textfiles/virus/virusbro.vir

238 lines
9.6 KiB
Plaintext
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

Computer Viruses and Trojan Horses;
A Guide to Protecting Your Computer
by Ted Landberg
3/8/88
This bulletin discusses software called viruses and trojan horses
and what precautionary steps you should take to prevent harm to
your computer based information.
Introduction
Recent newspaper and magazine articles have publicized several
incidences of malicious software known as computer viruses and
trojan horses. Serious questions are being raised about how
computer-based information can be protected from this type of
software. Presently, there are no absolute safeguards from this
malicious software short of isolating your computers, however
adequate protection can be achieved by employing a combination of
traditional safeguards and some common sense about where and who
you get software from.
What is a virus?
A computer virus has been described as a set of "extra" computer
instructions capable of replicating itself into other files,
usually programs. This self-replicating code is hidden in a
"host" program, referred to as a trojan horse. When the "host"
program is executed, so are the "extra instructions. A program
can be a trojan horse i.e. have "extra" instructions that may or
may not be a virus (self-replicating).
Trojan horses and viruses can be malicious. Examples of
malicious action include deleting data files, or rendering
computer systems unavailable by modifying software libraries.
This type of software presents a distinct threat to the
integrity of computer systems.
How do these virus programs enter a computer system?
Generally, viruses enter a computer system by using an appealing
program as a 'host' to harbor the self replicating computer
instructions. The host can be one of the operating system tools
such as compilers, editors, file utilities or one of the
embedded macro languages found in spreadsheets or data base
management software, and sometimes even in games.
1 Computer Viruses
Distribution of malicious software depends on getting an
unsuspecting user to accept a program where visual inspection of
the product is difficult, and the author or source can remain
anonymous. Public or private conferencing systems, timesharing
networks and electronic bulletin boards as well as user group
software exchanges and computer "flea markets" meet these
requirements.
What should I do to protect myself?
Isolating the computer system from contact with outside sources
of software is the best way to insure the integrity of the
system. This is very difficult for multi-user systems and not a
particularly attractive solution if the computer is going to
continue be useful over time.
One alternative approach is to detect the existence of malicious
or self replicating computer instructions. This requires some
knowledge of the target of the attack and the means used by a
virus to self replicate. A generic solution is difficult, but
several programs have been developed for identifying certain
types of computer instructions that could present risks.
These programs check for extraneous file operations including
opens, closes, reads and writes that bypass operating system
functions. A partial list of available software products is
found in Appendix A.
Another solution is to stop the virus from replication by
preventing the rewriting of 'infected' files. Confining programs
to libraries on storage devices with 'write disable' hardware is
one approach. Many large scale computer peripheral devices have
such a switch, however these features are rarely found on
desktop computers. An alternative to a hardware 'write disable'
switch is a software 'read only' feature. Unfortunately, these
options are found only on mini and mainframe computer operating
systems. The "read-only" attribute in MS-DOS is not an effective
protection mechanism because File Allocation Tables (FAT) can be
changed from user written programs.
Popular microcomputer operating systems allow execution of
computer instructions that can directly address and operate
storage devices bypassing normal operating system calls. Thus
there is a constant exposure of disk storage devices and their
file directories to destruction or modification.
2 Computer Viruses
A Five Point Program
There is no single set of solutions. Each installation must
assemble its own procedures for containing the problem. However
this 5 step process is suggested.
1. Education
All users of computers should be told about the existence of
Trojan Horses and Computer Viruses, what they are and how
to tell whether their system has been infected. Be frank
when discussing the threat of computer viruses.
2. Backup and recovery procedures.
Develop easy procedures for routine backup of important
computer files. Make backup hardware (i.e. tape units)
readily available to all users. Users connected to LANs
should use automatic backup features. Suggest file
organization structures that facilitate backup and recovery
of disks that have been ruined by computer viruses.
3. Isolate Software Libraries
On larger computer systems, consolidate libraries into 'Read
Only' directories. In general system or shared software
should have limited update and write attribute privileges.
4. Implement Software Library Management Procedures
Enforce program testing, version control, and quality
assurance checking for all software libraries. Use software
library management tools to control and audit programs.
Assign responsibility for testing public domain software and
providing "approved" copies of that kind of software. Known
source of software, inspect distribution media and
documentation for tapering, and develop a "master copy"
system.
5. Develop an Virus Alert Procedure
Getting the word out about potential or known viruses can
contain or minimize the eventual spread and harmful effects
of a computer virus. Notices, telephone trees to ADP
coordinators, phone or electronic mail are all good
vehicle. Procedures for containment and eradication should
be thought out before hand. These procedures usually
require shutting system down, reformatting disk or tape
storage media and re-building software libraries with a
known uninfected copies.
3 Computer Viruses
Appendix A
Virus Detection Tools
All Software Listed below is in the Public Domain and available
off of the NBS/ICST Security Bulletin Board (301) 948-5717 or
5718.
CHK4BOMB Checks for "write" instructions to absolute
disk sectors.
BOMBSQUAD A memory resident program that intercepts
read, write and verifies to floppy or hard
disks. Sends message on suspected
operations.
FLUSHOT3 Monitors COMMAND.COM file for writes and
updates. Will not allow a write to the
COMMAND.COM file. Note: some earlier
versions of this program had their own virus
in it.
HDSENTRY Protects hard disks from malicious writes
during testing of uncertified software.
EARLY Checks programs for incidence of use of OUT
instruction, INT 13H and DOS INT 26H.
4 Computer Viruses