197 lines
9.0 KiB
Plaintext
197 lines
9.0 KiB
Plaintext
|
RUMORS OF WORMS AND TROJAN HORSES
|
|||
|
Danger Lurking in the Public Domain
|
|||
|
|
|||
|
introduced and edited by Mike Guffey
|
|||
|
|
|||
|
-INTRODUCTION
|
|||
|
|
|||
|
There are literally thousands of free (or nearly free) programs
|
|||
|
available in computerdom's Public Domain. Those who use them save
|
|||
|
hundreds of dollars and thousands of hours. But many sneer at
|
|||
|
the idea of anything worthwhile being "free". Thus personal
|
|||
|
computing becomes divided into two camps: those who believe there
|
|||
|
are two camps and the rest who use Public Domain software (but
|
|||
|
sport no sense of moral superiority).
|
|||
|
|
|||
|
For several years now rumors have circulated about dangerous
|
|||
|
programs which, when run, infest the innards of personal
|
|||
|
computers like parasites. And unlike most software, these
|
|||
|
insideous programs don't go away when the power is shut off. The
|
|||
|
story is they invade ROMs and "eat" memory away each time
|
|||
|
hardware is powered up.
|
|||
|
|
|||
|
The legends have a basis in fact. For such horrors =do= exist in
|
|||
|
the world of mainframes. Probably first created by a bored or
|
|||
|
disgruntled programmer, such programs have been unleashed inside
|
|||
|
some of this country's largest computers. Generally, they are
|
|||
|
not outwardly visible, but begin the attack like a low grade
|
|||
|
fever. And these horrible little strings of code do damage a
|
|||
|
little at a time, slowly building in intensity. At first, things
|
|||
|
start going slightly awry. Ultimately, the system crashes or
|
|||
|
must be shut down. One recent magazine article called these
|
|||
|
creations "computer viruses". Just =how= damaging such programs
|
|||
|
can be (or have been) has not been fully publicized. But the
|
|||
|
facts lie on a razor's edge between science fiction and
|
|||
|
tomorrow's headlines. They are believed to pose a serious
|
|||
|
potential threat to national security.
|
|||
|
|
|||
|
Some say the first of such monsters appeared on computer bulletin
|
|||
|
boards (BBS's) named "WORM.COM". [Remember that it is only
|
|||
|
recently that any online descriptions began to be posted next to
|
|||
|
program names. Some BBS's, notably CP/M based systems, still do
|
|||
|
not offer any explanation beyond the program name or notes in the
|
|||
|
associated message base part of the system.] And almost every
|
|||
|
computer user group has at least one experienced member who can
|
|||
|
tell the horrible tales of what these programs do. Actual
|
|||
|
witnesses to the destruction or victims of the atrocities seem to
|
|||
|
be =very= rare.
|
|||
|
|
|||
|
Related to the twisted thinking behind such criminal mischief is
|
|||
|
the so-called "TWIT" phenomenon. Twits are computer vandals who
|
|||
|
glory in breaking into and "crashing" or seriously damaging
|
|||
|
remote computer systems. The targets range from neighborhood
|
|||
|
BBS's to any large computers which can be accessed via phone
|
|||
|
lines. And while such mental midgets have bee<65>hglorified in the
|
|||
|
media and mis-labeled as "hackers", their very existence causes
|
|||
|
hysteria in and amongst the non-computing public at large.
|
|||
|
|
|||
|
Computer security for large and small remote computer systems is
|
|||
|
getting better at screening out or scaring off "twits". But they
|
|||
|
still exist. There are indications that some have graduated from
|
|||
|
incessant attempts to break into BBS's. Instead they bring forth
|
|||
|
Trojan horses: damaging programs disguised as utilities and
|
|||
|
mis-labled or misdocumented as new treasures of the Public
|
|||
|
Domain.
|
|||
|
===]#[===
|
|||
|
|
|||
|
The following data was recently retreived from a California BBS:
|
|||
|
|
|||
|
WARNING! DANGEROUS PROGRAMS
|
|||
|
|
|||
|
1) Warning: Someone is [or may be] trying to destroy your data.
|
|||
|
Beware of a SUDDEN upsurge of [spurious] programs on Bulletin
|
|||
|
Boards and in the Public Domain. These programs purport to be
|
|||
|
useful utilities, but, in reality, are designed to sack your
|
|||
|
system.
|
|||
|
|
|||
|
One has shown up as EGABTR, a program that claims to show you how
|
|||
|
to maximize the features of IBM'S Enhanced Graphics Adapter. It
|
|||
|
has also been spotted renamed as a new super-directory program.
|
|||
|
It actually erases the (F)ile (A)llocation (T)ables on your hard
|
|||
|
disk, [thereby rendering all data useless and inaccessible]. For
|
|||
|
good measure, it asks you to put a disk in Drive A:, then another
|
|||
|
in Drive B:. After it has erased those FATs too, it displays,
|
|||
|
|
|||
|
" Got You! Arf! Arf! "
|
|||
|
|
|||
|
Don't [casually] run any public-domain program that is not a
|
|||
|
known quantity. Have someone you know and trust vouch for it.
|
|||
|
ALWAYS examine it FIRST with DEBUG [or DDT or a similar
|
|||
|
utility]. Look at all the ASCII strings and data. If there is
|
|||
|
anything even slightly suspicious about it, [either] do a cursory
|
|||
|
disassembly [or discard it]. [For MSDOS programs] be wary of
|
|||
|
disk calls (INTERRUPT 13H), especially if the program has no
|
|||
|
business writing to the disk. Run your system in Floppy only
|
|||
|
mode with write protect tabs on the disk or junk disks in the
|
|||
|
drives.
|
|||
|
|
|||
|
Speaking of Greeks bearing gifts, Aristotle said that the
|
|||
|
unexamined life is not worth living. The unexamined program [may
|
|||
|
not be] worth running.
|
|||
|
|
|||
|
- from The Editors of PC
|
|||
|
July 23, 1985
|
|||
|
Volume 4, Number 15
|
|||
|
|
|||
|
|
|||
|
2) Making the rounds of the REMOTE BULLETIN BOARDS [is] a program
|
|||
|
called VDIR.COM. It is a little hard to tell what the program is
|
|||
|
suppose to do.
|
|||
|
|
|||
|
What it actually does is TRASH your system. It writes garbage
|
|||
|
onto ANY disk it can find, including hard disks, and flashes up
|
|||
|
various messages telling you what it is doing. It's a TIME BOMB:
|
|||
|
once run, you can't be sure what will happen next because it
|
|||
|
doesn't always do anything immediately. At a later time, though,
|
|||
|
it can CRASH your system. Anyway, you'd do well to avoid
|
|||
|
VDIR.COM. I expect there are a couple of harmless, perhaps even
|
|||
|
useful, Public Domain programs floating about with the name VDIR;
|
|||
|
and, of course, anyone warped enough to launch this kind of trap
|
|||
|
once, can do it again. Be careful about untested "free"
|
|||
|
software.
|
|||
|
|
|||
|
[paraphrased from
|
|||
|
Computing at Chaos Manor
|
|||
|
From the living Room
|
|||
|
By Jerry Pournelle
|
|||
|
BYTE Magazine, The small systems Journal]
|
|||
|
|
|||
|
|
|||
|
Two other examples of this type of program:
|
|||
|
|
|||
|
1. STAR.EXE presents a screen of stars then copies RBBS-PC.DEF
|
|||
|
and renames it. The caller then calls back later and d/l the
|
|||
|
innocently named file, and he then has the SYSOP'S and all the
|
|||
|
Users passwords.
|
|||
|
|
|||
|
2. SECRET.BAS This file was left on an RBBS with a message saying
|
|||
|
that the caller got the file from a mainframe, and could not get
|
|||
|
the file to run on his PC, and asked someone to try it out. When
|
|||
|
it was executed, it formatted all disks on the system.
|
|||
|
|
|||
|
We must remember, that there are a few idiots out there who get
|
|||
|
great pleasure from destroying other peoples' equipment.
|
|||
|
Perverted I know, but we, the serious computer users, must take
|
|||
|
an active part in fighting against this type of stuff, to protect
|
|||
|
what we have. Be sure to spread this [message] to other BBS's
|
|||
|
across the country so that as many people as possible will be
|
|||
|
aware of what is going on.
|
|||
|
|
|||
|
[from
|
|||
|
The Flint Board
|
|||
|
Flint, Mich
|
|||
|
(313) 736-8031]
|
|||
|
===]#[===
|
|||
|
|
|||
|
-EPILOGUE
|
|||
|
|
|||
|
Got your attention? There is no need to hatchet your modem and
|
|||
|
erase your communications software. While such programs can do
|
|||
|
tremendous damage, they are, fortunately, very rare. The
|
|||
|
following is an expansion of the countermeasures suggested
|
|||
|
above.
|
|||
|
|
|||
|
A) Never, NEVER, N>E>V>E>R>! download and run Public Domain
|
|||
|
software (the first time) on a hard disk. While many programs
|
|||
|
are well known, it is a logical presumption that Trojan
|
|||
|
horse-type programs may have been uploaded with the name of a
|
|||
|
well-known utility. Or as a new version of one of your old
|
|||
|
favorites. Download them to a blank floppy or to a disk you have
|
|||
|
a current backup copy of.
|
|||
|
|
|||
|
B) Get in the habit of examining unknown software with HEX/ASCII
|
|||
|
utilities that will reveal copyright data, documentation, program
|
|||
|
error and prompt messages. A good choice in MSDOS is called
|
|||
|
PATCH.COM and in CP/M there is DUMPX.COM. Even if a program is
|
|||
|
written in protected BASIC, you may still be able to find some
|
|||
|
useful data this way. [This is also a way to find documentation
|
|||
|
within programs without .DOC files or descriptions.]
|
|||
|
|
|||
|
C) Be wary of text files suggesting patches with DEBUG or DDT
|
|||
|
that you do not understand. ALWAYS make such modifications to a
|
|||
|
backup copy of your .COM, .EXE, .OVR files. There are no known
|
|||
|
examples of Trojan horses appearing this way, but...
|
|||
|
|
|||
|
D) Make those BBS's which screen programs before making them
|
|||
|
available your first (but not your only) choice for acquiring new
|
|||
|
PD software. If you cannot figure out what a program does,
|
|||
|
=don't= upload it to some other BBS.
|
|||
|
|
|||
|
E) Be wary but not paranoid. Be careful but not overcautious.
|
|||
|
Do not fan the fires of hysteria by passing along rumors of worms
|
|||
|
and Trojan horses. Speak of what you =know=. There are alot of
|
|||
|
good public domain programs that will do what you need. And when
|
|||
|
you find it, pass it along.
|
|||
|
|
|||
|
-end-
|
|||
|
|