1758 lines
101 KiB
Plaintext
1758 lines
101 KiB
Plaintext
The following text is copyright (c) 1987-1990 CompuServe Magazine
|
||
and may not be reproduced without the express written permission of CompuServe.
|
||
|
||
CompuServe Magazine's Virus History Timeline
|
||
|
||
CompuServe Magazine is published monthly by the CompuServe Information
|
||
Service, the world's largest on-line information service with over 600,000
|
||
subscribers worldwide.
|
||
|
||
If you would like to become a CompuServe subscriber, call
|
||
1-800-848-8199 to receive a copy of the CompuServe Information Service
|
||
membership kit.
|
||
|
||
|
||
- 1988 -
|
||
|
||
|
||
COMPUTER VIRUS THREATENS HEBREW UNIVERSITY'S EXTENSIVE SYSTEM
|
||
|
||
(Jan. 8)
|
||
In Jerusalem, Hebrew University computer specialists are fighting a deadline
|
||
to conquer a digital "virus" that threatens to wipe out the university's system
|
||
on the first Friday the 13th of the year. That would be May 13.
|
||
Associated Press writer Dan Izenberg says the experts are working on a
|
||
two-step "immune" and "unvirus" program that could knock down the vandalized
|
||
area of the system.
|
||
"Viruses" are the latest in computer vandalism, carrying trojan horses and
|
||
logic bombs to a new level, because the destructiveness is passed from one
|
||
infected system to another. Izenberg quotes senior university programmer Yisrael
|
||
Radai as saying that other institutions and individual computers in Israel
|
||
already have been contaminated.
|
||
"In fact," writes the wire service, "anyone using a contaminated computer disk
|
||
in an IBM or IBM-compatible computer was a potential victim."
|
||
Radai says the virus was devised and introduced several months ago by "an
|
||
evidently mentally ill person who wanted to wield power over others and didn't
|
||
care how he did it."
|
||
AP describes the situation this way:
|
||
"The saboteur inserted the virus into the computer's memory and the computer
|
||
then infected all disk files exposed to it. Those disk files then contaminated
|
||
healthy computers and disks in an electronic version of a contagious cold."
|
||
Apparently, the intruder wanted to wipe out the files by Friday, May 13, Î<>º“¡+í<>haW:½ÑÑ•¹<E280A2>impatient, because
|
||
he then had his virus order contaminated
|
||
programs to slow down on Fridays and on the 13th day of each month.
|
||
Radai thinks that was the culprit's first mistake, because it allowed
|
||
researchers to notice the pattern and set about finding the reason why.
|
||
"Another clue," says AP, "was derived from a flaw in the virus itself. Instead
|
||
of infecting each program or data file once, the m!l`gnant orders copied
|
||
themselves over and over, consuming increasing amounts of memory space. Last
|
||
week, experts found the virus and developed an antidote to diagnose and treat
|
||
it."
|
||
Of viruses in general, computer expert Shai Bushinsky told AP, "It might do to
|
||
computers what AIDS has done to sex. The current free flow of information will
|
||
stop. Everyone will be very careful who they come into contact with and with
|
||
whom they share their information."
|
||
--Charles Bowen
|
||
|
||
|
||
TAMPA COMPUTERISTS FIGHT VIRUS
|
||
|
||
(Jan. 10)
|
||
Tampa, Fla., computerists say they are fighting a digital "virus" that sounds
|
||
as if it may be th} àame`£®¹<C2B9>‚ɽ<C389>É…µ<E280A6>r½Ý<C2BD>‚±…<C2B1>Õ¥¹<C2A5><C2B9>
|
||
<EFBFBD>ª¹¥Ù•ÉÍ¥Ñå<EFBFBD>J¹<EFBFBD>R•‰åçale[©H
|
||
Í<EFBFBD>reported earlier, Hebrew University computer specialists are contending
|
||
with a virus program that threatens to wipe out the university's system on the
|
||
first Friday the 13th of the year -- May 13. The Jerusalem team is working on a
|
||
two-step "immune" and "unvirus" program that could knock down the vandalized
|
||
area of the system.
|
||
Meanwhile, members of the Tampa Amiga User's Group now tell United Press
|
||
International that they, too, are fighting a computer virus, and UPI quotes one
|
||
expert as saying a version of that vandalizing program also is designed to begin
|
||
destroying files on May 13.
|
||
Computer viruses are self-propagating programs that spread from one machine to
|
||
another and from one disk to another, a sort of new generation of more
|
||
destructive trojan horses and logic bombs.
|
||
"It kinda creeps up on you," president Jeff White of the Amiga group told the
|
||
wire service, adding that the group's membership was infiltrated by the program.
|
||
UPI reports, "Experts don't yet know what, if any, damage the virus can cause
|
||
to the disks or programs. Similar problems have erased programs and information.
|
||
... White said the program spread itself to more than 20 of his floppy disks
|
||
before he discovered it. But by then, the program had spread to the disks of
|
||
many of the club's members via its regular disk-of-the-month distribution."
|
||
White said he doesn't know how the bug got to Tampa, but suspects it came from
|
||
West Germany on a disk from an overseas user group.
|
||
"White said the program works invisibly," says UPI. "When the computer is
|
||
turned on, the program stores itself in the machine's main memory and then
|
||
begins spreading copies of itself to new disks used in the machine."
|
||
He added that the Tampa club members now use a "virus-checker" program to test
|
||
disks to prevent another infection.
|
||
--Charles Bowen
|
||
|
||
|
||
VIRUS PROGRAMS COULD HAVE USEFUL APPLICATIONS, SAYS COLUMNIST
|
||
|
||
(Jan. 11)
|
||
Despite all the recent negative publicity about computer "viruses" --
|
||
self-propagating programs that spread from one machine to another in way that
|
||
has been called the computer version of AIDS -- a California computer columnist
|
||
says there could be a positive result.
|
||
Writing in The San Francisco Examiner, John Markoff observes, "In the future,
|
||
distributed computing systems harnessed by software programs that break tasks
|
||
into smaller parts and then run portions simultaneously on multiple machines
|
||
will be commonplace. In the mid-1970s computer researchers John Shoch and Jon
|
||
Hupp at Xerox's Palo Alto Research Center wrote experimental virus programs
|
||
designed to harness many computers together to work on a single task."
|
||
Markoff points out that some of the programs in that work functioned as "'town
|
||
criers' carrying messages through the Xerox networks; others were diagnostic
|
||
programs that continuously monitored the health of the computers in the
|
||
networks."
|
||
Also the researchers called one of their programs a "vampire worm" because it
|
||
hid in the network and came out only at night to take advantage of free
|
||
computers. In the morning, it disappeared again, freeing the machines for human
|
||
users.
|
||
For now, nonetheless, most viruses -- particularly in the personal computing
|
||
world -- are viewed as destructive higher forms of trojan horses and logic
|
||
bombs.
|
||
Markoff traces the first virus to the military ARPAnet in 1970. On that
|
||
system, which links the university, military and corporate computers, someone
|
||
let loose a program called "creeper."
|
||
Notes the paper, "It crawled through the network, springing up on computer
|
||
terminals with the message, 'I'm the creeper, catch me if you can!' In response,
|
||
another programmer wrote a second virus, called 'reaper' which also jumped
|
||
through the network detecting and 'killing' creepers."
|
||
Markoff also pointed out that Bell Labs scientist Ken Thompson, winner of the
|
||
prestigious Turing Award, recently discussed how he created a virus in the lab
|
||
to imbed in AT&T's Unix operating system, which he and colleague Dennis Ritchie
|
||
designed.
|
||
In a paper, Thompson noted how he had embedded a hidden "trapdoor" in the Unix
|
||
log-on module each time it created a new version of the operating system. The
|
||
trapdoor altered the log-on mechanism so that Unix would recognize a password
|
||
µ¶own only to Thompson.
|
||
Thompson and Ritchie say the Unix virus never escaped Bell Labs.
|
||
--Charles Bowen
|
||
|
||
|
||
SUBSCRIBER, SYSOP BLOCK POSSIBLE "VIRUS" IN APPLE HYPERCARD FORUM
|
||
|
||
(Feb. 8)
|
||
Quick reactions by a subscriber and a veteran forum administrator have blocked
|
||
a possible computer "virus" program that was uploaded over the weekend to
|
||
CompuServe's new Hypercard Forum.
|
||
The suspicious entry was an Apple Hypercard "stack" file called "NEWAPP.STK,"
|
||
which was uploaded Friday to the forum's Data Library 9, "HyperMagazines." It
|
||
was online for about 24 hours before it was caught.
|
||
Subscriber Glenn McPherson was the first to blow the whistle. Saturday night
|
||
McPherson posted a message saying that when he ran the application, the file
|
||
altered his Macintosh's systems file. "I don't know why it did this," he wrote,
|
||
"but no stack should touch my system file."
|
||
Neil Shapiro, chief forum administrator of the Micronetworked Apple Users
|
||
Group (MAUG), quickly investigated and removed the suspicious file.
|
||
In a bulletin to the membership, Shapiro warned those who already had
|
||
downloaded NEWAPP.STK that the stack would alter the system files with unknown
|
||
results. He also warned against using system files from any disk that was run
|
||
while the NEWAPP.STK's modified system was in effect.
|
||
Said Shapiro, "If you run NEWAPP.STK, it will modify the system on the disk it
|
||
is on so that the system's INITs contain an INIT labeled 'DR.' Then, if you use
|
||
another system with the DR-infected system as your boot system, the new system
|
||
will also contain the self-propagating 'DR' INIT Resource. While it is possible
|
||
to, apparently, 'cut' this resource from infected systems with the Resource
|
||
Editor, the only sure course of action is to trash any system file that has come
|
||
in contact with this stack."
|
||
It was not immediately known if the system alternations were deliberately or
|
||
accidentally programmed into NEWAPP.STK. Shapiro notes the file's uploader has
|
||
been locked off the entire system and that "he will be contacted by CompuServe
|
||
and/or myself."
|
||
Computer "viruses" -- self- propagating programs that infect system files and
|
||
then spread to other disks -- have been in the news for the past six months. To-
|
||
date, most of their targets have been regional computer users groups, private
|
||
and semi-public networks and stand-along bulletin board systems. This apparently
|
||
is the first report of a virus-like program on a national consumer information
|
||
service.
|
||
Shapiro says in his bulletin that in eight years of the various Apple forums'
|
||
operation, this is the only such occurrence.
|
||
"While I, of course, cannot say it will be the last, I still have just as much
|
||
confidence as always in the fact that 99.99999999% of the Mac community are
|
||
quite trustworthy and that there is no real need to fear downloads," he wrote.
|
||
Shapiro also urged his membership, "If you have not used (NEWAPP.STK) yet, do
|
||
not! If you have uploaded it to other BBS or network systems, please immediately
|
||
advise the sysops there of the problem. If you have placed it on a club disk,
|
||
please be certain to remove it from that disk before distribution and -- if it
|
||
has been run from the 'Master' disk already -- don't just remove it, but trash
|
||
the system."
|
||
Subscriber McPherson indicates the suspect file already has spread to other
|
||
systems. His forum note says he found the same stack program also in a software
|
||
library on the General Electric's GEnie network.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
DOD TRIES TO PROTECT ITS COMPUTERS FROM ELECTRONIC VIRU
|
||
(Feb. 9)
|
||
Just as a medical virus can spread rapidly, so does the deadly computer virus
|
||
seem to be making the rounds.
|
||
In an effort to inoculate itself against an outbreak, the Department of
|
||
Defense has taken steps to prevent the electronic sabotage from affecting its
|
||
computers, reports Government Computer News.
|
||
The computer viruses are self- propagating programs that are designed to
|
||
spread automatically from one computer to another and from one disk to another,
|
||
totally disrupting normal operations.
|
||
As reported in Online Today, such viruses have already struck computer systems
|
||
at Hebrew University in Jerusalem and IBM Corp.'s regional offices in Tampa,
|
||
Fla.
|
||
"It can spread through computer networks in the same way it spreads through
|
||
computers," said DOD spokeswoman Sherry Hanson. "The major problem areas are
|
||
denial of service and compromising data integrity." In addition to basic
|
||
security measures, computer scientists at the National Security Agency are
|
||
installing programming tools and hardware devices to prevent the infiltration of
|
||
virus programs. Hanson told GCN that DOD is also using specialized ROM devices
|
||
and intrusion detectors. The virus only comprises a few lines of programming
|
||
code and is easy to develop with few traces.
|
||
After IBM was infiltrated last December with an innocent- looking Christmas
|
||
message that kept duplicating itself many times over and substantially slowed
|
||
the company's massive message system, specialists installed a filter program to
|
||
monitor the system and protect against further intrusion.
|
||
According to GCN, executable programs can't be traj3³erred from one computer
|
||
to another within IBM's networi
|
||
¥¶Y‚•Éͽ¹…±<E280A6>½µÁÕÑ•É<E280A2>ªÍ•ÉÍ<C389>
|
||
É•<EFBFBD>º½ÉÉ¥•‘±š¥¹<EFBFBD>•<EFBFBD>¢¡•<EFBFBD>²¥ÉÕÍ<EFBFBD>’•µ…¥¹Í<EFBFBD>B¥‘‘•¹<EFBFBD>J¹<EFBFBD>
|
||
5Rcomèuteæ“.j…¥u<C2A5>memory. For instance, almost the entire membership of a Florida
|
||
Commodore Amiga users group was infected by a virus before it was discovered.
|
||
The president of the group said he believed the virus originated in Europe on
|
||
a disk of programs the group received from an overseas source. The club now has
|
||
a checker program to check disks for viruses before they are used.
|
||
Al Gengler, a member of the Amiga group, compared the virus to AIDS. "You've
|
||
got to watch who you compute with now," he said.
|
||
--Cathryn Conroy
|
||
|
||
|
||
EXPERTS SEES TWO SCENARIOS FOR THE COMPUTER "VIRUS" PROBLEM
|
||
|
||
(Feb. 9)
|
||
Don Parker, who heads the information security program for the Menlo Park,
|
||
Calif., SRI International, has been studying the problem of computer "viruses"
|
||
and now says he see two possible directions in the future.
|
||
Speaking with Pamela Nakaso of the Reuter Financial News Service, Parker said
|
||
his scenarios are:
|
||
-:- One, that viruses will be too difficult to design and use for
|
||
infiltration, and that interest in using them as "weapons" will die away.
|
||
-:- Or, two, viruses will increase in destructiveness as more sophisticated
|
||
saboteurs use them to destroy the public domain software resources available.
|
||
Nakaso also quotes editor Harold Highland of the magazine Computers and
|
||
Security as saying that "hysteria" over the few documented incidents may fuel
|
||
even more viruses, which are defined as self-propagating files that usually
|
||
damage a computer's systems files and then spread to other disks.
|
||
Highland pointed out that in a recent Australian virus case among Amiga
|
||
computers, one tabloid newspaper reported the incident with a headline that
|
||
sp`þned the entire cover, reading, "Terror Strikes in the DP Industry."
|
||
Parker told Reuter, "The vulner`òility is growing at the same rate as the
|
||
number of computers and number of communications with computers."
|
||
Nakaso writes, "Parker estimates that of the 2,000 cases of documented
|
||
computer crime he has compiled at SRI, about 20 to 30 have been virus attacks.
|
||
There is no question, however, the reported incidents are rising, and they are
|
||
expanding beyond personal computers to mainframes and other networks."
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
COMPUTER VIRUS CALLED FRAUD
|
||
|
||
(Feb. 10)
|
||
Comp}ôdr viruses may be frauds. Although lots of people are talking about
|
||
computerdoms latest illicit fad, to date, no one has produced a copy of a living
|
||
breathing virus. Now, a University of Utah expert on urban legends thinks that
|
||
the dreaded virus may be have become the high tech version of the bogey man.
|
||
Professor Jan Harold Brunvand has written three books about urban legends and
|
||
he seems to think that the virus is just the latest incarnation in a long line
|
||
of legends. Brunvand, and others, have pointed out that there are striking
|
||
similaré×<EFBFBD>V
|
||
µ½¹=<3D>r˸KÑÍ<C391>of the virus and legends such as the cat in the
|
||
microwave oven. For one thing, there are lots of reported sightings but no
|
||
concrete evidence. And urban legends always seem to appear and affect those
|
||
things about which urban dwellers are just coming to terms with: shopping malls
|
||
and microwave ovens in the 70's, computers in the 80's.
|
||
In doÌayg³š½<C5A1>¥•Ñå±
|
||
<EFBFBD>•ÉÍ•É<EFBFBD>½µÁÕÑ•É<EFBFBD>¢¡…Ñ<EFBFBD>"•ÍÑɽåÍ<C3A5>JÑÍ<C391>zݹ•É<E280A2>š<EFBFBD>"…Ñ…5RcÍrtaiÝly qualifies as the stuff about which legends are made.
|
||
Even the way in
|
||
which the deed is accompli.HY6 …Í<E280A6>mystical qualities: a computer wizard works
|
||
strange magic with the secret programming codes of a computer operating system.
|
||
Brunvand, a computer owner himself, says that although viruses could be
|
||
created, he has found absolutely no evidence to support claims about their
|
||
existence.
|
||
--James Moran
|
||
|
||
|
||
|
||
HYPERCARD VIRUS JUDGED "HARMLESS"
|
||
|
||
(Feb. 12)
|
||
Administrators of a CompuServe forum supporting the Apple Hypercard technology
|
||
have confirmed that a file uploaded to their data libraries last weekend did
|
||
indeed contain a so-called computer "virus."
|
||
However, they also have determined the program apparently was harmless, meant
|
||
only to display a surprise message from a Canadian computer magazine called
|
||
MacMag.
|
||
As reported earlier this week, forum administrator Neil Shapiro of the
|
||
Micronetworked Apple Users Groups (MAUG) removed the suspicious entry, a
|
||
Hypercard "stack" file called "NEWAPP.STK," after a forum member reported that
|
||
the file apparently altered his Macintosh's system files.
|
||
Computer "viruses," a hot topic in the general press these days, have been
|
||
defined as self-propagating programs that alter system files and then spread
|
||
themselves to other disks.
|
||
Since removing the file last weekend, the Apple administrators have been
|
||
examining the file and now Shapiro says it apparently was designed merely to
|
||
display a message from MacMag on March 2.
|
||
On the HyperForum message board ¨G2APPHYPER), Shapiro reports, "Billy
|
||
Steinberg was able to reverse engineer (disassemble) the INIT that the virus
|
||
places into system files. The good news is that the virus is harmless. But it
|
||
*is* a computer virus."
|
||
Shapiro says that if the downloaded file remained in the user's system, then
|
||
on March 2, the screen would display:
|
||
"Richard Brandnow, publisher of MacMag, and its entire staff would like to
|
||
take this opportunity to convey their universal message of peace to all
|
||
Macintosh users around the world."
|
||
Apparently the file is so designed that after March 2 it removes itself from
|
||
the ¬ë–®Ò.ÊÍåêem\
|
||
Shapiro notes that, while this file apparently is harmless, it still raises
|
||
the question of the propriety of database entries that quietly alter a user's
|
||
system files.
|
||
Shapiro said he has spoken to publisher Brandnow. "It was not his intention to
|
||
place it in a HyperCard stack nor to have it on (CompuServe)," Shapiro writes.
|
||
"What he did do was to develop the INIT in December and 'left' it on their
|
||
(MacMag's) own machines with the hope that 'it would spread.'"
|
||
Subsequently, someone else apparently captured the file, added it to his
|
||
"stack" and uploaded to the CompuServe forum and other information services.
|
||
While Brandnow maintains the system-altering INIT file was harmless, Shapiro
|
||
says he's concerned about what the NEWAPP.STK incident could represent.
|
||
"While the INIT itself is non-destructive," Shapiro wrote, "I believe it was
|
||
at least irresponsible for MacMag to have perpetrated this type of problem and
|
||
to have caused the confusion that they did. I also fear that this could give
|
||
other people ideas on less peaceful uses of such a virus.
|
||
"I beléede that MacMag has opened here a Pandora's Box of problems which will
|
||
haunt our community for years. I hope I am wrong."
|
||
--Charles Bowen
|
||
|
||
|
||
PUBLISHER DEFENDS HIS "VIRUS" PROGRAM AS "GOOD FOR COMMUNITY"
|
||
|
||
(Feb. 13)
|
||
The publisher of Canadian computer magazine MacMag contends the computer
|
||
"virus" program his staff initiated recently was not only harmless but was "good
|
||
for the Macintosh community."
|
||
Says 24-year-old Richard Brandow, "If other people do nasty things (with virus
|
||
programs), it is their responsibility. You can't blame Einstein for Hiroshima."
|
||
Speaking by phone with reporter Don Clark of The San Francisco Chronicle,
|
||
Brandow maintained his magazine's virus program, which spread through the Apple
|
||
Macintosh community this week on this continent and apparently reached Europe,
|
||
was intended to do nothing more than display a "peaceful" message on Mac screens
|
||
on March 2, the first anniversary of the introduction of the Apple Mac II.
|
||
Of the so-called "virus" technology, Brandow said, "This message is very good
|
||
for the Macintosh community."
|
||
The controversy centered around an Apple Hypercard "stack" file called
|
||
"NEWAPP.STK" that was uploaded to various public domain databases around the
|
||
country, including the data library of CompuServe's HyperForum (G APPHYPER).
|
||
When subscribers discovered that the file quietly altered their Mac's system
|
||
files when it was executed, a warning was posted and forum administrator Neil
|
||
Shapiro immediately removed the data library entry. Only after the forum's
|
||
sysops had disassembled the suspect file could it be determined that
|
||
NEWAPP.STK's only apparent function was to display a March 2 greeting from
|
||
Brandow and the MacMag staff.
|
||
HyperForum members now have been informed that the file, while indeed a
|
||
"virus," apparently is harmless. However, Shapiro contends MacMag staffers were
|
||
"at least irresponsible ... to have perpetrated this type of problem and to have
|
||
caused the confusion that they did."
|
||
Shapiro is quoted in The Chronicle as adding, "This is very similar to someone
|
||
breaking into your home and writing a message of good will in red lipstick on
|
||
your wall. It is a violation of the right of private property... Our computers
|
||
are machines that belong to us and other people should remain out of them."
|
||
On the other side of the argument, Brandow told the paper, "The idea behind
|
||
all this is to promote peaceful methods of communication between individuals
|
||
using harmless ways."
|
||
Montreal-based MacMag, with a circulation of 40,000, is Canada's only
|
||
Macintosh magazine. Brandow also heads a 1,250-member Mac user group, which he
|
||
says is Canada's largest.
|
||
Brandow told Clark that programmers worked more than a year on the virus,
|
||
adding that it was inspired by two groups, known as "The Neoists" and "The
|
||
Church of!ähe SubGenius." (He said the latter was formed in Texas as a satire on
|
||
fundamentalist religion and inspired a 1983 book.)
|
||
As noted here earlier, the MacMag virus also reached beyond CompuServe to
|
||
other information services and private bulletin board systems. For instance, The
|
||
Chronicle quotes General Manager Bill Louden of General Electric's GEnie as
|
||
saying that about 200 users downloaded the file from that information service
|
||
before it was discovered and removed early Monday. Meanwhile, Shapiro told Clark
|
||
that only about 40 of CompuServe's subscribers retrieved the file before it was
|
||
removed early Sunday.
|
||
The Chronicle says that Mac devotees in the Bay Area were "stunned" by news of
|
||
the virus, but not all were upset. For example, Apple wizard Andy Hertzfeld, a
|
||
co-designer of the original Mac, told the paper, "As far as I'm concerned, it
|
||
doesn't have any malicious intent and is just some people having fun. I don't
|
||
see why people are so uptight."
|
||
Meanwhile, a spokeswoman for Apple at company headquarters in Cupertino,
|
||
Calif., said the company is searching for details of the virus and could not
|
||
comment on it at present.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
TWO FIRMS OFFER TO "INOCULATE" US AGAINST THE COMPUTER "VIRUSES"
|
||
|
||
(March 4)
|
||
The debate continues over whether computer "viruses" are real or just the
|
||
latest urban legend, but at least two companies are hoping that we don't want to
|
||
take any changes.
|
||
Independent of each other, the firms this week both claimed to have the first
|
||
commercial software to "inoculate" systems against those reported rogue programs
|
||
that damage data and systems files.
|
||
One of the companies, Lasertrieve Inc. of Metuchen, N.J., introduced its
|
||
VirALARM product during Microsoft Corp.'s CD-ROM conference in Seattle.
|
||
In addition, in Stockholm, a Swedish company called Secure Transmission AB
|
||
(Sectra) today announced a similar anti-virus program called TCELL, after a
|
||
counterpart in human biology.
|
||
A Lasertrieve statement contends that previous anti-viral software utilities
|
||
-- mostly offered in the public domain -- work by drawing attention to the
|
||
virus's attempted alterations of system files, noting a change of file size, or
|
||
monitoring the dates of program changes. However, the New Jersey firm contends,
|
||
this approach makes such programs "easily fooled by sophisticated viruses."
|
||
Lasertrieve says its VirALARM contains a program designed to protect another
|
||
program, creating a software "barrier." According to the statement, before
|
||
anyone can use the protected program, VirALARM checks to determine whether the
|
||
program has been altered since it was inoculated. If there has been any change,
|
||
the software then blocks use of the altered program, notifies the user and
|
||
suggests a backup copy of the program be substituted.
|
||
Meanwhile, Bo-Goran Arfwidsson, marketing director of the Swedish company,
|
||
told Bengt Ljung of United Press International that its TCELL "vaccine" gives a
|
||
database a partial outside protection, sounds an alarm if a computer virus
|
||
appears inside a database and identifies the infected file so it can be
|
||
isolated. The contaminated part then can be replaced with a backup file.
|
||
Sectra spokesman Torben Kronander said that TCELL has been "tested for a year
|
||
now and ther% `s no question that it works," adding that since early 1987 the
|
||
software has functioned on computers of major Swedish manufacturing companies.
|
||
Arfwidsson declined to name those companies for security purposes.
|
||
Kronander said TCELL simply made the task of creating a virus so complicated
|
||
that only vast computer systems would be able to carry it out. "We've
|
||
effectively removed the hacker type of attack, and these have been the problem.
|
||
It will take the resources of a major software producer or a country to produce
|
||
a virus in the future."
|
||
UPI says Sectra is a 10-year-old research company with 19 employees in
|
||
Linkoping in central Sweden, closely tied to the city's Institute of Technology.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
"VIRUS" SPREADS TO COMMERCIAL PROGRAM; LEGAL ACTION CONSIDERED
|
||
|
||
(March 16)
|
||
That so-called "benign virus" that stirred the Apple Macintosh community
|
||
earlier this year when it cropped up in a public domain file in forums on
|
||
CompuServe and other information services now apparently has invaded a
|
||
commercial program called FreeHand.
|
||
The publisher, Seattle's Aldus Corp., says it had to recall or rework some
|
||
5,000 FreeHand packages once the virus was discovered and now is considering
|
||
legal action against those who admitted writing the self- propagating program.
|
||
Meanwhile, other major software companies reportedly are worried that the
|
||
virus may have affected some of their products as well.
|
||
At the heart of the controversy is a "peace message" that Canadian Richard
|
||
Brandow, publisher of Montreal's MacMag magazine, acknowledged writing. As
|
||
reported here earlier, that file was designed to simply pop up on Mac screens7ª³round the world on March 2 to
|
||
celebrate the first anniversary of the release of
|
||
the Macintosh II. However, many Mac users reacted angrily when they learned that
|
||
the file quietly had altered their systems files in order to make the surprise
|
||
message possible.
|
||
Now the virus has re-emerged, this time in FreeHand, a new Mac program Aldus
|
||
developed. Aldus spokeswoman Laury Bryant told Associated Press writer George
|
||
Tibbits that Brandow's message flashed when the program was loaded in the
|
||
computer.
|
||
Bryant added that, while it "was a very benign incident," Aldus officials are
|
||
angry and "are talking with our attorneys to understand what our legal rights
|
||
are in this instance.... We feel that Richard Brandow's actions deserve to be
|
||
condemned by every member of the Macintosh community."
|
||
This may be the first instance of a so-called "virus" infecting commercial
|
||
software.
|
||
Tibbits says the Brandow virus apparently inadvertently spread to the Aldus
|
||
program through a Chicago subcontractor called MacroMind Inc.
|
||
MacroMind President Marc Canter told AP that the virus appears to have been in
|
||
software he obtained from Brandow which included a game program called "Mr.
|
||
Potato Head," a version of the popular toy.
|
||
Canter said that, unaware of the digital infection, he ran the game program
|
||
once, then later used the same computer to work on a disk to teach Mac owners
|
||
how to use FreeHand. That disk, eventually sent to Aldus, became infected. Then
|
||
it inadvertently was copied onto disks sold to customers and infected their
|
||
computers, Canter said.
|
||
Upset with Brandow, Canter says he also is considering legal action. For his
|
||
part, Brandow says he met Canter, but denied giving him the software.
|
||
The whole incident apparently has some at other companies worried because they
|
||
also use Canter's services. Tibbits says that among MacroMind's clients are
|
||
Microsoft, Ashton-Tate, Lotus Development Corp. and Apple Computers. A-T has not
|
||
commented, but officials at Microsoft, Apple and Lotus all told AP that none of
|
||
their software was infected.
|
||
Ma!·while, Brandow told Tibbits that, besides calling for world peace, the
|
||
virus message was meant to discourage software piracy and to encourage computer
|
||
users to buy original copies.
|
||
The full message read: "Richard Brandow, the publisher of MacMag, and its
|
||
entire staff would like to take tZl.HÝêtuniìy èo convey their universal
|
||
message of peace to all Macintosh users around the world." Beneath that was a
|
||
picture of a globe.
|
||
|
||
BranÈKw`³XZ¢¡…Ñ<E280A6>zÉ¥<C389>¥¹…±±å<C2B1>B•<42>*áÁ•<C381>Ñ•‘<E280A2>‚•½Á±•<C2B1>j…¥¹<C2A5><C2B9>ª¹…ÕÑ¡½É¥é•‘<E280A2>½Á¥•Í<E280A2>z™5R°®ëÉ…µÍ<C2B5>z¹<7A>¢¡•<C2A1>j…<6A>¡¥¹•<C2B9>º½Õ±‘<C2B1>šÁÉ
|
||
•…‘<EFBFBD>¢¡•<EFBFBD>²¥ÉÕÍ<EFBFBD>J¹<EFBFBD>¢¡•<EFBFBD>j½¹±É•…e<EFBFBD>area and possibly
|
||
a few other areas of Canada and the United States. However, he said he was
|
||
shocked later to find that, after the virus program began to appear in the
|
||
databases of online information services, an estimated 350,000 people in North
|
||
America and Europe saw the message pop up on their computers on March 2.
|
||
--Charles Bowen
|
||
|
||
|
||
THREAT OF "VIRUS" BLOWN OUT OF PROPORTION, NORTON AND SYSOPS SAY
|
||
|
||
(April 10)
|
||
The threat of so-called computer "viruses" has been vastly overrated,
|
||
according to software guru Petår2Norton and two CompuServe forum administrators.
|
||
"We're dealing with an urban myth," Norton told Insight magazine. "It's like
|
||
the story of alligators in the sewers of New York. Everyone knows about them,
|
||
but no one's ever seen them. Typically, these stories come up(åwery three to
|
||
five years."
|
||
Don Watkins, administrator of CompuServe's IBM Users Network forums (GO
|
||
IBMNET) also told the general interest magazine that he's more concerned about
|
||
being hit by a meteor than a computer virus.
|
||
"In five years," Watson said, "I've seen only one program that was designed to
|
||
do intentional damage. That was about three yeaäW`¡Ö‹
|
||
¹‘<EFBFBD>JÑ<EFBFBD>º…͹<EFBFBD>¢<EFBFBD>²•Éå5R³¡¥ÍÑ¥<EFBFBD>…Ñ•‘¹j
|
||
@""I@have never spoken to anyone who personally, firsthand, has ever seen or
|
||
experienced a program like this," Watson added, "and my job keeps me iÜtouchM
|
||
·Z¢•¹Í<EFBFBD>z™<EFBFBD>¢¡½ÕÍ…¹‘Í<EFBFBD>z™<EFBFBD>‚•½Á±•¹j$ ComèuS˹W2½ÉÕµ<C395>administrators check each piece of user-contributed software
|
||
before posting it in data libraries for general distribution.
|
||
The alleged virus problem received widespread attention in early March when an
|
||
unauthorized message was placed onto Freehand, a commercial software product for
|
||
the Apple Macintosh published by Aldus Corp. Earlier, the same message
|
||
circulated in several information services and was uploaded to CompuServe's
|
||
Hyper Forum, a forum devoted to the Hypertext technology that is part of the
|
||
Micronetworked Apple Users Groups (GO MAUG).
|
||
The message read "Richard Brandow, publisher of MacMag, would like to take
|
||
this opportunity to convey a universal message of peace to all Macintosh users."
|
||
It then erased itself without doing any harm.
|
||
Of the situation, Neil Shapiro, MAUG's chief sysop, said, "The whole problem
|
||
has been completely hyped out of proportion."
|
||
--Daniel Janal
|
||
|
||
|
||
COMPUTER VIRUS NEWSLETTER DEBUTS
|
||
|
||
(April 13)
|
||
If you want to follow all the latest news on insipid computer viruses, you
|
||
might be interested in the debut of "Computer Virology," a newsletter devoted to
|
||
identifying and analyzing those annoying computer diseases.
|
||
Produced by Director Technologies Inc., the developers of Disk Defender, a
|
||
hardware device that write protects PC hard disks, the newsletter will be
|
||
published monthly. Topics will include developments for protection against the
|
||
viruses, precautions and procedures to follow to insure that terrorists not let
|
||
loose this rampant epidemic.
|
||
"The latest strain of computer viruses presently causing serious damage at
|
||
university labs, scientific research facilities, hospitals and business
|
||
organizations worldwide, has created a very real concern for the future of
|
||
having free access to the tremendous amounts of information that are now readily
|
||
available for unlimited use," said Dennis Director, president of Director
|
||
Technologies.
|
||
"The potential dangers of such viruses is that they can be used not only as a
|
||
means to facilitate malicious pranks in the home computer area, but also pose a
|
||
real `terrorist' threat to academic computing labs, scientific research projects
|
||
and business. Data loss can cost hundreds of thousands of dollars in real money,
|
||
as well as in wasted man-hours."
|
||
The newsletter is distributed free of charge. For information or to subscribe,
|
||
contact Director Technologies Inc., 906 University Pl., Evanston, IL 60201.
|
||
312/491-2334.
|
||
|
||
|
||
SIR-TECH UNVEILS ANTI-VIRUS
|
||
|
||
(April 14)
|
||
Sir-tech Software Inc., the Ogdensburg, N.Y., firm best known for its
|
||
recreational programs such as the acclaimed "Wizardry" series of adventure
|
||
games, now has released a free program called "Interferon, the Magic Bullet"
|
||
that it says is meant to "halt the devastation of computer virus."
|
||
A company statement reports that Robert Woodhead, 29-year-old director of
|
||
Sir-tech's Ithaca, N.Y., development center, designed the Apple Macintosh
|
||
program to "detect and destroy the highly-publicized computer virus which
|
||
threatens the integrity of the world's computer systems."
|
||
Sir-tech says the program will be offered free for downloading from related
|
||
services oî QompuServe and GEnie. In addition, it is available by mailing a
|
||
diskette with a self-addressed, stamped envelope to Sir-tech, 10 Spruce Lane,
|
||
Ithaca, N.Y. 14850.
|
||
While the program itself is free, Woodhead asks for donations to a fund
|
||
established to buy computer equipment for visually impaired users. A notice in
|
||
the software gives details on the fund.
|
||
Woodhead said he has worked since early this year to come up with Interferon,
|
||
named for the antiviral treatment for cancer. "Just as a virus leaves clues in a
|
||
human body, the computer virus is detectable if users know what to look for,"
|
||
Woodhead said.
|
||
The Inter~åâon`°®ëÉ…µ<E280A6>’•<E28099>½<EFBFBD>¹¥é•Í<E280A2>¡…¹<E280A6>•Í<E280A2>¢¡…Ñ<E280A6>½µÁÕÑ•É<E280A2>²¥ÉÕÍ•Í<E280A2>j…•<C2AD>
|
||
Í<EFBFBD>¢¡•å5R³É•…‘<EFBFBD>¢¡•¥É<EFBFBD>J¹™•<EFBFBD>Ñ¥½¹<EFBFBD>
|
||
¹‘<EFBFBD>º¥±±<EFBFBD>J¹‘¥<EFBFBD>…Ñ•<EFBFBD>¢¡…Ñ<EFBFBD>¢¡•É•<EFBFBD>JÍ<EFBFBD>š½µ•Ñ¡¥¹<EFBFBD><EFBFBD>
|
||
µ¥Íͱ¢¡•5Rstatement`³XZ–¢…•<E280A6>Ó·VÖÑ¥½¹<C2BD>can be cured by deleting the diseased files," it
|
||
added. "As new viruses are discovered, Interferon will be updated for instant
|
||
detection."
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
NEW VIRUS PLAGUES MACINTOSHES AT NASA AND APPLE
|
||
|
||
(April 18)
|
||
Apple Macintosh computers at the National Aeronautics and Space Administration
|
||
and at Apple Computer as well as other business offices around the country have
|
||
caught a new computer virus, reports0NÎwsdayn
|
||
@"Theb…Ñ•ÍÑ<C38D>high-tech plague is under investigation by Apple and federal
|
||
aut¿G¸ities.
|
||
During the past three weeks, Apple has been receiving reports of a virus
|
||
called Scores. Although it has not been known to erase any data, it can cause
|
||
malfunctions in printing and accessing files and can cause system crashes,
|
||
Cynthia Macon of Apple Computer told Newsday.
|
||
Two hundred of the 400 Macintosh computers at the Washington, D.C. offices of
|
||
NASA have been infected. Many of them are connected to local area networks and
|
||
are spreading the virus. "This particular virus does not attack data. We have
|
||
no record indicating anyone lost anything important," said Charles Redmond, a
|
||
NASA spokesman.
|
||
Newsday notes that the Scores virus can be detected by the altered symbols
|
||
that appear in Scrapbook and Note Pad, two Macintosh files. Instead of the Mac
|
||
logo, users see a symbol that looks like a dog-eared piece of paper. Two days
|
||
after the virus is transmitted, it is activated and begins to randomly infect
|
||
applications, such as word processing and spreadsheet programs.
|
||
EDS Corp. of Dallas, Texas was also infected with the Scores virus, but
|
||
managed to stop its spread.
|
||
-- Cathryn Conroy
|
||
|
||
|
||
|
||
FRIDAY THE 13TH "VIRUS" FIZZLES
|
||
|
||
(May 14)
|
||
Good morning, computerdom! It's Saturday the 14th and we're all still here. At
|
||
least, we all SEEM to still be here, though some are saying it's too early to
|
||
tell for sure.
|
||
Yesterday, the first Friday the 13th of the year, was widely reported to be
|
||
the target date for the denotation of a computer virus called "Black Friday"
|
||
which was first discovered in the computers of the Hebrew University in
|
||
Jerusalem late last year. The virus, which was reported to have spread from
|
||
Jerusalem to computers around the world, was said to be designed to destroy
|
||
computer files on May 13.
|
||
However, no early reports of damage have surfaced. Computer experts in
|
||
Jerusalem told Associated Press writer Karin Laub that the so-called virus was
|
||
undone because most computer users were alerted in time. Hebrew University
|
||
researchers detected the virus on Dec. 24 because of a flaw in its design,
|
||
according to senior programmer Yisrael Radai.
|
||
Nonetheless, a few experts are saying that we aren't out of the woods yet.
|
||
For instance, Donn Parker of the SRI International research firm in Menlo
|
||
Park, Calif., told The Washington Post this morning that he hadn't heard of any
|
||
virus-related damage, "but we have been holding our breath. I think it will be a
|
||
dud, but we won't know until next week, and only then if people whose computers
|
||
go down talk about it."
|
||
Some software companies tackled the virus scare. AP reports that the Iris
|
||
software publisher of Tel Aviv developed an anti-virus program for the Israeli
|
||
computing community and sold 4,000 copies before yesterday. President Ofer
|
||
Ahituv estimated that 30 percent of his 6,000 customers, most of them
|
||
businesses, had been infected by the Black Friday virus.
|
||
Meanwhile, some are saying the apparent fizzle of the virus is what they
|
||
expected all along.
|
||
"Viruses are like the bogyman," said Byron C. Howes, a computer systems
|
||
manager at the University of North Carolina at Chapel Hill. Speaking with AP, he
|
||
compared programmers who believe in viruses to "people who set little bowls of
|
||
milk outside our doors to feed the dwarfs."
|
||
Barry B. Cooper, owner of Commercial Software in Raleigh, N.C., agreed. "I
|
||
just think that the whole thing is a joke," like the prediction by medieval seer
|
||
Nostradamus of a major earthquake on May 8, 1988. "That didn't come true, and
|
||
this won't come true."
|
||
--Charles Bowen
|
||
|
||
|
||
R.I. NEWSPAPER DISLODGES VIRUS
|
||
|
||
(May 16)
|
||
The Providence, R.I., Journal-Bulletin says it worked for the past week and a
|
||
half to stamp out a "virus" that infected an in-house personal computer network
|
||
used by reporters and editors, but not before the virus destroyed one reporter's
|
||
data and infected scores of floppy disks.
|
||
Writing in The Journal, Jeffrey L. Hiday said the virus was "a well-known,
|
||
highly sophisticated variation called the 'brain' virus, which was created by
|
||
two brothers who run a computer store in Lahore, Pakistan."
|
||
Variations of the virus, he noted, have been discovered at companies and
|
||
colleges across the country, including, last week, Bowie State College in
|
||
Maryland, where it destroyed five students' disks. Online Today reported on
|
||
April 23 that a similar Pakistan-based virus infected a student system used at
|
||
Miami University in Ohio, threatening to wipe out term papers stored there.
|
||
Apparently this is the first time a virus has invaded a US newspaper's system.
|
||
Hiday said The Journal contacted one of the Pakistan brothers by phone, who
|
||
said he created this particular virus merely to keep track of software he wrote
|
||
and sold, adding that he did not know how it got to the United States.
|
||
However, Hiday added, "US computer programming experts ... believe the
|
||
Pakistanis developed the virus with malicious intent. The original version may
|
||
be relatively harmless, they point out, but its elegance lends itself to
|
||
alterations by other programmers that would make it more destructive."
|
||
The newspaper says it discovered the virus on May 6 when a message popped up
|
||
on computer screens reading, "Welcome to the Dungeon. ... Beware of this VIRUS.
|
||
Contact us for vaccination." The message included a 1986 copyright date, two
|
||
names (Basit and Amjad), a company (Brain Computer Services), an address (730
|
||
Nizam Block Allama Iqbal in Lahore, Pakistan) and three phone numbers.
|
||
Journal-Bulletin systems engineer Peter Scheidler told Hiday, "I was sort of
|
||
shocked. I never thought I'd see a virus. That's something you read about."
|
||
The virus infected only the PC network; neither the paper's Atex news-editing
|
||
system nor its IBM mainframe that supports other departments were affected.
|
||
Hiday says the newspaper now is taking steps to protect itself against another
|
||
virus attacks. It has tightened dissemination of new software and discussed
|
||
installing "anti-virus" devices. In addition, computer users have been warned
|
||
not to use "foreign" software, and reporters have been instructed to turn their
|
||
computers off and then on again before inserting floppy disks.
|
||
--Charles Bowen
|
||
|
||
|
||
EPA MACINTOSHES RECOVER FROM VIRUS
|
||
|
||
(May 18)
|
||
Although Apple Macintosh computers at the Environmental Protection Agency were
|
||
recently plagued with a virus, all of them seem to be on the mend now.
|
||
According to Government Computer News, the computers were vaccinated with
|
||
Virus Rx, a free program issued by Apple Computer Inc. to help users determine
|
||
if their hard disks have been infected. Apple has begun an educational campaign
|
||
to promote "safe computing practices," Apple spokeswoman Cynthia Macon told GCN.
|
||
Virus Rx is available on CompuServe in the Apple Developers Forum (GO APPDEV)
|
||
in Data Library 8 under the name VIRUS.SIT.
|
||
Macon said the best long-term response to viruses "is to make users aware of
|
||
steps they can take to protect themselves." These include backing up data files,
|
||
knowing the source of programs and write-protecting master disks. Other steps
|
||
include booting from a floppy disk and running all programs from floppies rather
|
||
than installing and running them from the hard disk.
|
||
EPA is having some trouble with reinfection. Since up to 20 people may use one
|
||
Macintosh, someone may unknowingly insert a virus-plagued disk into a clean
|
||
machine. "It's like mono. You just never get rid of it," said Leslie Blumenthal,
|
||
a Unisys Corp. contract employee at EPA.
|
||
FBI agents in Washington, D.C. and San Jose, Calif. are investigating the
|
||
spread of the Macintosh virus, notes GCN.
|
||
-- Cathryn Conroy
|
||
|
||
|
||
CONGRESS CONSIDERS VIRUS PROBLEMS
|
||
|
||
(May 19)
|
||
Computer viruses have come to the attention of Congress and legislators would
|
||
like to be assured that US defense computers are safe from the replicating
|
||
little bugs. Although defense systems can't be reached simply by telephoning
|
||
them, a virus could be contracted through an infected disk containing
|
||
non-essential information.
|
||
The Defense Authorization Bill for FY 1989 is likely to direct the Defense
|
||
Department (DoD) to report on its methods for handling potential viral
|
||
infections. Congress also wants to know what DoD has done about safeguarding
|
||
military computers. They'd like some assurance that the Defense Department also
|
||
has considered situations where a primary contractor's computer could be
|
||
infected and subsequently endanger DoD's own computers.
|
||
Anticipating future hearings, Congressional staffers are soliciting comments
|
||
from knowledgeable users as to what the report to Congress should cover.
|
||
Interested parties should forward their comments to Mr. Herb Lin, House Armed
|
||
Services Committee, 2120 Rayburn House Office Building, Washington DC 20515.
|
||
Further information is available by calling 202/225-7740. All comments will be
|
||
kept in confidence.
|
||
--James Moran
|
||
|
||
|
||
TEXAN STANDS TRIAL FOR ALLEGEDLY INFECTING SYSTEM WITH "VIRUS"
|
||
|
||
(May 24)
|
||
In Fort Worth, Texas, a 39-year-old programmer is to stand trial July 11 on
|
||
felony charges that he intentionally infected an ex-employer's system with a
|
||
computer "virus." If convicted, he faces up to 10 years in prison.
|
||
The man, Donald Gene Burleson, apparently will be the first person ever tried
|
||
under the state's tougher computer sabotage law, which took effect Sept. 1,
|
||
1985.
|
||
Dan Malone of the Dallas Morning News broke the story this morning, reporting
|
||
on indictments that accuse Burleson of executing programs "designed to interfere
|
||
with the normal use of the computer" and of acts "that resulted in records being
|
||
deleted" from the systems of USPA and IRA Co., a Fort Worth-based national
|
||
securities and brokerage.
|
||
The paper quoted police as saying the electronic interference was a "massive
|
||
deletion" of more than 168,000 records of sales commissions for employees of the
|
||
company, where Burleson once worked as a computer security officer.
|
||
Burleson currently is free on a $3,000 bonding pending the trial.
|
||
Davis McCown, chief of the Tarrant County district attorney's economic crimes
|
||
division, said of the alleged virus, "You can see it, but you can't see what it
|
||
does -- just like a human virus. It had the ability to multiply and move around
|
||
and was designed to change its name so it wouldn't be detected."
|
||
McCown also told Malone he wanted to make sure "that this type of criminal
|
||
understands that we have the ability to make these type of cases; that it's not
|
||
so sophisticated or complicated that it's above the law."
|
||
Company officials first noticed a problem on Sept. 21, 1985. Says the Dallas
|
||
newspaper, "Further investigation revealed that an intruder had entered the
|
||
building at night and used a 'back-door password' to gain access to the
|
||
computer. ... Once inside, the saboteur covered his tracks by erasing computer
|
||
logs that would have followed his activity, police said. With his access to the
|
||
computer complete, the intruder manually deleted the records."
|
||
Authorities say that only a few of the 200 workers in the USPA home office --
|
||
including Burleson -- had access and the knowledge needed to sabotage the
|
||
system.
|
||
Earlier USPA was awarded $12,000 by a jury in a civil lawsuit filed against
|
||
Burleson.
|
||
--Charles Bowen
|
||
|
||
|
||
FBI CALLED TO PROBE VIRUS CASE
|
||
|
||
(July 4)
|
||
The FBI has been called in by NASA officials to investigate an alleged
|
||
computer virus that has destroyed data on its personal computers and those of
|
||
several other government agencies.
|
||
The New York Times reported this morning that the rogue program -- apparently
|
||
the so- called "Scores" virus that surfaced last April -- was designed to
|
||
sabotage data at Dallas' Electronic Data Systems. The paper said the virus did
|
||
little damage to the Texas company but did wreak havoc on thousands of PCs
|
||
nationwide.
|
||
The Times quoted NASA officials as saying the FBI was called in because, even
|
||
though damage to government data was limited, files were destroyed, projects
|
||
delayed and hundreds of hours were spent tracking the culprit at various
|
||
government agencies, including NASA, the Environmental Protection Agency, the
|
||
National Oceanic and Atmospheric Administration and the US Sentencing
|
||
Commission.
|
||
NASA says it doesn't know how the program, which damaged files from January to
|
||
May, spread from the Texas EDS firm to PC networks nor whether the virus was
|
||
deliberately or accidentally introduced at government agencies.
|
||
Meanwhile, the Times quoted experts as saying that at least 40 so-called
|
||
"viruses" now have been identified in the United States, defining a virus as a
|
||
program that conceals its presence on a disk and replicates itself repeatedly
|
||
onto other disks and into the memory of computers.
|
||
As reported here in April, the Scores virus was blamed for infecting hundreds
|
||
of Apple Macintosh computers at NASA and other facilities in Washington,
|
||
Maryland and Florida.
|
||
The Times says the spread of the virus was exacerbated when private
|
||
contractors in Washington and North Carolina inadvertently sold dozens of
|
||
computers carrying the virus to government agencies. The virus spread for as
|
||
long as two months and infected networks of personal computers before it was
|
||
discovered.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
NEW MEXICO BBS SUES OVER VIRUS
|
||
|
||
(Aug. 17)
|
||
The operator of a New Mexico computer bulletin board system has filed what may
|
||
be the first federal suit against a person accused of uploading a computer
|
||
"virus."
|
||
William A. Christison, sysop of the Santa Fe Message BBS, alleges in his suit
|
||
that a man named Michael Dagg visited his board in the early hours of last May 4
|
||
and "knowingly and intentionally" uploaded a digitally-infected file called
|
||
"BBSMON.COM."
|
||
The suit says Christison "checked the program before releasing it to the
|
||
public and discovered that it was a 'Trojan Horse'; i.e., it appeared to be a
|
||
normal program but it contained hidden commands which caused the program to
|
||
vandalize Plaintiff's system, erasing the operating system and damaging the file
|
||
allocation tables, making the files and programs stored in the computer
|
||
unusable."
|
||
Christison says that the defendant re-visited the BBS nine times between May 5
|
||
and May 12, sometimes logging in under a pseudonym. "Several of these times,"
|
||
the suit says, "he sent in messages and on May 7, 1988, he knowingly and
|
||
intentionally sent in by modem a program of the same name, BBSMON.COM, as the
|
||
original 'Trojan Horse' computer program."
|
||
Through attorney Ann Yalman, Christison asks the court to grant $1,000 for
|
||
each Trojan Horse violation and to enjoin the defendant "from sending 'Trojan
|
||
Horses' or 'viruses' or other vandalizing programs to Plaintiff or anyone else."
|
||
A copy of the Santa Fe Message's suit has been uploaded to CompuServe's IBM
|
||
Communications Forum. To see it, visit the forum by entering GO IBMCOM at any
|
||
prompt. The ASCII file is VIRUS.CHG in forum library 0.
|
||
Also, you can reach Christison BBS directly with a modem call to 505/988-5867.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
VIRUS FIGHTERS FIGHT EACH OTHER
|
||
|
||
(Aug. 31)
|
||
Two groups that mean to protect us in the fight against so-called computer
|
||
"viruses" seem to be spending rather a lot of their energies fighting each
|
||
other.
|
||
"I personally know most of the people in this industry and I have never seen
|
||
this kind of animosity," Brian Camenker of the Boston Computer Society tells
|
||
business writer Peter Coy.
|
||
The bickering grew louder on Monday in page-one article in MIS Week trade
|
||
newspaper in which each side accused the other of using sloppy techniques and
|
||
manipulating the testing process for its own purposes.
|
||
Says Coy, "The intensity of the debate has left some software developers
|
||
disgusted with the whole business."
|
||
The argument, which centers around fair evaluation anti-virus "vaccine"
|
||
software, pits the 2- month-old Computer Virus Industry Association led by John
|
||
McAfee, president of InterPath Corp. of Santa Clara, Calif., against what Coy
|
||
terms "a loose collection of other computer experts" led by consultant Jon R.
|
||
David of Tappan and editor Harold Highland of Computers & Security magazine.
|
||
"Customers and producers agree on the need for an independent panel of experts
|
||
to review the (vaccine) software," Coy comments. "The question splitting the
|
||
industry is who should be in charge."
|
||
CVIA is pulling together an independent university testing panel made up of
|
||
representatives of Pace University, Adelphi University and Sarah Lawrence
|
||
College and headed by John Cordani, who teaches computer science at Adelphi and
|
||
Pace. However, David and Highland say these people don't have the necessary
|
||
credentials and that McAfee's InterPath products will have an advantage in the
|
||
testing because McAfee invented a virus simulator that will be used as a testing
|
||
mechanism.
|
||
Meanwhile, Highland says he's getting funding from his publisher, Elsevier
|
||
Advanced Technology Publications, for his own review of anti-viral software, but
|
||
adds he isn't interested in operating an ongoing review board.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
VIRUS TRIAL BEGINS IN FORT WORTH
|
||
|
||
(Sept. 7)
|
||
A 40-year-old Texas programmer has gone on trial this week, accused of using a
|
||
"virus" to sabotage thousands of computer records at his former employer's
|
||
business.
|
||
If convicted in what is believed to be the nation's first virus-related
|
||
criminal trial, Donald G. Burleson faces up to 10 years in jail and a $5,000
|
||
fine.
|
||
Reporting from the state criminal district court in Fort Worth, Texas, The
|
||
Associated Press notes Burleson was indicted on charges of burglary and harmful
|
||
access to a computer in connection with damage to data at USPA & IRA Co.
|
||
securities firm two days after he was fired. The trial is expected to last about
|
||
two weeks.
|
||
USPA, which earlier was awarded $12,000 in a civil suit against Burleson,
|
||
alleges the defendant went into its offices one night and planted a virus in its
|
||
computer records that, says AP, "would wipe out sales commissions records every
|
||
month. The virus was discovered two days later, after it had eliminated 168,000
|
||
records."
|
||
--Charles Bowen
|
||
|
||
|
||
VIRUS ATTACKS JAPANESE NETWORK
|
||
|
||
(Sept. 14)
|
||
Japan's largest computer network -- NEC Corp.'s 45,000- subscriber PC-VAN
|
||
service -- has been infected by a computer "virus."
|
||
McGraw-Hill News quotes a NEC spokesman as saying that over the past two weeks
|
||
13 different PC- VAN users have reported virus incidents.
|
||
Subscribers' user IDs and passwords "were apparently stolen by the virus
|
||
planter when the members accessed one of the service's electronic bulletin
|
||
boards," MH says. "The intruder then used the information to access other
|
||
services of the system and charged the access fees to the password holders."
|
||
NEC, which says it has not yet been able to identify the virus planter, gave
|
||
the 13 subscribers new user IDs and passwords to check the proliferation of the
|
||
virus.
|
||
--Charles Bowen
|
||
|
||
|
||
JURY CONVICTS PROGRAMMER OF VIRUS
|
||
|
||
(Sept. 20)
|
||
After deliberating six hours, a Fort Worth, Texas, jury late yesterday
|
||
convicted a 40-year-old programmer of planting a "virus" to wipe out 168,000
|
||
computer records in revenge for being fired by an insurance firm.
|
||
Donald Gene Burleson is believed to be the first person convicted under
|
||
Texas's 3-year-old computer sabotage law. The trial, which started Sept. 6, also
|
||
was among the first of its kind in the nation, Judge John Bradshaw told the
|
||
Tarrant County jury after receiving its verdict.
|
||
The Associated Press says jurors now are to return to State District Court to
|
||
determine the sentence.
|
||
Burleson, an Irving, Texas, resident, was found guilty of harmful access to a
|
||
computer, a third-degree felony with a maximum penalty of 10 years in prison and
|
||
a $5,000 fine. However, as a first-time offender, Burleson also is eligible for
|
||
probation.
|
||
As reported here earlier, Burleson was alleged to have planted a rogue program
|
||
in computers used to store records at USPA and IRA Co., a Fort Worth insurance
|
||
and brokerage firm.
|
||
During the trial, prosecutor Davis McCown told the jury the virus was
|
||
programmed like a time bomb and was activated Sept. 21, 1985, two days after
|
||
Burleson was fired as a programmer at the firm because of alleged personality
|
||
conflicts with other employees.
|
||
AP quoted McCown as saying, "There were a series of programs built into the
|
||
system as early as Labor Day (1985). Once he got fired, those programs went
|
||
off."
|
||
McCown added the virus was discovered two days later after it had eliminated
|
||
168,000 payroll records, holding up paychecks to employees for more than a
|
||
month.
|
||
Expert witnesses also testified in the three-week trial that the virus was
|
||
entered in the system via Burleson's terminal by someone who used Burleson's
|
||
personal access code.
|
||
However, the defense said Burleson was set up by someone else using his
|
||
terminal and code. Says AP, "Burleson's attorneys attempted to prove he was
|
||
vacationing in another part of the state with his son on the dates in early
|
||
September when the rogue programs were entered into the system. But prosecutors
|
||
presented records showing that Burleson was at work and his son was attending
|
||
school on those dates."
|
||
The Fort Worth Star-Telegram reports that also during the trial, Duane Benson,
|
||
a USPA & IRA senior programmer analyst, testified the automated virus series,
|
||
which was designed to repeat itself periodically until it destroyed all the
|
||
records in the system, never was automatically activated. Instead, Benson said,
|
||
someone manually set one of the programs in motion Sept. 21, 1985, deleting the
|
||
records, then covering his or her tracks by deleting the program.
|
||
Prosecutor McCown says data damage in the system could have amounted to
|
||
hundreds of thousands of dollars had the virus continued undetected.
|
||
As reported here earlier, Burleson also has lost a civil case to USPA in
|
||
connection with the incident. That jury ordered him to pay his former employers
|
||
$12,000.
|
||
Following the yesterday's verdict, McCown told Star-Telegram reporter Martha
|
||
Deller, "This proves (virus damage) is not an unprosecutable offense. It may be
|
||
hard to put a case together, but it's not impossible."
|
||
--Charles Bowen
|
||
|
||
|
||
UNIVERSITY PROFESSORS ATTACK COMPUTER VIRUSES
|
||
|
||
(Sept. 30)
|
||
Because they have not been given access to the National Security Agency's
|
||
anti-virus research, several university- based computer experts are planning to
|
||
begin their own testing and validating of software defenses against computer
|
||
viruses, reports Government Computer News.
|
||
Led by John Cordani, assistant professor of information systems at Adelphi
|
||
University, the results will be made public, unlike those being researched by
|
||
NSA. The work being done by the Department of Defense is too classified for use
|
||
by the general computer community.
|
||
GCN notes that computer viruses are hard-to-detect programs that secretly
|
||
replicate themselves in computer systems, sometimes causing major damage.
|
||
Cordani and five other academics will establish secure laboratories to study
|
||
viruses in three New York colleges: Adelphi University, Pace University and
|
||
Sarah Lawrence College. The lab will test anti-virus software developed by
|
||
companies that are members of the Computer Virus Industry Association, a
|
||
consortium of anti-virus defense developers.
|
||
The group will then publish what it is calling "consumer reports" in the media
|
||
and on electronic bulletin board systems. Once sufficient research is completed,
|
||
more general grading systems will be applied, said Cordani. In addition, the lab
|
||
will use viruses sent to them by the CVIA to develop classification algorithms
|
||
to aid in describing a virus' actions and effects.
|
||
-- Cathryn Conroy
|
||
|
||
|
||
|
||
SECOND VIRUS FOUND AT ALDUS CORP.
|
||
|
||
(Oct. 21)
|
||
For the second time this year, a computer "virus" has been found in a
|
||
commercial program produced by Seattle's Aldus Corp. The infection was found in
|
||
the latest version of the FreeHand drawing software, the same software that was
|
||
invaded by a different virus last March.
|
||
An Aldus official told The Associated Press the company was able to prevent
|
||
the virus's spread to programs for sale to the public, but that an entire
|
||
computer network within Aldus' headquarters has been infected.
|
||
The virus was found in a version of the Apple Macintosh software that was sent
|
||
to specific users to be tested before going to market. One of the testers
|
||
discovered the virus, dubbed "nVir," and two days later, Aldus realized the
|
||
virus was in its own in-house network.
|
||
Said Aldus spokeswoman Jane Dauber, "We don't know where it came from. That is
|
||
the nature of the virus. You can't really track it."
|
||
AP says Aldus officials said the new virus has remained dormant so far, a tiny
|
||
program that merely attaches itself to other programs.
|
||
"We don't know why," Dauber said. "We don't know what invokes this virus. With
|
||
some of them, you have to launch the program a certain number of times," for the
|
||
virus to activate.
|
||
The company told the wire service that, while it does not know where the virus
|
||
originated, reports are that it apparently has infected at least one
|
||
unidentified East Coast university's computers.
|
||
Another Aldus spokeswoman, Laury Bryant, added, "You just can't always stop
|
||
these things from coming in the door. But what we have done is to set up systems
|
||
which eliminate them before they are actually in full version, shrink-wrap
|
||
software and stop them from going out the door."
|
||
Last March, in what was apparently the first instance of an infection in
|
||
commercial software, a virus called the "March 2 peace message" was found in
|
||
some FreeHand programs. The invasion caused Aldus to recall or rework thousands
|
||
of packages of the new software.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
MAN SENTENCED IN NATION'S FIRST VIRUS-RELATED CRIMINAL COURT CASE
|
||
|
||
(Oct. 23)
|
||
Donald Gene Burleson, the first person ever convicted of using a computer
|
||
"virus" to sabotage data, has been sentenced to seven years' probation and
|
||
ordered to pay back nearly $12,000 to his former employer.
|
||
The 40-year-old Irving, Texas, man's attorney told United Press International
|
||
he will appeal the sentenced handed down late Friday by District Judge John
|
||
Bradshaw in Fort Worth, Texas.
|
||
As reported earlier, Burleson was convicted Sept. 19 of the third-degree
|
||
felony, the first conviction under the new Texas state computer sabotage law. He
|
||
was accused of infecting the computers of USPA & IRA, a Fort Worth insurance and
|
||
securities firm a few days after his firing Sept. 18, 1985.
|
||
Burleson could have received two to 10 years in prison and a fine up to $5,000
|
||
under the 1985 law. As a first-time offender, however, he was eligible for
|
||
probation.
|
||
As reported during last month's trial, a few days after Burleson's firing in
|
||
1985, company officials discovered that 168,000 records of sales commissions had
|
||
been deleted from their system.
|
||
Burleson testified that he was more than 300 miles away from Fort Worth on
|
||
Sept. 2 and Sept. 3 when the virus was created. However, UPI notes that evidence
|
||
showed that his son was not traveling with him as he said but in school, and
|
||
that a credit card receipt Burleson said proved he was in Rusk on Sept. 3 turned
|
||
out to be from 1987.
|
||
Associated Press writer Mark Godich quoted Burleson's lawyer, Jack Beech, as
|
||
saying he had asked for five years' probation for his client, and restitution
|
||
not to exceed $2,500.
|
||
Godich also observed that the Burleson's conviction and sentencing "could pave
|
||
the way for similar prosecutions of people who use viruses."
|
||
Chairman John McAfee of the Computer Virus Industry Association in Santa,
|
||
Clara, Calif., told AP the Texas case was precedent-setting and that it's rare
|
||
that people who spread computer viruses are caught. He added his organization
|
||
had documented about 250,000 cases of sabotage by computer virus.
|
||
--Charles Bowen
|
||
|
||
|
||
BRAIN VIRUS HITS HONG KONG
|
||
|
||
(Oct. 30)
|
||
According to Computing Australia, a major financial operation in Hong Kong was
|
||
infected with a version of the "Brain" virus. This is the first reported
|
||
infection of a commercial business in the East.
|
||
Business International, a major financial consulting firm in Hong Kong, is
|
||
believed not to have suffered any major damage. A company spokeswoman played
|
||
down the appearance of the virus and said that no data had been lost.
|
||
The "brain" virus has been reported as a highly sophisticated piece of
|
||
programming that was created by two men in Lahore, Pakistan who run the Brain
|
||
Computer Services company. It's last reported appearance in the US was during
|
||
May when it popped up at the Providence, R.I., Journal- Bulletin newspaper.
|
||
--James Moran
|
||
|
||
|
||
60 COMPUTER FIRMS SET VIRUS GOALS
|
||
|
||
(Nov. 2)
|
||
Some 60 computer companies have organized a group to set guidelines that they
|
||
say should increase reliability of computers and protect the systems from
|
||
so-called "viruses."
|
||
The Reuter Financial News Service says that among firms taking part in the
|
||
movement are Microsoft Corp., 3Com Inc., Banyan Systems and Novell Inc. At the
|
||
same time, though, declining to join the efforts are such big guys as IBM and
|
||
Digital Equipment Corp.
|
||
Reuter reports, "The companies said the measures would promote competition
|
||
while allowing them to cooperate in making computers more reliable and less
|
||
vulnerable to viruses."
|
||
However, the firms apparently have shied away from specific proposals, instead
|
||
issuing broad recommendations that leave it up to each company to develop the
|
||
technology needed to prevent the spread of viruses, Reuter said.
|
||
--Charles Bowen
|
||
|
||
|
||
THOUSANDS OF UNIVERSITY, RESEARCH COMPUTERS STUCK IN MAJOR ASSAULT
|
||
|
||
(Nov. 4)
|
||
Thousands of Unix-based computers at universities and research and military
|
||
installations were slowed or shut down throughout the day yesterday as a rogue
|
||
program ripped through international networks, an incident proclaimed by some to
|
||
be the largest assault ever on the nation's computers.
|
||
No permanent damage or security breaches appear to have occurred during the
|
||
attack. This led some to say this morning that the intrusion was not actually a
|
||
computer "virus" but rather was a "worm" program, in that it apparently was
|
||
designed to reproduce itself, but not to destroy data.
|
||
Science writer Celia Hooper of United Press International says the virus/worm
|
||
penetrated the computers through a "security hole" in debugging software for
|
||
electronic mail systems that connect Unix-based computers, evidently then moving
|
||
primarily through ARPAnet (the Advanced Research Projects Agency Network) and
|
||
NSFnet (network of the National Science Foundation) that link 2,000 computers
|
||
worldwide.
|
||
At other systems:
|
||
-:- The virus/worm also apparently invaded the Science Internet network that
|
||
serves many labs, including NASA's Jet Propulsion Laboratory in Pasadena, Calif.
|
||
-:- NASA spokesman Charles Redmond said there were no reports of the space
|
||
agency's network, Space Physics Analysis Network (SPAN), being affected by the
|
||
attack, but he added that SPAN was linked to some of the infected networks.
|
||
Meanwhile, The New York Times this morning reported an anonymous call from a
|
||
person who said his associate was responsible for the attack and that the
|
||
perpetrator had meant it to be harmless.
|
||
The caller told the newspaper that his associate was a graduate student who
|
||
made a programing error in designing the virus, causing the intruder to
|
||
replicate much faster than expected. Said The Times, "The student realized his
|
||
error shortly after letting the program loose and ... was now terrified of the
|
||
consequences."
|
||
UPI's Hooper says the virus/worm intrusion was detected about 9 p.m. Eastern
|
||
Time Wednesday at San Francisco's Lawrence Livermore National Laboratory, one of
|
||
two such labs where nuclear weapons are designed. Spokeswoman Bonnie Jean
|
||
Barringer told UPI said the invasion "was detected and contained within two
|
||
hours."
|
||
The rogue program evidently spread through a flaw in the e- mail system of the
|
||
networks. Hooper said it quickly penetrated Air Force systems at the NASA Ames
|
||
Research Center in Mountain View, Calif., and systems at the Massachusetts
|
||
Institute of Technology, the University of California at Berkeley, the
|
||
University of Wisconsin, the University of Chicago, the University of Michigan,
|
||
the University of Rochester, the University of Illinois and Rutgers, Boston,
|
||
Stanford, Harvard, Princeton, Columbia, Cornell and Purdue universities.
|
||
Charley Kline, senior research programmer with the Computing Services Office
|
||
at the University of Illinois at Urbana-Champaign, Ill., told Associated Press
|
||
writer Bernard Schoenburg, "This is the first time that I know of that (a virus
|
||
infection) has happened on this scale to larger systems."
|
||
Kline agreed the virus traveled between computer systems through e-mail and,
|
||
once the messages were received, they linked up to command controls and told the
|
||
local computers to make copies of the virus. Kline said the copies then sought
|
||
out other connected devices.
|
||
He also said that as far as he knows, only locations using Digital Equipment
|
||
Corp.'s VAX computers or those systems made by Sun Microsystems Inc. were
|
||
affected. He estimated about 75 percent of all national networks use such
|
||
systems.
|
||
Schoenburg also noted that all the affected computers use the BSD Unix
|
||
operating system, written at University of California/Berkeley as a modified
|
||
version AT&T's original Unix.
|
||
Commenting on the situation, Chairman John McAfee of the new Computer Virus
|
||
Industry Association in Santa Clara, Calif., told AP writer Paul A. Driscoll,
|
||
"The developer was clearly a very high-order hacker (because) he used a flaw in
|
||
the operating systems of these computers."
|
||
Research director Todd Nugent of the University of Chicago's computing
|
||
department told UPI computer operators across the country were tipped off to the
|
||
invasion when they noticed their Unix-based systems running unusually slowly.
|
||
Thm lachines turned out to be bogged down by loads of viral programs. Nugent
|
||
said that in one machine he had disconnected, the virus appeared to have
|
||
replicated itself 85 times.
|
||
Today, in the morning-after, systems operators were fighting back on several
|
||
fronts:
|
||
-:- First, a software "patch" has been developed to fend off the virus/worm.
|
||
Spokesman Bill Allen of the University of Illinois at Urbana-Champaign told
|
||
UPI's Hooper, "The strategy is to shut off various (infected) computers from the
|
||
network then sanitize them, purging the virus with a patch program." Hooper said
|
||
the patches, which find and excise the virus/worm from the computer and then
|
||
plug the hole through which it entered, now are circulating on campuses and have
|
||
been posted nationally on computer bulletin board systems.
|
||
-:- Secondly, the Defense Communications Agency has set up an emergency center
|
||
to deal with the problem. However, The New York Times noted that no known
|
||
criminal investigations are under way.
|
||
NSFnet Program Manager Al Thaler told UPI he considered the virus/worm "a
|
||
mean-spirited, vicious thing that interferes severely with the communications
|
||
network our research computers live in. We are angry." Even though it will be
|
||
hard to determine who started the virus/worm, Thaler said, "We are going to
|
||
try."
|
||
Finally, McAfee of the virus group told AP that this virus/worm was rare
|
||
because it infested computers at major institutions, not just personal
|
||
computers. "Any hacker in the world can infect personal computers," McAfee said,
|
||
"but in this case, the person who did this would have had to have been
|
||
physically at the site of one of the computers belonging to the network." He
|
||
added, though, that chances of identifying that person were "extremely slim."
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
REPORTS NAME 23-YEAR-OLD CORNELL STUDENT AS THE AUTHOR OF "VIRUS"
|
||
|
||
(Nov. 5)
|
||
A 23-year-old Cornell University student and the son of a government computer
|
||
security expert now is said to be the person who planted that "virus" that
|
||
stymied some 6,000 Unix- based computers across the nation for more than 36
|
||
hours this week.
|
||
The New York Times this morning quoted two sources as identifying the suspect
|
||
as Robert T. Morris Jr., a computer science graduate student. The paper says
|
||
Cornell University authorities found that the young man possessed unauthorized
|
||
computer codes.
|
||
The young man's father, Robert Morris Sr., the Silver Springs, Md., chief
|
||
scientist at the National Computer Security Center in Bethesda, Md.,
|
||
acknowledged this morning that "it's possible" his son was responsible for the
|
||
rapidly-replicating virus that started crashing international networks late
|
||
Wednesday night.
|
||
However, Morris Sr., who is known for security programming in Unix systems,
|
||
told science writer Celia Hooper of United Press International that he had "no
|
||
direct information" on his son's involvement. He added he had not spoken to his
|
||
son in several days and was unaware of his whereabouts.
|
||
The elder Morris also told The Times that the virus "has raised the public
|
||
awareness to a considerable degree. It is likely to make people more careful and
|
||
more attentive to vulnerabilities in the future."
|
||
As reported here yesterday (GO OLT-391), the incident, in which thousands of
|
||
networked computers at universities and research and military installations were
|
||
halted or slowed, is said to be the largest assault ever on the nation's
|
||
computers. However, no permanent damage or security breaches appear to have
|
||
occurred during the attack.
|
||
Of Morris Jr.'s alleged involvement, Cornell Vice President M. Stuart Lynn
|
||
released a statement late last night saying the Ithaca, N.Y., university has
|
||
uncovered some evidence. For instance, "We are investigating the (computer
|
||
files) to see if the virus was inserted in the system at Cornell. So far, we
|
||
have determined that this particular student's account does hold files that
|
||
appear to have passwords for some computers at Cornell and Stanford University
|
||
to which he's not entitled.
|
||
"We also found that his account contains a list of passwords substantially
|
||
similar to those contained in the virus," said Lynn. He added that students'
|
||
accounts show which computers they had accessed and what they had stored. The
|
||
university is preserving all pertinent computer tapes and records to determine
|
||
the history of the virus.
|
||
Morris Jr. himself has not been reached for comment. Associated Press writer
|
||
Douglas Rowe says the young man is believed to have flown to Washington, D.C.,
|
||
yesterday and plans to hire a lawyer and to meet with officials in charge of the
|
||
infected computer networks to discuss the incident.
|
||
Rowe also quotes computer scientists as saying the younger Morris worked in
|
||
recent summers at the AT&T's Bell Laboratories, where one of his projects
|
||
reportedly was rewriting the communications security software for most computers
|
||
that run AT&T's Unix operating system.
|
||
AP also notes that computer scientists who now are disassembling the virus to
|
||
learn how it worked said they have been impressed with its power and cleverness.
|
||
Of this, Morris' 56-year-old father told the Times that the virus may have
|
||
been "the work of a bored graduate student."
|
||
Rowe says that when this comment was heard back at Cornell, Dexter Kozen,
|
||
graduate faculty representative in the computer science department, chuckled and
|
||
said, "We try to keep them from getting bored. I guess we didn't try hard
|
||
enough."
|
||
Meanwhile, there already is talk of repercussions if Morris is determined to
|
||
be responsible for the virus.
|
||
Lynn said, "We certainly at Cornell deplore any action that disrupts computer
|
||
networks and computer systems whether or not it was designed to do so. And
|
||
certainly if we find a member of the Cornell community was involved, we will
|
||
take appropriate disciplinary action." He declined to specify what the action
|
||
would be.
|
||
In addition, federal authorities may be calling. Speaking with reporter Joseph
|
||
Verrengia of Denver's Rocky Mountain News late yesterday, FBI spokesman William
|
||
Carter said a criminal investigation would be launched if it is determined
|
||
federal law was violated. He said the bureau will review the Computer Fraud and
|
||
Abuse Act, which deals with unauthorized access to government computers or
|
||
computers in two or more states. Conviction carries a maximum penalty of 10
|
||
years in prison.
|
||
--Charles Bowen
|
||
|
||
|
||
ROBERT MORRIS' FRIENDS SAY NO MALICE MEANT WITH ALLEGED VIRUS
|
||
|
||
(Nov. 7)
|
||
Friends of a Cornell University graduate student suspected of creating a
|
||
"virus" that jammed some 6,000 networked computers for 36 hours last week say
|
||
they believe he intended no malice and that he also frantically tried to warn
|
||
operators after he saw his programming experiment had gone terribly awry.
|
||
Twenty-three-year-old Robert Tappen Morris Jr. is said to now be in contact
|
||
with his father -- Robert T. Morris Sr., a computer security expert with the
|
||
super secret National Security Agency - - and is expected to meet this week with
|
||
FBI agents after hiring a lawyer.
|
||
As reported earlier, the virus, which started Wednesday night, spread along
|
||
several major networks and, for about 36 hours, created widespread disturbances
|
||
in the unclassified branch of the military's defense data system, as well as in
|
||
thousands of university and research computer systems. However, apparently no
|
||
information was lost or damaged.
|
||
Morris Sr. told Associated Press writer David Germain that he met with FBI
|
||
agents for about an hour Saturday to explain why his son will not immediately
|
||
comply with their request for more information. The elder Morris said the family
|
||
has had preliminary discussions with an attorney and expects to hire one by
|
||
today. He said his son won't be available for a comment until at least tomorrow
|
||
or Wednesday.
|
||
The New York Times yesterday quoted Morris' friends as saying he had spent
|
||
weeks creating the virus. However, the paper said that by all accounts Morris
|
||
meant no harm to the systems; instead, the virus, created as an intellectual
|
||
challenge, was supposed to lie dormant in the systems.
|
||
A friend alleges Morris discovered a flaw in the electronic mail section of
|
||
the Unix 4.3 operating system, a modification of AT&T's original Unix produced
|
||
by the University of California at Berkeley. When he saw the flaw allowed him to
|
||
secretly enter the networked Unix computers, Morris literally jumped onto the
|
||
friend's desk and paced around on top of it, the Times reported.
|
||
Cornell instructor Dexter Kozen told AP the flaw was "a gaping hole in the
|
||
system that I'm amazed no one exploited before." While the loophole was not
|
||
evident before the virus was unleashed, "in retrospect it's really quite
|
||
obvious," Kozen said.
|
||
Incidentally, the programmer who designed Unix's e-mail program through which
|
||
the virus apparently entered told the Times this weekend that he had forgotten
|
||
to close a secret "back door." Eric Allman said he created the opening to make
|
||
adjustments to the program, but forgot to remove the entry point before the
|
||
program was widely distributed in 1985. He was working for a programming
|
||
organization at the University of California/Berkeley at the time.
|
||
Friends and others say Morris' original vision was to spread a tiny program
|
||
throughout and have it secretly take up residence in the memory of each computer
|
||
it entered, the Times said.
|
||
Working virtually around the clock, Morris reportedly made a single
|
||
programming error involving one number that ultimately jammed more than 6,000
|
||
computers by repeating messages time after time.
|
||
AP's Germain said Morris reportedly went to dinner after setting the program
|
||
loose Wednesday night and then checked it again before going to bed. Discovering
|
||
his mistake, Morris desperately worked to find a way to stop the virus' spread.
|
||
However, "his machines at Cornell were so badly clogged he couldn't get the
|
||
message out," said Mark Friedell, an assistant professor of computer science at
|
||
Harvard University, where Morris did his undergraduate studies.
|
||
AP says that, panicked, Morris called Andrew Sudduth, systems manager at
|
||
Harvard's Aiken Laboratory. He asked Sudduth to send urgent messages to a
|
||
computer bulletin board system, explaining how to defeat the virus.
|
||
Sudduth told The Washington Post, "The nets were like molasses. It took me
|
||
more than an hour to get anything out at all."
|
||
At a press conference this weekend, Cornell University officials said that,
|
||
while the computer virus was traced to their institution, they actually had no
|
||
evidence to positively identify Morris as the virus creator.
|
||
Said Dean Krafft, Cornell's computer facilities manager, "We have no
|
||
fingerprints. We have no eyewitness, but it was created on his computer
|
||
account." Krafft added that Morris' computer account holds files that appear to
|
||
have unauthorized passwords for computers at Cornell and Stanford University.
|
||
In addition, Cornell Vice President M. Stuart Lynn said the origin of the
|
||
program is hard to investigate, and it may be impossible to trace the virus back
|
||
to Morris. "At this stage we're simply not in a position to determine if the
|
||
allegations are true," Lynn said, adding he did not know how long the
|
||
investigation would take.
|
||
Curiously, in light of Krafft's statements, Lynn is quoted as saying, "It's
|
||
quite conceivable we may not be able to say with any certainty" if the virus was
|
||
created in Cornell's computer system.
|
||
Lynn also said the university had been contacted by the FBI, but there was no
|
||
indication any criminal charges would be filed. Officials said the school could
|
||
discipline Morris if he was involved.
|
||
By the way, one Cornell official, who spoke on condition of anonymity, told AP
|
||
that it appeared there was an earlier version of the virus in Morris' computer
|
||
files.
|
||
Regarding possible penalties, United Press International this morning quoted
|
||
an FBI spokesman as saying that the person responsible for the virus could face
|
||
up to 20 years in prison and $250,000 in fines for the federal offense of
|
||
unauthorized access to government computers.
|
||
Finally, Harvard graduate student Paul Graham, a friend of Morris, told the
|
||
Times he thought Morris' exploit was similar to that of Mathias Rust, the young
|
||
West German who flew a light plane through Soviet air defenses in May 1987 and
|
||
landed in Moscow.
|
||
"It's as if Mathias Rust had not just flown into Red Square, but built himself
|
||
a stealth bomber by hand and then flown into Red Square."
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
NEW LAN LABORATORY GROUP OFFERS SUGGESTIONS FOR VIRUS PREVENTION
|
||
|
||
(Nov. 7)
|
||
Just a week or so before thousands of networked computers across the country
|
||
were struck by a rapid virus, some 60 computer companies endorsed a set of
|
||
virus-prevention guidelines drafted by the National LAN Laboratory.
|
||
The Reston, Va., group, devoted to local area networks, hopes its tips can
|
||
prevent and control future viruses and worm program intrusions.
|
||
Speaking with business writer Peter Coy of The Associated Press, LAN Lab
|
||
spokesman Delbert Jones said, "The key issue is that with proper precautions,
|
||
one can continue to live a normal existence. ... "It's very much like the AIDS
|
||
virus: The best solution is precaution."
|
||
Here, according to AP, are the suggestions by the LAN Lab group:
|
||
1. All software should be purchased from known, reputable sources.
|
||
2. Purchased software should be in its original shrink wrap or sealed disk
|
||
containers when received.
|
||
3. Back-up copies should be made as soon as the software package is opened.
|
||
Back-ups should be stored off-site.
|
||
4. All software should be reviewed carefully by a system manager before it is
|
||
installed on a network.
|
||
6. New software should be quarantined on an isolated computer. This testing
|
||
will greatly reduce the risk of system virus contamination.
|
||
7. A back-up of all system software and data should be made at least once a
|
||
month, with the back-up copy stored for at least one year before re-use. This
|
||
will allow restoration of a system that has been contaminated by a
|
||
"time-released" virus. A plan that includes "grandfathered" rotation of back-up
|
||
copies will reduce risk even further.
|
||
8. System administrators should restrict access to system programs and data on
|
||
Â"needm´«Sk•‰…ͥ͹¢aÅë isolÉteç!p®K±•µÍ± protects critZ¥X
|
||
ÁÁ±¥<EFBFBD>…Ñ¥½¹Í±
|
||
and aids problem diagnosis.
|
||
9. All programs on a system should be checked regularly for program length
|
||
changes. Any program-length deviations could be evidence of tampering, or virus
|
||
infiltration.
|
||
10. Many shared or free programs are invaluable. However, these are the prime
|
||
entry point for viruses. Skeptical review of such programs is prudent. Also,
|
||
extended quarantine is essential before these programs are introduced to a
|
||
computer system.
|
||
11. Any software that exhibits symptoms of possible virus contamination should
|
||
be removed immediately. System managers should develop plans for quick removal
|
||
of all copies of a suspect program, and immediate backup of all related data.
|
||
These plans should be made known to all users, and tested and reviewed
|
||
periodicalµQ—ƒ#jjZ¡…‘±•Í<E280A2>Bowen
|
||
|
||
|
||
FBI UPGRADES VIRUS PROBE TO A "FULL CRIMINAL INVESTIGATION"
|
||
|
||
(Nov. 8)
|
||
The young man alleged to have written the virus that stymied some 6,000
|
||
networked computers last week has hired a Washington, D.C., attorney. His
|
||
selection apparently comes just in time, because the FBI reportedly is upgrading
|
||
its probe of the matter to a full criminal investigation.
|
||
Robert T. Morris Jr., 23-year- old Cornell University graduate student, has
|
||
not been formally charged, but nonetheless is widely alleged to have created the
|
||
virus that played havoc for 36 hours last week with Unix- based computers on the
|
||
Pentagon-backed ARPANET network and other systems.
|
||
Associated Press writer Anne Buckley this morning reported that lawyer Thomas
|
||
Guidoboni of the Washington firm of Bonner & O'Connell has been retained to
|
||
represent Morris. Guidoboni told Buckley, "We have notified the federal
|
||
authorities of our representation and (Morris') whereabouts. We are in the
|
||
process of investigating the facts and circumstances which have been reported by
|
||
the press in order to determine our course of action."
|
||
Meanwhile, The Washington Post this morning quoted law enforcement sources as
|
||
confirming their inquiry has been expanded to a full field investigation by the
|
||
FBI's Washington field office. That means the FBI has consulted with federal
|
||
prosecutors, agreed that the bureau has jurisdiction and that there is reason to
|
||
believe there may have been a violation ot federal criminal law.
|
||
"In a full-scale investigation," Buckley said, "the government has the power
|
||
to subpoena records and documents and compel testimony through the authorization
|
||
of immunity, two techniques which are not permitted through preliminary
|
||
inquiries. The move indicate(s) the FBI (is) moving very quickly in the case
|
||
because in many instances, preliminary inquiries take a month or more."
|
||
AP also quoted a government source who spoke on condition of anonymity as
|
||
saying investigators aren't sure whether any criminal activity actually
|
||
occurred, as defined by a statute passed in 1984.
|
||
Says Buckley, "A section of that law says it is unlawful to enter a government
|
||
computer with the intent to disrupt its functions. The crime is punishable by up
|
||
to 10 years in prison. The source said that in this case, there's no evidence
|
||
that anything was taken from the computers, but rather that it was a question of
|
||
disrupting computer systems. One section of law addresses sabotage, but the
|
||
source said it (is) unclear whether the virus case would involve an intent to
|
||
disrupt the computer."
|
||
AP says its source believes the bureau is investigating the matter in view of
|
||
the fact that there were breaches of security, and that the Justice Department
|
||
will have to determine whether the matter involved criminal conduct.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
GOVERNMENT MAY SUBPOENA CORNELL
|
||
|
||
(Nov. 9)
|
||
Sources close to the investigation of last week's massive virus attack say the
|
||
government may seek search warrants or subpoenas to get documents from Cornell
|
||
University before trying to interview the virus's alleged author.
|
||
AssoCiYºY‚É•ÍÍ<C38D>writer Pete Yost quotes Washington, D.C., lawyer Thomas
|
||
Guidoboni as saying he hasn't been contacted by the FBI since informing the
|
||
bureau that he was chosen on Monday to represent the suspect, 23-year-old Robert
|
||
T. Morris Jr., a Cornell graduate student.
|
||
Says Guidoboni, "The ball's in their court. We're waiting to hear from them."
|
||
Yost notes that earlier the FBI had sought to question Morris, but that was
|
||
before Guidoboni was retained. The lawyer told AP he didn't think "we'll have
|
||
enough information by the end of this week" to determine whether to talk to the
|
||
FBI. He says he wants to talk more with his client before deciding what course
|
||
to take.
|
||
Says the wire service, "The possibility of seeking grand jury subpoenas or a
|
||
search warrant for data at Cornell that could shed light on the computer virus
|
||
incident was considered (yesterday) within the FBI. It was discarded as being
|
||
unnecessary and then revived in discussions with Justice Department lawyers,
|
||
said the sources, speaking on condition of anonymity."
|
||
Meanwhile, Cornell Vice President M. Stuart Lynn reiterated that the
|
||
university will cooperate fully with the investigation.
|
||
Morris, son of acclaimed computer security expert Robert Morris Sr. of Arnold,
|
||
Va., has not been formally charged. Still, he is widely alleged to be the person
|
||
who created the virus that paralyzed some 6,000 networked Unix-based computers
|
||
on the Pentagon-backed ARPANET network and other systems for about 36 hours last
|
||
week.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
"BRAIN VIRUS" APPEARS IN HOUSTON
|
||
|
||
(Nov. 9)
|
||
A version of the so-called "Brain virus," a rogue program believed to have
|
||
originated in Pakistan, now has cropped up in computers used by University of
|
||
Houston business students. Texas officials say that the virus, while a nuisance,
|
||
has posed no real problem.
|
||
University research director Michael Walters told The Associated Press, "It
|
||
probably hasn't cost us much, except a few days of people-time to clean up these
|
||
disks, but it probably cost the students a good bit of frustration."
|
||
Some students report they have lost data, but Walters told the wire service he
|
||
knows of no one who has lost an entire term paper or other large quantity of
|
||
work. Nonetheless, reports still were coming in from students late yesterday.
|
||
This version of the Brain virus, which last spring was traced to a computer
|
||
store in Lahore, Pakistan, announced itself at the university early last week on
|
||
the screen of one of the 150 PCs the business department has for students and
|
||
faculty. Walters said the virus hasn't spread to the school's larger computers.
|
||
AP quotes Walters as saying the virus flashed this message (with these
|
||
misspellings) to students who tried to use infected programs:
|
||
"Welcome to the dungeon. Copyright 1968 Brain & Amjads, PVT, LTD. Virus shoe
|
||
record V9.0. Dedicated to the dynamic memory of millions of virus who are no
|
||
longer with us today -- Thank Goodness. BEWARE OF THE VIRUS. This program is
|
||
catching. Program follows after these messeges."
|
||
The original "Brain" virus -- which appeared in May at colleges and businesses
|
||
along the East Coast and in the computers of The Providence, R.I.,
|
||
Journal-Bulletin newspaper -- flashed the "Welcome to the Dungeon" message, but
|
||
added "Contact us for vaccination." It also gave names, an address and a phone
|
||
number of two brothers who run a Lahore, Pakistan, computer store.
|
||
Walters said the Houston version of the virus says nothing about any vaccine,
|
||
and the "V9.0" in its message suggests it may be a modified version.
|
||
Before this, the most recent sighting of the "Brain" virus was at Business
|
||
International, a Hong Kong financial operation. It was thought to be the first
|
||
reported digital infection of a commercial business in the East. The firm is
|
||
believed not to have suffered any major damage.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
UNIX EXPERT SAYS VIRUS "PANIC" UNNECESSARY, BLAMES BAD PLANNING
|
||
|
||
(Nov. 10)
|
||
An expert on the Unix operating system says that much of last week's "panic"
|
||
over the virus that brought down some 6,000 networked computers was caused by
|
||
poor management technique.
|
||
In a statement from his Rescue, Calif., offices, newsletter editor Bruce
|
||
Hunter said, "Most of the damage was done by the organizations themselves, not
|
||
the virus."
|
||
Hunter, who edits Root, a bimonthly Unix administration and management journal
|
||
published by InfoPro Systems, observed that more than 50,000 users were
|
||
reportedly cut off at a single site due to last week's virus, and that more than
|
||
a million people are believed to have been directly affected.
|
||
However, Hunter said, "By dropping network connections, administrators were
|
||
ensuring that the virus was winning. Good communications and information sharing
|
||
between administrators is what helped people on the network find and implement a
|
||
solution to the virus quickly."
|
||
Hunter, who also is an author and mainframe Unix system manager, said that one
|
||
job of an administrator is to keep all system resources available to users, and
|
||
another is to "go around searching for possible trouble."
|
||
He said the most important lesson learned from last week's virus was that a
|
||
definite plan is imperative to avoid inappropriate reactions.
|
||
Hunter made these suggestions to managers:
|
||
-:- Develop a set of scenarios and responses for future virus attacks as well
|
||
as physical disasters.
|
||
-:- Keep a printed list of system administrators at all company sites.
|
||
-:- Establish a central point of information.
|
||
-:- Coordinate an emergency response task force of key personnel.
|
||
-:- Keep current off-site backups of all data.
|
||
-:- Perform regular security audits.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
FBI LOOKING AT WIDE RANGE OF POSSIBLE VIOLATIONS IN VIRUS CASE
|
||
|
||
(Nov. 10)
|
||
The FBI now is looking at a wide range of possible federal violations in
|
||
connection with last week's massive computer virus incident, ranging beyond the
|
||
bureau's original focus on the provisions of the Computer Fraud and Abuse Act of
|
||
1986.
|
||
That was the word today from FBI Director William Sessions, who told a news
|
||
conference in Washington that the FBI is trying to determine whether statutes
|
||
concerning wire fraud, malicious mischief or unlawful access to stored
|
||
communications may have been broken.
|
||
The Associated Press notes that earlier the FBI had said it was concentrating
|
||
on the 1986 Computer Fraud and Abuse Act, which prohibits fraud or related
|
||
activity in connection with computers.
|
||
The FBI chief said, "We often look at intent as being knowing and intentional
|
||
doing of an act which the law forbids and knowing that the law forbids it to be
|
||
done. But we also have other statutes which deal simply with knowingly doing
|
||
something."
|
||
The wire service observed the following about two statutes to which Sessions
|
||
referred:
|
||
-:- The malicious mischief statute provides a maximum 10-year prison term for
|
||
anyone who wilfully interferes with the use of any communications line
|
||
controlled by the US government.
|
||
-:- The unlawful access law makes it a crime to prevent authorized access to
|
||
electronic communications while they are in electronic storage and carries a
|
||
maximum six-month jail term absent malicious destruction or damage.
|
||
Sessions also told reporters the preliminary phase of the bureau's criminal
|
||
investigation probably will be completed in the next two weeks.
|
||
As reported here earlier, authorities think 23-year-old Cornell University
|
||
student Robert T. Morris created the virus that disrupted thousands of networked
|
||
computers last week. However, Morris has not yet been charged with any crime.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
MICHIGAN WEIGHS ANTI-VIRUS LAW
|
||
|
||
(Nov. 15)
|
||
Michigan lawmakers soon will consider a proposed state law that would impose
|
||
felony penalties against anyone convicted of creating or spreading computer
|
||
"viruses."
|
||
Sponsoring the bill, Republican Sen. Vern Ehlers told United Press
|
||
International, "Because this is a new type of crime, it is essential we address
|
||
it directly with a law that deals with the unique nature of computers."
|
||
Citing this month's virus attack on military and research computers linked by
|
||
ARPANET and other networks, Ehlers added, "The country recently saw how quickly
|
||
a virus can spread through network users. The Defense Department and its
|
||
contractors were extremely fortunate that the virus was relatively harmless."
|
||
The senator said his bill, still being drafted, is expected to include
|
||
provisions making it a felony for anyone to deliberately introduce a virus into
|
||
a computer system.
|
||
UPI notes Ehlers is a physicist with a Ph.D who has 30 years' experience with
|
||
computers.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
VIRUS STRIKES CALIF. MACINTOSHES
|
||
|
||
(Nov. 15)
|
||
Students at Southern California universities were being warned today of a
|
||
rapidly spreading West German virus that reportedly is disrupting functions of
|
||
Apple Macintosh computers.
|
||
"In general, this thing is spreading like mad," Chris Sales, computer center
|
||
consultant at California State University at Northridge, told The Associated
|
||
Press. "It originated in West Germany, found its way to UCLA and in a short time
|
||
infected us here."
|
||
AP quotes school officials as saying that at least a dozen Macs at the
|
||
suburban San Fernando Valley campus have been infected since the virus first
|
||
cropped up last week. Cal State says the virus apparently does not erase data,
|
||
but that it does stall the computers and removal requires hours of
|
||
reprogramming.
|
||
The wire service said students' disks are "being tested for the virus" before
|
||
they can rent a Mac0aì the`µ+Ë•ÉÍ¥Ñå<C391>½½Íѽɕ¹j
|
||
@"--CÒarlY.½Ý•¹5
|
||
|
||
|
||
|
||
COMPUTER SECURITY EXPERT OFFERS TIPS
|
||
|
||
(Nov. 15)
|
||
The need to protect against computer viruses has heralded the end of the
|
||
user-friendly computer era, says one security expert.
|
||
According to Government Computer News, Sanford Sherizen, president of Data
|
||
Security Systems Inc. of Natick, Mass. said the objective now is to make
|
||
software bullet-proof, not accessible.
|
||
He said that since the advent of computers in offices, managers have been
|
||
faced with the conflicting needs of protecting the data versus producing it.
|
||
Data must be accessible to those who need it and yet at the same time secure
|
||
from those who can alter, delete, destroy, disclose or steal it or steal
|
||
computmò!hardware.
|
||
Sherizen told GCN reporter Richard A. Danca that non- technical managers can
|
||
contribute to computer security as advocates and facilitators. Users must learn
|
||
that security is a part of their jobs.
|
||
He predicted that security managers will soon use biometric security measures
|
||
such as comparing retinal blood vessels or fingerprints. Needless to say, such
|
||
techniques raise complicated issues of civil liberties and privacy.
|
||
Sherizen said that all information deserves protection.
|
||
--Cathryn Conroy
|
||
|
||
|
||
|
||
VIRUS THREAT SAID EXAGGERATED
|
||
|
||
(Nov. 16)
|
||
Because of the latest reports of attacks by computer "viruses," some in the
|
||
industry are ready to blame such rogue programs for anything that goes wrong.
|
||
However, expert Charles Wood told a 15th annual computer security conference
|
||
in Miami Beach, Fla., this week, "Out of over 1,400 complaints to the Software
|
||
Service Bureau this year, in only 2 percent of the cases was an electronic virus
|
||
the cause of the problem. People are jumping to the conclusion that whenever a
|
||
system slows down, it's a virus that's responsible."
|
||
The Associated Press reports that Wood and other panelists cautioned that
|
||
computer-dependent companies should focus more on the day-to-day breakdowns
|
||
caused by human error than on viruses.
|
||
President Steve Irwin of LeeMah Datacom Security Corp. told the conference
|
||
that this month's virus assault on networked computers on the ARPANET system
|
||
"could be a cheap lesson."
|
||
Said Irwin, "We were lucky because it was not a real malicious attempt ... If
|
||
(the virus' author) had ordered the programs to be erased, the loss could have
|
||
gone into billions, lots of zeroes."
|
||
AP quoted Wood as adding, "The virus is the hot topic right now, but actually
|
||
the real important subject is disaster recovery planning. But that's not as
|
||
glamorous as the viruses."
|
||
--Charles Bowen
|
||
|
||
|
||
FBI SEIZES MORRIS RECORDS IN PROBE OF NATIONAL VIRUS CASE
|
||
|
||
(Nov. 17)
|
||
While young Robert T. Morris Jr. still has not been charged with anything in
|
||
connection with the nation's largest computer virus case, the FBI now reveals
|
||
that items it has seized so far in its probe include magnetic tapes from Morris'
|
||
computer account at Cornell University.
|
||
The Associated Press reports that documents released by the FBI late yesterday
|
||
say investigators seized "two magnetic tapes labeled `files from Morris account
|
||
including backups' and hard copy related thereto" from Dean Krafft, a research
|
||
associate in computer science at Cornell, where the 23- year-old Morris is a
|
||
graduate student.
|
||
AP says the agents also obtained "two yellow legal pads with calculus and
|
||
assorted notes." Associate university counsel Thomas Santoro had taken the legal
|
||
pads from an office in Upson Hall, a campus building that contains computer
|
||
science classrooms and offices, AP says.
|
||
Even though Morris hasn't been charged, it has been widely reported that the
|
||
young man told friends he created the virus tHa¸ stymied an estimated 6,200
|
||
Unix- based computers on ARPANET and other networks for some 36 hours earlier
|
||
this month.
|
||
As reported, the FBI is conducting a criminal investigation to determine
|
||
whether statutes concerning wire fraud, malicious mischief or unlawful access to
|
||
stored communications may have been violated.
|
||
AP quotes these latest FBI documents as saying that US District Judge Gustave
|
||
J. DiBianco in the northern district of New York in Syracuse issued two warrants
|
||
on Nov. 10 for the Cornell searches. The FBI searches were conducted that same
|
||
afternoon.
|
||
"The government had said earlier that it might try to obtain documents from
|
||
the university before interviewing Morris," AP observes, "and Cornell's vice
|
||
president for information technologies, M. Stuart Lynn, had said the university
|
||
would cooperate fully with the investigation."
|
||
--Charles Bowen
|
||
|
||
|
||
SPA FORMS GROUP TO KNOCK DOWN RUMORS ABOUT COMPUTER VIRUSES
|
||
|
||
(Nov. 17)
|
||
Upset over wild rumors about the destructiveness of computer viruses, the
|
||
Software Publisher Association has formed a special interest group to address
|
||
computer security.
|
||
In a statement released today at the Comdex trade show in Las Vegas, SPA says
|
||
its new Software Security SIG will help distribute information and serve as
|
||
liaison for software publishers, industry analysts and consultants.
|
||
McGraw-Hill News quotes SPA member Ross Greenberg, president of Software
|
||
Concepts Design, as saying, "Recent unsubstantiated statements regarding the
|
||
actual damage caused by viruses...has caused more of X´Õ‰±¥<C2B1><C2A5>fervor than served
|
||
as a public service."
|
||
At the SIG's organizational meeting, several companies discussed setting
|
||
standards on how to educate the public regarding viruses and various anti-viral
|
||
products now being advertised.
|
||
--Charles Bowen
|
||
|
||
|