE
|
|||
|
Subj: REPLY TO MSG# 2752 (RE: COMMUNICATION VIRALS)
|
|||
|
SH> In a message to Herb Brown <15 Aug 90 17:44:00> Patricia Hoffman wrote
|
|||
|
|
|||
|
PH> The only way a virus could be directly transmitted via a
|
|||
|
PH> telecommunications link ...
|
|||
|
PH> is if the particular "service" has a feature where they upgrade
|
|||
|
PH> their software on your system when you connect.
|
|||
|
|
|||
|
SH> Is there any commercial system that does this? I don't know of one, bu
|
|||
|
SH> like to know what types of systems to be wary of.
|
|||
|
|
|||
|
SH> Steve
|
|||
|
just one word for you... PRODIGY avoid it like the plague...
|
|||
|
sandy
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2755 *Virus Info*
|
|||
|
08-25-90 06:25:00 (Read 9 Times)
|
|||
|
From: SANDY LOCKE
|
|||
|
To: MIKE MCCUNE
|
|||
|
Subj: REPLY TO MSG# 2747 (RE: HAVE ANYONE TRIED SECURE ?)
|
|||
|
|
|||
|
MM> I have tried Secure and have found it to be the only interrupt moniter
|
|||
|
MM> that will stop all the known viruses. It won't stop the boot viruses,
|
|||
|
MM> obviously (because a boot virus loades before Secure does), but it wil
|
|||
|
MM> detect them as soon as Secure is loaded. Secure is hard to configure,
|
|||
|
MM> but once it is configured, it will give few false alarms. With string
|
|||
|
MM> scanners becoming increasingly easy to defeat, Secure may be the way t
|
|||
|
MM> go for virus protection...<MM>.
|
|||
|
|
|||
|
well kiddies... a certain couple of anti-viral types on HOMEBASE BBS
|
|||
|
managed to sting SECURE with modified version of JER-B... one of them
|
|||
|
continues to find holes with the same tool... SECURE is simply NOT
|
|||
|
SECURE...
|
|||
|
sandy
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2756 *Virus Info*
|
|||
|
08-25-90 06:31:00 (Read 9 Times)
|
|||
|
From: SANDY LOCKE
|
|||
|
To: KEN DORSHIMER
|
|||
|
Subj: REPLY TO MSG# 2479 (RE: CRC CHECKING)
|
|||
|
|
|||
|
KD> On 19-Aug-90 with bulging eyes and flailing arms Patricia Hoffman sai
|
|||
|
|
|||
|
KD> <KD>>the deal is that the invading program would have to know how the
|
|||
|
KD> <KD>>your
|
|||
|
KD> <KD>>program uses works. otherwise it would have a (bytes changed!/by
|
|||
|
KD> <KD>>file!)
|
|||
|
KD> <KD>>chance of succeeding, or somewhere in that neighborhood...
|
|||
|
KD> <KD>>
|
|||
|
|
|||
|
PH> Except in the case of Stealth Viruses....CRC checking doesn't work
|
|||
|
PH> with them.
|
|||
|
PH>
|
|||
|
|
|||
|
KD> i'd have to see that for myself. i think a complex enough algorithm wo
|
|||
|
KD> keep them at bay. the probability factor is just too low for such a st
|
|||
|
KD> scheme to work.
|
|||
|
|
|||
|
KD> ...Your attorney is in the mail...
|
|||
|
|
|||
|
check out Gilmore Data Systems in LA authors of the OLD FICHECK and
|
|||
|
XFICHECK... the techniques is called CRC padding after the addition of
|
|||
|
the viral code the file is padded with a given number of bytes to make
|
|||
|
the CRC Polynomial come out with the same result... the FCB is then
|
|||
|
Patched to the original file length leaving nothing for standrad CRC
|
|||
|
checkers to detect... Childs play really...
|
|||
|
sandyp.s. in the case of most stealth viruses... the file read
|
|||
|
code is simply altered to disinfect the file as the CRC checking
|
|||
|
program reads it... agains simply childs play...
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2757 *Virus Info*
|
|||
|
08-25-90 06:32:00 (Read 10 Times)
|
|||
|
From: SANDY LOCKE
|
|||
|
To: PATRICK TOULME
|
|||
|
Subj: REPLY TO MSG# 2755 (RE: HAVE ANYONE TRIED SECURE ?)
|
|||
|
|
|||
|
MM> I have tried Secure and have found it to be the only interrupt moniter
|
|||
|
MM> that will stop all the known viruses.
|
|||
|
|
|||
|
PT> Mike perhaps you should add a caveat to that statement. Secure
|
|||
|
PT> neither detects, nor does it stop, Virus-101.
|
|||
|
|
|||
|
Right on Patrick...
|
|||
|
sandy
|
|||
|
p.s. Damn nice design on the code complex as HELL....
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2758 *Virus Info*
|
|||
|
08-25-90 06:36:00 (Read 9 Times)
|
|||
|
From: SANDY LOCKE
|
|||
|
To: PAUL FERGUSON
|
|||
|
Subj: REPLY TO MSG# 2740 (RE: REMAPPING...)
|
|||
|
PF> Hello, Tom...
|
|||
|
PF> .
|
|||
|
PF> More than likely there was nothing like that at all. Keyboard
|
|||
|
PF> remapping is an extremely complicated process and would take more than
|
|||
|
PF> forethought on the part of the programmer. What you have seen us
|
|||
|
PF> talking about here is figurative at best and personally, I would have
|
|||
|
PF> to see it to believe it. (you know the old saying: "Believe none of
|
|||
|
PF> what you hear and only half of of what you see."?) Although I do
|
|||
|
PF> believe that is quite possible under the proper circumstances, it woul
|
|||
|
PF> indeed be a rare occurance. Sometimes when receiving odd characters
|
|||
|
PF> during telecommunications or not getting the exact same keys that you
|
|||
|
PF> typed could be attributed to disparity (parity differences), differing
|
|||
|
PF> data bits, stop bits, or even simply ANSI interpretation problems
|
|||
|
PF> between Comm Programs. I've seen the smallest, simplest things like
|
|||
|
PF> that have people pulling their hair out by the roots!
|
|||
|
PF> .
|
|||
|
PF> .....Clarke's Third Law
|
|||
|
PF> Any sufficiently advanced technology is indistinguishable from
|
|||
|
PF> magic.
|
|||
|
PF> .
|
|||
|
PF> .
|
|||
|
PF> -Paul ^@@^........
|
|||
|
|
|||
|
well paul normally on hombase you are quite lucid... but as a long
|
|||
|
time programmer I can testify the keyboard mapping is really quite
|
|||
|
simple... no real problem and the business of using terminal control
|
|||
|
code is quite as simple...
|
|||
|
sandy
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2759 *Virus Info*
|
|||
|
08-25-90 06:39:00 (Read 9 Times)
|
|||
|
From: SANDY LOCKE
|
|||
|
To: CY WELCH
|
|||
|
Subj: REPLY TO MSG# 2743 (RE: KEYBOARD REMAPPING....)
|
|||
|
CW> In a message to Everyone <16 Aug 90 6:32:00> Paul Ferguson wrote:
|
|||
|
|
|||
|
PF> Isn't it possible to remap some (or any) keyboard functions via
|
|||
|
PF> communications with some funky ANSI control characters?....I seem to
|
|||
|
PF> remember mention of this somewhere.....I really can't remember if was
|
|||
|
PF> in the form of a question, though, or an answer.....It also made
|
|||
|
PF> mention of PKWares' Safe-ANSI program...Somebody help us out here...
|
|||
|
|
|||
|
CW> I think most of the "FAST" ansi replacements do not have the keyboard
|
|||
|
CW> remapping so that danger is removed in those cases.
|
|||
|
Well if you are referring to FANSI.SYS by hershey Microsystems it too
|
|||
|
is vunerable to remap effects... and since it implemnt FULL ANSI 3.64
|
|||
|
terminal control codes plus some extensions it is even more vunerable
|
|||
|
to a whole class of tricks that go way beyond noremally keyboard
|
|||
|
remapping... but to there credit they ahve include a way to turn this
|
|||
|
"FEATURE" OFF... just most users get it off a BBS and never order or
|
|||
|
look at the 50.00 set of docs that come when you pay for the
|
|||
|
products...
|
|||
|
sandy
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2760 *Virus Info*
|
|||
|
08-25-90 08:49:00 (Read 9 Times)
|
|||
|
From: PATRICIA HOFFMAN
|
|||
|
To: PHILLIP LAIRD
|
|||
|
Subj: REPLY TO MSG# 2738 (ONTARIO VIRUS)
|
|||
|
PL> Patty, have you heard of such a Virus? I was in the TAG Support Echo
|
|||
|
PL> and saw
|
|||
|
PL> a message about a TAG Sysop who contracted that virus. Any Info?
|
|||
|
PL> Supposedly the Virus is scanned in version SCANV66.ZIP.
|
|||
|
|
|||
|
Yep, I've heard of this one....I was the one that named it after it was
|
|||
|
submitted by Mike Shields (Sysop of 1:244/114). Ontario is a memory resident
|
|||
|
generic infector of .COM and .EXE files, including COMMAND.COM. Infected .COM
|
|||
|
files will increase in length by 512 bytes. Infected .EXE files will increase
|
|||
|
in length between 512 bytes and 1023 bytes on disk drives with standard 512
|
|||
|
byte sectors. When files are infected, the virus adds itself to the end of the
|
|||
|
program, and then places a jump at the beginning so that the virus's code will
|
|||
|
always execute before the program that was infected. Ontario is not a
|
|||
|
low-system memory TSR, it goes memory resident installing itself at the top of
|
|||
|
free memory, but below the 640K line. Available free memory will decrease by
|
|||
|
2,048 bytes. Once the virus has installed itself in memory, any program which
|
|||
|
is executed will then become infected.
|
|||
|
|
|||
|
It was reported with the sample I received from Mike that infected systems may
|
|||
|
experience hard disk errors, but I was unable to duplicate that here. This may
|
|||
|
only happen in severe infections, I try not to let them get that severe when
|
|||
|
I'm working with a virus :-).
|
|||
|
|
|||
|
Scan V66 and above can detect the Ontario Virus on both .COM and .EXE files.
|
|||
|
Unfortunately, Ontario is one of the viruses that uses a "double-encryption"
|
|||
|
technique to prevent scanners from being able to use a search string to detect
|
|||
|
it, so there isn't a simple way to find it with a hex string and a utility such
|
|||
|
as Norton Utilities. As of right now, there aren't any disinfectors available
|
|||
|
for the Ontario virus, so if you happen to be infected with it you need to
|
|||
|
remove the infected programs and replace them with clean copies from your
|
|||
|
uninfected backups or original write-protected distribution diskettes.
|
|||
|
|
|||
|
A more complete description of the Ontario virus is in VSUM9008, which was
|
|||
|
released on August 10. The above is just off of the top of my head, which
|
|||
|
happens to hurt right now. Hope it is understandable.....
|
|||
|
|
|||
|
Patti
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2761 *Virus Info*
|
|||
|
08-25-90 09:02:00 (Read 10 Times)
|
|||
|
From: PATRICIA HOFFMAN
|
|||
|
To: YEN-ZON CHAI
|
|||
|
Subj: REPLY TO MSG# 2741 (ANTI VIRUS VIRUSES)
|
|||
|
YC> DB> well..here is a question..where exactly did viruses originate
|
|||
|
YC> DB> anyway..was it in this country or others?
|
|||
|
YC>
|
|||
|
YC> Probably where hacker exists, virus exists.
|
|||
|
YC>
|
|||
|
|
|||
|
Well, the two oldest known viruses for MS-DOS are the Pakistani Brain and
|
|||
|
VirDem. The Brain is from Pakistan, VirDem from West Germany. Both of these
|
|||
|
originated in 1986. Both have known authors. The viruses from 1987 include
|
|||
|
Jerusalem and the Suriv series from Israel, Alameda/Yale from the United
|
|||
|
States, and 405 from Austria or Germany.
|
|||
|
|
|||
|
Patti
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2762 *Virus Info*
|
|||
|
08-25-90 09:07:00 (Read 10 Times)
|
|||
|
From: PATRICIA HOFFMAN
|
|||
|
To: KEVIN HIGGINS
|
|||
|
Subj: REPLY TO MSG# 2757 (RE: HAVE ANYONE TRIED SECURE ?)
|
|||
|
KH> I took a look at it, but to be realistic, when you run a BBS, or
|
|||
|
KH> are continuously updating your files as new releases come out, you
|
|||
|
KH> could easily get to the point where you spend more time reconfiguring
|
|||
|
KH> the anti-virus program than you would getting any work done. I find it
|
|||
|
KH> much more efficient to scan every file for viruses as soon as I get it
|
|||
|
KH> on my system, then rezip it, if I'm not going to use it... a simple
|
|||
|
KH> .bat file can be used such that if you want to check multiple files,
|
|||
|
KH> you can just feed the file names on the command line and let the .bat
|
|||
|
KH> file take care of unzipping, scanning and rezipping the file.
|
|||
|
KH> Be best if someone would write a program that would do this, but I
|
|||
|
KH> haven't found one yet.
|
|||
|
|
|||
|
You might want to take a look at CheckOut and Shez.
|
|||
|
|
|||
|
CheckOut uses ViruScan to check .ARC, .PAK, .ZIP, .LZH, and other archive
|
|||
|
formats for viruses by automatically creating a temporary directory and
|
|||
|
unarchiving the file to it. It then invokes Scan to check the executable
|
|||
|
files. One of its nice features is that it will never invoke a program in that
|
|||
|
temporary directory, as well as you can have it either delete an infected file
|
|||
|
or move it to a badfiles directory. It will also find archives which are
|
|||
|
damaged for you. It can be invoked easily from a .BAT file, such as if you
|
|||
|
want to run it at midnight against all new uploads.
|
|||
|
|
|||
|
Shez is another program which can be used to scan inside archives. It is
|
|||
|
interactive, so you need to manually invoke it. After you have selected the
|
|||
|
archive and listed the contents, hitting ctrl-Z will result in Scan checking
|
|||
|
the contents.
|
|||
|
|
|||
|
There are other scanning shells which handle archived files, though these are
|
|||
|
the two that I've used regularly and are the most familiar with. I was also
|
|||
|
involved in the beta testing of CheckOut with some known to be infected files,
|
|||
|
and it does function properly in that instance. I've also tested Shez with
|
|||
|
infected files, and it works well....
|
|||
|
|
|||
|
Patti
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2763 *Virus Info*
|
|||
|
08-24-90 16:53:00 (Read 8 Times)
|
|||
|
From: PRAKASH JANAKIRAMAN
|
|||
|
To: ALL
|
|||
|
Subj: LEPROSY
|
|||
|
Exactly what is the Leprosy virus supposed to do? I was informed that it had
|
|||
|
been included in McAfee's latest version of Scan, but, having never used Scan
|
|||
|
before in my life, and never having encountered a virus, are there "symptoms",
|
|||
|
shall we say, caused by the Leprosy virus, or for any virus? If there is a
|
|||
|
textfile explaining what each virus is capable of doing, and how it can be
|
|||
|
detected, I'd like to get a copy of it, if any of you know where I can get
|
|||
|
something of that sort.
|
|||
|
|
|||
|
Also, does anyone have the number to McAfee's BBS? I'd like to become a user
|
|||
|
over there as well. (I remember it being in the 408 area code, but I can't
|
|||
|
recall the actual number). Anyways, thanks a bunch, all...
|
|||
|
|
|||
|
Prakash
|
|||
|
--- TBBS v2.1/NM
|
|||
|
* Origin: G.A.D.M. Multi-User TBBS Hayward,CA.(415) 581-3019 (1:161/208)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2896 *Virus Info*
|
|||
|
08-26-90 20:55:00 (Read 9 Times)
|
|||
|
From: HERB BROWN
|
|||
|
To: SANDY LOCKE
|
|||
|
Subj: REPLY TO MSG# 2754 (RE: COMMUNICATION VIRALS)
|
|||
|
With a sharp eye <Aug 25 06:10>, Sandy Locke (1:204/869) noted:
|
|||
|
SL> Well considering that I am hosting chuck forsberg today ... hes down
|
|||
|
SL>here for the sco developer forum I will put the question to him
|
|||
|
SL>directly... but as one of the suggestors for feature addition to the
|
|||
|
SL>protocol in another personna... ZMODEM will INDEED allow one to
|
|||
|
SL>transmit a FULL path name... however this is mitigated by the ability
|
|||
|
|
|||
|
I have the understanding that other protocols would do this, not by choice.
|
|||
|
Without the security on the recieving end, this could be disasterous, to say
|
|||
|
the least.. I would be happy to hear what you find.. Speaking of registering
|
|||
|
zmodem, is it still free to sysops? You can asnwer that in net-mail.. :-)
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Delta Point (1:396/5.11)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2897 *Virus Info*
|
|||
|
08-24-90 13:39:00 (Read 7 Times)
|
|||
|
From: MIKE MCCUNE
|
|||
|
To: VESSELIN BONTCHEV
|
|||
|
Subj: REPLY TO MSG# 2746 (REMOVING JOSHI)
|
|||
|
In your recent letter to me you wrote to me you suggested that I check for the
|
|||
|
virus before trying to remove it. Now that I've got a working copy of the Joshi
|
|||
|
(and don't have to let someone else test RMJOSHI), I rewrote the program to
|
|||
|
check for the virus first.
|
|||
|
mov dx,80h
|
|||
|
mov cx,1h
|
|||
|
mov bx,200h
|
|||
|
mov ax,201h
|
|||
|
int 13h
|
|||
|
or ah,ah
|
|||
|
jnz read_error
|
|||
|
es:
|
|||
|
cmp w[bx],1feb
|
|||
|
jnz no_virus
|
|||
|
mov cx,000ah
|
|||
|
mov ax,301h
|
|||
|
int 13h
|
|||
|
or ah,ah
|
|||
|
jnz write_error
|
|||
|
mov cx,9h
|
|||
|
mov ax,201h
|
|||
|
int 13h
|
|||
|
or ah,ah
|
|||
|
jnz read_error
|
|||
|
mov cx,1h
|
|||
|
mov ax,301h
|
|||
|
int 13h
|
|||
|
or ah,ah
|
|||
|
jnz write_error
|
|||
|
mov ah,9h
|
|||
|
lea dx,remove_message
|
|||
|
int 21h
|
|||
|
int 20h
|
|||
|
remove_message:
|
|||
|
db 'Joshi Removed$'
|
|||
|
no_virus:
|
|||
|
mov ah,9h
|
|||
|
lea dx,virus_message
|
|||
|
int 21h
|
|||
|
int 20h
|
|||
|
virus_message:
|
|||
|
db 'Joshi not found$'
|
|||
|
read_error:
|
|||
|
mov ah,9h
|
|||
|
lea dx,read_message
|
|||
|
int 21h
|
|||
|
int 20h
|
|||
|
read_message:
|
|||
|
db 'Read Error$'
|
|||
|
write_error:
|
|||
|
mov ah,9h
|
|||
|
lea dx,write_message
|
|||
|
int 21h
|
|||
|
int 20h
|
|||
|
write_message:
|
|||
|
db 'Write Error$'
|
|||
|
I wrote it for the shareware A86, but it should assemble under MASM, TASM or
|
|||
|
WASM with minor modifications. Next I will scan the memory for the virus
|
|||
|
because the remover won't work while the virus is active in memory....<MM>.
|
|||
|
|
|||
|
|
|||
|
--- Opus-CBCS 1.13
|
|||
|
* Origin: The Slowboat BBS (404-578-1691) Atlanta, GA (1:133/311.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2898 *Virus Info*
|
|||
|
08-25-90 23:46:00 (Read 6 Times)
|
|||
|
From: TALLEY RAGAN
|
|||
|
To: MIKE MCCUNE
|
|||
|
Subj: REPLY TO MSG# 2897 (RE: REMOVING JOSHI)
|
|||
|
|
|||
|
|
|||
|
In a message to Talley Ragan <08-23-90 15:23> Mike Mccune wrote:
|
|||
|
|
|||
|
MM>>No, it just modifies the partition record to remove the virus.
|
|||
|
MM>>If the virus isn't there, it still modifies the partition
|
|||
|
MM>>record.
|
|||
|
|
|||
|
Thanks for the information. That clears up the question just
|
|||
|
fine.
|
|||
|
|
|||
|
|
|||
|
Talley
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- ZAFFER v1.01
|
|||
|
--- QuickBBS 2.64 [Reg] Qecho ver 2.62
|
|||
|
* Origin: Southern Systems *HST DS* Tampa Fl (813)977-7065 (1:377/9)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2899 *Virus Info*
|
|||
|
08-23-90 17:31:00 (Read 6 Times)
|
|||
|
From: DAVID BURGESS
|
|||
|
To: MARTIN NICHOL
|
|||
|
Subj: REPLY TO MSG# 2661 (WHAT'S THE SOLUTION?)
|
|||
|
In a message to michael tunn <21 Aug 90 20:29:00> Martin Nichol wrote:
|
|||
|
|
|||
|
MN> mt said => It seems to me our Virus checking programs will just
|
|||
|
MN> mt said => get bigger and bigger as more viruses and strains of
|
|||
|
MN> mt said => the same viruses are discovered. If so (and if their
|
|||
|
MN> mt said => development is excelerating) then we may find in the
|
|||
|
MN> mt said => near future that it has become impossiable to deal
|
|||
|
MN> mt said => with the outbreaks!
|
|||
|
MN> mt said => Do we do develop new Operating Systems which are far
|
|||
|
MN> mt said => more secure!
|
|||
|
|
|||
|
MN> Develope different virus scanning programs. Make them more generic
|
|||
|
MN> where virus signatures/characteristics can be kept in a seperate
|
|||
|
MN> file and the virus scanner just reads the
|
|||
|
MN> file and interprets it accordingly.
|
|||
|
|
|||
|
That opens the door to having the virus scanner or part of the virus scanner
|
|||
|
to become contaminated.
|
|||
|
|
|||
|
|
|||
|
--- [Q] XRS 3.40
|
|||
|
* Origin: Eurkea! I've found the secret elephant playground (RAX 1:124/3106.6)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2900 *Virus Info*
|
|||
|
08-17-90 21:06:00 (Read 6 Times)
|
|||
|
From: CHRIS BARRETT
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: RE: VIRUCIDE V1.2
|
|||
|
Thanks for the info.. If ya remeber the name could ya tell us it..
|
|||
|
I think i'll stick with the ScanV?? and CleanP?? for now then..
|
|||
|
|
|||
|
Chris..
|
|||
|
--- TBBS v2.1/NM
|
|||
|
* Origin: 1990 MultiLine Perth Western Australia - 09-370-3333 - (690/654)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2901 *Virus Info*
|
|||
|
08-17-90 06:26:00 (Read 6 Times)
|
|||
|
From: ZEBEE JOHNSTONE
|
|||
|
To: ALL
|
|||
|
Subj: MAC VIRUS
|
|||
|
Anyone know anything about a mac virus which:
|
|||
|
|
|||
|
Sets the delete flag on any folder with a name which starts with the
|
|||
|
letter "o" or higher (eg system...)
|
|||
|
|
|||
|
IT doesn't actually delete the folder, the machine will still boot, but the
|
|||
|
folder is missing from the desktop and the delete flag is set.
|
|||
|
|
|||
|
Weird one hmm?
|
|||
|
|
|||
|
---
|
|||
|
* Origin: Lighten up! What man can make, man can break! (3:680/813)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2902 *Virus Info*
|
|||
|
08-19-90 22:31:00 (Read 6 Times)
|
|||
|
From: BRENDON THOMPSON
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: "STONED 2"
|
|||
|
Patti, I sent you a message the other day about a new variant of
|
|||
|
"Stoned" that I found in Christchurch, New Zealand. It had reference
|
|||
|
to some "S & S program for testing anti-virus software" and the
|
|||
|
phone number 0494 791900 in it.
|
|||
|
|
|||
|
I have since had the time to pull it to bits, and it is only the
|
|||
|
original "Stoned" virus. The code at the start of the sector is
|
|||
|
still the same, but some clown has modified the message after
|
|||
|
location 65H.
|
|||
|
|
|||
|
I'm still pleased to send you a specimen by airmail if you like,
|
|||
|
but it ain't "Stoned 2".
|
|||
|
|
|||
|
Regards..
|
|||
|
|
|||
|
|
|||
|
... Doon.
|
|||
|
--- Via Silver Xpress V2.26
|
|||
|
* Origin: TONY'S BBS - Gateway to New Zealand. (3:770/101)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2903 *Virus Info*
|
|||
|
08-19-90 09:25:00 (Read 6 Times)
|
|||
|
From: DONALD ANDERSON
|
|||
|
To: FRIAR NESTOR
|
|||
|
Subj: RE: LOOKIN' FOR FUN?
|
|||
|
I always looking for fun
|
|||
|
|
|||
|
|
|||
|
--- KramMail v3.15
|
|||
|
* Origin: get real (3:621/221.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2904 *Virus Info*
|
|||
|
08-26-90 23:36:00 (Read 7 Times)
|
|||
|
From: GLENN JORDAN
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: REPLY TO MSG# 2761 (ANTI VIRUS VIRUSES)
|
|||
|
PH> The Vacsina Viruses were written in Bulgaria to seek out and destroy
|
|||
|
PH> certain other viruses, or at least that was their original purpose.
|
|||
|
|
|||
|
|
|||
|
In examples of the VACSINA virus I have investigated, I have found the
|
|||
|
following odd behavior, which I wonder if you have also noted :
|
|||
|
|
|||
|
.COM files of over a certain size are infected at first bite, but .EXE
|
|||
|
files are different. It takes two Exposures to infect an .EXE file, each of
|
|||
|
which adds a bit to the file length, but only at the second exposure do you get
|
|||
|
a live virus, signaled by a short beep. A tiny .EXE will take the first
|
|||
|
exposure, but never complete on a subsequent exposure to become a live virus.
|
|||
|
I wonder if in some way this behavior, which I have not seen in any other
|
|||
|
viruses so far, is in some way related to the original "anti-virus" nature of
|
|||
|
this beast ?
|
|||
|
|
|||
|
--- XRS 3.30-DV (286)
|
|||
|
* Origin: Jordan Computer Consulting (RAX 1:151/223.3)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2905 *Virus Info*
|
|||
|
08-26-90 07:54:00 (Read 6 Times)
|
|||
|
From: KEN DORSHIMER
|
|||
|
To: SANDY LOCKE
|
|||
|
Subj: REPLY TO MSG# 2756 (RE: CRC CHECKING)
|
|||
|
|
|||
|
On 25-Aug-90 with bulging eyes and flailing arms Sandy Locke said:
|
|||
|
|
|||
|
SL> check out Gilmore Data Systems in LA authors of the OLD FICHECK and
|
|||
|
SL> XFICHECK... the techniques is called CRC padding after the addition of
|
|||
|
SL> the viral code the file is padded with a given number of bytes to make
|
|||
|
SL> the CRC Polynomial come out with the same result... the FCB is then
|
|||
|
SL> Patched to the original file length leaving nothing for standrad CRC
|
|||
|
SL> checkers to detect... Childs play really... sandyp.s. in the case of
|
|||
|
SL> most stealth viruses... the file read code is simply altered to
|
|||
|
SL> disinfect the file as the CRC checking program reads it... agains
|
|||
|
SL> simply childs play...
|
|||
|
SL>
|
|||
|
|
|||
|
could you send me this article? i still believe that the virus would have to
|
|||
|
know your crc algorithm in order to perform this magic. additionally if the
|
|||
|
file is padded, it's size would increase and would be detected that way.
|
|||
|
correct? sooo, the person writting the virus would require a copy of your
|
|||
|
file to disassemble, see how you performed your checks, then create a means
|
|||
|
to circumvent it. sounds like a lot of trouble to me for very little gain.
|
|||
|
catch ya on the rebound.
|
|||
|
|
|||
|
...All of my dreams are in COBOL...
|
|||
|
|
|||
|
|
|||
|
--- ME2
|
|||
|
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2906 *Virus Info*
|
|||
|
08-26-90 23:58:00 (Read 6 Times)
|
|||
|
From: KEN DORSHIMER
|
|||
|
To: STEVEN TREIBLE
|
|||
|
Subj: REPLY TO MSG# 2751 (RE: VOICE NUMBER)
|
|||
|
|
|||
|
On 26-Aug-90 with bulging eyes and flailing arms Steven Treible said:
|
|||
|
|
|||
|
ST> Ken, I haven't mailed the disk yet as you can see. I'd like to have
|
|||
|
ST> your voice # so I can talk to instead of sending Net Mail. Thanks,
|
|||
|
ST> Steve.
|
|||
|
|
|||
|
you got it look for it in a net-mail-o-gram. i'd rather not leave it in the
|
|||
|
public msg area as everyone would try to call and shoot the breeze. :-)
|
|||
|
|
|||
|
...All of my dreams are in COBOL...
|
|||
|
|
|||
|
|
|||
|
--- ME2
|
|||
|
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2907 *Virus Info*
|
|||
|
08-26-90 13:09:00 (Read 6 Times)
|
|||
|
From: PAUL BENDER
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: REPLY TO MSG# 2744 (VIRUS RESCUE & F-PROT RELEASES)
|
|||
|
* Replying to a message originally to All
|
|||
|
|
|||
|
PH> Both programs are also file requestable by other systems.
|
|||
|
PH> File requests should ask for magic file names as follows:
|
|||
|
PH>
|
|||
|
PH> F-PROT for the latest copy of F-PROT (currently
|
|||
|
PH> FPROT112.ZIP)
|
|||
|
PH> RESCUE for the latest version of Virus Rescue
|
|||
|
PH>
|
|||
|
|
|||
|
Would it be possible for you to hatch these out into SDS or arrange for the
|
|||
|
authors to do so?
|
|||
|
|
|||
|
Paul
|
|||
|
|
|||
|
--- RemoteAccess 0.04a via QEcho 2.
|
|||
|
* Origin: -=* Rassi's Retreat *=- 10pm to 8am Only! (615) 831-1338 (1:116/37)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2908 *Virus Info*
|
|||
|
08-26-90 12:44:00 (Read 7 Times)
|
|||
|
From: PATRICIA HOFFMAN
|
|||
|
To: ALL
|
|||
|
Subj: VIRUS_INFO INTRODUCTION & RULES
|
|||
|
Welcome to the VIRUS_INFO echo. The purpose of this echo is to allow
|
|||
|
BBS users and sysops to ask questions about computer viruses and to be
|
|||
|
able to get back up-to-date information. Discussion topics may include,
|
|||
|
but is not necessarily limited to:
|
|||
|
|
|||
|
- what are viruses
|
|||
|
- how to prevent getting infected
|
|||
|
- how to determine if your system is infected
|
|||
|
- how to clean up an infected system and salvage as much information
|
|||
|
as possible
|
|||
|
- reviews and announcements of new anti-viral products and product
|
|||
|
releases.
|
|||
|
|
|||
|
There was a lot of hysteria in the press over the Columbus Day/
|
|||
|
DataCrime/October 12 virus, for example, but little mentioned of how
|
|||
|
rare the virus is or how to determine if a system is infected with it
|
|||
|
and how to remove it. This type of information is an example of what
|
|||
|
this echo is intended to carry.
|
|||
|
|
|||
|
Some messages appearing in this conference may be cross-postings from
|
|||
|
the Dirty_Dozen echo which is sysop only. Cross-postings may only be
|
|||
|
done by the originator of the message. For example, several of my
|
|||
|
messages posted in the Dirty_Dozen echo will be cross-posted here.
|
|||
|
Messages from the HomeBase/CVIA BBS run by Mr. John McAfee in Santa
|
|||
|
Clara, CA and/or CVIA bulletins may be posted here by Patricia Hoffman,
|
|||
|
these are being done with Mr. McAfee's permission. Replies to these
|
|||
|
messages, as well as netmail received at 1:204/869 for Mr. McAfee, is
|
|||
|
manually transferred to his system as it is received.
|
|||
|
|
|||
|
Conference rules are very simple.....
|
|||
|
1. Discussions of how to write a virus, specific technical discussions
|
|||
|
of how a virus works, or anything of an illegal nature, are not
|
|||
|
allowed. This rule is *not* open to debate.
|
|||
|
2. Messages with a sexually suggestive nature are not allowed, please keep
|
|||
|
in mind that minors as well as adults participate in this conference.
|
|||
|
3. Discussions of a ethical or retorical nature that lead into a debate are
|
|||
|
considered off-topic in that they will not ever be resolved and do not
|
|||
|
help anyone. An example in this category would be a discussion in the
|
|||
|
area of "Should live viruses or virus disassemblies be made available
|
|||
|
to the public?". These questions and topics will be allowed until such
|
|||
|
a point that they start to severely disrupt the echo, or start a flame
|
|||
|
war. At that point, the moderator will request that the discussion be
|
|||
|
discontinued.
|
|||
|
4. Be courteous to your fellow echo participants, and remember there
|
|||
|
is no such thing as a dumb question, except for the question that some-
|
|||
|
one is afraid to ask. Everyone needs to help everyone else understand
|
|||
|
viruses and why they are a problem.
|
|||
|
5. This conference is not to be distributed thru Group-mail or any
|
|||
|
other mail processor which will obscure the ability to track a
|
|||
|
message back to an originating system. All messages must have
|
|||
|
seen-bys and path statements if the BBSs participatings software
|
|||
|
can generate them.
|
|||
|
6. If you have a question or problem of an extremely sensitive nature,
|
|||
|
consider sending it NetMail to 1:204/869 or 99:9403/2 instead of
|
|||
|
posting it here. If you are netmailing a file that you think is
|
|||
|
infected, be sure to send a message in NetMail with it so I know
|
|||
|
what it is, I'll be sure it gets to someone to get analysed for you.
|
|||
|
Do not under any circumstances host route a file that you think is
|
|||
|
infected. Suspect files may also be sent on diskette via US Mail
|
|||
|
to the following address:
|
|||
|
Patricia Hoffman
|
|||
|
1556 Halford Avenue #127
|
|||
|
Santa Clara, CA 95051
|
|||
|
7. This conference is available to FidoNet and EggNet systems.
|
|||
|
The conference echomail tag in FidoNet is VIRUS_INFO, in EggNet
|
|||
|
the conference is available as E_VIRUS_INFO.
|
|||
|
8. This conference is available on the FidoNet Backbone. While you
|
|||
|
are welcome to freely pass this echo along to other systems, out
|
|||
|
of region links must be approved by moderator of the echo. Gating
|
|||
|
the echo into another network or Zone must be approved by the
|
|||
|
conference moderator.
|
|||
|
9. Opinions are welcome in the conference, however the ethics of the
|
|||
|
behavior of people that write viruses, or name calling, is frowned
|
|||
|
upon. Likewise, accusations of virus writing are strictly forbidden.
|
|||
|
Please keep opinions down to a single message, and do not
|
|||
|
repeatedly post them, as these messages tend to water down the
|
|||
|
purpose of the conference and degrade the level of information that
|
|||
|
is being presented.
|
|||
|
10. Handling of off-topic messages or messages that violate the
|
|||
|
conference rules will be done by the moderator. First and second
|
|||
|
warnings on these messages will be in private Netmail. Please
|
|||
|
do not respond to the off-topic messages so that the conference
|
|||
|
doesn't get further off-track. Let the moderator do the moderating.
|
|||
|
11. Handles are allowed in this conference, however sysops of boards
|
|||
|
carrying the conference are expected to be able to determine which
|
|||
|
of their users entered a message if a problem arises. This in
|
|||
|
effect means, for example, that Opus systems must not set this echo
|
|||
|
up to allow anonymous messages.
|
|||
|
12. If a matter arises where the moderator needs to contact a participant
|
|||
|
in the echo, the moderator will contact the system where the message
|
|||
|
was entered and request that the sysop allow the user netmail access,
|
|||
|
or call the participant with a request for them to logon to the
|
|||
|
moderator's system or provide a phone number with the participant's
|
|||
|
permission. Sysops are not expected to provide their users' phone
|
|||
|
numbers to the moderator without the user's express permission, their
|
|||
|
privacy is important. There are times, however, when a phone call
|
|||
|
or chat can resolve a problem much faster than any other route. This is
|
|||
|
the only reason for this rule.
|
|||
|
12. This echo is not a programming echo for answering questions
|
|||
|
on how to code programs in assembler. If you want to exchange
|
|||
|
assembler (or any other program language) techniques, please
|
|||
|
locate an appropriate programming echo or start your own echo.
|
|||
|
|
|||
|
Patricia M. Hoffman is the moderator of the VIRUS_INFO echo conference. She
|
|||
|
has previously used the name "Merry Hughes" in moderating this conference, and
|
|||
|
is the originator of the conference and the original moderator.
|
|||
|
|
|||
|
Patricia Hoffman is also the author of the Virus Information Summary List, and
|
|||
|
is an independent anti-viral researcher.
|
|||
|
|
|||
|
Please contact the moderator, Patricia Hoffman, at 1:204/869 or 99:9403/2
|
|||
|
if you need assistance on setting up an echofeed for this echo to your
|
|||
|
system.
|
|||
|
|
|||
|
|
|||
|
thanks...
|
|||
|
Patti
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2909 *Virus Info*
|
|||
|
08-26-90 15:13:00 (Read 7 Times)
|
|||
|
From: PATRICIA HOFFMAN
|
|||
|
To: PRAKASH JANAKIRAMAN
|
|||
|
Subj: REPLY TO MSG# 2763 (LEPROSY)
|
|||
|
PJ> Exactly what is the Leprosy virus supposed to do? I was informed that
|
|||
|
PJ> it had been included in McAfee's latest version of Scan, but, having
|
|||
|
PJ> never used Scan before in my life, and never having encountered a
|
|||
|
PJ> virus, are there "symptoms", shall we say, caused by the Leprosy virus,
|
|||
|
PJ> or for any virus? If there is a textfile explaining what each virus is
|
|||
|
PJ> capable of doing, and how it can be detected, I'd like to get a copy of
|
|||
|
PJ> it, if any of you know where I can get something of that sort.
|
|||
|
|
|||
|
The Leprosy virus is a non-resident overwriting virus. It infects .COM and
|
|||
|
.EXE files, overwriting the first 666 bytes of the file. Symptoms of it
|
|||
|
include that infected files will not execute properly...instead of what they
|
|||
|
are supposed to do, they will upon execution, infect other files then display a
|
|||
|
message and end. A complete description of this virus and all (with the
|
|||
|
exception of V2P2, V2P6, V2P6 and Stoned II) known MS-DOS viruses as of August
|
|||
|
10, 1990 is available in the Virus Information Summary List. Its current
|
|||
|
version is VSUM9008.ZIP. It is available on my system at 408-244-0813, as well
|
|||
|
as many other systems, including McAfee's BBS. Check around your area before
|
|||
|
you make the long distance call, it could save you the phone call cost.
|
|||
|
|
|||
|
PJ>
|
|||
|
PJ> Also, does anyone have the number to McAfee's BBS? I'd like to become a
|
|||
|
PJ> user over there as well. (I remember it being in the 408 area code, but
|
|||
|
PJ> I can't recall the actual number). Anyways, thanks a bunch, all...
|
|||
|
|
|||
|
The number of the HomeBase BBS is 408-988-4004. The 9600 HST number is
|
|||
|
408-988-5138.
|
|||
|
|
|||
|
Patti
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2910 *Virus Info*
|
|||
|
08-24-90 23:05:00 (Read 7 Times)
|
|||
|
From: CY WELCH
|
|||
|
To: TALLEY RAGAN
|
|||
|
Subj: REPLY TO MSG# 2898 (REMOVING JOSHI)
|
|||
|
In a message to Mike Mccune <20 Aug 90 17:09:00> Talley Ragan wrote:
|
|||
|
|
|||
|
>MM>> Just be sure to boot off a clean diskette to remove the
|
|||
|
>MM>>virus from memory, otherwise the virus will not be removed.
|
|||
|
>MM>> If RMJOSHI is used on an unifected hard drive, it will
|
|||
|
>MM>>destroy the partition table. This next program, RETURN.COM
|
|||
|
>MM>>will restore the partition table.
|
|||
|
>MM>> I will post this program in my next listing...<MM>.
|
|||
|
|
|||
|
TR> Does this mean that RMJOSHI.COM, if run on an uninfected hard
|
|||
|
TR> drive by it self is a virus?
|
|||
|
|
|||
|
Actually I think it would fit the description of trojan rather than virus as it
|
|||
|
doesn't replicate.
|
|||
|
|
|||
|
--- XRS! 3.40+
|
|||
|
* Origin: Former QuickBBS Beta Team Member (99:9402/122.1) (Quick 1:125/122.1)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2911 *Virus Info*
|
|||
|
08-26-90 21:13:00 (Read 6 Times)
|
|||
|
From: TOM PREECE
|
|||
|
To: SANDY LOCKE
|
|||
|
Subj: REPLY TO MSG# 2758 (RE: REMAPPING...)
|
|||
|
As you may see by looking at my other entry's, I have been loading a cache
|
|||
|
program that is clearly implementing software to remap my keys to s certain
|
|||
|
extent. If this is possible as a glitch, its is obviously possible as an
|
|||
|
attack. Let's hope it never comes to that.
|
|||
|
--- TBBS v2.1/NM
|
|||
|
* Origin: G.A.D.M. Multi-User TBBS Hayward,CA.(415) 581-3019 (1:161/208)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2993 *Virus Info*
|
|||
|
08-27-90 07:54:00 (Read 7 Times)
|
|||
|
From: JAMES DICK
|
|||
|
To: KEN DORSHIMER
|
|||
|
Subj: REPLY TO MSG# 2762 (RE: HAVE ANYONE TRIED SECURE ?)
|
|||
|
On Fri, 24 Aug, 1990 at the ungodly hour of 23:37, while ducking Broccoli Jello
|
|||
|
and drinking jolt, Ken Dorshimer wrote to Kevin Higgins, TO WIT...
|
|||
|
|
|||
|
KD > sounds like a plan to me. it would actually be fairly simple to write
|
|||
|
KD > a
|
|||
|
KD > program to look at all the files in your upload directory, unpack them
|
|||
|
KD > based
|
|||
|
KD > on the extension, scan them, then re-compress them (if needed). of
|
|||
|
|
|||
|
Sounds like CHECKOUT....available here, homebase excaliber! and others as
|
|||
|
CKOT11.*
|
|||
|
|
|||
|
-={ Jim }=-
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: The Clipperist - Home to happy Clippheads in Ottawa, Canada
|
|||
|
(1:163/118.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2994 *Virus Info*
|
|||
|
08-27-90 19:34:00 (Read 6 Times)
|
|||
|
From: PHILLIP LAIRD
|
|||
|
To: ALAN DAWSON
|
|||
|
Subj: REPLY TO MSG# 2750 (RE: SCAN WEIRDNESS)
|
|||
|
** Quoting Alan Dawson to Patricia Hoffman **
|
|||
|
>among them a SCAN-known Dark Avenger. I SCAN this floppy from
|
|||
|
>the C
|
|||
|
>drive, and the "hey, nothing to worry about there" report comes
|
|||
|
>back.
|
|||
|
>Strange. I SCAN it again. This time 'round, SCAN barfs after
|
|||
|
>
|
|||
|
>--- Opus-CBCS 1.13
|
|||
|
> * Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand
|
|||
|
>(3:608/9.0)
|
|||
|
** End of Quote **
|
|||
|
|
|||
|
Allan, I NEVER SCAN from the C Drive or any hard disk. I always scan from a
|
|||
|
write protected Floppy Diskette in Drive A. I also have a third system (Yep
|
|||
|
that's right a third system to do all my scanning from. However, I have never
|
|||
|
had happen to me what happened to you. I did one time find Scan.EXE infected
|
|||
|
at my place of employment when I didn't write protect the floppy and scanned
|
|||
|
the b drive, PLEASE write protect the floppy or SCAN.EXE on the hard drive...
|
|||
|
|
|||
|
--- TAGMAIL v2.20
|
|||
|
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2995 *Virus Info*
|
|||
|
08-27-90 19:50:00 (Read 10 Times)
|
|||
|
From: PHILLIP LAIRD
|
|||
|
To: SANDY LOCKE
|
|||
|
Subj: REPLY TO MSG# 2753 (RE: VIRUS ORIGINALS)
|
|||
|
Sandy, maybe this might help. I have read an excellent book on the Subject of
|
|||
|
Origins of Viruses, but let me quote you guys first...
|
|||
|
|
|||
|
** Quoting Sandy Locke to Sky Raider **
|
|||
|
>SR> effort to see what kind of stuff could be done with them,
|
|||
|
>a group of
|
|||
|
>SR> programmers (financed by the US government as I recall)
|
|||
|
>institued a se
|
|||
|
>SR> programs that would attempt to 'beat' others in taking
|
|||
|
>over a computer
|
|||
|
>SR> system. These programs led to a gaming system known as
|
|||
|
>the CORE WARS.
|
|||
|
>SR> today there is an International Core Wars Society.
|
|||
|
>
|
|||
|
>SR> I think it can be easily seen how a program to destroy/circumvent
|
|||
|
>a st
|
|||
|
>SR> operating system can develope into a virus.
|
|||
|
>
|
|||
|
>SR> I tried to double check this information for accuracy,
|
|||
|
>names, dates, e
|
|||
|
>SR> but it seems I have deleted this file. I will try to get
|
|||
|
>further info
|
|||
|
>SR> you, but beleive this info is shrouded in secrecy, and
|
|||
|
>may be hard to
|
|||
|
>SR> relocate.
|
|||
|
>
|
|||
|
>SR> So, the original viruses did come from the US (and even
|
|||
|
>possibly with
|
|||
|
>SR> government help).
|
|||
|
>
|
|||
|
>SR> Ivan Baird
|
|||
|
>SR> * Origin: Northern Connection, Fredericton, N.B. Canada
|
|||
|
><HST 14.4K>
|
|||
|
>SR> (1:255/3)
|
|||
|
>WHAT a LOAD of UNADULTERATED CRAP... redcode is simply a GAME
|
|||
|
>created by
|
|||
|
>bored programmers... ORIGINAL CORE WARS games were created
|
|||
|
>as far back
|
|||
|
>as 1969 back on the OLD IBM 360 architectures under both OS/MFT
|
|||
|
>and
|
|||
|
>OSMVT OS's... neither had anything to do with so-called secret
|
|||
|
>financing by the US government...BTW I was AROUND and A Systems
|
|||
|
>Programmer during that period... we created our own versions
|
|||
|
>when we
|
|||
|
>heard of the rumours... it was an old system programmers game
|
|||
|
>designed
|
|||
|
>to give Egotistal programmers some lighthearted fun... at this
|
|||
|
>point
|
|||
|
>ALL code ran in real Address space and redcode hadnt even been
|
|||
|
>though
|
|||
|
>of... the MUCH later article by Scientific American in 1979
|
|||
|
>gave this
|
|||
|
>fun with out harm via the redcode interpreter implemented on
|
|||
|
>early 6502
|
|||
|
>and 8080 systems... really... I am going to have to move to
|
|||
|
>canada...
|
|||
|
>sounds like there are some really potent and fun drugs in circulation
|
|||
|
>up there... jeese... what a simp...
|
|||
|
> sandy
|
|||
|
>
|
|||
|
>
|
|||
|
>--- QM v1.00
|
|||
|
> * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813
|
|||
|
>(1:204/869.0)
|
|||
|
** End of Quote **
|
|||
|
|
|||
|
O.K. The above message is what I am quoting to you....
|
|||
|
|
|||
|
If you get a chance, you can pick this book up at Wladen Software at the
|
|||
|
following locations in California and maybe other bookstores near you can order
|
|||
|
the book, too:
|
|||
|
|
|||
|
Viruses, A High Tech Disease
|
|||
|
By Ralph Burger
|
|||
|
Published by Abacus
|
|||
|
ISBN 1557550433
|
|||
|
Retails at 18.95 US
|
|||
|
|
|||
|
Can be picked up at the following Walden Software Stores:
|
|||
|
|
|||
|
Doly City, Ca (415) 756-2430
|
|||
|
San Leandro, Ca (415) 481-8884
|
|||
|
|
|||
|
It starts from way back when...
|
|||
|
|
|||
|
Phillip Laird
|
|||
|
|
|||
|
--- TAGMAIL v2.20
|
|||
|
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 2996 *Virus Info*
|
|||
|
08-27-90 19:58:00 (Read 7 Times)
|
|||
|
From: PHILLIP LAIRD
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: REPLY TO MSG# 2760 (RE: ONTARIO VIRUS)
|
|||
|
** Quoting Patricia Hoffman to Phillip Laird **
|
|||
|
>after it was submitted by Mike Shields (Sysop of 1:244/114).
|
|||
|
> Ontario is a memory resident generic infector of .COM and
|
|||
|
>.EXE files, including COMMAND.COM. Infected .COM files will
|
|||
|
>increase in length by 512 bytes. Infected .EXE files will
|
|||
|
>A more complete description of the Ontario virus is in VSUM9008,
|
|||
|
>which was released on August 10. The above is just off of
|
|||
|
>the top of my head, which happens to hurt right now. Hope
|
|||
|
>it is understandable.....
|
|||
|
>
|
|||
|
>Patti
|
|||
|
>
|
|||
|
>
|
|||
|
>--- QM v1.00
|
|||
|
> * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813
|
|||
|
>(1:204/869.0)
|
|||
|
** End of Quote **
|
|||
|
|
|||
|
Yea, I think Mike was the one the message came from I read about. He Was
|
|||
|
instrumental in helping us with another problem he found, too. I am sure that
|
|||
|
he is on the up and up about the hard disk problems. Nope, I don't have the
|
|||
|
Ontario Virus that I know of! I read about the Virus after I had posted to
|
|||
|
you, Thanx for the info. Nice to know where it loads in Mem, that would make
|
|||
|
a util easier to write once I had a fix on what you have already told me.
|
|||
|
|
|||
|
I will see if I can locate that message from Mike about the Virus originally
|
|||
|
and let you read it...
|
|||
|
|
|||
|
--- TAGMAIL v2.20
|
|||
|
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3029 *Virus Info*
|
|||
|
08-26-90 14:01:00 (Read 7 Times)
|
|||
|
From: RICK WILSON
|
|||
|
To: SANDY LOCKE
|
|||
|
Subj: RE: CORE WARS
|
|||
|
yep core wars was something that a bunch of people that had access to systems
|
|||
|
messed with after hours, there was a artical in DDJ a few years ago about a
|
|||
|
bunch of em out a Berkely of Stanford or something. really weired how these
|
|||
|
folks that have recently ( within the last 8 to 10 years ) become such experts
|
|||
|
on micros and mainframes and their history. later...
|
|||
|
Rick
|
|||
|
|
|||
|
--- Telegard v2.5 Standard
|
|||
|
* Origin: Telegard BBS (000-000-0000) (1:161/88.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3030 *Virus Info*
|
|||
|
08-26-90 16:45:00 (Read 7 Times)
|
|||
|
From: JOE MORLAN
|
|||
|
To: CY WELCH
|
|||
|
Subj: KEYBOARD REMAPPING.
|
|||
|
In addition to PKWares's Safe-ANSI, ZANSI does not support keyboard remapping.
|
|||
|
However, NANSI.SYS does have keyboard remapping.
|
|||
|
|
|||
|
--- Telegard v2.5 Standard
|
|||
|
* Origin: Telegard BBS (000-000-0000) (1:161/88.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3070 *Virus Info*
|
|||
|
08-30-90 23:11:45 (Read 9 Times)
|
|||
|
From: SKY RAIDER
|
|||
|
To: SANDY LOCKE
|
|||
|
Subj: REPLY TO MSG# 2753 (Re: VIRUS ORIGINALS)
|
|||
|
Firstly, I did not wish to anger you (although I seem to have done just this),
|
|||
|
but only sought to answer your question to the best of my abilities (which you
|
|||
|
seem to doubt).
|
|||
|
|
|||
|
Secondly, I stand by my original assertions that viruses were developed through
|
|||
|
the original Core Wars gaming system. This has been corroborated by various
|
|||
|
'virus gurus' here at the local university. In fact, without prompting, one
|
|||
|
mentioned Bell Labs. Since, as you state, you are a Systems Programmer - it
|
|||
|
should be obvious to yourself that a RedCode program could be easily adapted to
|
|||
|
the microcomputer world. It should also be equally as obvious that these
|
|||
|
RedCode experiments have laid the groundwork for many of the various virus
|
|||
|
types infecting micros today (ie. trojans, worms, etc.).
|
|||
|
|
|||
|
Thirdly, I did not state, nor did I mean to imply (as you seem to believe),
|
|||
|
that these RedCode 'fighter programs' are in fact the viruses we see today -
|
|||
|
merely that they (RedCode fighters) provided the techniques for the micro
|
|||
|
viruses. Furthermore, since the RedCode experiments were "old system
|
|||
|
programmers games designed to give Egoistical programmers some lighthearted
|
|||
|
fun", and since it is generally accepted that virus writers are in this for the
|
|||
|
same reasons (the egotistical, not the fun), I find it hard to beleive that you
|
|||
|
cannot equate the two.
|
|||
|
|
|||
|
If you will note in the extract below, I am not the only person who who
|
|||
|
beleives the RedCode experiments were the forerunners of the modern viruses (in
|
|||
|
fact, it may be noted they refer to these as viruses - which, of course, they
|
|||
|
were);
|
|||
|
|
|||
|
|
|||
|
From the Sept./89 issue of Popular Science;
|
|||
|
|
|||
|
Despite all the recent publicity, viruses aren't new. In the 1950's researchers
|
|||
|
studied programs the called "self-altering automata," says Mike Holm...
|
|||
|
|
|||
|
In the 1960s computer scientists at Bell Laboratories had viruses battling each
|
|||
|
other in a game called Core Wars. The object was to create a virus small enough
|
|||
|
to destroy other viruses without being caught....
|
|||
|
|
|||
|
|
|||
|
Also, just for the record, allow me to mention that this is an American
|
|||
|
publication (apparently there are strange drugs down there too).
|
|||
|
|
|||
|
Again, for the record, allow me to mention that it is fact that Robert Morris,
|
|||
|
Sr. was a participant in the Core Wars games. Is it a coincidence that his son
|
|||
|
wrote the Internet Virus, or did his father give him the building blocks to
|
|||
|
build upon? (With my apologies to the Morris family, but I felt this example
|
|||
|
might carry some weight with Know-it-all System Programmers).
|
|||
|
|
|||
|
To answer your original question, in a form that you may deem acceptable (ie.
|
|||
|
no RedCode, no mainframe systems, the US is not the origin - all those naive
|
|||
|
things), the original micro virus was (at least in the IBM world, I can not be
|
|||
|
sure this applies to early Apple ][ systems, or even the Pets from Commodore)
|
|||
|
the "Pakistani Brain", released in Jan. '86.
|
|||
|
|
|||
|
But it must be noted (although I feel you will reject this also (ie. mainframe,
|
|||
|
US, etc)), in Nov. '83, Fred Cohen, in 8 hours wrote a virus which attached
|
|||
|
itself to users programs, and proceeded to use this program to gain access to
|
|||
|
all system rights (in an average time of 30 mins). Also, although I don't have
|
|||
|
a date (the computer name itself may give some indication of age) - on a UNIVAC
|
|||
|
1108, with a secure operating system using the Bell-Lapadula model for OS
|
|||
|
security, a virus was created that: infected the system in 26 hours, used only
|
|||
|
legitimate activity with the Bell-Lapadula rules, and the infection took only
|
|||
|
250 (approx.) of code (From "Computer Security: Are Viruses the AIDS of the
|
|||
|
Computing Industry?", by Prof. Wayne Patterson, Chairman, Dept. of Computer
|
|||
|
Science, University of New Orleans.).
|
|||
|
|
|||
|
I am not interested in a war of words, so I will suggest some reading before
|
|||
|
you go off half cocked to this reply - "Computer Security; A Global Challenge,"
|
|||
|
J.W. Finch & E.G. Douglas, eds., Elsevier Science Publishers, North-Holland -
|
|||
|
especially the chapters by Fred Cohen. I have not read this, but will try to
|
|||
|
when it becomes available to me. Also see the message posted by Phillip Laird.
|
|||
|
--- TBBS v2.1/NM
|
|||
|
* Origin: Northern Connection, Fredericton, N.B. Canada <HST 14.4K> (1:255/3)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3154 *Virus Info*
|
|||
|
08-28-90 06:33:00 (Read 7 Times)
|
|||
|
From: PATRICIA HOFFMAN
|
|||
|
To: ALAN DAWSON
|
|||
|
Subj: REPLY TO MSG# 2994 (SCAN WEIRDNESS)
|
|||
|
AD> Anybody heard of this? I've got a floppy with some viruses on it,
|
|||
|
AD> among them a SCAN-known Dark Avenger. I SCAN this floppy from the C
|
|||
|
AD> drive, and the "hey, nothing to worry about there" report comes back.
|
|||
|
AD> Strange. I SCAN it again. This time 'round, SCAN barfs after 64K of
|
|||
|
AD> the memory check, telling me Dark Avenger is in memory, power down,
|
|||
|
AD> load the .45, get the cyanide tablet ready and so on.
|
|||
|
AD> But DA of course is NOT in memory or active in any way. It is,
|
|||
|
AD> however, on the floppy, unrun.
|
|||
|
AD> The above occurred with SCANV64. Out of curiosity, I cranked up
|
|||
|
AD> SCAN-54 and -- EXACTLY the same result.
|
|||
|
AD> AST Bravo 286, no TSRs, nothing else loaded, clean (normal) boot
|
|||
|
AD> just performed.
|
|||
|
AD> I have a bunch of viruses that I don't expect SCAN to find --
|
|||
|
AD> ever. But this kind of thing has never happened to me before. Can
|
|||
|
AD> anyone match this story, or event?
|
|||
|
|
|||
|
There are a couple of possibilities here. First, if the virus is on a
|
|||
|
non-executable file, such as one with a .VOM or .VXE extension, Scan won't find
|
|||
|
it since it is not one of the file extensions it checks for Dark Avenger. In
|
|||
|
this case, a subsequent run of Scan may find it in memory anyways since the DOS
|
|||
|
buffers in memory are not cleaned out between program executions. If this is
|
|||
|
the case, running Scan with the /A option will find it on any file, regardless
|
|||
|
of extension.
|
|||
|
|
|||
|
Likewise, if your copy of Dark Avenger has ever had a disinfector run against
|
|||
|
it, it may have some "dead" Dark Avenger code after the end of file mark, but
|
|||
|
within the last sector of the program as allocated on disk. In this case, Scan
|
|||
|
won't find it on disk, but may later find it in memory since the code after the
|
|||
|
end of file mark was read in with the rest of the last sector of the program to
|
|||
|
memory. This is what is sometimes referred to as a "ghost virus", it isn't
|
|||
|
really the virus, just dead remnant code remaining in the slack space in the
|
|||
|
sector. It can't be executed. Running a disk optimization utility such as
|
|||
|
Speed Disk from Norton Utilities will get rid of the "ghost virus". They are
|
|||
|
caused by the way DOS fills out the end of the buffer before it writes it out
|
|||
|
to disk, doesn't always occur when disinfecting programs, but it sometimes will
|
|||
|
occur.
|
|||
|
|
|||
|
The other case is if your copy of Dark Avenger does not occur at the correct
|
|||
|
place in the file. Dark Avenger always adds its code to the End Of Programs.
|
|||
|
If your copy happens to have it at the beginning of the program, or perhaps
|
|||
|
imbedded in the middle where it shouldn't be, it may not get found. In this
|
|||
|
case, your copy doesn't match either of the Dark Avenger's that McAfee has.
|
|||
|
|
|||
|
Hope that helps....those are the only three cases that I've heard of a similar
|
|||
|
problem to yours.
|
|||
|
|
|||
|
Patti
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3155 *Virus Info*
|
|||
|
08-28-90 15:16:00 (Read 5 Times)
|
|||
|
From: KEN DORSHIMER
|
|||
|
To: JAMES DICK
|
|||
|
Subj: REPLY TO MSG# 2993 (RE: HAVE ANYONE TRIED SECURE ?)
|
|||
|
|
|||
|
On 27-Aug-90 with bulging eyes and flailing arms James Dick said:
|
|||
|
|
|||
|
JD> On Fri, 24 Aug, 1990 at the ungodly hour of 23:37, while ducking
|
|||
|
JD> Broccoli Jello and drinking jolt, Ken Dorshimer wrote to Kevin
|
|||
|
JD> Higgins, TO WIT...
|
|||
|
KD >> sounds like a plan to me. it would actually be fairly simple to write
|
|||
|
KD >> a
|
|||
|
KD >> program to look at all the files in your upload directory, unpack them
|
|||
|
KD >> based
|
|||
|
KD >> on the extension, scan them, then re-compress them (if needed). of
|
|||
|
|
|||
|
JD> Sounds like CHECKOUT....available here, homebase excaliber! and
|
|||
|
JD> others as CKOT11.*
|
|||
|
JD>
|
|||
|
thanks but you might want to tell kevin higgins about that. :-) as for me,
|
|||
|
hell i'll write the bloody thing myself. just wouldn't be a day without some
|
|||
|
programming in it.
|
|||
|
|
|||
|
...All of my dreams are in COBOL...
|
|||
|
|
|||
|
|
|||
|
--- ME2
|
|||
|
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3156 *Virus Info*
|
|||
|
08-27-90 14:14:00 (Read 5 Times)
|
|||
|
From: MICHAEL CHOY
|
|||
|
To: ALL
|
|||
|
Subj: IN THE MAC WORLD
|
|||
|
Disinfectant 2.0 was released in July...it has the Disinfectant INIT, which is
|
|||
|
like SAM only it removes viruses as well as detecting them..it catches the
|
|||
|
Frankie virusa whoch in an old virus that ran on mac emulators for Atari..I
|
|||
|
guess nobody has to worry about that...it also has much more info on protecting
|
|||
|
yourself from virus and such..
|
|||
|
|
|||
|
--- Telegard v2.5 Standard
|
|||
|
* Origin: Telegard BBS (000-000-0000) (1:161/88.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3157 *Virus Info*
|
|||
|
08-27-90 20:25:00 (Read 5 Times)
|
|||
|
From: JOE MORLAN
|
|||
|
To: ALL
|
|||
|
Subj: LHARC114?
|
|||
|
I had heard that and infected version of LHARC was released last year under the
|
|||
|
name LHARC114. I also heard that because of that, the next release of LHARC
|
|||
|
was expected to be LHARC200 to avoid confustion with the virus. This week a
|
|||
|
file appeared on a local board called LHARC114. I left a message to the sysop
|
|||
|
to check it out and he says it's clean. The docs say that this is version
|
|||
|
114b, the latest version.
|
|||
|
|
|||
|
Does anybody know what the deal is or was here? Is LHARC114 safe to use? Is
|
|||
|
there a virus associated with this program? Thanks.
|
|||
|
|
|||
|
--- Telegard v2.5 Standard
|
|||
|
* Origin: Telegard BBS (000-000-0000) (1:161/88.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3158 *Virus Info*
|
|||
|
08-28-90 15:01:00 (Read 6 Times)
|
|||
|
From: KEVIN HIGGINS
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: REPLY TO MSG# 3155 (RE: HAVE ANYONE TRIED SECURE ?)
|
|||
|
Thanks for the info on CheckOut. I'd seen the file description usage
|
|||
|
included in a .bat for for TAG, but never implemented it, or d/l'd the checkout
|
|||
|
file because on my XT it sometimes takes awhile to dearc. a large .zip file--a
|
|||
|
real pain for L/D types... Probably be wise to start using something like that,
|
|||
|
though, since the BBS can do all the checking automatically following
|
|||
|
uploads....
|
|||
|
Guess most users won't mind waiting a minute or so, if it makes their d/l's
|
|||
|
almost certifiably safe.
|
|||
|
Kevin
|
|||
|
|
|||
|
--- TAGMAIL v2.40.02 Beta
|
|||
|
* Origin: The Hornet's Nest BBS (1:128/74)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3177 *Virus Info*
|
|||
|
08-28-90 18:10:00 (Read 6 Times)
|
|||
|
From: RICK PERCIVAL
|
|||
|
To: KEVIN HIGGINS
|
|||
|
Subj: REPLY TO MSG# 3158 (RE: HAVE ANYONE TRIED SECURE ?)
|
|||
|
> command line and let the .bat file take care of unzipping, scanning
|
|||
|
> and rezipping the file. Be best if someone would write a program
|
|||
|
> that would do this, but I haven't found one yet.
|
|||
|
> Kevin
|
|||
|
|
|||
|
Hi there, you guys must be behind the times or something but there is a very
|
|||
|
good program which does exactly what you are looking for. Its called CHECKOUT.
|
|||
|
The version we are using over here is called CKOT11.ZIP and it is a little
|
|||
|
pearler!!
|
|||
|
|
|||
|
What it does is, unzips a file, scans it and rezips it, menu driven or
|
|||
|
command line driven. Try it, you'll love it.
|
|||
|
|
|||
|
--- FD 1.99c
|
|||
|
* Origin: The Cyclops BBS Auckland NEW ZEALAND (3:772/170)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3178 *Virus Info*
|
|||
|
08-14-90 09:39:00 (Read 7 Times)
|
|||
|
From: DAN BRIDGES
|
|||
|
To: KEN DORSHIMER
|
|||
|
Subj: RE: CRC?
|
|||
|
I've been reading, with interest, the messages about a program that provides a
|
|||
|
demo of circumventing a single CRC generating program. I thought that its name
|
|||
|
would be common knowledge, but apparently it isn't.
|
|||
|
|
|||
|
You were told the name of the file was MCRCx. May I suggest that you look for
|
|||
|
it as FICHECKx. The one I got is v5 and has program called PROVECRC which
|
|||
|
demonstrates the problem.
|
|||
|
|
|||
|
|
|||
|
**********************
|
|||
|
* FICHECK Ver 5.0 *
|
|||
|
* MFICHECK Ver 5.0 *
|
|||
|
**********************
|
|||
|
|
|||
|
(C)Copyright 1988,1989 Gilmore Systems
|
|||
|
P.O. Box 3831, Beverly Hills, CA 90212-0831
|
|||
|
U.S.A.
|
|||
|
|
|||
|
Voice: (213) 275-8006 Data: (213) 276-5263
|
|||
|
|
|||
|
Cheers,
|
|||
|
Dan (no connection with the above firm).
|
|||
|
|
|||
|
--- Maximus-CBCS v1.02
|
|||
|
* Origin: Marwick's MadHouse (3:640/820)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3179 *Virus Info*
|
|||
|
08-18-90 14:19:00 (Read 7 Times)
|
|||
|
From: YVETTE LIAN
|
|||
|
To: FRED GOLDFARB
|
|||
|
Subj: RE: VIRUS GROUPS....
|
|||
|
FG> writing viruses". The idea I got was that there are actual
|
|||
|
FG> "virus groups" similar to the game cracking groups you hear
|
|||
|
FG> of occasionally, who's sole purposes are to write viruses,
|
|||
|
FG> not for research's sake, but to infect people. Has anyone
|
|||
|
FG> else heard of this before? Are there really such groups?
|
|||
|
FG> Imagine, when a new virus comes out three or four groups
|
|||
|
FG> claiming to be the writers.. Kinda like terrorist bombings
|
|||
|
FG> only different. Come to think of it, I remember reading a
|
|||
|
|
|||
|
That'd be right... you would think that if these people were intelligent enough
|
|||
|
to program something such as a virus they'd probably be better off not wasting
|
|||
|
their time with it...
|
|||
|
|
|||
|
--- QuickBBS 2.64 (Eval)
|
|||
|
* Origin: Virus Info .. how to do it and not get it ! (3:640/886)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3180 *Virus Info*
|
|||
|
08-18-90 14:42:00 (Read 7 Times)
|
|||
|
From: ROD FEWSTER
|
|||
|
To: KERRY ROBINSON
|
|||
|
Subj: RE: VIRUS CHECKERS
|
|||
|
> In a message of <12 Jun 90 7:31:31>, Patrick Curry (1:133/425) writes:
|
|||
|
>
|
|||
|
> Rarely does a MAC get a virus It is an IBM phonomonum
|
|||
|
^^^^^^^^^^^^^^^^^^^^^^^
|
|||
|
Tell it to an Amiga user !! B-)
|
|||
|
|
|||
|
--- FD 1.99c
|
|||
|
* Origin: The Edge of Reality .. THE NIGHTMARE BEGINS ! (3:640/886)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3181 *Virus Info*
|
|||
|
08-30-90 13:01:00 (Read 7 Times)
|
|||
|
From: BRIAN WENDT
|
|||
|
To: ALL
|
|||
|
Subj: NEWSPAPER CLIPPING
|
|||
|
The following item appeared in a newspaper in Brisbane, Austsralia yesterday.
|
|||
|
Anyone care to comment?
|
|||
|
|
|||
|
VIRUS ATTACKS STATE'S PERSONAL COMPUTERS
|
|||
|
|
|||
|
A sophisticated computer virus is feared to have infected Queensland Government
|
|||
|
and home computers. The COMPUTER VIRUS INFORMATION GROUP at the QUEENSLAND
|
|||
|
UNIVERSITY OF TECHNOLOGY has issued it first major warning to personal computer
|
|||
|
users about the virus.
|
|||
|
|
|||
|
The virus, initially detected by the Israeli defence force, freezes computers
|
|||
|
on September 22, the birthday of a character in Tolkien's book, 'Lord of the
|
|||
|
Rings'.
|
|||
|
|
|||
|
A computer virus is a program designed to attach copies of itself to software
|
|||
|
and disable a computer system, or destroy files. Acting technologist, MR
|
|||
|
EMLYN CREEVY said the warning was issued after a State Government public
|
|||
|
servant gave the virus to the group for investigation.
|
|||
|
|
|||
|
Mr Creevy said somputers infected with the virus - known as FRODO, 4096, or
|
|||
|
CENTURY - would freeze on September 22 or until the end of the year unless it
|
|||
|
was removed. He said the group expected to know if the virus had infected
|
|||
|
computers in Queensland next week after users report the results of searches
|
|||
|
they were requested to conduct. The group warned all personal computer
|
|||
|
operators that there was a bug in the FRODO virus which prevented it from
|
|||
|
displaying a message 'FRODO LIVES' on September 22 and instead caused the
|
|||
|
computer to 'hang' or freeze.
|
|||
|
|
|||
|
"It is from the FRODO name that the significance of the 22nd September can be
|
|||
|
identified," they said. "This is the birthday of Frodo Baggins in Tolkien's
|
|||
|
story. Users are advised to theck for the virus as soon as possible.
|
|||
|
|
|||
|
Mr Creevy said the virus had the ability to avoid detection and spread but was
|
|||
|
not 'seriously destructive'. He said it could become damaging if an expert
|
|||
|
could disassemble the virus and change the instructions to wipe the computer's
|
|||
|
disk. "I'd say there's people working on it somewhere although probably not
|
|||
|
in Australia," Mr Creevy said.
|
|||
|
|
|||
|
An expert would have created the Frodo virus because it had only one bug while
|
|||
|
most viruses had more.
|
|||
|
|
|||
|
Mr Creevy said more than 100 viruses were believed to exist worldwide.
|
|||
|
|
|||
|
ENDS
|
|||
|
|
|||
|
Brian Wendt
|
|||
|
Sysop
|
|||
|
SUNMAP BBS
|
|||
|
|
|||
|
--- Maximus-CBCS v1.02
|
|||
|
* Origin: Sunmap BBS Node 5 (HST/DS) - Brisbane - Australia (3:640/206)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3182 *Virus Info*
|
|||
|
08-28-90 19:33:00 (Read 7 Times)
|
|||
|
From: SANDY LOCKE
|
|||
|
To: PATRICK TOULME
|
|||
|
Subj: REPLY TO MSG# 3177 (RE: HAVE ANYONE TRIED SECURE ?)
|
|||
|
MM> Maybe I should say all virus that are in the "public domain".
|
|||
|
MM> Virus 101 is a research virus that only a few people have (and
|
|||
|
MM> you wrote). Nothing is fool proof but Secure is better than any
|
|||
|
MM> other interrupt moniter.
|
|||
|
|
|||
|
PT>
|
|||
|
PT> I agree with you, Mike.
|
|||
|
|
|||
|
and I have to concur with patrick, out of all the TSR type monitor
|
|||
|
programs out there , SECURE is indeed the best of the group... BUT
|
|||
|
PLEASE do NOT depend upon this as your ONLY protection... as on part of
|
|||
|
a multilayered protection scheme it would be fine... I guess my real
|
|||
|
problems with it stem from the NAME the Mark wasburn has chosen...it
|
|||
|
can mislead the neophyte too easily...into thinking that it really is
|
|||
|
the be-all and end-all of protection...I wouldnt hestitate to recommend
|
|||
|
it over the socalled commercial products in this class... BUT again NOT
|
|||
|
as a SOLE protection against viruses... sorry for any confusion my
|
|||
|
comments may have caused...
|
|||
|
cheers
|
|||
|
sandy
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3183 *Virus Info*
|
|||
|
08-28-90 19:35:00 (Read 6 Times)
|
|||
|
From: SANDY LOCKE
|
|||
|
To: ALAN DAWSON
|
|||
|
Subj: REPLY TO MSG# 2749 (RE: VIRUS SCANNERS....)
|
|||
|
DS> You can't win on this! I've been downloading for quite a while
|
|||
|
DS> - always running a virus checker on the information. So, where
|
|||
|
DS> did our virus come from? Off a shrink-wrapped anti-virus
|
|||
|
DS> diskette one of our guys picked up in the US!
|
|||
|
|
|||
|
AD> Nothing new about this, as people learn all the time. One MAJOR
|
|||
|
AD> company (really big, really well known) has shipped shrink-wrapped
|
|||
|
AD> viruses twice -- once on purpose! Shrink wrap doesn't keep the bugs
|
|||
|
AD> out.
|
|||
|
|
|||
|
|
|||
|
UH ALAN... you mind sending the NAME of this vendor via private
|
|||
|
e-mail... accidentally I can understand BUT ON PURPOSE??? what end
|
|||
|
would this kind of action serve???
|
|||
|
cheers
|
|||
|
sandy
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3184 *Virus Info*
|
|||
|
08-28-90 19:44:00 (Read 6 Times)
|
|||
|
From: SANDY LOCKE
|
|||
|
To: KEN DORSHIMER
|
|||
|
Subj: REPLY TO MSG# 2905 (RE: CRC CHECKING)
|
|||
|
well close... without discussing HOW its done... the file length is
|
|||
|
altered back to the original length... its not that hard and does point
|
|||
|
out one of the MAJOR problesm with crc scanners...that is that the
|
|||
|
critical information that tells the operating system how long the file
|
|||
|
is can be altered at will... as far as the comments of a virus author
|
|||
|
disassembling the CRC package its commonly done during product testing
|
|||
|
to find out ahead of time what algorithms are in use by the product...
|
|||
|
it really depends on the level of security one wants for ones PC...
|
|||
|
I really wouldnt put it past a good virus author to specifically
|
|||
|
target anti-viral programs in this fashion... as far as disassemblies
|
|||
|
being hard... well I do an average of 5-6 per day with files ranging in
|
|||
|
size from 2k to 90k(although I will admit that some of the trickier
|
|||
|
ones do cause head scratching occasionally...) note that i said
|
|||
|
programs and not specifically viruses...
|
|||
|
cheers
|
|||
|
sandy
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3185 *Virus Info*
|
|||
|
08-28-90 19:53:00 (Read 6 Times)
|
|||
|
From: SANDY LOCKE
|
|||
|
To: TOM PREECE
|
|||
|
Subj: REPLY TO MSG# 2911 (RE: REMAPPING...)
|
|||
|
TP> As you may see by looking at my other entry's, I have been loading a c
|
|||
|
TP> program that is clearly implementing software to remap my keys to s ce
|
|||
|
TP> extent. If this is possible as a glitch, its is obviously possible as
|
|||
|
TP> attack. Let's hope it never comes to that.
|
|||
|
Tom,
|
|||
|
without adding too much fuel to any fire... certain
|
|||
|
non-communication programs are susceptible to the ANSI programmable
|
|||
|
attack... on my end I run no program that implements ANSI3.64
|
|||
|
terminal control language without having a way to turn thoses "FEATURES
|
|||
|
" off... certain programs without mentioning brand names do allow
|
|||
|
this. if the echo moderator allows I will post a list of good and bad
|
|||
|
programs in this regard... so that you can all protect yourselves
|
|||
|
better...(n.b. after being chewed out by the moderator I am
|
|||
|
constraining my comments carefully...)
|
|||
|
cheers
|
|||
|
sandyp.s. these attacks have been common since programmable
|
|||
|
terminals came into being during the middle 1970's the problem is that
|
|||
|
when these features were implemented in comm programs the possibility
|
|||
|
arose that it was possible for malicious individuals to finally do some
|
|||
|
real damage...the way to protect yourself is to STOP using programs
|
|||
|
that implement such features and switch to others that are more secure
|
|||
|
in their usage of such features...
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3186 *Virus Info*
|
|||
|
08-29-90 05:44:00 (Read 6 Times)
|
|||
|
From: PATRICIA HOFFMAN
|
|||
|
To: SANDY LOCKE
|
|||
|
Subj: REPLY TO MSG# 3185 (RE: REMAPPING...)
|
|||
|
SL> attack... on my end I run no program that implements ANSI3.64
|
|||
|
SL> terminal control language without having a way to turn thoses "FEATURES
|
|||
|
SL> " off... certain programs without mentioning brand names do allow
|
|||
|
SL> this. if the echo moderator allows I will post a list of good and bad
|
|||
|
SL> programs in this regard... so that you can all protect yourselves
|
|||
|
SL> better...(n.b. after being chewed out by the moderator I am
|
|||
|
SL> constraining my comments carefully...)
|
|||
|
|
|||
|
Please feel free to go ahead and post the list. Was just trying to keep you
|
|||
|
out of trouble, you do sometimes get over excited in messages...didn't mean for
|
|||
|
it to be "chewing out".
|
|||
|
|
|||
|
Patti
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3187 *Virus Info*
|
|||
|
08-29-90 06:27:00 (Read 7 Times)
|
|||
|
From: PATRICIA HOFFMAN
|
|||
|
To: PHILLIP LAIRD
|
|||
|
Subj: REPLY TO MSG# 2996 (RE: ONTARIO VIRUS)
|
|||
|
PL> Nope, I don't have the Ontario Virus that I know of! I read about the
|
|||
|
PL> Virus after I had posted to you, Thanx for the info. Nice to know
|
|||
|
PL> where it loads in Mem, that would make a util easier to write once I
|
|||
|
PL> had a fix on what you have already told me.
|
|||
|
PL>
|
|||
|
|
|||
|
Ontario loads into the top of free memory, right below the 640K boundary. It
|
|||
|
takes up 2,048 bytes. If you run chkdsk after it is in memory, both total
|
|||
|
system memory and free available memory will have decreased by 2,048 bytes.
|
|||
|
Patti
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3326 *Virus Info*
|
|||
|
08-30-90 15:05:00 (Read 6 Times)
|
|||
|
From: KEN DORSHIMER
|
|||
|
To: SANDY LOCKE
|
|||
|
Subj: REPLY TO MSG# 3184 (RE: CRC CHECKING)
|
|||
|
|
|||
|
...at a time when Western civilization was declining
|
|||
|
too rapidly for comfort, yet too slowly to be very
|
|||
|
exciting Sandy Locke was saying:
|
|||
|
|
|||
|
SL> well close... without discussing HOW its done... the file length is
|
|||
|
SL> altered back to the original length... its not that hard and does
|
|||
|
SL> point out one of the MAJOR problesm with crc scanners...that is that
|
|||
|
|
|||
|
interesting why don't you drop me some net-mail on this (see origin line)
|
|||
|
|
|||
|
SL> the critical information that tells the operating system how long the
|
|||
|
SL> file is can be altered at will... as far as the comments of a virus
|
|||
|
SL> author disassembling the CRC package its commonly done during product
|
|||
|
SL> testing to find out ahead of time what algorithms are in use by the
|
|||
|
|
|||
|
i think that's one of the things i mentioned; that they would have to have
|
|||
|
pre-existing knowledge of the crc scheme in order to make that work.
|
|||
|
|
|||
|
SL> product... it really depends on the level of security one wants for
|
|||
|
SL> ones PC... I really wouldnt put it past a good virus author to
|
|||
|
SL> specifically target anti-viral programs in this fashion... as far as
|
|||
|
|
|||
|
one of the reasons i am interesting in developing my own anti-viral utils for
|
|||
|
my software business. i figure if they stay primarily in house, the chance
|
|||
|
that some bozo will screw around with them and try to break them is reduced.
|
|||
|
|
|||
|
SL> disassemblies being hard... well I do an average of 5-6 per day with
|
|||
|
SL> files ranging in size from 2k to 90k(although I will admit that some
|
|||
|
SL> of the trickier ones do cause head scratching occasionally...) note
|
|||
|
SL> that i said programs and not specifically viruses... cheers sandy
|
|||
|
|
|||
|
heh, yup source to assembled is always easier than the reverse process, of
|
|||
|
course there's head scratching that goes on at that end too. :-)
|
|||
|
the client said he wanted it to do what?!
|
|||
|
|
|||
|
...just part of the food chain...
|
|||
|
|
|||
|
--- ME2
|
|||
|
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3327 *Virus Info*
|
|||
|
08-29-90 11:37:00 (Read 6 Times)
|
|||
|
From: PAUL FERGUSON
|
|||
|
To: EVERYONE
|
|||
|
Subj: FLOPPY MBR BACKUP
|
|||
|
I had originally posted this question to the moderator, but after a
|
|||
|
little thought decided that I would be sure to receive a myriad of
|
|||
|
answers from the ECHO participants if asking the question here,
|
|||
|
also.....
|
|||
|
It is simply this:
|
|||
|
Does anyone have any decent (and simple) suggestions for extraction of
|
|||
|
the floppy MBR???.....There are several very good utilities in the
|
|||
|
public domain for strictly Hard Drive Boot Sector (ie. ST0) and other
|
|||
|
utilities contained within, say for instance, PCTools, that can back-up
|
|||
|
the HARD Drive Partition Table (I forgot to mention several PD programs
|
|||
|
to back-up the FAT).....But, almost all of these that I have seen
|
|||
|
pertain to the HDU! I realize that there are ways to write it to a file
|
|||
|
using certain SPY-type programs, but what I am really interested in is
|
|||
|
a simplified program that is easy to use at the lowest end of the USER
|
|||
|
pyramid
|
|||
|
|
|||
|
-Thanks in advance for your suggestions and assistance.....
|
|||
|
|
|||
|
|
|||
|
-Paul ^@@^.........
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3328 *Virus Info*
|
|||
|
08-29-90 18:46:00 (Read 6 Times)
|
|||
|
From: PAUL FERGUSON
|
|||
|
To: EVERYONE
|
|||
|
Subj: STEALTH FAMILY
|
|||
|
I have read with great interest the July editions of VIRUS-L digest
|
|||
|
(along with about the first week or so of August) and cannot, for the
|
|||
|
life of me, figure the almighty hype with The (noticed that I
|
|||
|
capitolized that!) Stealth Family of Virus....Only a Trojan should
|
|||
|
deserve such attentention.....If one takes appropriate precautionary
|
|||
|
measures, then the virus will (theoretically) be caught in memory..
|
|||
|
...that is, it will make (and reside) a noticeable difference in
|
|||
|
vectoring.....I truly believe WAY too much hype (Ok, maybe that is a
|
|||
|
little strong!) has been given to this.....Yes, it can be a true menace
|
|||
|
if one does not expect such a rogue, but come on.......I downloaded
|
|||
|
some code today....Yes, I must say it IS quite ingenius, but at the
|
|||
|
same time, I must also say, I enjoy the work I do, etc....
|
|||
|
|
|||
|
PS.....Patrick Toulme, Check your E-Mail....
|
|||
|
|
|||
|
|
|||
|
........"The Delicate Sound of Thunder".......
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3329 *Virus Info*
|
|||
|
08-29-90 22:07:00 (Read 6 Times)
|
|||
|
From: PAUL FERGUSON
|
|||
|
To: EVERYONE
|
|||
|
Subj: LATENITE
|
|||
|
Ok, so we're up again in the pale moonlite (unquote)...
|
|||
|
|
|||
|
|
|||
|
Next question (in paticular, to you, Sandy)
|
|||
|
is:
|
|||
|
What diverse opinions do you have concerning those that, also,
|
|||
|
fight the battle on the front lines (I'm noy alluding to who has any
|
|||
|
more experience, to wit)...I feel that many of us (Tech
|
|||
|
Support/Slash/Gov't Contractors)(No, We're not scum, nor
|
|||
|
unknowledgable) have done much to benefit the Anti-Viral Research
|
|||
|
Community.....I would like a little input on this topic.....
|
|||
|
|
|||
|
|
|||
|
|
|||
|
.......We're not all BAD guys!........
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3330 *Virus Info*
|
|||
|
08-31-90 13:05:00 (Read 6 Times)
|
|||
|
From: HERB BROWN
|
|||
|
To: ALL
|
|||
|
Subj: PKZ120.ZIP
|
|||
|
|
|||
|
I was informed that there is a bad version of PKZIP floating around by the name
|
|||
|
of PKZ120.ZIP.. I am not sure if it is viral or not, but delete it if you find
|
|||
|
it..
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Delta Point (1:396/5.11)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3331 *Virus Info*
|
|||
|
09-01-90 11:34:00 (Read 7 Times)
|
|||
|
From: DEREK BILLINGSLEY
|
|||
|
To: ALL
|
|||
|
Subj: POSSIBLE VIRUS?
|
|||
|
|
|||
|
This just hit me today - I am not sure if it is some kind of system error or a
|
|||
|
potential virus.
|
|||
|
|
|||
|
Last night (September first) and before gave me no indication of any virus
|
|||
|
being present on my system. It is now september 1st and now, whenever a file is
|
|||
|
written to disk (I noticed the text files first, but a downloaded zip'd file
|
|||
|
was also garbled...) it took out about 10 bytes from the beginning of each
|
|||
|
line...
|
|||
|
|
|||
|
When I realized this may be set to occur on this date, I set my DATE back a
|
|||
|
night and everything worked fine... I made a sample text file with a known
|
|||
|
pattern of characters -- any date past september 1st 1990 leaves the file
|
|||
|
altered as mentioned above. Any date previous is written unharmed...
|
|||
|
|
|||
|
SCANV56 reports only that the SCAN program is damaged - no disk presence of the
|
|||
|
source is evident.
|
|||
|
|
|||
|
Has anyone heard of something like this happening?
|
|||
|
|
|||
|
Derek Billingsley
|
|||
|
|
|||
|
--- SLMAIL v1.36M (#0198)
|
|||
|
* Origin: Atlantic Access SJ/NB 1-506-635-1964 HST You can Run With Us !
|
|||
|
(1:255/1)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3354 *Virus Info*
|
|||
|
08-29-90 09:02:00 (Read 6 Times)
|
|||
|
From: CY WELCH
|
|||
|
To: SANDY LOCKE
|
|||
|
Subj: REPLY TO MSG# 2759 (KEYBOARD REMAPPING....)
|
|||
|
In a message to Cy Welch <25 Aug 90 6:39:00> Sandy Locke wrote:
|
|||
|
|
|||
|
>CW> In a message to Everyone <16 Aug 90 6:32:00> Paul Ferguson wrote:
|
|||
|
|
|||
|
> PF> Isn't it possible to remap some (or any) keyboard functions via
|
|||
|
> PF> communications with some funky ANSI control characters?....I seem to
|
|||
|
> PF> remember mention of this somewhere.....I really can't remember if was
|
|||
|
> PF> in the form of a question, though, or an answer.....It also made
|
|||
|
> PF> mention of PKWares' Safe-ANSI program...Somebody help us out here...
|
|||
|
|
|||
|
>CW> I think most of the "FAST" ansi replacements do not have the keyboard
|
|||
|
>CW> remapping so that danger is removed in those cases.
|
|||
|
SL> Well if you are referring to FANSI.SYS by hershey Microsystems it too
|
|||
|
SL> is vunerable to remap effects... and since it implemnt FULL ANSI 3.64
|
|||
|
SL> terminal control codes plus some extensions it is even more vunerable
|
|||
|
SL> to a whole class of tricks that go way beyond noremally keyboard
|
|||
|
SL> remapping... but to there credit they ahve include a way to turn this
|
|||
|
SL> "FEATURE" OFF... just most users get it off a BBS and never order or
|
|||
|
SL> look at the 50.00 set of docs that come when you pay for the
|
|||
|
SL> products...
|
|||
|
|
|||
|
Actually I was refering to zansi.sys which is a high speed replacement which
|
|||
|
part of what they did to do it was to remove the keyboard remapping functions.
|
|||
|
|
|||
|
--- XRS! 3.40+
|
|||
|
* Origin: Former QuickBBS Beta Team Member (99:9402/122.1) (Quick 1:125/122.1)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3355 *Virus Info*
|
|||
|
08-26-90 15:45:00 (Read 6 Times)
|
|||
|
From: MIKE MCCUNE
|
|||
|
To: SANDY LOCKE
|
|||
|
Subj: SECURE
|
|||
|
Sandy,
|
|||
|
Thanks for the information. I suspected that Secure probably had some
|
|||
|
holes in its protection scheme and that someone knew about it. I am
|
|||
|
curious about how the modified Jerusalem-B got around it. I'm pretty
|
|||
|
sure how Virus 101 does it (the Air Force uses it) but I would like
|
|||
|
to know if there are any other hole in secure...<MM>
|
|||
|
|
|||
|
|
|||
|
--- Opus-CBCS 1.13
|
|||
|
* Origin: The Slowboat BBS (404-578-1691) Atlanta, GA (1:133/311.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3477 *Virus Info*
|
|||
|
09-01-90 15:56:00 (Read 6 Times)
|
|||
|
From: KEN DORSHIMER
|
|||
|
To: HERB BROWN
|
|||
|
Subj: REPLY TO MSG# 3330 (RE: PKZ120.ZIP)
|
|||
|
>
|
|||
|
> I was informed that there is a bad version of PKZIP floating
|
|||
|
> around by the name of PKZ120.ZIP.. I am not sure if it
|
|||
|
> is viral or not, but delete it if you find it..
|
|||
|
|
|||
|
seem to remember seeing something about this a couple of months ago.
|
|||
|
mostly, i wanted to drop a line and say "hey". got your net-mail, hopefully if
|
|||
|
the routing is working right, you got a response. :-) how's new orleans this
|
|||
|
time of year? later.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- Opus-CBCS 1.12 & NoOrigin 3.7a
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Ion Induced Insomnia (1:203/42.753)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3478 *Virus Info*
|
|||
|
09-02-90 10:45:00 (Read 6 Times)
|
|||
|
From: JAMES KLASSEN
|
|||
|
To: PRAKASH JANAKIRAMAN
|
|||
|
Subj: REPLY TO MSG# 2909 (LEPROSY)
|
|||
|
I have a copy of the Leprosy virus along with its source and
|
|||
|
"documentation". What it does is copies itself to 4 exe or com files
|
|||
|
each time it is run and produces a memory error code so the user thinks
|
|||
|
there is a problem with memory and runs it again. After all the com and
|
|||
|
exe files have been infected, it displays a message that they have a
|
|||
|
virus and "Good luck!"... It increases file sizes by 666 but when I
|
|||
|
tested it on a floppy, the bytes didn't increase...
|
|||
|
|
|||
|
--- W2Q v1.4
|
|||
|
* Origin: The C.F.I BBS * Norfolk, Va. * (804)423-1338 * (1:275/328)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3479 *Virus Info*
|
|||
|
09-01-90 07:18:00 (Read 6 Times)
|
|||
|
From: YASHA KIDA
|
|||
|
To: PAUL FERGUSON
|
|||
|
Subj: REPLY TO MSG# 3329 (LATENITE)
|
|||
|
In a message of <29 Aug 90 22:07:29>, Paul Ferguson (1:204/869) writes:
|
|||
|
|
|||
|
PF> EID:6368 151db0ee
|
|||
|
PF> Support/Slash/Gov't Contractors)(No, We're not scum, nor
|
|||
|
PF> unknowledgable) have done much to benefit the Anti-Viral Research
|
|||
|
PF> Community.....I would like a little input on this topic.....
|
|||
|
PF>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
I am a Private contractor for a Large Network installation an support company.
|
|||
|
I work for the good of the Customer and the population (users).
|
|||
|
|
|||
|
I hear the phrase " SLIMY CONTRACTOR" " M.F.C." everyday. I also heard
|
|||
|
"Can this be done", "Would you look into this...", "What are your suggestions
|
|||
|
so I can put them in my report" when things get deep. We are the WHIPPING BOYS
|
|||
|
and EMERGENCY 911 all in one.
|
|||
|
|
|||
|
I am sure there are Software contractors who have planted or released a virus
|
|||
|
at contract renewal time. To show how much they are needed.
|
|||
|
There are also those of us the that want to see their job sites safe from such
|
|||
|
problems. We are the ones who own our time (Non-Paid) Compile information
|
|||
|
on ways to safe guard our data from compermise or viral attacks.
|
|||
|
|
|||
|
The Anti-Viral reseach done by Mrs. Hoffman (PAT) and John McAfees group
|
|||
|
is carefully read and evaluated on my end. I am sure it has saved many a rear
|
|||
|
from a bear trap.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- msged 1.99S ZTC
|
|||
|
* Origin: Bragg IDBS, (FT. Bragg, NC - we're gonna kick some booty)
|
|||
|
(1:151/305)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3480 *Virus Info*
|
|||
|
09-02-90 19:19:00 (Read 6 Times)
|
|||
|
From: HERB BROWN
|
|||
|
To: KEN DORSHIMER
|
|||
|
Subj: REPLY TO MSG# 3477 (RE: PKZ120.ZIP)
|
|||
|
With a sharp eye <Sep 01 15:56>, Ken Dorshimer (1:203/42.753) noted:
|
|||
|
>
|
|||
|
> I was informed that there is a bad version of PKZIP floating
|
|||
|
> around by the name of PKZ120.ZIP.. I am not sure if it
|
|||
|
> is viral or not, but delete it if you find it..
|
|||
|
KD>
|
|||
|
KD>seem to remember seeing something about this a couple of months ago.
|
|||
|
KD>mostly, i wanted to drop a line and say "hey". got your net-mail,
|
|||
|
KD>hopefully if the routing is working right, you got a response. :-)
|
|||
|
KD>how's new orleans this time of year? later.
|
|||
|
KD>
|
|||
|
|
|||
|
|
|||
|
Hmmmm, first time I heard of this file. How long ago did it appear?
|
|||
|
Rained Sunday and had to BBQ inside. Made watching TV a little hard, but we
|
|||
|
managed.
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Delta Point (1:396/5.11)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3630 *Virus Info*
|
|||
|
09-01-90 20:49:00 (Read 6 Times)
|
|||
|
From: PAUL FERGUSON
|
|||
|
To: KEN DORSHIMER
|
|||
|
Subj: REPLY TO MSG# 3326 (RE: CRC CHECKING)
|
|||
|
Ken...
|
|||
|
|
|||
|
I've GOT to agree with you on this one....only preconceived CRC
|
|||
|
defeaters are just that...preconceived....no such luck...
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3813 *Virus Info*
|
|||
|
09-01-90 13:11:00 (Read 6 Times)
|
|||
|
From: KEVIN HIGGINS
|
|||
|
To: JAMES DICK
|
|||
|
Subj: SECURING YOUR UPLOADS
|
|||
|
I've got checkout, and while its a pretty neat program, there are a few
|
|||
|
things I don't like about it, the main one being the initial memory scan. I
|
|||
|
also don't like the auto-pause that seems to be at the beginning of it. That
|
|||
|
means running gateway, which means the user may be able to get into DOS and
|
|||
|
party. (have heard of Key-fake, but never seen it around to play with it..).
|
|||
|
TAG calls a file named postul.bat after every upload (if the .bat file is
|
|||
|
present), so I hacked up this .bat file to auto-check for virii. But I'm not
|
|||
|
smart enough to know how to use the %%f in a batch file to have it run through
|
|||
|
for all the files in the active directory (for batch uploads)...
|
|||
|
Maybe there's a genius out there who can help. FYI the parameters passed to
|
|||
|
the .bat file are: [Baud] [ComPort] [User#] [U/L Dir] [Filename].
|
|||
|
|
|||
|
Here it is. Chuckle, then help make it better <grin>.
|
|||
|
|
|||
|
echo off
|
|||
|
cd\bbs\uploads
|
|||
|
echo Verifying latest Pkzip version...... > com2
|
|||
|
REM This program checks file integrity.
|
|||
|
ozf -v %5 > com2
|
|||
|
echo : > com2
|
|||
|
REM These are the directories I don't want checked.
|
|||
|
if %4 == D:\ZIPSTUFF\WRITERS\ goto end
|
|||
|
if %4 == D:\ZIPSTUFF\AMIGA goto end
|
|||
|
echo Testing file integrity, and checking for virii. > com2
|
|||
|
echo Please wait..... (this is the scary part, eh?) > com2
|
|||
|
echo : > com2
|
|||
|
echo Moving the suspect file to a sterile cell for interogation.... > com2
|
|||
|
REM This moves the file to an empty directory for the examination.
|
|||
|
move %4%5 d:\bbs\bads
|
|||
|
echo File is now undergoing interrogation... > com2
|
|||
|
cd\bbs\bads
|
|||
|
pkunzip -x D:\bbs\bads\%5 *.exe *.com > com2
|
|||
|
scan d:\bbs\bads\*.exe /NOMEM > com2
|
|||
|
scan d:\bbs\bads\*.com /NOMEM > com2
|
|||
|
if errorlevel 1 goto Oops
|
|||
|
echo Alright! (whew) File passed. > com2
|
|||
|
del *.exe
|
|||
|
del *.com
|
|||
|
echo Almost finished. Releasing innocent file back into public. > com2
|
|||
|
move %5 d:\bbs\uploads
|
|||
|
echo : > com2
|
|||
|
echo Now adding (Nested) zip comment to file... > com2
|
|||
|
cd\
|
|||
|
REM This adds the Hornet's Nest comment to the .Zip file.
|
|||
|
call d:\commentr.bat
|
|||
|
cd\bbs
|
|||
|
echo Thanks for waiting!..
|
|||
|
goto end
|
|||
|
:Oops
|
|||
|
echo Arrrrgghhhhh! File had a virus! File deleted! > com2
|
|||
|
erase *.*
|
|||
|
echo Logging your name to Scumbag.lst! > com2
|
|||
|
echo Hey, Kato! User number %3 tried to upload a virus infected file! >>
|
|||
|
d:\fd\scumbag.lst
|
|||
|
echo Maybe you need to leave a message to Kato, eh? > com2
|
|||
|
cd\bbs
|
|||
|
:end
|
|||
|
|
|||
|
|
|||
|
(Note: the fourth line from the end is a continuation of the line above it.)
|
|||
|
Also, I have a program that will make a .com fil out of a .bat file, for faster
|
|||
|
processing. Any reason why this couldn't be done with the above .bat file? How
|
|||
|
about after the %%f is added?
|
|||
|
Kevin
|
|||
|
|
|||
|
--- TAGMAIL v2.40.02 Beta
|
|||
|
* Origin: The Hornet's Nest BBS (1:128/74)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3814 *Virus Info*
|
|||
|
09-03-90 23:40:00 (Read 5 Times)
|
|||
|
From: RICK THOMA
|
|||
|
To: HERB BROWN
|
|||
|
Subj: REPLY TO MSG# 3480 (RE: PKZ120.ZIP)
|
|||
|
> Hmmmm, first time I heard of this file. How long ago did it
|
|||
|
> appear?
|
|||
|
|
|||
|
I have a copy, and think it came out around March, or so. At the time,
|
|||
|
SCANV detected no virus, but I thought better of running it.
|
|||
|
|
|||
|
Sorry, folks. Whatever it is, it isn't available for downloading, so please
|
|||
|
don't ask. I'm just waiting for the time to pick it apart, to see just what
|
|||
|
kind of hack it is.
|
|||
|
|
|||
|
--- FD 2.00
|
|||
|
* Origin: Village BBS, Mahopac, NY 914-621-2719 *HST* (1:272/1)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3815 *Virus Info*
|
|||
|
09-03-90 03:38:00 (Read 5 Times)
|
|||
|
From: KEN DORSHIMER
|
|||
|
To: PAUL FERGUSON
|
|||
|
Subj: REPLY TO MSG# 3630 (RE: CRC CHECKING)
|
|||
|
|
|||
|
...at a time when Western civilization was declining
|
|||
|
too rapidly for comfort, yet too slowly to be very
|
|||
|
exciting Paul Ferguson was saying:
|
|||
|
|
|||
|
PF> Ken... I've GOT to agree with you on this one....only preconceived CRC
|
|||
|
PF> defeaters are just that...preconceived....no such luck...
|
|||
|
PF>
|
|||
|
|
|||
|
that's what i figured. that is if you're responding to the msg i think you're
|
|||
|
responding to. what the hell does that mean?
|
|||
|
|
|||
|
...space is merely a device to keep everything from being
|
|||
|
in the same spot...
|
|||
|
|
|||
|
|
|||
|
--- ME2
|
|||
|
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3816 *Virus Info*
|
|||
|
09-03-90 18:03:00 (Read 5 Times)
|
|||
|
From: KEN DORSHIMER
|
|||
|
To: HERB BROWN
|
|||
|
Subj: REPLY TO MSG# 3814 (RE: PKZ120.ZIP)
|
|||
|
|
|||
|
...at a time when Western civilization was declining
|
|||
|
too rapidly for comfort, yet too slowly to be very
|
|||
|
exciting Herb Brown was saying:
|
|||
|
|
|||
|
HB> Hmmmm, first time I heard of this file. How long ago did it appear?
|
|||
|
HB> Rained Sunday and had to BBQ inside. Made watching TV a little hard,
|
|||
|
HB> but we managed.
|
|||
|
|
|||
|
i think it was a couple of months ago. which means any mention of it has long
|
|||
|
since been renumbered off my system. yup BBQing indoors does have a certain
|
|||
|
mystique. i know dinner is ready when the smoke alarm goes off.
|
|||
|
|
|||
|
...space is merely a device to keep everything from being
|
|||
|
in the same spot...
|
|||
|
|
|||
|
|
|||
|
--- ME2
|
|||
|
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3817 *Virus Info*
|
|||
|
09-03-90 18:08:00 (Read 7 Times)
|
|||
|
From: KEN DORSHIMER
|
|||
|
To: DEREK BILLINGSLEY
|
|||
|
Subj: REPLY TO MSG# 3331 (RE: POSSIBLE VIRUS?)
|
|||
|
|
|||
|
...at a time when Western civilization was declining
|
|||
|
too rapidly for comfort, yet too slowly to be very
|
|||
|
exciting DEREK BILLINGSLEY was saying:
|
|||
|
|
|||
|
DB> This just hit me today - I am not sure if it is some kind of system
|
|||
|
DB> error or a potential virus.
|
|||
|
DB>
|
|||
|
DB> Last night (September first) and before gave me no indication of any
|
|||
|
DB> virus being present on my system. It is now september 1st and now,
|
|||
|
DB> whenever a file is written to disk (I noticed the text files first,
|
|||
|
DB> but a downloaded zip'd file was also garbled...) it took out about 10
|
|||
|
DB> bytes from the beginning of each line...
|
|||
|
DB>
|
|||
|
|
|||
|
could you send a copy of what you believe is infected to me? i'd like to
|
|||
|
analyse this myself, thanks.
|
|||
|
my address is:
|
|||
|
Dorshimer Software Systems
|
|||
|
P.O. Box 191126
|
|||
|
Sacramento, Ca. 95819-1126 USA
|
|||
|
|
|||
|
...space is merely a device to keep everything from being
|
|||
|
in the same spot...
|
|||
|
|
|||
|
|
|||
|
--- ME2
|
|||
|
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3818 *Virus Info*
|
|||
|
09-03-90 20:57:00 (Read 4 Times)
|
|||
|
From: JOHN HERRBACH
|
|||
|
To: ALL
|
|||
|
Subj: PUBLIC KEY ENCRYPTION
|
|||
|
Does anyone know the status or progress in regards to public key encryption?
|
|||
|
Thanks.
|
|||
|
|
|||
|
John {|-)
|
|||
|
|
|||
|
--- ME2
|
|||
|
* Origin: The Lighthouse BBS/HST; Lansing, MI; 517-321-0788 (1:159/950)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3819 *Virus Info*
|
|||
|
09-01-90 20:26:00 (Read 5 Times)
|
|||
|
From: SEAN SOMERS
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: REPLY TO MSG# 3186 (RE: REMAPPING...)
|
|||
|
|
|||
|
Off topic here, anybody out there encounter the French Revoloution virus? I was
|
|||
|
the first out here to discover it. What it does is nuke your HD while
|
|||
|
displaying an anti Western/English speaking Canadians.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- outGATE v2.10
|
|||
|
# Origin: SIGnet International GateHost (8:7501/103)
|
|||
|
* Origin: Network Echogate (1:129/34)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3938 *Virus Info*
|
|||
|
09-06-90 11:51:00 (Read 13 Times)
|
|||
|
From: YASHA KIDA
|
|||
|
To: SKY RAIDER (Rcvd)
|
|||
|
Subj: REPLY TO MSG# 2995 (RE: VIRUS ORIGINALS)
|
|||
|
|
|||
|
GLAD TO SEE SOMEONE does their homework...
|
|||
|
|
|||
|
Well written.. If you don't mind I wish to post it as a bulletin
|
|||
|
on my System (BBS).. Re written to as a document instead of a
|
|||
|
msg reply...
|
|||
|
'
|
|||
|
|
|||
|
|
|||
|
Yasha
|
|||
|
sysop 151/305
|
|||
|
|
|||
|
|
|||
|
|
|||
|
"What do you do when all of your users are in the sand lands, without a phone."
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- Maximus-CBCS v1.00
|
|||
|
* Origin: Bragg IDBS, We hunt bugs for the 82nd Airborne (1:151/305)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 3974 *Virus Info*
|
|||
|
09-08-90 13:42:35 (Read 5 Times)
|
|||
|
From: SKY RAIDER
|
|||
|
To: YASHA KIDA
|
|||
|
Subj: VIRUS POST ON BBS
|
|||
|
Yasha,
|
|||
|
|
|||
|
You write:
|
|||
|
|
|||
|
GLAD TO SEE SOMEONE does their homework...
|
|||
|
|
|||
|
Well written.. If you don't mind I wish to post it as a bulletin on my System
|
|||
|
(BBS).. Re written to as a document instead of a msg reply...
|
|||
|
|
|||
|
|
|||
|
Sure, no problems in rewritting and posting on your system. I try not to enter
|
|||
|
into this type of a conversation without at least a bit of a footing in fact. I
|
|||
|
wish I could find the original document I had quoting these things (it had
|
|||
|
names, dates, etc.). How about giving me your system number so I can call and
|
|||
|
see the finished form (never been quoted in this manner before).
|
|||
|
|
|||
|
A questor of knowledge,
|
|||
|
|
|||
|
Sky Raider
|
|||
|
Ivan Baird, CET
|
|||
|
--- TBBS v2.1/NM
|
|||
|
* Origin: Northern Connection, Fredericton, N.B. Canada <HST 14.4K> (1:255/3)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4025 *Virus Info*
|
|||
|
09-06-90 13:32:00 (Read 6 Times)
|
|||
|
From: JONO MOORE
|
|||
|
To: JOE MORLAN
|
|||
|
Subj: REPLY TO MSG# 3157 (LHARC114?)
|
|||
|
JM >I had heard that and infected version of LHARC was released
|
|||
|
JM >last year under the name LHARC114. I also heard that
|
|||
|
JM >because of that, the next release of LHARC was expected to
|
|||
|
JM >be LHARC200 to avoid confustion with the virus. This week a
|
|||
|
JM >file appeared on a local board called LHARC114. I left a
|
|||
|
JM >message to the sysop to check it out and he says it's clean.
|
|||
|
JM >The docs say that this is version 114b, the latest version.
|
|||
|
|
|||
|
LHARC v1.14b is a real release. The author brought it out after the
|
|||
|
controversy on the fake 1.14 release.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- outGATE v2.10
|
|||
|
# Origin: SIGnet International GateHost (8:7501/103)
|
|||
|
* Origin: Network Echogate (1:129/34)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4026 *Virus Info*
|
|||
|
09-05-90 19:47:00 (Read 5 Times)
|
|||
|
From: PATRICIA HOFFMAN
|
|||
|
To: PAUL FERGUSON
|
|||
|
Subj: LET ME REPHRASE THAT.....
|
|||
|
PF> Actually, I really should have said "virtually preconceived".
|
|||
|
PF> From what I can gather on the topic (I don't yet have a copy of 4096),
|
|||
|
PF> they actually redirect CRC/Checksum interrogators to a "snapshot" of
|
|||
|
PF> the original file as it appeared before infection.(Someone, I'm sure,
|
|||
|
PF> will correct me if I'm wrong or at least add enlightenment.)
|
|||
|
|
|||
|
You are correct.....What the CRC/Checksum interrogator sees, if 4096 is in
|
|||
|
memory, is the disinfected version of the program in memory, not what is
|
|||
|
actually out on disk. Fish 6 also does this, as do a couple of other viruses
|
|||
|
using Stealth techniques.
|
|||
|
|
|||
|
PF> The infected file, in the case of 4096, has in reality grown by 4096
|
|||
|
PF> bytes and would more than likely hang the system, therefore, which
|
|||
|
PF> would lead me to believe that running the CRC check without the virus
|
|||
|
PF> TSR would allow you to identify the actual infected files. Also, it
|
|||
|
PF> seems like the only way to catch it TSR is to trace the interrupt
|
|||
|
PF> vectors (although everyone seems to have a little bit of differing
|
|||
|
PF> ideas on this '->)
|
|||
|
|
|||
|
Lots of 4096 infected files will run without hanging the system....the virus
|
|||
|
disinfects the program when it is read into memory so that anti-viral packages
|
|||
|
can't find the virus as easily. CRC checkers and scanners won't be able to
|
|||
|
find it in the infected file if the virus is in memory, in fact, these viruses
|
|||
|
usually infect on file open as well as execute. Run a CRC checker or Scanner
|
|||
|
that doesn't check memory for the virus with it present and you'll infect
|
|||
|
everything that is openned that meets its infection criteria.
|
|||
|
|
|||
|
If the virus isn't in memory, the CRC checker technique will work to identify
|
|||
|
the infected files in 99% of the cases. I'm not going to say 100% because I
|
|||
|
believe some of the 512 virus variants can get around it due to the way it
|
|||
|
attaches to the files in some cases, but not all. Some CRC checkers don't
|
|||
|
actually CRC the entire file either....and as soon as I state it is a fool
|
|||
|
proof way of doing it, someone will write a virus that gets around it
|
|||
|
perfectly in all cases.
|
|||
|
|
|||
|
Patti
|
|||
|
|
|||
|
PF> Until I can get my hands on this little fellow, I guess that I'll
|
|||
|
PF> just follow the more logical explanations from the sources with
|
|||
|
PF> credibilty and make a judgement from that! Sounds credible. But, as I'v
|
|||
|
PF> said before- I sure would like to see it.
|
|||
|
PF>
|
|||
|
PF> I've been following several different message base threads on
|
|||
|
PF> this particular virus, with input from users at the basic levels to BBS
|
|||
|
PF> SysOps to the AntiViral research community.......I must say, it gets
|
|||
|
PF> overwhelming at times to keep objective. *:)
|
|||
|
PF>
|
|||
|
PF> -Paul
|
|||
|
PF>
|
|||
|
PF>
|
|||
|
PF> --- QM v1.00
|
|||
|
PF> * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813
|
|||
|
PF> (1:204/869.0)
|
|||
|
PF>
|
|||
|
|
|||
|
--- W2Q v1.4
|
|||
|
* Origin: The C.F.I BBS * Norfolk, Va. * (804)423-1338 * (1:275/328)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4027 *Virus Info*
|
|||
|
09-07-90 12:48:00 (Read 4 Times)
|
|||
|
From: MICHAEL ADAMS
|
|||
|
To: RICHARD HUFFMAN
|
|||
|
Subj: RE: ARC.EXE
|
|||
|
Thank you for the warning .... Kill keep an eye out for it.
|
|||
|
|
|||
|
--- Maximus-CBCS v1.00
|
|||
|
* Origin: The Southern Star - SDS/SDN/PDN - 504-885-5928 - (1:396/1)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4028 *Virus Info*
|
|||
|
09-07-90 20:21:00 (Read 5 Times)
|
|||
|
From: HERB BROWN
|
|||
|
To: JONO MOORE
|
|||
|
Subj: REPLY TO MSG# 4025 (LHARC114?)
|
|||
|
|
|||
|
JM >I had heard that and infected version of LHARC was released
|
|||
|
JM >last year under the name LHARC114. I also heard that
|
|||
|
JM >because of that, the next release of LHARC was expected to
|
|||
|
JM >be LHARC200 to avoid confustion with the virus. This week a
|
|||
|
JM >file appeared on a local board called LHARC114. I left a
|
|||
|
JM >message to the sysop to check it out and he says it's clean.
|
|||
|
JM >The docs say that this is version 114b, the latest version.
|
|||
|
|
|||
|
JM>LHARC v1.14b is a real release. The author brought it out after the
|
|||
|
JM>controversy on the fake 1.14 release.
|
|||
|
JM>
|
|||
|
|
|||
|
Now, how is someone going to know the difference? That is about as dumb as
|
|||
|
BBQ'ing indoors and forgetting to open the windows... Sheesh..
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Delta Point (1:396/5.11)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4029 *Virus Info*
|
|||
|
09-07-90 20:25:00 (Read 4 Times)
|
|||
|
From: HERB BROWN
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: REPLY TO MSG# 4026 (LET ME REPHRASE THAT.....)
|
|||
|
|
|||
|
|
|||
|
PH>can't find the virus as easily. CRC checkers and scanners won't be
|
|||
|
PH>able to
|
|||
|
PH>find it in the infected file if the virus is in memory, in fact, these
|
|||
|
PH>viruses
|
|||
|
PH>usually infect on file open as well as execute. Run a CRC checker or
|
|||
|
PH>Scanner
|
|||
|
PH>that doesn't check memory for the virus with it present and you'll
|
|||
|
PH>infect
|
|||
|
PH>everything that is openned that meets its infection criteria.
|
|||
|
|
|||
|
|
|||
|
I seem to be missing something here. As I understand it, to check for virii
|
|||
|
with a scanner, such as SCAN, or whatever, you boot from a uninfected floppy
|
|||
|
that has scan residing on it. Ok, now, how would a virus that works as a TSR,
|
|||
|
that probably is loaded from the boot sector from the hard disk be loaded, if
|
|||
|
you are booting from the floppy? Which, the floppy being write protected, of
|
|||
|
course, would not have this viral infection. I was under the assumption that
|
|||
|
the BIOS first checked drive A: at bootup for a disk, etc. It seems that it
|
|||
|
would be impossible to find a virii in memory with this type of scheme.. Please
|
|||
|
enlighten me..
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Delta Point (1:396/5.11)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4030 *Virus Info*
|
|||
|
09-07-90 17:03:00 (Read 5 Times)
|
|||
|
From: TALLEY RAGAN
|
|||
|
To: MIKE MCCUNE
|
|||
|
Subj: REPLY TO MSG# 2910 (RE: REMOVING JOSHI)
|
|||
|
|
|||
|
|
|||
|
In a message to Talley Ragan <09-04-90 16:04> Mike Mccune wrote:
|
|||
|
|
|||
|
MM>>I have posted a new version that checks for the virus
|
|||
|
MM>>before
|
|||
|
MM>>trying to remove it (now that I have a working copy of the
|
|||
|
MM>>virus). It will not damage the partition table on
|
|||
|
MM>>uninfected
|
|||
|
MM>>hard disks...<MM>.
|
|||
|
|
|||
|
Thanks for the information. This was very educational, as I have
|
|||
|
had one case of a virus. I don't know how it workedbut the screen would
|
|||
|
show all garbage and then the computer would hang. I low level formatted
|
|||
|
the hard disk and restored from good backups. I sure would like to know
|
|||
|
how it got to me and where it came from!!... Thanks again.
|
|||
|
|
|||
|
|
|||
|
Talley
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- ZAFFER v1.01
|
|||
|
--- QuickBBS 2.64 [Reg] Qecho ver 2.62
|
|||
|
* Origin: Southern Systems *HST DS* Tampa Fl (813)977-7065 (1:377/9)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4031 *Virus Info*
|
|||
|
09-05-90 21:23:00 (Read 5 Times)
|
|||
|
From: TOM PREECE
|
|||
|
To: HERB BROWN
|
|||
|
Subj: REPLY TO MSG# 3816 (RE: PKZ120.ZIP)
|
|||
|
I seem to remember running into this file several months ago. I don't remember
|
|||
|
concluding that it had a virus - just that it didn't work properly. The sysop
|
|||
|
on the sytem that had it apparently reached the same conclusion or something
|
|||
|
similar because it disappeared here (SF Bay Area.)
|
|||
|
--- TBBS v2.1/NM
|
|||
|
* Origin: G.A.D.M. Multi-User TBBS Hayward,CA.(415) 581-3019 (1:161/208)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4032 *Virus Info*
|
|||
|
09-06-90 19:15:00 (Read 5 Times)
|
|||
|
From: KEN DORSHIMER
|
|||
|
To: PAUL FERGUSON
|
|||
|
Subj: REPLY TO MSG# 4029 (RE: LET ME REPHRASE THAT.....)
|
|||
|
|
|||
|
...at a time when Western civilization was declining
|
|||
|
too rapidly for comfort, yet too slowly to be very
|
|||
|
exciting Paul Ferguson was saying:
|
|||
|
|
|||
|
PF> Ken- This is a continuation of msg.# 156 (I dropped the
|
|||
|
|
|||
|
just FYI the msg numbers don't have much bearing here. on my system is was
|
|||
|
#75 or something. :-)
|
|||
|
|
|||
|
PF> don't yet have a copy of 4096), they actually redirect CRC/Checksum
|
|||
|
PF> interrogators to a "snapshot" of the original file as it appeared
|
|||
|
PF> before infection.(Someone, I'm sure, will correct me if I'm wrong or
|
|||
|
|
|||
|
interesting. seems there would be some simple method of circumventing what
|
|||
|
the virus does. (i don't have a copy of that one yet either)
|
|||
|
|
|||
|
PF> system, therefore, which would lead me to believe that running the CRC
|
|||
|
PF> check without the virus TSR would allow you to identify the actual
|
|||
|
PF> infected files. Also, it seems like the only way to catch it TSR is to
|
|||
|
PF> trace the interrupt vectors (although everyone seems to have a little
|
|||
|
|
|||
|
i've always thought that by having your own tsr grab the interupts first
|
|||
|
might be a good way to stop unwanted tsr's from grabbing them. (i'm sure
|
|||
|
someone will argue the point tho)
|
|||
|
|
|||
|
...space is merely a device to keep everything from being
|
|||
|
in the same spot...
|
|||
|
|
|||
|
|
|||
|
--- ME2
|
|||
|
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4278 *Virus Info*
|
|||
|
09-08-90 13:51:00 (Read 5 Times)
|
|||
|
From: DUANE BROWN
|
|||
|
To: PHILLIP LAIRD
|
|||
|
Subj: REPLY TO MSG# 3813 (SECURING YOUR UPLOADS)
|
|||
|
PL>present. I have the Key fake program if it will help you!
|
|||
|
PL>That file will enter the "Y or N" Question when the batch
|
|||
|
PL>file comes to Are you sure? Y or N. Meaning you had the
|
|||
|
PL>batch file to delete all programs in the temp check
|
|||
|
|
|||
|
That's easy to fix the problem about del *.* -- just do
|
|||
|
|
|||
|
echo y | del *.*
|
|||
|
|
|||
|
then the Y gets placed in there automatically...no keyfake, nothing!
|
|||
|
|
|||
|
---
|
|||
|
* Origin: End of the Line. Stafford, Va. (703)720-1624. (1:274/16)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4279 *Virus Info*
|
|||
|
09-07-90 12:45:00 (Read 5 Times)
|
|||
|
From: CHARLES HANNUM
|
|||
|
To: PHILLIP LAIRD
|
|||
|
Subj: REPLY TO MSG# 4031 (RE: PKZ120.ZIP)
|
|||
|
>Didn't someone say that because someone had already hacked an earlier
|
|||
|
>version of PKZIP that 120 would be the next scheduled release?
|
|||
|
>Anybody have any info?
|
|||
|
|
|||
|
Yes. Phil Katz said it.
|
|||
|
|
|||
|
--- ZMailQ 1.12 (QuickBBS)
|
|||
|
* Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4280 *Virus Info*
|
|||
|
09-08-90 10:49:00 (Read 4 Times)
|
|||
|
From: JAMES BARRETT
|
|||
|
To: ALL
|
|||
|
Subj: SEPTEMBER 18-20, 1990
|
|||
|
I have heard somebody mention that there will be a major virus in the next
|
|||
|
couple of weeks. What's the scoop? I'm involved in a college campus computer
|
|||
|
lab and need to know what's coming and how to prepare for it. Will ScanV66
|
|||
|
catch it????
|
|||
|
|
|||
|
Thanks in advance...
|
|||
|
--JCB
|
|||
|
--- XRS 3.40+
|
|||
|
* Origin: >- c y n o s u r e -< 919-929-5153 <HST><XRS> (RAX 1:151/501.14)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4281 *Virus Info*
|
|||
|
09-08-90 17:39:00 (Read 4 Times)
|
|||
|
From: HERB BROWN
|
|||
|
To: KEN DORSHIMER
|
|||
|
Subj: REPLY TO MSG# 4032 (RE: LET ME REPHRASE THAT.....)
|
|||
|
With a sharp eye <Sep 06 19:15>, Ken Dorshimer (1:203/42.753) noted:
|
|||
|
|
|||
|
KD>i've always thought that by having your own tsr grab the interupts
|
|||
|
KD>first
|
|||
|
KD>might be a good way to stop unwanted tsr's from grabbing them. (i'm
|
|||
|
KD>sure
|
|||
|
KD>someone will argue the point tho)
|
|||
|
|
|||
|
Depends on who got there first, I would presume.. Also, multiple TSR's would be
|
|||
|
a nightmare, colliding and such.
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Delta Point (1:396/5.11)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4535 *Virus Info*
|
|||
|
09-07-90 08:04:00 (Read 4 Times)
|
|||
|
From: PAUL FERGUSON
|
|||
|
To: DOUG EMMETT
|
|||
|
Subj: SCAN FROM C:
|
|||
|
Hello, Doug....
|
|||
|
Doug, I must tell you that it is not advisable to run ViruScan
|
|||
|
from your hard disc....It really should ALWAYS be run from a WRITE
|
|||
|
PROTECTED FLOPPY....Scan can become easily infected when ran in an
|
|||
|
infected environment on a HD. BTW....Software that "Write Protects" you
|
|||
|
r hard disc may work in some cases, but can be circunvented.
|
|||
|
Be safe.....
|
|||
|
-Paul
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4536 *Virus Info*
|
|||
|
09-07-90 08:06:00 (Read 4 Times)
|
|||
|
From: PAUL FERGUSON
|
|||
|
To: LONNIE DENNISON
|
|||
|
Subj: WELCOME...
|
|||
|
Glad to have you........
|
|||
|
Welcome aboard....
|
|||
|
-Paul ^@@^........
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4537 *Virus Info*
|
|||
|
09-07-90 08:09:00 (Read 4 Times)
|
|||
|
From: PAUL FERGUSON
|
|||
|
To: RICHARD HUFFMAN
|
|||
|
Subj: REPLY TO MSG# 4027 (ARC.EXE)
|
|||
|
Richard,
|
|||
|
Please E- me out of the conference....I would like to discuss this
|
|||
|
a little further......Better yet, contact me at the NCSA BBS in DC
|
|||
|
(202) 364-1304 at 1200/2400, 8,N,1.....I can be reached in the VIRUS
|
|||
|
Conference.....Thanks, -Paul
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4538 *Virus Info*
|
|||
|
08-16-90 08:30:00 (Read 5 Times)
|
|||
|
From: ALAN DAWSON
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: REPLY TO MSG# 3183 (RE: VIRUS SCANNERS....)
|
|||
|
PH> I just wish the people writing this viruses would find more
|
|||
|
PH> useful things to do with their talents....such as trying to
|
|||
|
PH> help people instead of harm their systems.
|
|||
|
|
|||
|
Hear, hear! The frustrating, rug-chewing, desk-beating,
|
|||
|
monitor-smashing, stomp-down crying SHAME is that some of these
|
|||
|
viruses, on a technical level, are tremendously slick, wonderous
|
|||
|
programs. The people writing them are wonderful programmers. Just
|
|||
|
think what these people could be doing to help our PCs work better by
|
|||
|
writing a different kind of program -- and, potentially, how much
|
|||
|
money they might be able to make. They obviously have inventive
|
|||
|
minds, many of them. Such inventiveness could be put to such great
|
|||
|
use.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- Opus-CBCS 1.13
|
|||
|
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4539 *Virus Info*
|
|||
|
08-16-90 08:36:00 (Read 5 Times)
|
|||
|
From: ALAN DAWSON
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: REPLY TO MSG# 4538 (RE: VIRUS SCANNERS....)
|
|||
|
PH> I'd agree with that. The anti-viral program should be able to
|
|||
|
PH> detect that it is infected and produce a warning, though it may
|
|||
|
PH> still execute. By the time the anti-viral program has
|
|||
|
PH> determined its been infected, you've already infected system
|
|||
|
PH> memory or spread the virus.
|
|||
|
|
|||
|
Sure. Something ELSE has infected it. No reason not to let it run so
|
|||
|
long as it still works. One of our local youngsters wrote a wonderful
|
|||
|
remover of the Dark Avenger -- about 1400 bytes and worked like a
|
|||
|
charm. Only one teensy-weensy trouble -- the remover got infected and
|
|||
|
didn't warn you. That's not really one of the more useful programs to
|
|||
|
have around.
|
|||
|
Since it seems to be the constant topic of conversation here,
|
|||
|
SCANV's routine of warning of infection and continuing its duties is
|
|||
|
great.
|
|||
|
A common cause of re-infection is forgetting to remove the tools
|
|||
|
you used in the disinfection process -- stuff like LIST, just for
|
|||
|
example, that you might have used to examine the virus.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- Opus-CBCS 1.13
|
|||
|
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4540 *Virus Info*
|
|||
|
08-16-90 08:52:00 (Read 5 Times)
|
|||
|
From: ALAN DAWSON
|
|||
|
To: MICHAEL TUNN
|
|||
|
Subj: REPLY TO MSG# 2899 (RE: WHAT'S THE SOLUTION?)
|
|||
|
MT> It seems to me our Virus checking programs will just get bigger
|
|||
|
MT> and bigger as more viruses and strains of the same viruses are
|
|||
|
MT> discovered. If so (and if their development is excelerating)
|
|||
|
|
|||
|
Right. Question of the Year (1991??): What can you call it after you've
|
|||
|
hit the SCANV999 wall?
|
|||
|
|
|||
|
MT> Do we do develop new Operating Systems which are far more
|
|||
|
MT> secure!
|
|||
|
|
|||
|
Well, at least a new DOS which allows 9-character names? Then we
|
|||
|
could do SCANV9999. [joke].
|
|||
|
|
|||
|
MT> Do we crawl in a hole and hope it wont happen to us?
|
|||
|
|
|||
|
No, in a metaphor placed in 1970 terms, we get to the airport two
|
|||
|
hours before flight time for the security checks. And for the same
|
|||
|
reason, too -- the unwillingness of the many to take the resolve to
|
|||
|
remove the few. We have, most of us, helped the virus writers build
|
|||
|
up their existing sick belief that we are willing participants in
|
|||
|
some kind of game here. They win if they manage to steal our time,
|
|||
|
programs, disk space and data. They only do it because they had an
|
|||
|
unhappy childhood, right?
|
|||
|
One tangible result of allowing them to feed on this warped view
|
|||
|
is this echo, where we're all trying to get to the airport two hours
|
|||
|
early for the security check -- AND WE'RE ALL WASTING TWO HOURS
|
|||
|
because somebody we don't know might try to hurt us.
|
|||
|
We should have sympathy for Robert Morris, of course, because
|
|||
|
after all, he was just experimenting and not REALLY trying to hurt
|
|||
|
anyone, right? I have a one-word, two-syllable response to that but
|
|||
|
FidoNet policy frowns down upon me for thinking of using it.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- Opus-CBCS 1.13
|
|||
|
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4541 *Virus Info*
|
|||
|
08-16-90 09:25:00 (Read 4 Times)
|
|||
|
From: ALAN DAWSON
|
|||
|
To: KEN DORSHIMER
|
|||
|
Subj: RE: VIRUSES, WHAT ELSE...
|
|||
|
KD> not sure on that one, who knows what menagerie of thoughts
|
|||
|
KD> wander through clients minds.. :-) actually, i was unaware of
|
|||
|
KD> Corporate Vaccine (maybe I should get out more). I'm a little
|
|||
|
KD> concerned that the commercial programs may not be aware of some
|
|||
|
KD> of the newer viruses which crop up from time to time.
|
|||
|
|
|||
|
This is just a thought, too. But why not take your clients into your
|
|||
|
confidence, and point out to them that it is virtually impossible for
|
|||
|
anyone to match the up-to-dateness of a BBS distribution system?
|
|||
|
You're a BBSer. You know, just for example, that without BBSes McAfee
|
|||
|
couldn't have a program-of-the-week. Distribution of what your
|
|||
|
clients think of as commercial software simply isn't up to this
|
|||
|
standard -- isn't meant to be; never was; probably never will be.
|
|||
|
Seems to me if your clients like the SCANV concept, you should
|
|||
|
explain to them why they should be using SCANV. Why reinvent the
|
|||
|
wheel?
|
|||
|
If it wasn't that commercial messages which mention something
|
|||
|
other than SCANV often seem to get flamed here, I'd tell you about my
|
|||
|
commercial, non-BBS, wholly generic virus detector that doesn't need
|
|||
|
upgrading, which is available in North America and which soon will be
|
|||
|
launched there. But I don't want to get flamed, so I won't.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- Opus-CBCS 1.13
|
|||
|
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4542 *Virus Info*
|
|||
|
08-29-90 12:26:00 (Read 5 Times)
|
|||
|
From: ALAN DAWSON
|
|||
|
To: KEN DORSHIMER
|
|||
|
Subj: REPLY TO MSG# 3815 (RE: CRC CHECKING)
|
|||
|
PH>> Except in the case of Stealth Viruses....CRC checking doesn't work
|
|||
|
PH>> with them.
|
|||
|
PH>>
|
|||
|
|
|||
|
KD> i'd have to see that for myself. i think a complex enough
|
|||
|
KD> algorithm would keep them at bay. the probability factor is
|
|||
|
KD> just too low for such a stealth scheme to work.
|
|||
|
|
|||
|
Roger that. A program (such as a virus) can possibly figure out a
|
|||
|
checksum or CRC and "fool" your checker. But complex and random
|
|||
|
checksumming or CRCing is beyond the real-world possibility of defeat
|
|||
|
by a PC virus -- it would have to be too big and complex itself.
|
|||
|
Our strategy on our anti-virus program is to have eight different
|
|||
|
algorithms, and to use two of them on each checksum pass. Which two,
|
|||
|
even we do not know. Your virus then would have to take into account
|
|||
|
64 reasonably complex algorithmic possibilities to defeat it.
|
|||
|
Patti is technically correct that this can be done -- but not in
|
|||
|
the real world. I'd tend to be slightly suspicious if my word
|
|||
|
processor suddenly grew by the size of THIS virus. Most programs
|
|||
|
would, in fact, be incapable of loading it.
|
|||
|
As you say -- make it complex (which isn't so difficult) and keep
|
|||
|
churning out hundreds of different algorithms. Then you can forget
|
|||
|
about "stealth" viruses succeeding.
|
|||
|
|
|||
|
- From Thailand, a warm country in more ways than one.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- Opus-CBCS 1.13
|
|||
|
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4543 *Virus Info*
|
|||
|
09-01-90 21:26:00 (Read 5 Times)
|
|||
|
From: ALAN DAWSON
|
|||
|
To: PHILLIP LAIRD
|
|||
|
Subj: REPLY TO MSG# 3154 (RE: SCAN WEIRDNESS)
|
|||
|
PL> Allan, I NEVER SCAN from the C Drive or any hard disk. I
|
|||
|
PL> always scan from a write protected Floppy Diskette in Drive A.
|
|||
|
|
|||
|
This is absolutely correct, of course, and EXACTLY what's recommended
|
|||
|
in the doc. I was just curious whether others had had the experience.
|
|||
|
I do do some experimenting with viruses and anti-virus stuff, because
|
|||
|
Bangkok's a "virus capital" (dumb dealers plus a whole raft of
|
|||
|
pirates) and because I'm involved in a commercial anti-virus project.
|
|||
|
This was just a weird thing that happened to me when I was "playing"
|
|||
|
with Dark Avenger. I do wonder how many people follow that
|
|||
|
"write-protected floppy" recommendation (order???) in the SCAN docs,
|
|||
|
though.
|
|||
|
One note on your comment: it might be hard for some people to
|
|||
|
follow the recommendation, i.e. those with one floppy. The total
|
|||
|
beauty of SCAN, really, is to look over that new stuff. A lot of
|
|||
|
machines go to new people with one floppy drive.
|
|||
|
A lot also go with two different floppy drives (my own setup)
|
|||
|
although this of course is combatted simply by having TWO
|
|||
|
write-protected diskettes with SCAN aboard.
|
|||
|
- From Thailand, a warm country in more ways than one.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- Opus-CBCS 1.13
|
|||
|
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4544 *Virus Info*
|
|||
|
09-01-90 23:00:00 (Read 5 Times)
|
|||
|
From: ALAN DAWSON
|
|||
|
To: SANDY LOCKE
|
|||
|
Subj: REPLY TO MSG# 3819 (RE: REMAPPING...)
|
|||
|
SL> long time programmer I can testify the keyboard mapping is
|
|||
|
SL> really quite simple... no real problem and the business of
|
|||
|
SL> using terminal control code is quite as simple...
|
|||
|
SL> sandy
|
|||
|
|
|||
|
Finally, some sanity, sandy. [grin] (no pun intended until after I
|
|||
|
read that). The letter bomb, as a friend calls it, is alive, well and
|
|||
|
could certainly flourish. I wouldn't lay a huge amount of money on
|
|||
|
the ability to write a *virus* with remapping, but a bomb's a piece
|
|||
|
of cake.
|
|||
|
I THINK this thread started with the ability to put one directly
|
|||
|
over a terminal BBS-to-user connection, and in general there seem by
|
|||
|
my own experiments to be two chances of this: slim and fat. But, like
|
|||
|
a virus, a letter bomb can be transmitted via a BBS to a user, and
|
|||
|
then set off by that user in a number of pernicious ways that occur
|
|||
|
to me right off the top of my head. None of which you will see writ
|
|||
|
here, you understand -- but after watching this thread for a few
|
|||
|
weeks, I'm glad you leapt in with both feet.
|
|||
|
- From Thailand, a warm country in more ways than one.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- Opus-CBCS 1.13
|
|||
|
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4545 *Virus Info*
|
|||
|
09-06-90 18:59:00 (Read 5 Times)
|
|||
|
From: ALAN DAWSON
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: REPLY TO MSG# 4543 (RE: SCAN WEIRDNESS)
|
|||
|
PH> There are a couple of possibilities here. First, if the virus
|
|||
|
PH> is on a non-executable file, such as one with a .VOM or .VXE
|
|||
|
|
|||
|
Nope, wasn't either of these Patti. I tried to put in everything, and
|
|||
|
then forgot to say it was a regular file called AVENGER.COM -- a
|
|||
|
small utility I infected to harbor the virus when I ran it for tests.
|
|||
|
The utility originally was a small screen shell for looking at files
|
|||
|
a la LIST. It USED to be 3K, but now it's a little bigger [grin]
|
|||
|
|
|||
|
PH> The other case is if your copy of Dark Avenger does not occur
|
|||
|
PH> at the correct place in the file. Dark Avenger always adds its
|
|||
|
PH> code to the End Of Programs. If your copy happens to have it at
|
|||
|
|
|||
|
Roger. This is right up against the end of the file.
|
|||
|
|
|||
|
PH> Hope that helps....those are the only three cases that I've
|
|||
|
PH> heard of a similar problem to yours.
|
|||
|
|
|||
|
OK, no biggie. It was just that it was so weird I thought maybe you'd
|
|||
|
heard of it. I'll try it again when we get SCAN66B just for fun. It's
|
|||
|
not the kind of "bug" that's detrimental -- it's just one of those
|
|||
|
hey-it's-not-supposed-to-do-that things. Stupid machines.
|
|||
|
- From Thailand, a warm country in more ways than one.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- Opus-CBCS 1.13
|
|||
|
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4546 *Virus Info*
|
|||
|
09-06-90 19:00:00 (Read 5 Times)
|
|||
|
From: ALAN DAWSON
|
|||
|
To: SANDY LOCKE
|
|||
|
Subj: REPLY TO MSG# 4539 (RE: VIRUS SCANNERS....)
|
|||
|
SL> UH ALAN... you mind sending the NAME of this vendor via private
|
|||
|
SL> e-mail... accidentally I can understand BUT ON PURPOSE??? what
|
|||
|
SL> end would this kind of action serve???
|
|||
|
SL> cheers
|
|||
|
SL> sandy
|
|||
|
|
|||
|
This was before the Great Virus Scare of 1989 of course -- it was, if
|
|||
|
my tremendously failing memory isn't failing me, in 1986. A Toronto
|
|||
|
magazine put the virus in as a joke -- every time you started an
|
|||
|
infected program, a brief ad for the mag jumped up. Ald. . . whoops,
|
|||
|
the company name almost slipped out there, thought this was
|
|||
|
hilarious, left it in and shipped the thing. I'll send full details
|
|||
|
your way.
|
|||
|
This same company, the next time it shipped viruses, claimed that
|
|||
|
a guy in the shipping department was playing a game and accidentally
|
|||
|
infected the shipment (exclaimer!!!!). Is this a company with a weird
|
|||
|
sense of security, or what?
|
|||
|
- From Thailand, a warm country in more ways than one.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- Opus-CBCS 1.13
|
|||
|
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4746 *Virus Info*
|
|||
|
09-09-90 14:33:00 (Read 4 Times)
|
|||
|
From: CHARLES HANNUM
|
|||
|
To: PHILLIP LAIRD
|
|||
|
Subj: RE: MAKING SCAN READ ONLY.
|
|||
|
> Patti, is it feasible to make Scan.Exe Read only? Doug Emmett was
|
|||
|
> wondering about doing that. Couldn't you change the archive bits to
|
|||
|
> read only? Also, doesn't scan have an internal routine to determine
|
|||
|
> if it is damaged?
|
|||
|
|
|||
|
Setting the "Read-only" attribute wouldn't even *phase* a decent virus, and
|
|||
|
SCAN's internal checksum is VERY weak. (It quite literally is a checksum.
|
|||
|
It simply checks to see if all the words in the files add up to 0.)
|
|||
|
|
|||
|
--- ZMailQ 1.12 (QuickBBS)
|
|||
|
* Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4747 *Virus Info*
|
|||
|
09-09-90 07:35:00 (Read 5 Times)
|
|||
|
From: JERRY MASEFIELD
|
|||
|
To: CHARLES HANNUM
|
|||
|
Subj: REPLY TO MSG# 4279 (RE: PKZ120.ZIP)
|
|||
|
> >Didn't someone say that because someone had already hacked an earlier
|
|||
|
> >version of PKZIP that 120 would be the next scheduled release?
|
|||
|
> >Anybody have any info?
|
|||
|
>
|
|||
|
> Yes. Phil Katz said it.
|
|||
|
|
|||
|
No, Phil Katz said there WOULDN'T be a 120 release because of the same reason.
|
|||
|
This would eliminate any confusions between the real and phony versions. Also,
|
|||
|
Katz is offering a reward for any info leading to the arrest of the perpetrator
|
|||
|
of this hacking.
|
|||
|
|
|||
|
|
|||
|
--- TosScan 1.00
|
|||
|
* Origin: On A Clear Disk You Can Seek Forever! (1:260/212)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4748 *Virus Info*
|
|||
|
09-09-90 23:16:00 (Read 5 Times)
|
|||
|
From: PHILLIP LAIRD
|
|||
|
To: CHARLES HANNUM
|
|||
|
Subj: REPLY TO MSG# 4747 (RE: PKZ120.ZIP)
|
|||
|
** Quoting Charles Hannum to Phillip Laird **
|
|||
|
>Yes. Phil Katz said it.
|
|||
|
>
|
|||
|
>--- ZMailQ 1.12 (QuickBBS)
|
|||
|
> * Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0)
|
|||
|
** End of Quote **
|
|||
|
|
|||
|
That is what I thought. As soon as he went and said it, somebody appearently
|
|||
|
decided to hack it, huh?
|
|||
|
|
|||
|
--- TAGMAIL v2.20
|
|||
|
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4749 *Virus Info*
|
|||
|
09-08-90 17:42:00 (Read 4 Times)
|
|||
|
From: PAUL FERGUSON
|
|||
|
To: KEN DORSHIMER
|
|||
|
Subj: YEAH, BUT...
|
|||
|
You're on the right track, Ken....But TSR's have a nasty habit of
|
|||
|
fighting for control amongst each other. Some do not behave very well.
|
|||
|
-Paul
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4750 *Virus Info*
|
|||
|
09-09-90 08:43:00 (Read 6 Times)
|
|||
|
From: PATRICIA HOFFMAN
|
|||
|
To: PHILLIP LAIRD
|
|||
|
Subj: JERUSALEM B AND CLEANP64.ZIP
|
|||
|
PL> I cleaned 17 infected files today with clean version 64. I have a good
|
|||
|
PL> question. While the program removes the file, some where removed the
|
|||
|
PL> first time around, others were scanned several times before the virus
|
|||
|
PL> was actually removed. Can you tell me why?
|
|||
|
|
|||
|
The programs that were scanned several times probably were infected multiple
|
|||
|
times with Jerusalem virus. A lot of the variants of Jerusalem B will infect
|
|||
|
.EXE files repeatedly, eventually the program will get too large to fit into
|
|||
|
memory. On files that are infected multiple times with Jerusalem, you'll see a
|
|||
|
message come up for each infection as it is removed.
|
|||
|
|
|||
|
That is my guess as to what you observed...
|
|||
|
|
|||
|
Patti
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4751 *Virus Info*
|
|||
|
09-09-90 11:01:00 (Read 5 Times)
|
|||
|
From: PATRICIA HOFFMAN
|
|||
|
To: HERB BROWN
|
|||
|
Subj: REPLY TO MSG# 4281 (LET ME REPHRASE THAT.....)
|
|||
|
HB> I seem to be missing something here. As I understand it, to check for
|
|||
|
HB> virii with a scanner, such as SCAN, or whatever, you boot from a
|
|||
|
HB> uninfected floppy that has scan residing on it. Ok, now, how would a
|
|||
|
HB> virus that works as a TSR, that probably is loaded from the boot sector
|
|||
|
HB> from the hard disk be loaded, if you are booting from the floppy?
|
|||
|
HB> Which, the floppy being write protected, of course, would not have this
|
|||
|
HB> viral infection. I was under the assumption that the BIOS first
|
|||
|
HB> checked drive A: at bootup for a disk, etc. It seems that it would be
|
|||
|
HB> impossible to find a virii in memory with this type of scheme.. Please
|
|||
|
HB> enlighten me..
|
|||
|
|
|||
|
The memory resident viruses that are a real problem when they are in memory and
|
|||
|
any antiviral, whether a scanner or CRC checker, is run are not boot sector
|
|||
|
infectors....4096, Fish-6, Dark Avenger, and many others which infect on file
|
|||
|
open are file infectors. There are three that are file infectors but can also
|
|||
|
infect and replicate from the partition table and/or boot sector: V2100,
|
|||
|
Anthrax, and Plastique 5.21. (These last three are extremely rare, fairly new,
|
|||
|
and not known in the United States.) All of the viruses mentioned about use
|
|||
|
"Stealth" techniques to avoid detection or infect on file open.
|
|||
|
|
|||
|
If you are booting from an uninfected diskette when powering on the computer,
|
|||
|
you wouldn't ever find a virus in memory. However, if you are performing a
|
|||
|
warm reboot from a floppy, you could have a virus in memory still. The real
|
|||
|
point here was that most people do not run scan or other anti-viral utilities
|
|||
|
after powering on and booting from a floppy, so it is always possible for the
|
|||
|
virus to be in memory.
|
|||
|
|
|||
|
In that particular case, for a CRC checker which is what was being discussed,
|
|||
|
there are definite cases (the "Stealth" viruses) where the virus can get around
|
|||
|
the CRC checker simply because if the virus is in memory it disinfects the
|
|||
|
infected programs as they are read into memory. The CRC checker, since it is
|
|||
|
performing file reads, reads the DOS buffers to check the program, so the
|
|||
|
program it sees isn't infected and isn't the same as what is actually on the
|
|||
|
disk. In the case of viruses that infect on file open, running an anti-viral
|
|||
|
product against all the programs on a system with the virus active in memory
|
|||
|
can very well result in all the programs becoming infected.
|
|||
|
|
|||
|
I'm not against CRC checkers, I use one all the time on several of my systems.
|
|||
|
These systems all have master boot diskettes with clean system files, the CRC
|
|||
|
checker, and the log of all the expected crc values to be returned. Most
|
|||
|
people simply do not have that type of diskette setup for their systems since
|
|||
|
they feel they'll never be infected with a virus. In fact, the probability
|
|||
|
that a person will be infected with a virus is fairly low, though it does
|
|||
|
change depending on the person's computing habits and how often they exchange
|
|||
|
diskettes and/or programs with others.
|
|||
|
|
|||
|
I was trying to point out that NONE of the current anti-virals will absolutely
|
|||
|
protect a user from getting a virus....all the techniques currently used by
|
|||
|
anti-viral products can be circumvented by some of the newer, more
|
|||
|
technologically advanced viruses. Not to point that out would be like burying
|
|||
|
one's head in the sand, especially when the discussion has to do with someone
|
|||
|
thinkin of writing a new anti-viral who needs to know what can currently be
|
|||
|
circumvented. It is easier to fix the design before the program is written
|
|||
|
then to fix it later after the hole is found....
|
|||
|
|
|||
|
Patti
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4967 *Virus Info*
|
|||
|
09-10-90 16:55:00 (Read 5 Times)
|
|||
|
From: CHARLES HANNUM
|
|||
|
To: JERRY MASEFIELD
|
|||
|
Subj: REPLY TO MSG# 4748 (RE: PKZ120.ZIP)
|
|||
|
>> >Didn't someone say that because someone had already hacked an earlier
|
|||
|
>> >version of PKZIP that 120 would be the next scheduled release?
|
|||
|
>> >Anybody have any info?
|
|||
|
>>
|
|||
|
>> Yes. Phil Katz said it.
|
|||
|
|
|||
|
> No, Phil Katz said there WOULDN'T be a 120 release because of the
|
|||
|
> same reason. This would eliminate any confusions between the real
|
|||
|
> and phony versions. Also, Katz is offering a reward for any info
|
|||
|
> leading to the arrest of the perpetrator of this hacking.
|
|||
|
|
|||
|
Err, <retracting foot from mouth> I must have misread the original note...
|
|||
|
|
|||
|
--- ZMailQ 1.12 (QuickBBS)
|
|||
|
* Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4968 *Virus Info*
|
|||
|
09-10-90 17:54:00 (Read 5 Times)
|
|||
|
From: CHARLES HANNUM
|
|||
|
To: WHOM IT MAY CONCERN
|
|||
|
Subj: LHARC 1.14B(ETA)
|
|||
|
The 'b' is actually a beta, which makes me think he released it for testing
|
|||
|
and it got loose, but is not yet an "official" release.
|
|||
|
|
|||
|
At any rate, I NEED AN ANSWER!! I have "LHarc 1.14b(eta)", and I really need
|
|||
|
a definitive answer. IS IT REAL OR NOT?
|
|||
|
|
|||
|
--- ZMailQ 1.12 (QuickBBS)
|
|||
|
* Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4969 *Virus Info*
|
|||
|
09-10-90 23:13:00 (Read 4 Times)
|
|||
|
From: PHILLIP LAIRD
|
|||
|
To: DUANE BROWN
|
|||
|
Subj: REPLY TO MSG# 4278 (RE: SECURING YOUR UPLOADS)
|
|||
|
** Quoting Duane Brown to Phillip Laird **
|
|||
|
>
|
|||
|
>That's easy to fix the problem about del *.* -- just do
|
|||
|
>
|
|||
|
>echo y | del *.*
|
|||
|
>
|
|||
|
>then the Y gets placed in there automatically...no keyfake,
|
|||
|
>nothing!
|
|||
|
>
|
|||
|
>---
|
|||
|
> * Origin: End of the Line. Stafford, Va. (703)720-1624. (1:274/16)
|
|||
|
** End of Quote **
|
|||
|
|
|||
|
Thanx.... Using the pipe redirection will do just that like you say. I use
|
|||
|
the KEYFAKE Program for a reason with KEY.DAT in the program I just finished
|
|||
|
that will check for bugs in uploads. It calls the routine externally from the
|
|||
|
Execute file.
|
|||
|
|
|||
|
--- TAGMAIL v2.20
|
|||
|
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4970 *Virus Info*
|
|||
|
09-10-90 23:21:00 (Read 6 Times)
|
|||
|
From: PHILLIP LAIRD
|
|||
|
To: ALAN DAWSON
|
|||
|
Subj: REPLY TO MSG# 4545 (RE: SCAN WEIRDNESS)
|
|||
|
** Quoting Alan Dawson to Phillip Laird **
|
|||
|
>
|
|||
|
>This is absolutely correct, of course, and EXACTLY what's recommended
|
|||
|
>
|
|||
|
>in the doc. I was just curious whether others had had the experience.
|
|||
|
>
|
|||
|
>I do do some experimenting with viruses and anti-virus stuff,
|
|||
|
>because
|
|||
|
>Bangkok's a "virus capital" (dumb dealers plus a whole raft
|
|||
|
>of
|
|||
|
>pirates) and because I'm involved in a commercial anti-virus
|
|||
|
>project.
|
|||
|
>--- Opus-CBCS 1.13
|
|||
|
> * Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand
|
|||
|
>(3:608/9.0)
|
|||
|
** End of Quote **
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
I totally agree that most people do not read the docs. I work for a University
|
|||
|
in South East Texas. Some of the Micros have been plagued with viruses. I
|
|||
|
have setup a routine for the Labs to Scan the Floppies coming in with SCAN.
|
|||
|
This has just taken Place. Next thing I know, the clerk decides to run SCAN
|
|||
|
From her hard drive on her desktop! Then Alameda hit her! The SCAN Program
|
|||
|
has gone over good at the University. We are getting an order ready for a Site
|
|||
|
License Agreement with MCafee and Associates. I do a little research on some
|
|||
|
of the strains. However this BBS keeps me busy after work!
|
|||
|
|
|||
|
Weird thing about CLEAN.EXE the program to remove the Viruses. I am using
|
|||
|
Clean Version 66 and sometimes the program will scan the file numerous times
|
|||
|
before the virus is eventually removed. I guess the Marker is trying to move
|
|||
|
around in the file? Anybody know?
|
|||
|
|
|||
|
--- TAGMAIL v2.20
|
|||
|
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4971 *Virus Info*
|
|||
|
09-09-90 10:59:00 (Read 5 Times)
|
|||
|
From: MIKE BADER
|
|||
|
To: MARC SHEWRING
|
|||
|
Subj: INFORMATION
|
|||
|
Several anti-virus programs use signature files.
|
|||
|
IBM (yech) for one, but VirHUNT by DDI alos
|
|||
|
uses a file for signatures and goes into
|
|||
|
quite a bit of detail in their manual.
|
|||
|
I'll look up a better address and phone.
|
|||
|
|
|||
|
Mike
|
|||
|
|
|||
|
--- FD 1.99c
|
|||
|
* Origin: P-1 BBS ][ (313) 542-9615 Ferndale, MI (HST) (1:120/45)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4972 *Virus Info*
|
|||
|
09-06-90 20:56:00 (Read 8 Times)
|
|||
|
From: CY WELCH
|
|||
|
To: DEREK BILLINGSLEY
|
|||
|
Subj: REPLY TO MSG# 3817 (POSSIBLE VIRUS?)
|
|||
|
In a message to All <01 Sep 90 11:34:00> Derek Billingsley wrote:
|
|||
|
|
|||
|
DB> This just hit me today - I am not sure if it is some kind of system
|
|||
|
DB> error or a potential virus.
|
|||
|
|
|||
|
DB> Last night (September first) and before gave me no indication of any
|
|||
|
DB> virus being present on my system. It is now september 1st and now,
|
|||
|
DB> whenever a file is written to disk (I noticed the text files first,
|
|||
|
DB> but a downloaded zip'd file was also garbled...) it took out about
|
|||
|
DB> 10 bytes from the beginning of each line...
|
|||
|
|
|||
|
DB> When I realized this may be set to occur on this date, I set my DATE
|
|||
|
DB> back a night and everything worked fine... I made a sample text file
|
|||
|
DB> with a known pattern of characters -- any date past september 1st
|
|||
|
DB> 1990 leaves the file altered as mentioned above. Any date previous
|
|||
|
DB> is written unharmed...
|
|||
|
|
|||
|
DB> SCANV56 reports only that the SCAN program is damaged - no disk
|
|||
|
DB> presence of the source is evident.
|
|||
|
|
|||
|
DB> Has anyone heard of something like this happening?
|
|||
|
|
|||
|
Can't say I have heard of that but it sure sounds like a virus. I would
|
|||
|
recommend getting a copy of scan v64 and see what it says. It might even be
|
|||
|
something new.
|
|||
|
|
|||
|
|
|||
|
--- XRS! 3.41+
|
|||
|
* Origin: Former QuickBBS Beta Team Member (99:9402/122.1) (Quick 1:125/122.1)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4973 *Virus Info*
|
|||
|
08-14-90 18:15:00 (Read 5 Times)
|
|||
|
From: JAMES BLEACHER
|
|||
|
To: DOUG BAGGETT
|
|||
|
Subj: REPLY TO MSG# 2904 (ANTI VIRUS VIRUSES)
|
|||
|
* Replying to a message originally to Patricia Hoffman
|
|||
|
DB>well..here is a question..where exactly did viruses
|
|||
|
DB>originate anyway..was it in this country or others?
|
|||
|
DB>Doug
|
|||
|
|
|||
|
According to want I've read Dr. Fred Cohen at MIT developed the first virus
|
|||
|
back in 1964 or so. This was to prove that code could actually replicate and
|
|||
|
spread throughout a mainframe. My question is why on earth would he want to do
|
|||
|
that in the first place?
|
|||
|
---
|
|||
|
* Origin: "Hey! Why's my COMMAND.COM larger than normal?" (1:151/801)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4974 *Virus Info*
|
|||
|
08-14-90 18:23:00 (Read 5 Times)
|
|||
|
From: JAMES BLEACHER
|
|||
|
To: PAUL FERGUSON
|
|||
|
Subj: REPLY AND ADDENDUM TO MSG 145
|
|||
|
* Replying to a message originally to Alan Dawson
|
|||
|
PF>You can always be sure of an uninfected SCAN IF you download
|
|||
|
PF>from the
|
|||
|
PF>authors' BBS....The program itself will terminate upon
|
|||
|
PF>detection and
|
|||
|
PF>has safeguards written into it to protect against such
|
|||
|
PF>occurances....Of
|
|||
|
PF>course, there are ways for an unsuspecting user (You know
|
|||
|
PF>who) to
|
|||
|
PF>infect the programs themselves and then re-archive
|
|||
|
PF>unwittingly a
|
|||
|
PF>viral Scan that will never know (depending upon the
|
|||
|
|
|||
|
WRONG! Scan checks itself upon startup and will give you a message to the
|
|||
|
effect of:
|
|||
|
|
|||
|
FILE DAMAGED! "C:\SCAN.EXE"
|
|||
|
|
|||
|
But will continue to operate. If you see that message then you're in big
|
|||
|
trouble. Viruses like the Dark Avenger will use scan's file checking (since it
|
|||
|
opens all the files it's checking) to spread itself all over your floppy/hard
|
|||
|
drive. Unless you've got a totally new virus that scan can't detect you don't
|
|||
|
have anything to worry about if it's already infected when you get it. (Except
|
|||
|
that it's probably detecting the virus all over your drive because it just
|
|||
|
helped put it there!)
|
|||
|
---
|
|||
|
* Origin: "Hey! Why's my COMMAND.COM larger than normal?" (1:151/801)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 4975 *Virus Info*
|
|||
|
09-10-90 18:02:00 (Read 6 Times)
|
|||
|
From: JAMES BLEACHER
|
|||
|
To: DEREK BILLINGSLEY
|
|||
|
Subj: REPLY TO MSG# 4972 (POSSIBLE VIRUS?)
|
|||
|
DB>SCANV56 reports only that the SCAN program is damaged - no
|
|||
|
DB>disk presence of the source is evident.
|
|||
|
DB>
|
|||
|
DB>Has anyone heard of something like this happening?
|
|||
|
|
|||
|
Well, first of all you've got an old version of scan. Try downloading scanv66b
|
|||
|
from someone. I have it if you can't locate it elsewhere. Second if scan ever
|
|||
|
reports being damaged there's a 99% chance that you've got a virus! Better
|
|||
|
check into it quick! Hope you don't find that you have one but it sure sounds
|
|||
|
like you do!
|
|||
|
---
|
|||
|
* Origin: "Hey! Why's my COMMAND.COM larger than normal?" (1:151/801)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 5238 *Virus Info*
|
|||
|
09-10-90 15:11:00 (Read 6 Times)
|
|||
|
From: JOE MORLAN
|
|||
|
To: JONO MOORE
|
|||
|
Subj: REPLY TO MSG# 4028 (RE: LHARC114?)
|
|||
|
I have learned from other sources that the latest official release of LHARC
|
|||
|
is LH113D. The 'new' LHARC114 is said to be another unauthorized hack. It
|
|||
|
evidently is NOT a virus. Yoshi has been quoted as stating on GENIE that the
|
|||
|
next official release will be ver. 2.0. I hope this helps.
|
|||
|
|
|||
|
--- Telegard v2.5i Standard
|
|||
|
* Origin: Telegard BBS (000-000-0000) (1:161/88.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 5239 *Virus Info*
|
|||
|
09-10-90 15:12:00 (Read 6 Times)
|
|||
|
From: JOE MORLAN
|
|||
|
To: HERB BROWN
|
|||
|
Subj: REPLY TO MSG# 5238 (RE: LHARC114?)
|
|||
|
Exactly. LHARC v1.14b is not a real release. Just another unauthorized hack.
|
|||
|
|
|||
|
--- Telegard v2.5i Standard
|
|||
|
* Origin: Telegard BBS (000-000-0000) (1:161/88.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 5240 *Virus Info*
|
|||
|
09-07-90 20:35:00 (Read 6 Times)
|
|||
|
From: CHRIS BARRETT
|
|||
|
To: SIMON FOSTER
|
|||
|
Subj: RE: MYSTERY VIRUS??
|
|||
|
Could I ask wy the buffers would be causing the Boot Block to be altered.
|
|||
|
|
|||
|
I have since removed the val checks using ScanV66B and put some new ones on
|
|||
|
using ScanV66B.
|
|||
|
|
|||
|
Could it be possible that someone has altered a bit of the code and as ScanV66
|
|||
|
uses a string (or is it hex search) it doesn't find it?
|
|||
|
|
|||
|
eg In the Virus it originaly said "Your disk is stoned' and the person
|
|||
|
converted it to say 'Your disk is now stoned'. If ScanV66 happens to look for
|
|||
|
the original string to my knowlegde the virus would not be recognized.
|
|||
|
|
|||
|
Chris.
|
|||
|
--- TBBS v2.1/NM
|
|||
|
* Origin: 1990 MultiLine Perth Western Australia - 09-370-3333 - (690/654)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 5241 *Virus Info*
|
|||
|
09-12-90 22:11:00 (Read 6 Times)
|
|||
|
From: PHILLIP LAIRD
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: REPLY TO MSG# 4751 (RE: LET ME REPHRASE THAT.....)
|
|||
|
** Quoting Patricia Hoffman to Herb Brown **
|
|||
|
>If you are booting from an uninfected diskette when powering
|
|||
|
>on the computer, you wouldn't ever find a virus in memory.
|
|||
|
> However, if you are performing a warm reboot from a floppy,
|
|||
|
>you could have a virus in memory still. The real point here
|
|||
|
>was that most people do not run scan or other anti-viral utilities
|
|||
|
>after powering on and booting from a floppy, so it is always
|
|||
|
>possible for the virus to be in memory.
|
|||
|
** End of Quote **
|
|||
|
|
|||
|
THat is exactly the way I have found some of the Virii I researched as being.
|
|||
|
If the virus is present in memory, then it is possible the the file will
|
|||
|
infect, however, if the Scan Diskette is write protected and the diskette is
|
|||
|
bootable, Like oyu say. It is BEST to cut the power to the system and then
|
|||
|
re-boot the system. However, if you wanted to go a step further, it is
|
|||
|
possible to clear all volatile RAM if you want to do a warm boot. The Warm
|
|||
|
Boot can result in infection, since the ram is not cleared. The various
|
|||
|
hardware interrupts are still performed and cotrol passed to Command.com, but
|
|||
|
the System files are still present in memory, along with a virus possibly. Too
|
|||
|
many people are now taking the virus issue too lightly. It can effect you,
|
|||
|
take precaution and use the Floppy to boot up on with a Write Protect on the
|
|||
|
Diskette. Then scan the drive from there.
|
|||
|
|
|||
|
--- TAGMAIL v2.20
|
|||
|
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 5242 *Virus Info*
|
|||
|
09-12-90 22:16:00 (Read 6 Times)
|
|||
|
From: PHILLIP LAIRD
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: RE: JERUSALEM B AND CLEANP64.Z
|
|||
|
** Quoting Patricia Hoffman to Phillip Laird **
|
|||
|
> PL> I cleaned 17 infected files today with clean version 64.
|
|||
|
> I have a good
|
|||
|
> PL> question. While the program removes the file, some where
|
|||
|
>removed the
|
|||
|
> PL> first time around, others were scanned several times before
|
|||
|
>the virus
|
|||
|
> PL> was actually removed. Can you tell me why?
|
|||
|
>
|
|||
|
>The programs that were scanned several times probably were
|
|||
|
>infected multiple times with Jerusalem virus. A lot of the
|
|||
|
>variants of Jerusalem B will infect .EXE files repeatedly,
|
|||
|
>eventually the program will get too large to fit into memory.
|
|||
|
> On files that are infected multiple times with Jerusalem,
|
|||
|
>you'll see a message come up for each infection as it is removed.
|
|||
|
>
|
|||
|
>
|
|||
|
>That is my guess as to what you observed...
|
|||
|
>
|
|||
|
>Patti
|
|||
|
>
|
|||
|
** End of Quote **
|
|||
|
|
|||
|
That is exactly what I had suspected. I assumed the file was re-infected
|
|||
|
several times as the size of the Original WP.EXE files that were infected once
|
|||
|
was for example 112K, and the ones that were infected several times was around
|
|||
|
173K. Some of the programs were non functional after clean ws performed on the
|
|||
|
file. We just delte the file and re-copy it when that happens. The only safe
|
|||
|
way to do it I have found is to go ahead anuse scans' /D option and delete the
|
|||
|
file and re-copy it.
|
|||
|
|
|||
|
--- TAGMAIL v2.20
|
|||
|
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 5887 *Virus Info*
|
|||
|
09-14-90 14:05:00 (Read 5 Times)
|
|||
|
From: MIKE MCCUNE
|
|||
|
To: PATRICK TOULME
|
|||
|
Subj: MOTHER FISH
|
|||
|
Everybody was talking about the Mother Fish a few weeks ago. Now that it has
|
|||
|
been out for mor than a week, nobody is saying anything about it. What's the
|
|||
|
deal with this virus?
|
|||
|
|
|||
|
|
|||
|
--- Opus-CBCS 1.13
|
|||
|
* Origin: The Slowboat BBS (404-578-1691) Atlanta, GA (1:133/311.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 6048 *Virus Info*
|
|||
|
09-14-90 07:05:00 (Read 4 Times)
|
|||
|
From: JOE MORLAN
|
|||
|
To: CHARLES HANNUM
|
|||
|
Subj: REPLY TO MSG# 4968 (RE: LHARC 1.14B(ETA))
|
|||
|
According to folks posting on the technical echo, Yoshi has stated on Genie
|
|||
|
that the next official release after LHarc 1.13c will be LHarc 2.xx. Beta
|
|||
|
versions of LHarc 2.0 are said to have been released in Japan. It is illogical
|
|||
|
that 114b would be a valid release. The main change is the same as the known
|
|||
|
unauthorized hack, ICE.
|
|||
|
|
|||
|
There are a few people on that echo that seem to believe that the release is
|
|||
|
"real" based mostly on the source where the file had been posted. It seems
|
|||
|
clear to me that it is just another unauthorized hack.
|
|||
|
|
|||
|
--- Telegard v2.5i Standard
|
|||
|
* Origin: The Twilight Zone (415)-352-0433 (1:161/88.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 6659 *Virus Info*
|
|||
|
09-15-90 08:13:00 (Read 4 Times)
|
|||
|
From: RICHARD HECK
|
|||
|
To: ALL
|
|||
|
Subj: CLEAN UP
|
|||
|
I think that the newest version of cleanup was alot better then the version
|
|||
|
before it.
|
|||
|
Oh and watch out for that Sunday Virus.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- outGATE v2.10
|
|||
|
# Origin: SIGnet International GateHost (8:7501/103)
|
|||
|
* Origin: Network Echogate (1:129/34)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 6660 *Virus Info*
|
|||
|
09-16-90 11:28:00 (Read 5 Times)
|
|||
|
From: SATYR DAZE
|
|||
|
To: CHRIS BARRETT
|
|||
|
Subj: REPLY TO MSG# 5240 (RE: MYSTERY VIRUS??)
|
|||
|
|
|||
|
Sorry to butt in ..... you aparently have been infected by the Stoner-Marijauna
|
|||
|
Virus , quite a few people here in florida myself included have seen this
|
|||
|
little beauty.
|
|||
|
|
|||
|
After disinfecting yourself the damaged caused by the virus is unaltered.
|
|||
|
Backup your harddrive and reformat it, after restoring it. Delete and redo
|
|||
|
Autoexec.bat and Config.sys they have both also been altered.
|
|||
|
|
|||
|
Your Hardrive should now be back to snuff .... but before i forget run a
|
|||
|
utility to mark and lock out bad sectors the Virus may have caused. These
|
|||
|
unfortunaly are not always recoverable.
|
|||
|
|
|||
|
|
|||
|
G'Day ....................... The Satyr Daze
|
|||
|
--- TBBS v2.1/NM
|
|||
|
* Origin: Eclectic Multi-BBS System / Miami FL (305)662-1748 (1:135/2)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 6661 *Virus Info*
|
|||
|
09-16-90 11:39:00 (Read 4 Times)
|
|||
|
From: SATYR DAZE
|
|||
|
To: GARY MOYER
|
|||
|
Subj: REPLY TO MSG# 4546 (RE: VIRUS SCANNERS....)
|
|||
|
Well you can Download a Virus scanner from a reputable BBS -- one that
|
|||
|
actually checks all of it's files for viruses --- or go out and purchase a
|
|||
|
Virus Scanner. Most of the downloadable stuffis by Mcaffe Associates, You can
|
|||
|
purchase Virucide (commercial version) which checks and disinfects your files,
|
|||
|
also by Mcaffe Associates for about $30.00. Not a bad buy when you consider the
|
|||
|
consequences of not having a good scanner.
|
|||
|
|
|||
|
Just make sure that after Downloading a file, unarc-unzip-unwhatever it, But
|
|||
|
under no circumstance activate it --- run it --. Run the scanner, if the file
|
|||
|
checks clean go ahead and run it then. If it dosn't the program will warn you
|
|||
|
and disinfect it. The reason you must open the file (unzip) is because
|
|||
|
scanners can't look into an archived file.
|
|||
|
|
|||
|
The Satyr Daze
|
|||
|
--- TBBS v2.1/NM
|
|||
|
* Origin: Eclectic Multi-BBS System / Miami FL (305)662-1748 (1:135/2)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 6662 *Virus Info*
|
|||
|
09-16-90 13:40:00 (Read 4 Times)
|
|||
|
From: SATYR DAZE
|
|||
|
To: CHARLES HANNUM
|
|||
|
Subj: REPLY TO MSG# 4973 (RE: ANTI VIRUS VIRUSES)
|
|||
|
Actually the Honor of creating Viruses Belongs to John Conway, he was trying to
|
|||
|
develop software that emulated living organisms. He developed the first "Game
|
|||
|
of Life". As he created these new programs they became more and more complex
|
|||
|
having intricate enviroments that the elements would have to over come in order
|
|||
|
to survive.
|
|||
|
|
|||
|
But these were never allowed to get beyond that scope, Virus programs where
|
|||
|
never destructive untill the "Core Wars". Opposing Programmers would create
|
|||
|
self-replicating programms that when they encountered other self-replicaters
|
|||
|
would try to devour them. Incidently it was called "Core Wars" because the
|
|||
|
game itself took place in Core Memory . These young Programmers were actually
|
|||
|
quite small in number and never publicly discussed what they were doing. If
|
|||
|
any blame is to be attached it should be to Ken THompson who went public with
|
|||
|
the process in 1983..... at that point it was "Discovered" by university
|
|||
|
students who began creatingthe real nasties ..... Today many strains are just
|
|||
|
variation of their original work.
|
|||
|
|
|||
|
Just a little History...............
|
|||
|
|
|||
|
The Satyr Daze
|
|||
|
--- TBBS v2.1/NM
|
|||
|
* Origin: Eclectic Multi-BBS System / Miami FL (305)662-1748 (1:135/2)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 6663 *Virus Info*
|
|||
|
09-14-90 19:31:00 (Read 5 Times)
|
|||
|
From: RAJU DARYANANI
|
|||
|
To: ALL
|
|||
|
Subj: NETWARE BYPASSING JERUSALEM VIRUS
|
|||
|
Does anyone have any details on the CERT announcement that it has
|
|||
|
isolated a version of the Jerusalem virus that can bypass Novell
|
|||
|
Netware's file protection settings and infect files ? Anyone know
|
|||
|
of actual infections, how common it is and whether McAfee's SCAN detect
|
|||
|
this virus ?
|
|||
|
|
|||
|
Raju
|
|||
|
|
|||
|
--- via Silver Xpress V2.24 [NR]
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: TAIC Maximus - DVNet Asia, PEP/V.32 High Speed PathFinder
|
|||
|
(3:700/1.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 6664 *Virus Info*
|
|||
|
09-16-90 00:41:00 (Read 4 Times)
|
|||
|
From: ALAN DAWSON
|
|||
|
To: PHILLIP LAIRD
|
|||
|
Subj: REPLY TO MSG# 4970 (RE: SCAN WEIRDNESS)
|
|||
|
PL> been plagued with viruses. I have setup a routine for the Labs
|
|||
|
PL> to Scan the Floppies coming in with SCAN. This has just taken
|
|||
|
PL> Place. Next thing I know, the clerk decides to run SCAN From
|
|||
|
PL> her hard drive on her desktop! Then Alameda hit her! The SCAN
|
|||
|
|
|||
|
The next "killer-ap" should be the anti-stupidity program. If ever it
|
|||
|
needed to be proved that "a little knowledge is a dangerous thing,"
|
|||
|
computer users prove it to their techies daily!
|
|||
|
|
|||
|
PL> Weird thing about CLEAN.EXE the program to remove the Viruses.
|
|||
|
PL> I am using Clean Version 66 and sometimes the program will scan
|
|||
|
PL> the file numerous times before the virus is eventually removed.
|
|||
|
|
|||
|
I really don't like the whole idea of a "popular" virus remover. (A
|
|||
|
specific cure for a specific virus on one site is different.) Any
|
|||
|
yo-yo with PC-Tools or Norton can make a "new" virus and this makes
|
|||
|
the possible results from a removal program very iffy. I really
|
|||
|
believe in brute-force removal i.e. DEL VIRUS.COM, and re-install.
|
|||
|
It's safer that way, and certain (after you check the floppies, of
|
|||
|
course).
|
|||
|
- From Thailand, a warm country in more ways than one.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- Opus-CBCS 1.13
|
|||
|
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 7165 *Virus Info*
|
|||
|
08-31-90 20:15:00 (Read 4 Times)
|
|||
|
From: CHRIS BARRETT
|
|||
|
To: ALL
|
|||
|
Subj: BOOKS ON VIRUSES
|
|||
|
Could someone tell me somenames of books on Viruses and their authors.
|
|||
|
As I am in Australia getting hold of them may be a problem though.
|
|||
|
|
|||
|
Hope you can help...
|
|||
|
Chris..
|
|||
|
--- TBBS v2.1/NM
|
|||
|
* Origin: 1990 MultiLine Perth Western Australia - 09-370-3333 - (690/654)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 7166 *Virus Info*
|
|||
|
08-31-90 20:21:00 (Read 5 Times)
|
|||
|
From: CHRIS BARRETT
|
|||
|
To: ALL
|
|||
|
Subj: REPLY TO MSG# 6660 (MYSTERY VIRUS??)
|
|||
|
At my school we have some XT's with 2 360K FDD each. Lately we have noticed
|
|||
|
that some of the students disks are being over written by the program disk they
|
|||
|
were using. Eg some people have found the Turbo pascal files on their data
|
|||
|
disks.
|
|||
|
|
|||
|
I brought in a copy of ScanV66 and placed a validation check on the program
|
|||
|
disks (Not the data disks). Scanning showed no viruses (well known ones
|
|||
|
anyway). But when we scanned them a week later we found some had had their Boot
|
|||
|
Blocks altered.
|
|||
|
|
|||
|
In some cases the files on the data disk are just renamed to one on the program
|
|||
|
disk. Eg we listed "TURBO.EXE" and found it to contain a students pascal source
|
|||
|
code.
|
|||
|
|
|||
|
Could someone shed some light please..
|
|||
|
I have told the teacher it is most likely home grown and he is sh*tting
|
|||
|
himself.
|
|||
|
|
|||
|
Chris.
|
|||
|
--- TBBS v2.1/NM
|
|||
|
* Origin: 1990 MultiLine Perth Western Australia - 09-370-3333 - (690/654)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 7167 *Virus Info*
|
|||
|
09-01-90 18:28:00 (Read 4 Times)
|
|||
|
From: DOUG EMMETT
|
|||
|
To: PHILLIP LAIRD
|
|||
|
Subj: REPLY TO MSG# 6664 (RE: SCAN WEIRDNESS)
|
|||
|
For the new boy would you mind explaining how to write protect Scan.Exe on the
|
|||
|
C: drive-Thanks
|
|||
|
|
|||
|
|
|||
|
--- Opus-CBCS 1.13
|
|||
|
* Origin: The U.S.A. Connection-*HN-NZ*-(+64-71-566851) (3:772/260.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 7168 *Virus Info*
|
|||
|
09-02-90 14:18:00 (Read 4 Times)
|
|||
|
From: WARREN ANDERSON
|
|||
|
To: MIKE DURKIN
|
|||
|
Subj: REPLY TO MSG# 2475 (INTERNET WORM)
|
|||
|
Hi, No I have never come across the book. I would appreciate it if you could
|
|||
|
provide a copy of the password list (just in case I can't get hold of a copy of
|
|||
|
the book). Thanks again.
|
|||
|
Regards
|
|||
|
\/\/ /\/\ Anderson
|
|||
|
|
|||
|
--- Telegard v2.5 Standard
|
|||
|
* Origin: InfoBoard BBS - Auckland - New Zealand (3:772/140.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 7169 *Virus Info*
|
|||
|
09-04-90 06:12:00 (Read 4 Times)
|
|||
|
From: PAUL FERGUSON
|
|||
|
To: YASHA KIDA
|
|||
|
Subj: REPLY TO MSG. 134
|
|||
|
Right on, Yasha......I couldn't have said it better myself.....This
|
|||
|
town (DC) seems to have a real problem concerning this. That's OK,
|
|||
|
though, as you have said, we shall see who they come running to when
|
|||
|
the going gets rough.....
|
|||
|
|
|||
|
-Paul
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 7170 *Virus Info*
|
|||
|
09-05-90 12:50:00 (Read 4 Times)
|
|||
|
From: MICHAEL ADAMS
|
|||
|
To: RICK THOMA
|
|||
|
Subj: RE: PKZ120.EXE
|
|||
|
Rick .. I had one uploaded to my Board called "PKZ120.exe". The File looks
|
|||
|
Authentic. Even went to the point of -AV and the Pkware registeration number
|
|||
|
on the last line after self extraction. If it were not for the file
|
|||
|
"Warning.txt" put out by "Pkware" I'd still be using it. Really went through
|
|||
|
alot of trouble authenticating it!
|
|||
|
|
|||
|
Michael Adams
|
|||
|
Baud Horizons
|
|||
|
(504) 436-9590
|
|||
|
|
|||
|
--- Maximus-CBCS v1.00
|
|||
|
* Origin: The Southern Star - SDS/SDN/PDN - 504-885-5928 - (1:396/1)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 7171 *Virus Info*
|
|||
|
09-05-90 16:06:00 (Read 4 Times)
|
|||
|
From: LONNIE DENISON
|
|||
|
To: ALL
|
|||
|
Subj: HEY
|
|||
|
Just letting you know that I have joined my board (The Maze) to this echo..
|
|||
|
hope we can contribute some info here!
|
|||
|
|
|||
|
Lonnie Denison
|
|||
|
|
|||
|
--- Telegard v2.5i Standard
|
|||
|
* Origin: => The Maze <= 916-391-6118 "Would ya Believe" (1:203/60.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 7172 *Virus Info*
|
|||
|
09-05-90 18:28:00 (Read 4 Times)
|
|||
|
From: PHILLIP LAIRD
|
|||
|
To: KEVIN HIGGINS
|
|||
|
Subj: REPLY TO MSG# 4969 (RE: SECURING YOUR UPLOADS)
|
|||
|
Kevin, nice batch file for testing files for virrii. I am now Alpha testing my
|
|||
|
new program that will work with TAG at present. I have the Key fake program if
|
|||
|
it will help you! That file will enter the "Y or N" Question when the batch
|
|||
|
file comes to Are you sure? Y or N. Meaning you had the batch file to delete
|
|||
|
all programs in the temp check directory. I plan on a new realease of the
|
|||
|
program to several BBSES that will work to help all Sysops keep out the Virii.
|
|||
|
If you want Keyfake Program, just Tell me, and I will netmail it to you... I
|
|||
|
had a run in with Jerusalem B [jeru] today at Lamar University. Seems the
|
|||
|
Chemistry Department stockroom manager had already infected 17 files on his
|
|||
|
hard drive. Clean removed the virus.
|
|||
|
|
|||
|
--- TAGMAIL v2.20
|
|||
|
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 7173 *Virus Info*
|
|||
|
09-05-90 18:30:00 (Read 5 Times)
|
|||
|
From: PHILLIP LAIRD
|
|||
|
To: PATRICIA HOFFMAN
|
|||
|
Subj: REPLY TO MSG# 4750 (JERUSALEM B AND CLEANP64.ZIP)
|
|||
|
Patti:
|
|||
|
|
|||
|
I cleaned 17 infected files today with clean version 64. I have a good
|
|||
|
question. While the program removes the file, some where removed the first
|
|||
|
time around, others were scanned several times before the virus was actually
|
|||
|
removed. Can you tell me why?
|
|||
|
|
|||
|
--- TAGMAIL v2.20
|
|||
|
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 7174 *Virus Info*
|
|||
|
09-05-90 18:32:00 (Read 4 Times)
|
|||
|
From: PHILLIP LAIRD
|
|||
|
To: RICK THOMA
|
|||
|
Subj: REPLY TO MSG# 4967 (RE: PKZ120.ZIP)
|
|||
|
Didn't someone say that because someone had already hacked an earlier version
|
|||
|
of PKZIP that 120 would be the next scheduled release? Anybody have any info?
|
|||
|
|
|||
|
--- TAGMAIL v2.20
|
|||
|
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 7175 *Virus Info*
|
|||
|
09-05-90 18:37:00 (Read 4 Times)
|
|||
|
From: PHILLIP LAIRD
|
|||
|
To: ALL
|
|||
|
Subj: PROCOMM 3.10
|
|||
|
Beware, there is a version of Procomm.zip going around in our area here in
|
|||
|
Texas which boasts Procomm 3.10. After consulting with my friend at Datastorn
|
|||
|
Technologies, he called my BBS and downloaded the file. I had a user complain
|
|||
|
that the file hung and said "NUKE" at the lower left of his terminal.
|
|||
|
Datastorm Technologies stated that this version doesn't exist, I.E.... the
|
|||
|
latest was 2.4.3. The same user told me that the file one night then put a
|
|||
|
message on his screen that stated "Does this IBM PC or Compatible have more
|
|||
|
than one drive? Y or N " He immediately turned off the computer and didn't
|
|||
|
answer the question. Althought we scanned this program and found no virus, we
|
|||
|
disassembled it and also didn't find anything suspicious either. Be careful,
|
|||
|
it might be a time bomb. If you know of this program, let me know at 1:19/49.
|
|||
|
I would like to keep tabs on it.
|
|||
|
|
|||
|
--- TAGMAIL v2.20
|
|||
|
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 7176 *Virus Info*
|
|||
|
09-04-90 16:04:00 (Read 4 Times)
|
|||
|
From: MIKE MCCUNE
|
|||
|
To: TALLEY RAGAN
|
|||
|
Subj: REPLY TO MSG# 4030 (RE: REMOVING JOSHI)
|
|||
|
I have posted a new version that checks for the virus before
|
|||
|
trying to remove it (now that I have a working copy of the
|
|||
|
virus). It will not damage the partition table on uninfected
|
|||
|
hard disks...<MM>.
|
|||
|
|
|||
|
|
|||
|
--- KramMail v3.15
|
|||
|
* Origin: The Slowboat BBS (404-578-1691) Atlanta, GA (1:133/311.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 7177 *Virus Info*
|
|||
|
09-04-90 13:31:00 (Read 4 Times)
|
|||
|
From: PAUL FERGUSON
|
|||
|
To: KEN DORSHIMER
|
|||
|
Subj: REPLY TO MSG# 5241 (LET ME REPHRASE THAT.....)
|
|||
|
Ken-
|
|||
|
|
|||
|
This is a continuation of msg.# 156 (I dropped the
|
|||
|
keyboard....Looong day, you know).....
|
|||
|
|
|||
|
Actually, I really should have said "virtually preconceived".
|
|||
|
From what I can gather on the topic (I don't yet have a copy of 4096),
|
|||
|
they actually redirect CRC/Checksum interrogators to a "snapshot" of
|
|||
|
the original file as it appeared before infection.(Someone, I'm sure,
|
|||
|
will correct me if I'm wrong or at least add enlightenment.)
|
|||
|
The infected file, in the case of 4096, has in reality grown by 4096
|
|||
|
bytes and would more than likely hang the system, therefore, which
|
|||
|
would lead me to believe that running the CRC check without the virus
|
|||
|
TSR would allow you to identify the actual infected files. Also, it
|
|||
|
seems like the only way to catch it TSR is to trace the interrupt
|
|||
|
vectors (although everyone seems to have a little bit of differing
|
|||
|
ideas on this '->)
|
|||
|
Until I can get my hands on this little fellow, I guess that I'll
|
|||
|
just follow the more logical explanations from the sources with
|
|||
|
credibilty and make a judgement from that! Sounds credible. But, as I'v
|
|||
|
said before- I sure would like to see it.
|
|||
|
|
|||
|
I've been following several different message base threads on
|
|||
|
this particular virus, with input from users at the basic levels to BBS
|
|||
|
SysOps to the AntiViral research community.......I must say, it gets
|
|||
|
overwhelming at times to keep objective. *:)
|
|||
|
|
|||
|
-Paul
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 7178 *Virus Info*
|
|||
|
09-05-90 09:20:00 (Read 4 Times)
|
|||
|
From: PAUL FERGUSON
|
|||
|
To: EVERYONE
|
|||
|
Subj: DETAILED INFO ON 4096...
|
|||
|
The description in VSUM (August 15 release) of the 4096 virus has
|
|||
|
gotten my usual curiousity arouser, along with a plethora of discussion
|
|||
|
on this particular virus within many message conferences and viral
|
|||
|
echos......Since I have not had the opportunity, yet, to obtain a
|
|||
|
sample to personally examine, I must post a few questions to the field:
|
|||
|
|
|||
|
|
|||
|
1.) Would someone like to elaborateon the structure of "Phases" that
|
|||
|
the CVIA uses to catorgorize viruses? Please? ;-)
|
|||
|
|
|||
|
2.) I seem to remember mention (No, I don't have my copy of VSUM in
|
|||
|
front of my now) of the virus (4096) containing it's own boot sector.
|
|||
|
Could someone enlighten me on this , also?
|
|||
|
|
|||
|
3.) And, under what ? circumstances does the 'FRODO LIVES' msg.
|
|||
|
appear and when does it not?
|
|||
|
|
|||
|
|
|||
|
No offense, Patti, but I did think that on a couple of these points
|
|||
|
that the VSUM doc was kinda sketchy (I know that is ALOT of work to
|
|||
|
compile that baby and continually update, etc.!).
|
|||
|
Perhaps with a little more detail, I will have settled my
|
|||
|
curiousity and returned to other problems at hand...
|
|||
|
|
|||
|
-Paul
|
|||
|
|
|||
|
Patti- Any luck with last U/L? ,-)
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 7179 *Virus Info*
|
|||
|
09-05-90 20:34:00 (Read 5 Times)
|
|||
|
From: PATRICIA HOFFMAN
|
|||
|
To: SEAN SOMERS
|
|||
|
Subj: REPLY TO MSG# 4544 (RE: REMAPPING...)
|
|||
|
SS> Off topic here, anybody out there encounter the French Revoloution
|
|||
|
SS> virus? I was the first out here to discover it. What it does is nuke
|
|||
|
SS> your HD while displaying an anti Western/English speaking Canadians.
|
|||
|
|
|||
|
Haven't seen or heard of that one before.... What does it infect? .COM, .EXE,
|
|||
|
overlays, boot sectors, only floppies? If you want to send me a copy of it,
|
|||
|
I'd be happy to take a look at it as well as pass it along to John McAfee's
|
|||
|
group. Snail mail address is:
|
|||
|
|
|||
|
Patricia M. Hoffman
|
|||
|
1556 Halford Avenue #127
|
|||
|
Santa Clara, CA 95051
|
|||
|
|
|||
|
It can also be sent in a .ZIP file to my system, though be sure you don't route
|
|||
|
it thru anyone, or directly uploaded here to a suspect area that is secured.
|
|||
|
|
|||
|
Not off-topic at all, that is what this conference is for....
|
|||
|
|
|||
|
Patti
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 7180 *Virus Info*
|
|||
|
09-05-90 20:01:00 (Read 5 Times)
|
|||
|
From: PATRICIA HOFFMAN
|
|||
|
To: PAUL FERGUSON
|
|||
|
Subj: REPLY TO MSG# 7178 (DETAILED INFO ON 4096...)
|
|||
|
PF> 1.) Would someone like to elaborateon the structure of "Phases" that
|
|||
|
PF> the CVIA uses to catorgorize viruses? Please? ;-)
|
|||
|
PF>
|
|||
|
|
|||
|
VSUM doesn't necessarily use the McAfee or CVIA categorization techniques to
|
|||
|
classify viruses. VSUM's categorization is a bit finer than McAfee's since in
|
|||
|
many cases he can group things together for detection/removal purposes.
|
|||
|
However, in describing them they don't make much sense that way. I haven't
|
|||
|
seen a copy of the CVIA categorization in some time, but I believe they
|
|||
|
classified by:
|
|||
|
|
|||
|
boot sector infector
|
|||
|
parasitic file infector
|
|||
|
overwriting file infector
|
|||
|
|
|||
|
Partition table infectors were (I think) thrown in with boot sector infectors
|
|||
|
since at the time the only partition table infector was Stoned, which also
|
|||
|
infected floppy boot sectors. They also classified by memory resident or
|
|||
|
non-resident.
|
|||
|
|
|||
|
Generally, VSUM classified by memory resident/non-resident, what it infects,
|
|||
|
file length change, symptoms, and other characteristics, as well as what virus
|
|||
|
the new entry is based on if applicable. In the case of memory resident
|
|||
|
viruses, there is a code to indicate how or where it is memory resident.
|
|||
|
|
|||
|
McAfee and I had a loooonnnnnggggg discussion on classification and naming
|
|||
|
awhile back, and "agreed we could disagree" since how he uses the names in Scan
|
|||
|
isn't workable for VSUM, and using the VSUM naming in Scan would not serve his
|
|||
|
purposes since he needs to group variants in many cases. If possible, though,
|
|||
|
we try to use the same names. If VSUM differs, the name that will be indicated
|
|||
|
by Scan is indicated as an alias. McAfee's current classification methods as
|
|||
|
indicated in VIRLIST.TXT which comes out with Scan also differs from the CVIA
|
|||
|
classifications, and is fairly close to VSUM.
|
|||
|
|
|||
|
PF> 2.) I seem to remember mention (No, I don't have my copy of VSUM in
|
|||
|
PF> front of my now) of the virus (4096) containing it's own boot sector.
|
|||
|
PF> Could someone enlighten me on this , also?
|
|||
|
PF>
|
|||
|
|
|||
|
Yes, it includes a boot sector, though do to an error in the virus, the
|
|||
|
included boot sector isn't ever written to the hard disk or floppy boot sector.
|
|||
|
This boot sector is where the "FRODO LIVES" message is....
|
|||
|
|
|||
|
PF> 3.) And, under what ? circumstances does the 'FRODO LIVES' msg.
|
|||
|
PF> appear and when does it not?
|
|||
|
PF>
|
|||
|
|
|||
|
Normally, due to a bug in the virus, the message is never displayed. If one
|
|||
|
copies the boot sector from within the 4096 virus to a floppy diskette as
|
|||
|
sector 0, and boots from it, the message will appear.
|
|||
|
|
|||
|
Of course, the above bugs may be fixed in a later version of the virus....but
|
|||
|
the versions I've seen hang on September 22 when they were meant to activate
|
|||
|
the Frodo Lives message.
|
|||
|
|
|||
|
PF>
|
|||
|
PF> No offense, Patti, but I did think that on a couple of these points
|
|||
|
PF> that the VSUM doc was kinda sketchy (I know that is ALOT of work to
|
|||
|
PF> compile that baby and continually update, etc.!).
|
|||
|
PF> Perhaps with a little more detail, I will have settled my
|
|||
|
PF> curiousity and returned to other problems at hand...
|
|||
|
PF>
|
|||
|
|
|||
|
No problem....A lot of time what makes perfect sense to me doesn't make sense
|
|||
|
to others :-). There is always this question with VSUM on where to draw the
|
|||
|
line on the descriptions.
|
|||
|
|
|||
|
PF> Patti- Any luck with last U/L? ,-)
|
|||
|
PF>
|
|||
|
|
|||
|
Not yet....I'm busy working on analysing a new virus right now, and it is going
|
|||
|
to take awhile....will probably be a Whale of a tale when I get done....and I
|
|||
|
don't want to say anything prematurely on it.
|
|||
|
|
|||
|
Patti
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 7181 *Virus Info*
|
|||
|
09-06-90 11:33:00 (Read 4 Times)
|
|||
|
From: TONY JOHNSON
|
|||
|
To: ALL
|
|||
|
Subj: REPLY TO MSG# 3029 (CORE WARS)
|
|||
|
Core Wars was a simulation system, it was not per se' a breeding ground for the
|
|||
|
type of viri that you see today attacking systems and PCs. The programs tested
|
|||
|
were called viri in the way they attacked and behaved while operating
|
|||
|
within the Core Wars environment. I believe the "arena" used for the "viruses"
|
|||
|
was an 8K memory grid, and that the programs/"viri" were limited to that area.
|
|||
|
|
|||
|
While those programs were not the same thing as what we see today chewing up
|
|||
|
our beloved computers, I can say that Core Wars was an extremely enlightening
|
|||
|
experience that had the programmers thinking about how a similiar type of
|
|||
|
situation could apply to the actual computing world.
|
|||
|
|
|||
|
|
|||
|
--- QM v1.00
|
|||
|
* Origin: The 286 Express (504-282-5817) (1:396/30.0)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Msg#: 7182 *Virus Info*
|
|||
|
09-06-90 13:09:00 (Read 5 Times)
|
|||
|
From: CHARLES HANNUM
|
|||
|
To: CHRIS BARRETT
|
|||
|
Subj: REPLY TO MSG# 7166 (RE: MYSTERY VIRUS??)
|
|||
|
>At my school we have some XT's with 2 360K FDD each. Lately we have
|
|||
|
>noticed that some of the students disks are being over written by the
|
|||
|
>program disk they were using. Eg some people have found the Turbo
|
|||
|
>pascal files on their data disks.
|
|||
|
|
|||
|
This could happen (and has) if you are using disk caching software. That would
|
|||
|
|
|||
|
be a good place to look first.
|
|||
|
|
|||
|
--- ZMailQ 1.12 (QuickBBS)
|
|||
|
* Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0)
|
|||
|
|