86 lines
4.1 KiB
Plaintext
86 lines
4.1 KiB
Plaintext
![]() |
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<20> VIRUS REPORT <20>
|
|||
|
<20> Typo (COM infector) <20>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
Synonyms: Fumble virus, 867 virus
|
|||
|
|
|||
|
Date of Origin: summer, 1989.
|
|||
|
|
|||
|
Place of Origin: Israel.
|
|||
|
|
|||
|
Host Machine: PC compatibles.
|
|||
|
|
|||
|
Host Files: Remains resident. Infects COM files.
|
|||
|
|
|||
|
Increase in Size of Infected Files: 867 bytes.
|
|||
|
|
|||
|
Nature of Damage: Affects system run-time operation; corrupts program or
|
|||
|
overlay files.
|
|||
|
|
|||
|
Detected by: Scanv48+, F-Prot, IBM Scan, Pro-Scan.
|
|||
|
|
|||
|
Removed by: CleanUp, Scan/D, F-Prot, or delete infected files.
|
|||
|
|
|||
|
First detected in Israel during the summer of 1989 (Some experts
|
|||
|
attribute first detection to Joe Hirst of Brighton, U.K., in November,
|
|||
|
1989.) It creates errors in printouts, by (sometimes) replacing some
|
|||
|
characters or digits. It is closely related to the Ping-Pong or Italian
|
|||
|
virus, which is one of the most common viruses. In fact, the viruses are
|
|||
|
so similar that some anti-virus programs even identify Typo as the
|
|||
|
Italian virus. This is not so surprising, since the boot sectors are
|
|||
|
almost identical. The differences between the boot sectors are:
|
|||
|
|
|||
|
* Some local variables have been moved. For example, the word
|
|||
|
containing the location of the original boot sector is now located
|
|||
|
two bytes earlier than before.
|
|||
|
|
|||
|
* The signature (two bytes that the virus uses to see if a diskette has
|
|||
|
already been infected) has been changed.
|
|||
|
|
|||
|
* The activation times have been changed. Ping-Pong had an "activation
|
|||
|
window" (a second or so long) every half hour. Typo will become active
|
|||
|
112.5 seconds after power-on, and will stay active most of the time.
|
|||
|
|
|||
|
* The major differences between the two viruses are in the other part
|
|||
|
of the virus code, which is not stored in the boot sector, but in the
|
|||
|
cluster the viruses mark as "bad" in the FAT.
|
|||
|
|
|||
|
Of course, there are quite a few interesting things the viruses have
|
|||
|
in common. For instance, Typo contains the same "bug" as Ping-Pong does,
|
|||
|
that prevents it from working on '286 and '386 machines.
|
|||
|
|
|||
|
It is possible to remove Typo with some programs designed to remove
|
|||
|
Ping-Pong. Since the signature is stored in the same place on both
|
|||
|
viruses, it is possible to inoculate diskettes against one of them, but
|
|||
|
not both.
|
|||
|
|
|||
|
Typo will only infect COM files on even-numbered days.
|
|||
|
|
|||
|
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
|||
|
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
|||
|
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
|||
|
<EFBFBD> Security Association. It contains information compiled from <20>
|
|||
|
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
|||
|
<EFBFBD> presented here is accurate. <20>
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
|||
|
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
|||
|
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
|||
|
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
|||
|
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
|||
|
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
|||
|
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
|||
|
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> This document may be distributed in any format, providing <20>
|
|||
|
<EFBFBD> this message is not removed or altered. <20>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
|||
|
|
|||
|
Downloaded From P-80 International Information Systems 304-744-2253
|