1235 lines
68 KiB
Plaintext
1235 lines
68 KiB
Plaintext
The following text is copyright (c) 1987-1990 CompuServe Magazine
|
||
and may not be reproduced without the express written permission of CompuServe.
|
||
|
||
CompuServe Magazine's Virus History Timeline
|
||
|
||
CompuServe Magazine is published monthly by the CompuServe Information
|
||
Service, the world's largest on-line information service with over 600,000
|
||
subscribers worldwide.
|
||
|
||
If you would like to become a CompuServe subscriber, call
|
||
1-800-848-8199 to receive a copy of the CompuServe Information Service
|
||
membership kit.
|
||
|
||
|
||
- 1989 -
|
||
|
||
|
||
VIRUS STRIKES UNIVERSITY OF OKLA.
|
||
|
||
(Jan. 11)
|
||
Officials at the University of Oklahoma in Norman, Okla., blame a computer
|
||
virus for ruining several students' papers and shutting down terminals and
|
||
printers in a student lab at the university library.
|
||
Manager Donald Hudson of Bizzell Memorial Library told The Associated Press
|
||
that officials have purged the library computers of the virus. He said the
|
||
library also has set up extra computers at its lab entrance to inspect students'
|
||
programs for viruses before they are used on other computers.
|
||
The wire service said the library's virus probably got into a computer through
|
||
a student's disk, but the student may not have known the virus was there. Hudson
|
||
said the library's computers are not linked to any off-campus systems. However,
|
||
the computers are connected through printers, which he said allowed the virus to
|
||
spread.
|
||
--Charles Bowen
|
||
|
||
|
||
"FRIDAY THE 13TH" VIRUS STRIKES
|
||
|
||
(Jan. 13)
|
||
Data files and programs on personal computers throughout Britain apparently
|
||
were destroyed today by what was termed a "Friday the 13th" computer virus.
|
||
Alan Solomon, managing director of S and S Enterprises, a British data
|
||
recovery center, told The Associated Press that hundreds of users of IBM and
|
||
compatible PCs reported the virus, which he said might be a new species.
|
||
Solomon, who also is chairman of an IBM users group, told the wire service
|
||
that phone lines to the center were busy with calls for help from businesses and
|
||
individuals whose computers were struck by the virus.
|
||
"It has been frisky," he said, "and hundreds of people, including a large firm
|
||
with over 400 computers, have telephoned with their problems."
|
||
S and S hopes to figure out how the virus operates and then attempt to disable
|
||
it. "The important thing is not to panic and start trying to delete everything
|
||
in a bid to remove the virus," Solomon said. "It is just a pesky nuisance and is
|
||
causing a lot of problems today."
|
||
--Charles Bowen
|
||
|
||
|
||
"FRIDAY THE 13TH" VIRUS MAY BE NEW VERSION OF ONE FROM ISRAEL
|
||
|
||
(Jan. 14)
|
||
Investigators think the "Friday the 13th" virus that struck Britain yesterday
|
||
might be a new version of the one that stymied computers at the Hebrew
|
||
University in Jerusalem on another Friday the 13th last May.
|
||
As reported here yesterday (GO OLT-308), hundreds of British IBM PCs and
|
||
compatibles were struck by the virus, which garbled data and deleted files.
|
||
Jonathan Randal of The Washington Post Foreign Service reports the program is
|
||
being called the "1,813" variety, because of the number of unwanted bytes it
|
||
adds to infected software.
|
||
He says the specialists are convinced the program "is the brainchild of a
|
||
mischievous -- and undetected -- computer hacker at Hebrew University."
|
||
Alan Solomon, who runs the IBM Personal Computer User Group near London, told
|
||
the Post wire service that 1,813 was relatively benign, "very minor, just a
|
||
nuisance or a practical joke."
|
||
Solomon said he and other specialists first noted the virus in Britain several
|
||
months ago when it began infecting computers. Solomon's group wrote security
|
||
software with it distributed free, so, he said, the virus basically struck only
|
||
the unlucky users who didn't take precautions.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
LIBRARY OF CONGRESS VIRUS VICTIM
|
||
|
||
(Jan. 27)
|
||
An official with the US Library of Congress acknowledges that the institution
|
||
was struck by a computer virus last fall.
|
||
Speaking to a delegation of Japanese computer specialists touring Washington,
|
||
D.C., yesterday, Glenn McLoughlin of the library's Congressional Research
|
||
Service disclosed that a virus was spotted and killed out of the main catalog
|
||
computer system before it could inflict any damage to data files.
|
||
Associated Press writer Barton Reppert quoted McLoughlin as saying, "It was
|
||
identified before it could spread or permanently erase any data."
|
||
McLoughlin added the virus was found after personnel logged onto computers at
|
||
the library and noticed they had substantially less memory space to work with
|
||
than they had expected.
|
||
He said the virus apparently entered the system through software obtained from
|
||
the University of Maryland. "We don't know," he said, "whether it was a student
|
||
at Maryland, or whether Maryland had gotten it from somebody else. That was
|
||
simply the latest point of departure for the software."
|
||
Meanwhile, Reppert also quoted computer security specialist Lance J. Hoffman
|
||
of George Washington University as saying the world may be heading toward a
|
||
catastrophic computer failure unless more effective measures are taken to combat
|
||
viruses.
|
||
Comparing last November's virus assault on the Pentagon's ARPANET network to a
|
||
nuclear accident that "could have had very disastrous consequences for our
|
||
society," Hoffman told the visitors, "It wasn't Chernobyl yet, it was the Three
|
||
Mile Island -- it woke a lot of people up."
|
||
Online Today has been following reports of viruses for more than a year now.
|
||
For background files, type GO OLT-2039 at any prompt. And for other stories from
|
||
The Associated Press, type GO APO.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
CHRISTMAS VIRUS FROM FRANCE?
|
||
|
||
(Jan 30)
|
||
A little noticed software worm, the so-called Christmas Decnet virus, may
|
||
have originated from Germany or France. Apparently released at the end of
|
||
December, the worm replicated itself only onto Digital Equipment Corp. computers
|
||
that were connected to Decnet, a national communications network often accessed
|
||
by DEC users.
|
||
At least one system administrator has noticed that the worm collected
|
||
identifying information from the invaded terminals and electronically mailed
|
||
that information to a nedw<64>rk`<60><><EFBFBD><EFBFBD>J<EFBFBD><4A>2<EFBFBD>ancen T<>e ass<73>mptZ<74>J́that the French
|
||
node collected the information and, subsequently, used it to propagate the worm
|
||
throughout the network.
|
||
The so-called German connection came about because of the way the worm
|
||
presents text information on invaded terminals. Though written in English, the
|
||
worm message is said to contain strong indications of Germanic language syntax.
|
||
Predictably, a German "connection" has led to speculation that Germany's Chaos
|
||
Computer Club may have had a role in worm's creation.
|
||
--James Moran
|
||
|
||
|
||
|
||
SPLIT SEEN ON HOW TO PROSECUTE MAN ACCUSED OF ARPANET VIRUS
|
||
|
||
(Feb. 2)
|
||
Authorities apparently are divided over how to prosecute Robert T. Morris Jr.,
|
||
the 23- year-old Cornell University graduate student suspected of creating the
|
||
virus that stymied the national Arpanet computer network last year.
|
||
The New York Times reports today these two positions at issue:
|
||
-:- US Attorney Frederick J. Scullin in Syracuse, N.Y., wants to offer Morris
|
||
a plea bargain to a misdemeanor charge in exchange for information he could
|
||
provide. Scullin reportedly already has granted Morris limited immunity in the
|
||
case.
|
||
-:- Some in the US Justice Department want Morris charged with a felony in
|
||
hopes of deterring similar computer attacks by others. They are angry over
|
||
Morris's receiving limited immunity.
|
||
Confirming a report in The Times, a source who spoke on condition of anonymity
|
||
told Associated Press writer Carolyn Skorneck the idea of granting Morris
|
||
limited immunity has "caused a lot of consternation down here."
|
||
Skorneck notes the 1986 Computer Fraud and Abuse Act makes unlawful access to
|
||
a government computer punishable by up to a year in jail and a $250,000 fine. If
|
||
fraud is proved, the term can reach 20 years in prison.
|
||
The source told AP, "As far as we're concerned, the legal problem was still
|
||
(Morris's) intent." In other words, officials apparently are uncertain whether
|
||
Morris had planned to create and spread the virus that infected some 6,000
|
||
government computers on the network last Nov. 2.
|
||
As reported earlier, Morris allegedly told friends he created the virus but
|
||
that he didn't intend for it to invade the Unix- based computers linked to
|
||
Arpanet.
|
||
Skorneck says Mark M. Richard, the Justice Department official who is
|
||
considering what charges should be brought in the case, referred questions to
|
||
the FBI, which, in turn, declined to discuss the case because it is an ongoing
|
||
investigation.
|
||
0H<30>weverl S۷]<5D>֭<EFBFBD><D6AD> <20><><EFBFBD><EFBFBD>-<2D>said he understood the FBI was extremely upset over
|
||
the limited immunity granted to Morris.
|
||
Meanwhile, Morris's attorney, Thomas Guidoboni of Washington, D.C., said no
|
||
plea bargain had been worked out, "They have not told me," he said, "what
|
||
they've recommended, and I've not offered on behalf of my client to plead guilty
|
||
to anything. I have told p(Y[<5B>W<EFBFBD><57><EFBFBD><EFBFBD>t plead guilty to a felony. I'm very
|
||
emphatic about that."
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
FEDERAL GROUP FIGHTS VIRUSES
|
||
|
||
(Feb. 3)
|
||
The Computer Emergency Response Team (CERT) has been formed by the Department
|
||
of Defense and hopes to find volunteer computer experts who will help federal
|
||
agencies fight computer viruses. CERT's group of UNIX experts are expected to
|
||
help users when they encounter network problems brought on by worms or viruses.
|
||
A temporary group that was formed last year after Robert T. Morris Jr.
|
||
apparently let loose a bug that infected the Department of Defense's Advanced
|
||
Project Agency network (ARPANET), will be disbanded.
|
||
The Morris case has some confusing aspects in that some computer groups have
|
||
accused federal prosecutors with reacting hysterically to the ARPANET infection.
|
||
It has been pointed out that the so-called Morris infection was not a virus, and
|
||
that evidence indicates it was released onto the federal network accidentally.
|
||
CERT is looking toward ARPANET members to supply its volunteers. Among those
|
||
users are federal agencies, the Software Engineering Institute and a number of
|
||
federally-funded learning institutions. Additional information is available from
|
||
CERT at 412/268- 7090.
|
||
--James Moran
|
||
|
||
|
||
|
||
COMPUTER VIRUSES HOT ISSUE IN CONGRESS
|
||
|
||
(Feb. 3)
|
||
One of the hottest high-tech issues on Capitol Hill is stemming the plague of
|
||
computer viruses.
|
||
According to Government Computer News, Rep. Wally Herger (R-Calif.) has
|
||
pledged to reintroduce a computer virus bill that failed to pass before the
|
||
100th Congress adjourned this past fall. The measure will create penalties for
|
||
people who inject viruses into computer systems.
|
||
"Unfortunately, federal penalties for those who plant these deadly programs do
|
||
not currently exist," said Herger. "As a result, experts agree that there is
|
||
little reason for a hacker to even think twice about planting a virus." (Herger
|
||
then later corrected himself saying those who plant viruses are not hackers but
|
||
rather criminals.)
|
||
GCN notes that the bill calls for prison sentences of up to 10 years and
|
||
extensive fines for anyone convicted of spreading a computer virus. It would
|
||
also allow for civil suits so people and businesses could seek reimbursement for
|
||
system damage caused by a virus attack.
|
||
If the bill is referred to the Judiciary Committee, as is likely, it stands a
|
||
reasonable chance of passage. Rep. Jack Brooks, a longtime technology
|
||
supporter, is the new head of that committee and he has already stated that the
|
||
new position will not dampen his high-tech interests.
|
||
-- Cathryn Conroy CONGRESS LOOKS AT ANOTHER COMPUTER PROTECTION BILL
|
||
|
||
(Feb. 27)
|
||
The Computer Protection Act (HR 287) is the latest attempt by Congress to
|
||
battle computer viruses and other forms of sabotage on the high-tech machines.
|
||
Introduced by Rep. Tom McMillan (D-Md.), the bill calls for a maximum of 15
|
||
years in prison with fines of $100,000 to $250,000 for those convicted of
|
||
tampering with a computer, be it hardware or software.
|
||
"With the proliferation of various techniques to tamper with computers, we
|
||
need to fill the void in federal law to deal with these criminals," said
|
||
McMillan. "This legislation will send the clear signal that infiltrating
|
||
computers is not just a cute trick; it's against the law."
|
||
The bill, which has been referred to the Judiciary Committee, is written quite
|
||
broadly and is open to interpretation.
|
||
-- Cathryn Conroy
|
||
|
||
|
||
|
||
VIRUS CREATOR FOUND DEAD I<>!39
|
||
|
||
(March 17)
|
||
A Californian who said he and one of his students created the first computer
|
||
virus seven years ago as an experiment has been found dead at 39 following an
|
||
apparent aneurysm of the brain.
|
||
Jim Hauser of San Luis Obispo died Sunday night or Monday morning, the local
|
||
Deputy Coroner, Ray Connelly, told The Associated Press.
|
||
Hauser once said he and a student developed the first virus in 1982, designing
|
||
it to give users a "guided tour" of an Apple II. He said that, while his own
|
||
program was harmless, he saw the potentially destructive capability of what he
|
||
termed an "electronic hitchhiker" that could attach itself to programs without
|
||
being detected and sneak into private systems.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
HOSPITAL STRUCK BY COMPUTER VIRUS
|
||
|
||
(March 22)
|
||
Data on two Apple Macintoshes used by a Michigan hospital was altered recently
|
||
by one or more computer viruses, at least one of which apparently traveled into
|
||
the system on a new hard disk that the institution bought.
|
||
In its latest edition, the prestigious New England Journal of Medicine quotes
|
||
a letter from a radiologist at William Beaumont Hospitals in Royal Oak, Mich.,
|
||
that describes what happened when two viruses infected computers used to store
|
||
and re!d)nuclear scans that are taken to diagnose patients' diseases.
|
||
The radiologist, Dr. Jack E. Juni, said one of the viruses was relatively
|
||
benign, making copies of itself while leaving other data alone. However, the
|
||
second virus inserted itself into programs and directories of patient
|
||
information and made the machines malfunction.
|
||
"No lasting harm was done by this," Juni wrote, because the hospital had
|
||
backups, "but there certainly was the potential."
|
||
Science writer Daniel Q. Haney of The Associated Press quoted Juni's letter as
|
||
saying about three-quarters of the programs stored in0t<30>e`<60><>j<EFBFBD><6A>II@PCs were
|
||
infected.
|
||
Haney said Juni did not know the origin of the less harmful virus, "but the
|
||
more venal of the two apparently was on the hard disk of one of the computers
|
||
when the hospital bought it new. ... The virus spread from one computer to
|
||
another when a doctor used a word processing program on both machines while
|
||
writing a medical paper."
|
||
Juni said the hard disk in question was manufactured by CMS Enhancements of
|
||
Tustin, Calif.
|
||
CMS spokesman Ted James confirmed for AP that a virus was inadvertently put on
|
||
600 hard disks last October.
|
||
Says Haney, "The virus had contaminated a program used to format the hard
|
||
disks. ... It apparently got into the company's plant on a hard disk that had
|
||
been returned for servicing. James said that of the 600 virus-tainted disks, 200
|
||
were shipped to dealers, and four were sold to customers."
|
||
James also said the virus was "as harmless as it's possible to be," that it
|
||
merely inserted a small piece of extra computer code on hard disks but did not
|
||
reproduce or tamper with other material on the disk. James told AP he did not
|
||
think the Michigan hospital's problems actually were caused by that virus.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
|
||
MORE HOSPITALS STRUCK BY VIRUS
|
||
|
||
(March 23)
|
||
The latest computer virus attack, this one on hospital systems, apparently was
|
||
more far- reaching than originally thought.
|
||
As reported here, a radiologist wrote a letter to the New England Journal of
|
||
Medicine detailing how data on two Apple Macintoshes used by the William
|
||
Beaumont Hospital in Royal Oak, Mich., was altered by one or more computer
|
||
viruses. At least one of the viruses, he said, apparently traveled into the
|
||
system on a new hard disk the institution bought.
|
||
Now Science writer Rob Stein of United Press International says the virus --
|
||
possibly another incarnation of the so-called "nVIR" virus -- infected computers
|
||
at three Michigan hospitals last fall. Besides the Royal Oak facility, computers
|
||
at another William Beaumont Hospital in Troy, Mich., were infected as were some
|
||
desktop units at the University of Michigan Medical Center in Ann Arbor.
|
||
Stein also quoted Paul Pomes, a virus expert at the Universh<73>y of Illinois in
|
||
Champaign, as saying this was the first case he h<>@`<60>YX.z<><7A>J<EFBFBD><4A><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>5Rh<EFBFBD><EFBFBD>$Vkɭ<6B>ѕ<EFBFBD><D195>a computer used for patient care or diagnosis in a hospital.
|
||
However, he added such disruptions could become more common as personal
|
||
computers are used more widely in hospitals.
|
||
The virus did not harm any patients but reportedly did delay diagnoses by
|
||
shutting down computers, creating files of non-existent patients and garbling
|
||
names on patient records, which could have caused more serious problems.
|
||
Dr. Jack Juni, the radiology who reported the problem in the medical journal,
|
||
said the virus "definitely did affect care in delaying things and it could have
|
||
affected care in terms of losing this information completely." He added that if
|
||
patient information had been lost, the virus could have forced doctors to repeat
|
||
tests that involve exposing patients to radiation. Phony and garbled files could
|
||
have caused a mix-up in patient diagnosis. "This was information we were using
|
||
to base diagnoses on," he said. "We were lucky and caught it in time."
|
||
Juni said the virus surfaced when a computer used to display images used to
|
||
diagnose cancer and other diseases began to malfunction at the 250-bed Troy
|
||
hospital last August. In October, Juni discovered a virus in the computer in the
|
||
Troy hospital. The next day, he found the same vir<69>s2in a similar computer in
|
||
the 1,200-bed Royal Oak facility.
|
||
As noted, the virus seems to have gotten into the systems through a new hard
|
||
disk the hospitals bought, then spread via floppy disks.
|
||
The provider of the disk, CMS Enhancements Inc. of Tustin, Calif., said it
|
||
found a virus in a number of disks, removed the virus from the disks that had
|
||
not been sent to customers and sent replacement programs to distributors that
|
||
had received some 200 similar disks that already had been shipped.
|
||
However, CMS spokesman Ted James described the virus his company found as
|
||
harmless, adding he doubted it could have caused the problems Juni described.
|
||
"It was a simple non-harmful virus," James told UPI, "that had been created by a
|
||
software programmer as a demonstration of how viruses can infect a computer."
|
||
Juni, however, maintains the version of the virus he discovered was a mutant,
|
||
damaging version of what originally had been written as a harmless virus known
|
||
as "nVIR." He added he also found a second virus that apparently was harmless.
|
||
He did not know where the second virus originated.
|
||
--Charles Bowen
|
||
|
||
|
||
GOVERNMENT PLANS FOR ANTI-VIRUS CENTERS
|
||
|
||
(March 24)
|
||
Federal anti-virus response centers that will provide authentic solutions to
|
||
virus attacks as they occur will be developed by the National Institute of
|
||
Standards and Technology, reports Government Computer News.
|
||
The centers will rely on unclassified material throughout the federal
|
||
government and provide common services and communication among other response
|
||
centers.
|
||
NIST will urge agencies to establish a network of centers, each of which will
|
||
service a different use or technological constituency. They will offer
|
||
emergency response support to users, including problem-solving and
|
||
identification of resources. GCN notes they will also aid in routine information
|
||
sharing and help identify problems not considered immediately dangerous, but
|
||
which can make users or a system vulnerable to sabotage.
|
||
A prototype center called the Computer Emergency Response Team is already
|
||
operational at the Defense Advanced Research Projects Agency and will serve as a
|
||
model for the others.
|
||
Although NIST and the Department of Energy will provide start-up funds, each
|
||
agency will have to financially support its response center.
|
||
--Cathryn Conroy
|
||
|
||
|
||
|
||
MORRIS "WORM" WAS NEITHER GENIUS NOR CRIMINAL, COMMISSION SAYS
|
||
|
||
(April 2)
|
||
A Cornell University investigating commission says 23- year-old graduate
|
||
student Robert Morris acted alone in creating the rogue program that infected up
|
||
to 6,000 networked military computers last Nov. 2 and 3.
|
||
In addition, the panel's 45- page report, obtained yesterday by The Associated
|
||
Press, further concludes that while the programming by the Arnold, Md., student
|
||
was not the work of a genius, it also was not the act of a criminal.
|
||
AP says Morris, who is on a leave of absence from Cornell's doctoral program,
|
||
declined to be interviewed by the investigating commission.
|
||
Speculating on why Morris cre{<7B>fd the rogue program, the panel wrote, "It may
|
||
simply have been the unfocused intellectual meanderings of a hacker completely
|
||
absorbed with his creation and unharnessed by considerations of explicit purpose
|
||
or potential effect."
|
||
Incidentally, the panel also pointed out what others in the industry observed
|
||
last November, that the program technically was not a "virus," which inserts
|
||
itself into a host program to reproduce, but actually was a "worm," an
|
||
independent program that endlessly duplicates itself once placed in a computer
|
||
system.
|
||
As reported, Morris still is being investigated by a federal grand jury in
|
||
Syracuse, N.Y., and by the US Justice Department in Washington, D.C.
|
||
AP says the university commission rejected the idea that Morris created the
|
||
worm to point out the need for greater computer security. Says the report, "This
|
||
was an accidental byproduct of the event and the resulting display of media
|
||
interest. Society does not condone burglary on the grounds that it heightens
|
||
concern about safety and security."
|
||
The report said, "It is no act of genius or heroism to exploit such
|
||
weaknesses," adding that Morris, a first-year student, should have reported the
|
||
flaws he discovered, which would "have been the most responsible course of
|
||
action, and one that was supported by his colleagues."
|
||
The group also believes the program could have been created by many students,
|
||
graduate or undergraduate, particularly if they were aware of the Cornell
|
||
system's well-known security flaws.
|
||
The wire service quotes thg<68>eport`<60>.<2E><><EFBFBD><EFBFBD>ձ<EFBFBD>ѥ<EFBFBD><D1A5><EFBFBD>j<EFBFBD><6A>ɥ<EFBFBD>Bp<42>K<EFBFBD><4B><EFBFBD><EFBFBD><EFBFBD>wanted to
|
||
spread the worm without detection, but did not want to clog the computers. In
|
||
that regard, the commission said Morris clearly should have known the worm would
|
||
replicate uncontrollably and thus had a "reckless disregard" for the
|
||
consequences.
|
||
However, the Cornell panel also disputed some industry claims that the Morris
|
||
program caused about $96 million in damage, "especially considering no work or
|
||
data were irretrievably lost." It said the greatest impact may be a loss of
|
||
trust among scholars who use the research network.
|
||
AP says the report found that computer science professionals seem to favor
|
||
"strong disciplinary measures," but the commission said punishment "should not
|
||
be so stern as to damage permanently the perpetrator's career."
|
||
--Charles Bowen
|
||
|
||
|
||
ETHICS STUDY NEEDED IN COMPUTING
|
||
|
||
(April 4)
|
||
A Cornell University panel says education is more effective than security in
|
||
preventing students from planting rogue programs in research networks.
|
||
As reported earlier, the panel investigated the work of Cornell graduate
|
||
student Robert Morris Jr., concluding the 23-year-old Maryland man acted alone
|
||
and never intended permanent damage when he inserted a "worm" into a nationwide
|
||
research network last November.
|
||
Speaking at a press conference late yesterday in Ithaca, N.Y., Cornell Provost
|
||
Robert Barker said, "One of the important aspects of making the report public is
|
||
that we can now use it on campus in a much fuller way than we have before."
|
||
United Press International says Cornell has taken steps to improve its
|
||
computer security since the incident, but members of the committee noted that
|
||
money spent on building "higher fences" was money that could not be spent on
|
||
education.
|
||
Barker said Cornell will place a greater emphasis on educating its students on
|
||
computer ethics, and might use the recent case as an example, instead of relying
|
||
primarily on increased security to prevent similar incidents. Said the provost,
|
||
"It was the security of the national systems, and not of Cornell, that was the
|
||
problem here."
|
||
As reported, Morris's worm infected up to 6,000 Unix-based computers across
|
||
the country. A federal grand jury in Syracuse, N.Y., investigated the case and
|
||
Justice Department officials in Washington now are debating whether to prosecute
|
||
Morris.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
ILLINOIS STUDIES VIRUS LAW
|
||
|
||
(April 15)
|
||
The virus panic in some state legislatures continues as anti- virus
|
||
legislation is introduced in Illinois.
|
||
Illinois House Bill 498 has been drafted by Rep. Ellis B. Levin (D-Chicago) to
|
||
provide criminal penalties for loosing a so-called computer virus upon the
|
||
public. The bill is similar to one that has been introduced in Congress.
|
||
Rep. Levin's bill provides that a person commits "'computer tampering by
|
||
program' when he knowingly: inserts into a computer program information or
|
||
commands which, when the program is run, causes or is designed to cause the
|
||
loss, damage or disruption of a computer or its data, programs or property to
|
||
another person; or provides or offers such a program to another person."
|
||
Conviction under the legislation would result in a felony. A second
|
||
conviction would bring harsher penalties.
|
||
Currently, the bill is awaiting a hearing in the Illinois' House Judiciary II
|
||
Committee. It is expected that testimony on HB 498 will be scheduled sometime
|
||
during April.
|
||
--James Moran
|
||
|
||
|
||
ERRORS, NOT CRACKERS, MAIN THREAT
|
||
|
||
(April 28)
|
||
A panel of computer security experts has concluded that careless users pose a
|
||
greater threat than malicious saboteurs to corporate and government computer
|
||
networks.
|
||
Citing the well-publicized allegations that Cornell University graduate
|
||
student Robert T. Morris Jr. created a worm program last November that swept
|
||
through some 6,000 networked systems, Robert H. Courtney Jr. commented, "It was
|
||
a network that no one attempted to secure."
|
||
According to business writer Heather Clancy of United Press International,
|
||
Courtney, president of Robert Courtney Inc. computer security firm, said the
|
||
openness of Internet was the primary reason it was popular among computer
|
||
crackers, some of whom are less talented or more careless than others.
|
||
"People making mistakes are going to remain our single biggest security
|
||
problems," he said. "Crooks can never, ever catch up."
|
||
Sharing the panel discussion in New York, Dennis D. Steinauer, a computer
|
||
scientist with the National Institute for Standards and Technologies, added that
|
||
network users should not rely only on technological solutions for security
|
||
breaks.
|
||
"Not everyone needs all security products and mechanisms out there," he said.
|
||
"The market is not as large as it is for networking equipment in general." He
|
||
added that a standard set of program guidelines, applicable to all types of
|
||
networks, should be created to prevent mishaps. "There has been a tremendous
|
||
amount of work in computer (operating) standards. The same thing is now
|
||
happening in security."
|
||
Fellow panelist Leslie Forman, AT&T's division manager for the data systems
|
||
group, said companies can insure against possible security problems by training
|
||
employees how to use computers properly and tracking users to make sure they
|
||
aren't making potentially destructive errors. "It's not a single home run that
|
||
is going to produce security in a network," she said. "It's a lot of little
|
||
bunts."
|
||
--Charles Bowen
|
||
|
||
|
||
EXPERTS TESTIFY ON COMPUTER CRIME
|
||
|
||
(May 16)
|
||
Electronic "burglar alarms" are needed to protect US military and civilian<61>
|
||
qomputer systems, Clifford Stoll, an astronomer at the Harvard- Smithsonian
|
||
Center for Astrophysics, told a Senate Judiciary subcommittee hearing on
|
||
computer crimes, reports United Press International.
|
||
Stoll was the alert scientist who detected a 75-cent accounting error in
|
||
August 1986 in a computer program at Lawrence Berkeley Laboratory that led him
|
||
to discover a nationwide computer system had been electronically invaded by West
|
||
Germans.
|
||
"This was a thief stealing information from our country," he said. "It deeply
|
||
bothers me that there are reprobates who say, `I will steal anything I can and
|
||
sell it to whoever I want to.' It opened my eyes."
|
||
Following his discovery, Stoll was so immersed in monitoring the illegal
|
||
activity that he was unable to do any astronomy work for a year.
|
||
"People kind of look at this as a prank," Stoll said. "It's kind of funny on
|
||
the one hand. But it's people's work that's getting wiped out."
|
||
The West German computer criminals, who were later determined to have been
|
||
working for Soviet intelligence, searched the US computer network for
|
||
information on the Strategic Defense Initiative, the North American Defense
|
||
Command and the US KH-11 spy satellite. They also withdrew information from
|
||
military computers in Alabama and California, although no classified information
|
||
was on any of the computer systems.
|
||
William Sessions, FBI director, also appeared before the Senate subcommittee
|
||
and said the bureau is setting up a team to concentrate on the problem.
|
||
He explained that computer crimes are among "the most elusive to investigate"
|
||
since they are often "invisible." The FBI has trained more than 500 agents in
|
||
this area.
|
||
UPI notes that Sessions agreed to submit his recommendations to Sen. Patrick
|
||
Leahy (D-Vt.), the subcommittee chairman, for new laws that could be used to
|
||
protect sensitive computer networks from viruses. Currently, there are no
|
||
federal laws barring computer viruses.
|
||
The FBI is working with other federal agencies to assess the threat of such
|
||
crimes to business and national security.
|
||
William Bayes, assistant FBI director, told the senators he likens a computes<65>
|
||
to a house with locks on the door. He explained that he has placed a burglar
|
||
alarm on his computer at Berkeley, programming it to phone him when someone
|
||
tries to enter it. He said more computer burglar alarms may be needed.
|
||
-- Cathryn Conroy
|
||
|
||
|
||
MASS. CONSIDERS NEW INTRUSION LAW
|
||
|
||
(May 21)
|
||
In Boston, a state senator has offered a bill that would make it a violation
|
||
of Massachusetts law to enter a computer without authorization. It also would
|
||
level penalties against those caught planting so-called computer "viruses."
|
||
Sen. William Keating, the bill's sponsor, told The Associated Press his
|
||
measure considers this new category of crime to be analogous to breaking into a
|
||
building.
|
||
"It's an attempt," Keating added, "to put on the statutes a law that would
|
||
penalize people for destruction or deliberate modification or interference with
|
||
computer properties. It clarifies the criminal nature of the wrongdoing and, I
|
||
think, in that sense serves as a deterrent and makes clear that this kind of
|
||
behavior is criminal activity."
|
||
The senator credits a constituent, Elissa Royal, with the idea for the bill.
|
||
Royal, whose background is in hospital administration, told AP, "I heard about
|
||
(computer) viruses on the news. My first thought was the clinical pathology
|
||
program. Our doctors would look at it and make all these decisions without
|
||
looking at the hard copy. I thought, what if some malevolent, bright little
|
||
hacker got into the system and changed the information? How many people would be
|
||
injured or die?"
|
||
Keating's bill would increase penalties depending on whether the attacker
|
||
merely entered a computer, interfered with its operations or destroyed data. In
|
||
the most serious case, a person found guilty of knowingly releasing a virus
|
||
would be subject to a maximum of 10 years in prison or a $25,000 fine.
|
||
AP says the bill is pending in committee, as staff members are refining its
|
||
language to carefully define the term "virus."
|
||
--Charles Bowen
|
||
|
||
|
||
COMPUTER VACCINE MARKET THRIVES ON USER FEAR
|
||
|
||
(May 23)
|
||
The computer protection market is thriving. The reason? Fear. Fear of the
|
||
spread of computer viruses and worms has caused a boom in products that are
|
||
designed to protect unwitting users from the hazards of high- tech diseases.
|
||
According to the Dallas Morning News, there is a surging cottage industry
|
||
devoted to creating "flu shots" and "vaccines" in the form of software and
|
||
hardware; however, many of these cures are nothing more than placebos.
|
||
"There's a protection racket springing up," said Laura A. DiDio, senior editor
|
||
of Network World, the trade publication that sponsored a recent executive
|
||
roundtable conference in Dallas on "Network Terrorism."
|
||
Last year alone, American businesses lost a whopping $555.5 million, 930 years
|
||
of human endeavor and 15 years of computer time from unauthorized access to
|
||
computers, according to statistics released by the National Center for computer
|
||
Crime Data in Los Angeles, Calif.
|
||
The most difficult systems to protect against viruses are computer networks
|
||
since they distribute computing power throughout an organization. Despite the
|
||
threat, sales are thriving. Market Intelligence Research says sales of <08><>sonalM
|
||
com<EFBFBD>utѶ<EFBFBD>5<EFBFBD>ݽ<EFBFBD><EFBFBD><EFBFBD>q<EFBFBD><EFBFBD>equipment grew 50 percent last year and are expected to
|
||
grow another 41 percent this year to $929.5 million.
|
||
Meanwhile, the Computer Virus Industry Association says that the number of
|
||
computer devices infected by viruses in a given month grew last year from about
|
||
1,000 in January to nearly 20,000 in November and remained above 15,000 in
|
||
December.
|
||
-- Cathryn Conroy
|
||
|
||
|
||
|
||
MORRIS SUSPENDED FROM CORNELL
|
||
|
||
(May 25)
|
||
Robert T. Morris, the 23-year-old graduate student whose "worm" program
|
||
brought down some 6,000 networked government and scientific computers last
|
||
November, has been suspended from Cornell University.
|
||
The New York Times reported today Cornell officials have ruled that Morris, a
|
||
first-year graduate student, violated the school's Code of Academic Integrity.
|
||
The paper quoted a May 16 letter to Morris in which Alison P. Casarett, dean
|
||
of Cornell's graduate school, said the young man will be suspended until the
|
||
beginning of the 1990 fall semester. Casarett added that if Morris wants to
|
||
reapply, the decision to readmit him will be made by the graduate school's
|
||
computer science faculty.
|
||
The Times says the letter further states the decision to suspend Morris was an
|
||
academic ruling and was not related to any criminal charges Morris might face.
|
||
No criminal charges have been levied against Morris so far. A federal grand
|
||
jury earlier forwarded its recommendations to the US Justice Department, but no
|
||
action has been taken.
|
||
As reported last month, a Cornell University commission has said Morris'
|
||
action in creating and accidentally releasing the worm program into the ARPANET
|
||
system of Unix-based computers at universities, private corporations and
|
||
military installations was "a juvenile act that ignored the clear potential
|
||
consequences."
|
||
While the Morris worm did not destroy data, it forced the shut- down of many
|
||
of the systems for up to two days while they were cleared of the rogue program.
|
||
--Charles Bowen
|
||
|
||
|
||
PENDING COMPUTER LAWS CRITICIZED
|
||
|
||
(June 18)
|
||
Computer attorney Jonathan Wallace says that the virus hystY<74>ZX<5A>ѥ<EFBFBD><D1A5><EFBFBD>hasn't
|
||
quieted down and that legislation that will be reintroduced in Congress this
|
||
year is vague and poorly drafted.
|
||
Noting that at least one state, New York, is also considering similar
|
||
legislation, Wallace says that legislators may have overlooked existing laws
|
||
that apply to "software weapons." In a newsletter sent out to clients, Wallace
|
||
notes p(X<><58>ѡ<EFBFBD>the Electronic Communications Privacy Act (ECPA) and the
|
||
Computer Fraud and Abuse Act (CFAA) cover the vast majority of software crimes.
|
||
Wallace points out that both the ECPA and the CFAA already impose criminal
|
||
penalties on illegal actions. Even the Senate Judiciary Committee has refutted
|
||
the idea that more federal laws are needed. "Why don't we give existing laws a
|
||
chance to work, before rushing off to create new ones," Wallace asks.
|
||
Wallace is the editor of Computer Li<4C>!Letter and is an Assistant System
|
||
Administrator on CompuServe's Legal Forum (GO LAWSIG).
|
||
--James Moran
|
||
|
||
|
||
NEW VIRUS HITS THAI COMPUTERS
|
||
|
||
(June 27)
|
||
A newspaper in Bangkok is reporting that a new computer virus, said to be the
|
||
most destructive yet discovered, has struck computer systems in Thailand.
|
||
According to the Newsbytes News Service, computer security specialist John
|
||
Dehaven has told The Bangkok Post, "This is a very subtle virus that can lay
|
||
dormant, literally, for years."
|
||
The wire service says that two Thai banks and several faculties at
|
||
Chulalongkorn University were hit by the rogue program -- called the "Israeli
|
||
virus," because it was first detected there -- at the beginning of last month.
|
||
Newsbytes says the infection spreads quickly through any computer once it is
|
||
activated.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
CONGRESS STUDIES COMPUTER VIRUSES
|
||
|
||
(July 21)
|
||
The Congress is taking a hard look at a new report that says major computer
|
||
networks remain vulnerable to computer viruses that are capable of crippling
|
||
communications and stopping the nation's telecommunications infrastructure dead
|
||
in its tracks.
|
||
Rep. Edward Markey (D-Mass.), chairman of the House telecommunications
|
||
subcommittee, told a hearing earlier this week that federal legislation may be
|
||
needed to ease the threats posed by computer viruses.
|
||
"The risk and fear of computer-based sabotage must be reduced to an acceptable
|
||
level before we can reasonably expect our national networks to accomplish the
|
||
purposes for which they were created," Markey said during a hearing Wednesday on
|
||
the new congressional study.
|
||
"We must develop policies that ensure (network's) secure operation and the
|
||
individuals' rights to privacy as computer network technologies and applications
|
||
proliferate," he added.
|
||
The report by the General Accounting Office examined last year's virus attack
|
||
that shut down the massive Internet system, which links 60,000 university,
|
||
government and industry research computers.
|
||
The GAO found that Internet and other similar systems remain open to attack
|
||
with much more serious results than the temporary shutdown experienced by
|
||
Internet.
|
||
The GAO warned that the Internet virus, a "worm" which recopied itself until
|
||
it exhausted all of the systems available memory, was relatively mild compared
|
||
to other more destructive viruses.
|
||
"A few changes to the virus program could have resulted in widespread damage
|
||
and compromise," the GAO report said.
|
||
"With a slightly enhanced program, the virus could have erased files on
|
||
infected computers or remained undetected for weeks, surreptitiously changing
|
||
information on computer files," the report continued.
|
||
The GAO recommended the president's science advisor and the Office of Science
|
||
and Technology Policy should take the lead in developing new security for
|
||
Internet.
|
||
In addition, the report said Congress should consider changes to the Computer
|
||
Fraud and Abuse Act of 1986, or the Wire Fraud Act, to make it easier to bring
|
||
charges against computer saboteurs.
|
||
Joining in sounding the alarm at the hearing was John Landry, executive vice
|
||
president of Cullinet Software of Westwood, Mass., who spoke on behalf of
|
||
ADAPSO.
|
||
"The range of threats posed by viruses, worms and their kin is limited only by
|
||
the destructive imagination of their authors," Landry said. "Existing computer
|
||
security systems often provide only minimal protection agaif<69>u a determined
|
||
attack."
|
||
Landry agreed the Internet attack could have been much worse. He said viruses
|
||
have been found that can modify data and corrupt information in computers by
|
||
means as simple as moving decimal points one place to the left or right.
|
||
One recently discovered virus, he said, can increase disk access speed,
|
||
resulting in the wearing out of disk drives. They also have been linked to
|
||
"embezzlement, fraud, industrial espionage and, more recently, international
|
||
political espionage," he said.
|
||
"Virus attacks can be life threatening," Landry said, citing a recent attack
|
||
on a computer used to control a medical experiment. "The risk of loss of life
|
||
resulting from infections of airline traffic control or nuclear plant monitoring
|
||
systems is easily imaginable," he said.
|
||
Landry said ADAPSO endorses the congressional drive toward tightening existing
|
||
law to ensure that computer viruses are covered along with other computer
|
||
abuses.
|
||
--J. Scott Orr
|
||
|
||
|
||
|
||
GLOSSARY OF VIRUS-RELATED TERMS
|
||
|
||
(July 21)
|
||
Until last year's computer virus attack on the massive Internet network made
|
||
headlines, computer sabotage attracted little attention outside computer and
|
||
telecommunications circles.
|
||
Today "computer virus" has become a blanket term covering a wide range of
|
||
software threats.
|
||
ADAPSO, the computer software and services industry association, believes the
|
||
term has been thrown around a little too loosely. Here, then, is ADAPSO's
|
||
computer virus glossary:
|
||
-:- COMPUTER VIRUS, a computer program that attaches itself to a legitimate,
|
||
executable program, then reproduces itself when the program is run.
|
||
-:- TROJAN HORSE, a piece of unauthorized code hidden within a legitimate
|
||
program that, like a virus, may execute immediately or be linked to a certain
|
||
time or event. A trojan horse, however, does not self-replicate.
|
||
-:- WORM, an infection that enters a computer system, typically through a
|
||
security loophole, and searches for idle computer memory. As in the Internet
|
||
case, the worm recopies itself to use up available memory.
|
||
-:- TRAPDOOR, a program written to provide future access to computer systems.
|
||
These are typical entryways for worms.
|
||
-:- TIME BOMB, a set of computer instructions entered into a system or piece
|
||
of software that are designed to go off at a predetermined time. April Fool's
|
||
Day and Friday the 13th have been popular times for time bomb's to go off.
|
||
-:- LOGIC BOMB, similar to a time bomb, but linked instead to a certain event,
|
||
such as the execution of a particular sequence of commands.
|
||
-:- CHAOS CLUB, a West German orc!<21>ization that some have alleged was fn<66>med
|
||
to wreak havoc on computer systems through the use of viruses and their kin.
|
||
--J. Scott Orr
|
||
|
||
|
||
|
||
MORRIS INDICTED IN WORM INCIDENT
|
||
|
||
(July 27)
|
||
A federal grand jury has indicted the 24-year-old Cornell University graduate
|
||
student who is alleged to have released a "worm" program that temporarily
|
||
crippled the massive Internet computer network last November.
|
||
Robert Tappan Morris of Arnold, Md., becomes the first person to be indicted
|
||
under the federal Computer Fraud and Abuse Act of 1986 in connection with the
|
||
spread of a computer virus.
|
||
In convicted, Morris faces a maximum sentence of five years in federal prison
|
||
and a $250,000 fine. Morris' attorney, Thomas A. Guidoboni, said his client will
|
||
fight the charges.
|
||
The virus, a worm that sought out unused memory throughout the system and
|
||
recopied itself to fill the vacant space, infected at least 6,000 computers
|
||
nationwide. Internet is an unclassified, multinetwork system connecting 500
|
||
networks and more than 60,000 computers around the world.
|
||
The indictment, handed up yesterday in Syracuse, N.Y., charges Morris
|
||
"intentionally and without authorization, accessed ... federal interest
|
||
computers."
|
||
The action, the indictment continued, "prevented the authorized use of one or
|
||
more of these federal interest computers and thereby caused a loss to one or
|
||
more others of a value aggregating $1,000 or more."
|
||
The indictment said the illegally accessed computers included those at the
|
||
University of California at Berkeley, the Massachusetts Institute of Technology,
|
||
the National Aeronautics and Space Administration, Purdue University and the US
|
||
Air Force Base Logistics Command at Wright Paterson Air Force Base in Dayton,
|
||
Ohio.
|
||
"Mr. Morris will enter a plea of not guilty and contest the charge against
|
||
him," Guidoboni said. He said his client "looks forward to his eventual
|
||
vindication and his return to a normal life."
|
||
Morris, a Harvard graduate and computer science graduate student at Cornell,
|
||
is about to begin a one-year suspension from Cornell that stemmed from the
|
||
incident. His father is chief computer scientist for the National Computer
|
||
Security Center near Baltimore.
|
||
The indictment comes less than a week after the General Accounting Office
|
||
found that Internet and other similar systems remain open to attack with much
|
||
more serious results than the temporary shutdown experienced last year.
|
||
The GAO warned the Internet virus was relatively mild compared to other more
|
||
destructive viruses. It went on to recommend the President's Science Advisor and
|
||
the Office of Science and Technology Policy take the lead in developing new
|
||
security for Internet.
|
||
In addition, the report said Congress should consider changes to the Computer
|
||
Fraud and Abuse Act, or the Wire Fraud Act, to make it easier to bring charges
|
||
against computer saboteurs.
|
||
The GAO said the Internet worm spread largely by exploiting security holes in
|
||
system software based on the Berkeley Software Distribution Unix system, the
|
||
most commonly used operating system on Internet.
|
||
The report from the GAO said the virus moved with startling speed. It was
|
||
first detected at 9 p.m. on Nov. 2. Within an hour it had spread to multiple
|
||
sites and by the next morning had infected thousands of systems.
|
||
According to GAO, the virus had four methods of attack. It used:
|
||
-:- A debugging feature of the "Sendmail" utility program to allow the sending
|
||
of an executable program. After issuing a debug command, the virus gave orders
|
||
to copy itself.
|
||
-:- A hole in another utility program -- "Fingerd," which allows users to
|
||
obtain public information about other users -- to move on to distant computers.
|
||
-:- Different methods to guess at user passwords. Once successful, the virus
|
||
"masqueraded" as a legitimate user to spread and access other computers.
|
||
-:- "Trusted host" features to spread quickly though local networks once one
|
||
computer was penetrated.
|
||
--J. Scott Orr
|
||
|
||
|
||
|
||
|
||
RESEARCHER UNCOVERS OCT. 12 VIRUS
|
||
|
||
(July 31)
|
||
An official with a British firm that markets anti-virus software says the
|
||
company has uncovered a new virus called "Datacrime" is set to attack MS-DOS
|
||
systems starting O<>t< 12.
|
||
Dr. Jan Hruska of Sophos UK tells Computergram International the virus
|
||
apparently appends itself to .COM (command) files on MS-DOS systems.
|
||
"Operating on a trigger mechanism," CI says, "the virus reformats track 0 of
|
||
the hard disk on or after Oct. 12. It has no year check and so will remain
|
||
active from Oct. 12 onwards destroying or losing programs and data."
|
||
Hruska told the publication this is a relatively new virus and that its
|
||
encrypted form reveals its name ("Datacrime") and its date of release, last
|
||
March 1.
|
||
Sophos markets a program called Vaccine version 4 designed to detect known
|
||
viruses.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
MORRIS TO PLEAD INNOCENT
|
||
|
||
(Aug. 2)
|
||
Robert T. Morris Jr., the former Cornell University graduate student who was
|
||
indicted last week by a federal grand jury, will plead innocent in federal court
|
||
to charges he planted a computer worm that wrecked havoc with some 6,000
|
||
computers nationwide, reports United Press International.
|
||
As reported, the 24-year-old Arnold, Md., resident was indicted by the grand
|
||
jury on charges of breaking a federal statute by gaining unauthorized access to
|
||
a nationwide computer network and causing damage in excess of $1,000.
|
||
Both federal investigators and a Cornell University panel claim Morris created
|
||
the computer worm, which spread from the Cornell campus in Ithaca, N.Y., on Nov.
|
||
2 to computers around the country, notes UPI.
|
||
The worm infiltrated a Department of Defense computer system and forced many
|
||
federal and university computers to shut down. The exact amount of damage has
|
||
not been determined.
|
||
If convicted, Morris could be sent to prison for five years and fined up to
|
||
$250,000. In addition, the judge could order him to make restitution to those
|
||
who were adversely affected by the incident.
|
||
-- Cathryn Conroy
|
||
|
||
|
||
|
||
NIST FORMS COMPUTER SECURITY NETWORK
|
||
|
||
(Aug. 3)
|
||
The National Institute of Standards and Technology is working with other
|
||
federal agencies to establish a government-wide information network on security
|
||
incidents and issues, reports Government Computer News.
|
||
Organized by NIST's Computer Security Division, the network would supply the
|
||
latest information to agencies on security threats, develop a program to report
|
||
and assess security incidents as well as offer assistance.
|
||
Dennis Steinauer, evaluation group manager of the Computer Security Division,
|
||
said the plan is a response to the communications problems federal agencies
|
||
suffered during last November's worm attack on Internet b9 Jornell University
|
||
graduate student Robert T. Morris Jr.
|
||
In addition to NIST, the departments of Energy, Justice and Transportation as
|
||
well as the National Science Foundation and NASA are participating in the
|
||
project, which calls for each agency to organize a security incident response
|
||
and resource center.
|
||
NIST's network would connect the centers electronically, allowing them to
|
||
communicate with one another. Steinauer said he wants to set up a master
|
||
database of contacts, phone numbers and fax numbers to ensure communications.
|
||
One aspect of the plan calls for each center to become expert in some specific
|
||
area of the technology, such as personal computers, local area networks or
|
||
multiuser hosts.
|
||
"The answer is not some monolithic, centralized command center for
|
||
government," Steinauer told GCN. "Problems occur in specific user or technology
|
||
communities, and we see the solutions evolving where the reaction is by people
|
||
who know the user community and the environment."
|
||
He explained that the Computer Security Act has helped increase security
|
||
awareness within the government, but the emergence of computer viruses, worms
|
||
and other sophisticated threats has demonstrated the need for more advanced
|
||
security tools.
|
||
-- Cathryn Conroy
|
||
|
||
|
||
AUSTRALIAN CHARGED WITH CRACKING
|
||
|
||
(Aug. 14)
|
||
Australia is reporting its first computer cracking arrest. A Melbourne student
|
||
is charged with computer trespass and attempted criminal damage.
|
||
Authorities allege 32-year-old Deon Barylak was seen loading a personal
|
||
computer with a disk that was later found to possess a computer virus.
|
||
"Fortunately, it was stopped before it could spread, which is why the charge
|
||
was only attempted criminal damage," senior detective Maurice Lynn told Gavin
|
||
Atkins for a report in Newsbytes News Service.
|
||
The wire service said Barylak could face a maximum of 100 years' jail and a
|
||
fine.
|
||
Also police expect to make further arrests in connection with the case.
|
||
Authorities said Barylak also faces charges of possessing computer equipment
|
||
allegedly stolen from a community center.
|
||
--Charles Bowen
|
||
|
||
|
||
INTERNET VIRUS BACK?
|
||
|
||
(Sept. 4)
|
||
Apparently, neither the threat of criminal sanctions nor the hazards of
|
||
investigation by the FBI is enough to keep the Internet computer communications
|
||
network secure from intrusion. The Department of Defense agency responsible for
|
||
monitoring Internet security has issued a warning that unauthorized system
|
||
activity recently has been detected at a number of sites.
|
||
The Computer Emergency Response Team (CERT) says that the activity has been
|
||
evident for some months and that security on some networked computers may have
|
||
been compromised. In a warning broadcast to the Internet, CERT says that the
|
||
problem is spreading.
|
||
Internet first came to general attention when a came to much of the computing
|
||
communities attention when a 23-year-old Cornell University student was said to
|
||
be responsible for inserting a software "worm" into the network. The Department
|
||
of Defense's Advanced Project Agency network (ARPANET) also was infected and
|
||
CERT was formed to safeguard networks used or accessed by DoD emplyees and
|
||
contractors.
|
||
In its warning about recent intrusions, CERT says that several computers have
|
||
had their network communications programs replaced with hacked versions that
|
||
surreptitiously capture passwords used on remote systems.
|
||
"It appears that access has been gained to many of the machines which have
|
||
appeared in some of these session logs," says a broadcast CERT warning. "As a
|
||
first step, frequent telnet [communications program] users should change their
|
||
passwords immediately. While there is no cause for panic, there are a number of
|
||
things that system administrators can do to detect whether the security on their
|
||
machines has been compromised using this approach and to tighten security on
|
||
their systems where necessary."
|
||
CERT went on to suggest a number of steps that could be taken to verify the
|
||
authenticity of existing programs on any individual UNIX computer. Among those
|
||
was a suggestion to reload programs from original installation media.
|
||
--James Moran
|
||
|
||
|
||
AIR FORCE WARNS ITS BASES OF POSSIBLE "COLUMBUS DAY VIRUS"
|
||
|
||
(Sept. 10)
|
||
The US Air Force has warned its bases across the country about a possible
|
||
computer virus reportedly set to strike MS-DOS systems Oct. 12.
|
||
Warning of the so-called "Columbus Day virus" was issued by the Air Force
|
||
Communications Command at Scott Air Force Base, Ill., at the request of the
|
||
Office of Special Investigations.
|
||
OSI spokesman Sgt. Mike Grinnell in Washington, D.C., told David Tortorano of
|
||
United Press International the advisory was issued so computer operators could
|
||
guard against the alleged virus. "We're warning the military about this,"
|
||
Grinnell said, "but anybody that uses MS-DOS systems can be affected."
|
||
As reported here July 31, Dr. Jan Hruska, an official with a British firm
|
||
called Sophos UK, which markets anti-virus software, said his company had
|
||
uncovered a new virus called "Datacrime." Hruska told Computergram International
|
||
at the time that the virus apparently appends itself to .COM (command) files on
|
||
MS-DOS systems.
|
||
Said CI, "Operating on a trigger mechanism, the virus reformats track 0 of the
|
||
hard disk on or after Oct. 12. It has no year check and so will remain active
|
||
from Oct. 12 onwards destroying or losing programs and data." Hruska told the
|
||
publication this was a relatively new virus and that its encrypted form revealed
|
||
its name ("Datacrime") and its date of release, last March 1.
|
||
Meanwhile, Air Force spokeswoman Lynn Helmintoller at Hurlburt Field near Fort
|
||
Walton Beach, Fla., told UPI that computer operators there had been directed to
|
||
begin making backup copies of files on floppy disks just in case. She said the
|
||
warning was received at the base Aug. 28.
|
||
Staff Sgt. Carl Shogren, in charge of the small computer technology center at
|
||
Hurlburt, told Tortorano no classified data would be affected by the possible
|
||
virus attack because the disks used for classified work are different from those
|
||
that might be struck.
|
||
UPI quoted officials at Scott Air Force Base as saying the warning was sent to
|
||
every base with a communications command unit, but that they did not know how
|
||
many bases were involved.
|
||
--Charles Bowen
|
||
|
||
|
||
COMPUTER VIRUSES PLAGUE CONGRESS
|
||
|
||
(Sept. 11)
|
||
Although Congress recently passed the Computer Security Act to force federal
|
||
agencies to guard against high-tech break- ins and computer viruses, the
|
||
legislators may soon realize they made a costly mistake. The law applies to all
|
||
federal agencies -- except Congress itself. And according to Government
|
||
Computer News, Capitol Hill has been the victim of several recent virus attacks.
|
||
One virus, for instance, emerged about a year ago in the Apple Macintosh
|
||
computers of several House offices causing unexplained system crashes. A steep
|
||
bill of some $100,000 was incurred before experts were confident the plague, now
|
||
known as Scores, was stopped. However, it does still lurk in the depths of the
|
||
computers, notes GCN, causing occasional malfunctions.
|
||
Dave Gaydos, Congress' computer security manager, says the sources of many
|
||
viruses may never be known, since some 10,000 programmers are capable of
|
||
producing them.
|
||
Capitol Hill legislators and staff members are only now becoming aware of the
|
||
potential danger of viruses as more offices are exploring ways to connect with
|
||
online database services and with each other through local area networks.
|
||
GCN reports that last February, a California congressional office was the
|
||
victim of a virus, caught while using a so-called vaccine program meant to
|
||
detect intruders into the system.
|
||
"I used to laugh about viruses," said Dewayne Basnett, a systems specialist on
|
||
Capitol Hill. "But now when you ask me about them, I get very angry. I think
|
||
of all the time and effort expended to repair the damage they do."
|
||
According to GCN, many of the 3,000 House employees with computers are
|
||
ignorant of the risks and unable to take basic precautions. Although various
|
||
computer specialists are trying to inform Hill users of computer security issues
|
||
and offer training sessions, there is no broad support from the legislators
|
||
themselves for such actions.
|
||
"We are working to alert people to the dangers," said Gaydos, "but it may take
|
||
an incident like a destructive virus to move [Congress] to take precautions."
|
||
-- Cathryn Conroy
|
||
|
||
|
||
|
||
VIRUS HITS AUSTRALIA
|
||
|
||
(Sept. 12)
|
||
Australian authorities are said to be confused about the origin of a supposed
|
||
computer virus that has been making the rounds of computer installations in the
|
||
South Pacific. An Australian newspaper, The Dominion, says that sensitive data
|
||
in Defense Department computers has been destroyed by the virus.
|
||
Dubbed the Marijuana virus because of the pro-drug message that is displayed
|
||
before any data is erased, it is thought that the misbehaving bug originated in
|
||
New Zealand. Some have even suggested that the program was purposely introduced
|
||
into Australian Defense computers by agents of New Zealand, a contention that a
|
||
Defense Department spokesman branded as "irresponsible." The two South Pacific
|
||
nations have had strong disagreements about defense matters, including recent
|
||
joint maneuvers in the area by Australian and US forces.
|
||
A more likely explanation for the intrusion into Defense computers is the
|
||
likelihood that Australian security specialists were examining the virus when
|
||
they inadvertently released it into their own security system. The Marijuana
|
||
virus is known to have been infecting computers in the country for at least
|
||
three months and its only known appearance in government computers occurred in a
|
||
Defense sub-department responsible for the investigation and prevention of
|
||
computer viruses.
|
||
--James Moran
|
||
|
||
|
||
|
||
VIRUS THREAT ABSURDLY OVERBLOWN, SAY EXPERTS
|
||
|
||
(Sept. 18)
|
||
The so-called "Columbus Day Virus" purportedly set to destructively attack
|
||
MS-DOS computers on Oct. 13 has computer users -- including the US military --
|
||
scampering to protect their machines. But according to The Washington Post, the
|
||
threat is absurdly overblown with less than 10 verified sightings of the virus
|
||
in a country with tens of millions of computers.
|
||
"At this point, the panic seems to have been more destructive than any virus
|
||
itself," said Kenneth R. Van Wyk, a security specialist at Carnegie-Mellon
|
||
University's Software Engineering Institute, who has been taking some 20 phone
|
||
calls daily from callers seeking advice on the subject.
|
||
Bill Vance, director of secure systems for IBM Corp., told The Post, "If it
|
||
was out there in any number, it would be spreading and be more noticeable."
|
||
He predicted Oct. 13 is not likely to be "a major event."
|
||
As reported in Online Today, this latest virus goes by several names,
|
||
including Datacrime, Friday the 13th and Columbus Day. It lies dormant and
|
||
unnoticed in the computer until Oct. 13 and then activates when the user turns
|
||
on the machine. Appending itself to .COM (command) files, the virus will
|
||
apparently reformats track 0 of the hard disk.
|
||
The Post notes that the federal government views viruses as a grave threat to
|
||
the nation's information systems and has set in motion special programs to guard
|
||
computers against them and to punish those who introduce them.
|
||
Centel Federal Systems in Reston, Va., a subsidiary of Centel Corp. of
|
||
Chicago, is taking the threat seriously, operating a toll-free hotline staff by
|
||
six full-time staff members. More than 1,000 calls have already been received.
|
||
Tom Patterson, senior analyst for Centel's security operations, began working
|
||
on the virus five weeks ago after receiving a tip from an acquaintance in
|
||
Europe. He said he has dissected a version of it and found it can penetrate a
|
||
number of software products designed to keep viruses out.
|
||
Patterson told The Post that he found the virus on one of the machines of a
|
||
Centel client. "The virus is out there. It's real," he said.
|
||
Of course, where there's trouble, there's also a way to make money. "The more
|
||
panicked people get," said Jude Franklin, general manager of Planning Research
|
||
Corp.'s technology division, "the more people who have solutions are going to
|
||
make money."
|
||
For $25 Centel is selling software that searches for the virus. Patterson
|
||
said, however, the company is losing money on the product and that the fee only
|
||
covers the cost of the disk, shipping and handling. "I'm not trying to hype
|
||
this," he said. "I'm working 20-hour days to get the word out."
|
||
-- Cathryn Conroy
|
||
|
||
|
||
|
||
SICK SOFTWARE INFECTS 100 HOSPITALS NATIONWIDE
|
||
|
||
(Sept. 20)
|
||
When a hospital bookkeeping computer program could not figure out yesterday's
|
||
date, some 100 hospitals around the country were forced to abandon their
|
||
computers and turn to pen and paper for major bookkeeping and patient admissions
|
||
functions, reports The Washington Post.
|
||
Although there was no permanent loss of data or threat to treatment of
|
||
patients, the hospital accounting departments found themselves at the mercy of a
|
||
software bug that caused major disruptions in the usual methods of doing
|
||
business.
|
||
The incident affected hospitals using a program provided by Shared Medical
|
||
Systems Corp. of Pennsylvania. The firm stores and processes information for
|
||
hospitals on its own mainframe computers and provides software that is used on
|
||
IBM Corp. equipment.
|
||
According to The Post, the program allows hospitals to automate the ordering
|
||
and reporting of laboratory tests, but a glitch in the software would not
|
||
recognize the date Sept. 19, 1989 and "went into a loop" refusing to function
|
||
properly, explained A. Scott Holmes, spokesman for Shared Medical Systems.
|
||
The firm dubbed the bug a "birth defect" as opposed to a "virus," since it was
|
||
an accidental fault put into the program in its early days that later threatened
|
||
the system's health.
|
||
At the affected hospitals around the country, patients were admitted with pen
|
||
and paper applications. Hospital administrators admitted the process was slower
|
||
and caused some delay in admissions, but patient care was never compromised.
|
||
-- Cathryn Conroy
|
||
|
||
|
||
ARMY TO BEGIN VIRUS RESEARCH
|
||
|
||
(Sept. 21)
|
||
Viruses seem to be on the mind of virtually every department administrator in
|
||
the federal government, and the US Army is no exception. The Department of the
|
||
Army says it will begin funding for basic research to safeguard against the
|
||
presence of computer viruses in computerized weapons systems.
|
||
The Army says it will fund three primary areas of research: computer security,
|
||
virus detection and the development of anti-viral products. Research awards will
|
||
be made to US businesses who are eligible to participate in the Small Business
|
||
Innovation Research (SBIR) program.
|
||
The Army program, scheduled to begin in fiscal year 1990, is at least
|
||
partially the result of Congressional pressure. For some months, Congressional
|
||
staffers have been soliciting comments about viruses and their potential effect
|
||
on the readiness of the US defense computers.
|
||
Small businesses who would like to bid on the viral research project may
|
||
obtain a copy of Program Solicitation 90.1 from the Defense Technical
|
||
Information Center at 800/368-5211.
|
||
--James Moran
|
||
|
||
|
||
|
||
SO-CALLED "DATACRIME" VIRUS REPORTED ON DANISH POSTGIRO NET
|
||
|
||
(Sept. 22)
|
||
The so-called "Datacrime" virus, said to be aimed at MS-DOS system next month,
|
||
reportedly has turned up on the Danish Postgiro network, a system of 260
|
||
personal computers described as the largest such network in Scandinavia.
|
||
Computergram International, the British newsletter that first reported the
|
||
existence of the Datacrime virus back in July, says, ""Twenty specialists are
|
||
now having to check 200,000 floppy disks to make sure that they are free from
|
||
the virus."
|
||
Datacrime is said to attach itself to the MS-DOS .COM files and reformats
|
||
track zero of the hard disk, effectively erasing it. However, as reported, some
|
||
experts are saying the threat of the virus is absurdly overblown, that there
|
||
have been fewer than 10 verified sightings of the virus in a country with tens
|
||
of millions of computers.
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
IBM RELEASING ANTI-VIRUS SOFTWARE
|
||
|
||
(Oct. 4)
|
||
In a rare move, IBM says it is releasing a program to check for personal
|
||
computer viruses in response, in part, to customer worries about a possible
|
||
attack next week from the so-called "Datacrime" virus.
|
||
"Up until the recent press hype, our customers had not expressed any
|
||
tremendous interest (in viruses) over and above what we already do in terms of
|
||
security products and awareness," Art Gilbert, IBM's manager of secure systems
|
||
industry support, told business writer Peter Coy of The Associated Press.
|
||
However, reports of a "Datacrime" virus, rumored to be set to strike MS-DOS
|
||
systems, have caused what Coy describes as "widespread alarm," even as many
|
||
experts say the virus is rare and a relatively small number of PCs are likely to
|
||
be harmed.
|
||
IBM says it is releasing its Virus Scanning Program for MS-DOS systems that
|
||
can spot three strains of the Datacrime virus as well as more common viruses
|
||
that go by names such as the Jerusalem, Lehigh, Bouncing Ball, Cascade and
|
||
Brain.
|
||
The $35 program is available directly from IBM or from dealers, marketing
|
||
representatives and remarketers and, according to Gilbert, will detect but not
|
||
eradicate viruses. Gilbert added that installing a virus checker is not a
|
||
substitute for safe-computing practices such as making backup copies of programs
|
||
and data and being cautious about software of unknown origin.
|
||
Meanwhile, virus experts speaking with Coy generally praised IBM's actions.
|
||
"It's about time one of the big boys realized what a problem this is and did
|
||
something about it," said Ross Greenberg, a New York consultant and author of
|
||
Flu-Shot Plus. "To date, all the anti-virus activity is being done by the mom
|
||
and pops out there."
|
||
In addition, Pamela Kane, president of Panda Systems in Wilmington, Del., and
|
||
author of a new book, "Virus Protection," called the move "a very important and
|
||
responsible step."
|
||
As noted, experts are differing widely over whether there is truly a threat
|
||
from the Datacrime virus. The alleged virus -- also dubbed The Columbus Day
|
||
virus, because it reportedly is timed to begin working on and after Oct. 12 --
|
||
supposedly cripples MS-DOS- based hard disks by wiping out the directory's
|
||
partition table and file allocation table.
|
||
Besides the IBM virus scanning software, a number of public domain and
|
||
shareware efforts have been contributed online, collected on CompuServe by the
|
||
IBM Systems/Utilities Forum (GO IBMSYS). For more details, visit the forum, see
|
||
Library 0 and BROwse files with the keyword of VIRUS (as in BRO/KEY:VIRUS).
|
||
--Charles Bowen
|
||
|
||
|
||
|
||
DUTCH COMPUTERISTS FEAR 'DATACRIME' VIRUS
|
||
|
||
(Oct. 7)
|
||
The "Datacrime"/Columbus Day virus, which is being widely down-played in the
|
||
US, may be much more common in the Netherlands. A Dutch newspaper reported this
|
||
week the virus had spread to 10 percent of the personal computers there.
|
||
"Those figures are possibly inflated," police spokesman Rob Brons of the Hague
|
||
told The Associated Press. Nonetheless, police are doing brisk business with an
|
||
antidote to fight the alleged virus. Brons said his department has sold
|
||
"hundreds" of $2.35 floppy disks with a program that purportedly detects and
|
||
destroys the virus.
|
||
As reported, Datacrime has been described as a virus set to destroy data in
|
||
MS-DOS systems on or after Oct. 12. AP notes that in the US there have been
|
||
fewer than a dozen confirmed sightings of the dormant virus by experts who
|
||
disassembled it.
|
||
The wire service also quotes Joe Hirst, a British expert on viruses, as saying
|
||
some now believe the virus was created by an unidentified Austrian computerist.
|
||
He added that as far as he knew the Netherlands was the only European country in
|
||
which the virus had been spotted.
|
||
--Charles Bowen
|
||
|