VIRUS-L Digest             Tuesday, 29 Nov 1988         Volume 1 : Issue 23

Today's Topics:
More on nVIR (MacIntosh)
MORRIS BROKE THE LAW?
Local News Program with Loren Keim
general virus query
Auto-configuring PCs
How do you remove nVir from hard disk? (MacIntosh)
Warning init available (MacIntosh)

---------------------------------------------------------------------------

Date: Fri, 25 Nov 88 08:18 EDT
From: "$CAROL@OBERLIN (BITNET)" <$CAROL%[email protected]>
Subject:   More on nVIR (MacIntosh)

We had a chance to try out various virus detection programs today on
an infected SE hard disk.  Some expected and unexpected results:

VirusRX (Apple's own detection program) does NOT detect the nVIR
virus.  Interferon 3.0 and VirusDetective both caught it.  nVIR
Vaccine removed it successfully from an infected MacWrite application,
but had no effect on system files.

While checking some of the user's floppy disks for infection, I
discovered that Interferon is unable to examine MFS disks. Virus
Detective gave the same disk a clean bill of health.  Should I assume
the disk is virus-free?

By the way, this virus arrived here via "shared" (read pirated)
software from another college.

Robin Russell
Oberlin College Computing Center
prussell@oberlin

------------------------------

Date:         Fri, 25 Nov 88 18:39:58 CST
From:         John Boncek <MMBONC@LSUVM>
Subject:      MORRIS BROKE THE LAW?

A number of folks have written in indicating that "MORRIS BROKE THE LAW"
by spreading his virus on the internet.  some points to consider:

(1) the federal government hasn't brought criminal charges against morris
   yet;  the question whether "MORRIS BROKE THE LAW" is open until
   resolved by a jury!

(2) AS I understand the current federal statute, both criminal intent
   and actual damage must be proved in order to sustain a conviction.
   It may be difficult for a government prosecutor to prove both
   beyond a reasonable doubt.  (On the issue of "actual damages" ...
   consider the case where a user inadvertently causes havoc on a system;
   or the case where the operating system itself is damaged.  Doesn't
   the computer center allocate the same programmer hours and computer
   cycles to the task of correcting the problem??  What makes the appearance
   of a virus different from any other problem occurring on a system??)

   Also remember that the government must
   prove, beyond a reasonable doubt, that it was MORRIS, and not
   someone else, who actually committed the acts in question.
   There is a whole lot of circumstantial evidence ..
   the FBI has impounded tapes, disks, etc. from CORNELL; a number of
   morris' friends have been talking to the newspapers .. but no one
   (as far as I know) actually saw him doing anything......

   I strongly suspect that the government will offer morris a deal
   (e.g. a plea bargain to some misdemeanor) rather than risk having
   him win an acquittal on the felony charges.

(3) As to civil charges....In an action in tort, most american courts
   allow recovery for damages "proximately caused" by someone's action;
   intent is generally not an issue.  Assuming that someone can prove that
   it was morris who caused the virus to propagate, and that actual
   damages occurred, civil damages could be awarded.

   The more interesting question in the civil case is jurisdiction.
   Again assuming that Morris propagated the virus:

         - Morris is a resident of Maryland
         - Morris was physically present in New York
         - The virus was apparently propagated from a computer in
           massachusetts
         - "damages" occurred in a number of states (New York, New
           mexico, california, illinois, massachusetts, etc.)

   Where can an action against morris be brought?  Whose law applies?
   For example, morris was physically present in new york, but propagated
   apparently propagated the virus from massachusetts.  Did his "act"
   occur in New York or in Massachusetts?  Is his "presence" in
   massachusetts sufficient to give the massachusetts courts jurisdiction?
   Who has jurisdiction over (say) New mexico damages?  Morris' only presence
   there was by electronic mail!

   Also consider...let's assume that someone argues that morris "negligently"
   caused him damage.  Can morris counterargue that using Berkeley unix 4.3
   with "known security flaws" was also a negligent act, offsetting his
   liability for damage????  Consider whether researchers can sue their own
   computer centers for negligence in not protecting their systems from
   infection from a virus!!!!!

Egads!

------------------------------

Date:     MON NOV 28, 1988 20.07.09 EST
From:     "Loren K Keim   -- Lehigh University" <LKK0@LEHIGH>
Subject:  Local News Program with Loren Keim

Well, Mitch, its quite a while since we last heard from you.
Please, please, lets not start annother bitter war of flames
back and forth here.

Actually, you've either read a LOT into that TV interview,
or your read one or two of our reviews in the other magazines
I've been in recently.  A transcript of the TV interview
follows:"

Keim:  "Well, we've seen a school in Israel lose 7000 hours of
  research and thats a lot of research, we've seen lots of
  companies lose money, we've seen a lot of records wiped out,
  we've seen a company in Germany whose research was actually
  stolen.  The computer actually, the virus attacked, gathered up the
  research , called up another computer and mailed it out."

Reporter:  "Computer expert Loren Keim has worked to stop some of the
  peskiest computer viruses and he thinks that he nad his associates
  can develop software that will hlep to shield both large and
  small systems from viruses.

Keim:  "We figure out how viruses work, how they propagate, how
  they possibly CAN propagate, and we find any hole s that
  exist in a companies current computer security program and
  we plug these holes."

Reporter:  "Keim is getting ready to market a liine of
  comprehensive computer antiviral programs.  A different program
  must be written for each system and although, keim says, there
  are already antiviral programs on the market.

Keim:  "We have found easy ways around packages that we have s
  tested so far"

Rep:   "Oh"

Keim:  "Our program is written to watch for something to try and
   get around it, and it will stop tht."

Reporter:  "Keim says that he and his associates have 5 antivirus
   programs.  They've tested them against many viruses and stopeed
   them all."

- -----  [end]

As for our Unix package, it is not currently available, it is
in the works.   We have two separate Unix ideas we are working
on, and I think the second idea is excellent.  We discussed it
at length at the COmputer Virus conference, since you are local
to this area, you should have stopped in.

If anyone wishes detailed information about any of our packages
(Outlines for PC, Unix, VM/CMS/, VMS, and Mac are availabe upon
request), please write to eme.  (This is not a sales pitch).  But
I warn you that I will not go into exacting technical detail as
to how certain things work.  We like to call them trade secrets,
you'll have to completely dissassemble our packages to do that.

As for key encoded algorithms.   What I simply said (not ot
the press you mentioned though) was that our PC version
will allow for keys, random keys which will change the program
oin some ways from copy to copy.  In effect, efvery copy of
teh program will be slightly different, thus helping to
ensure that the program won't be broken.  However, this
is just one single level of defense isn a multi level system.

I hesitate to saytoo much because I don't wan t to be though
of as trying to "sell" m this package on the net.   I honestly
feel it will be the s best package available.  I really do.
Its effective, it doesn't clutter up the screen with
garbage, it doesn't require a special user interface.

Again, please forgive me if this sounds like I'm selling.

Loren Keim

------------------------------

Date:    Mon, 28 Nov 1988  22:13 EDT
From:    34EVEKA@CMUVM
Subject: general virus query

Hello there,
My name is John Lennon (no lie) and I'm a student a Central Michigan Univ.
and I have a question about viruses.
- ----If I have received a virus by mail how can I receive info about this
   particular virus.-----

------------------------------

Date:         Mon, 28 Nov 88 22:02:49 CST
From:         James Ford <JFORD1@UA1VM>
Subject:      Auto-configuring PCs

Most computers now have auto-configuring at bootup (ie, no more dip
switches to set for memory, drives, etc).  Can a program change this
configuration?  If so, what possible hardware damage could a virus or
trojan cause to your computer system by changing these values?

                      James

------------------------------

Date:     Mon, 28 Nov 88 18:44 EST
From:     "Back off man, I'm a scientist..." <FRANK@LOYVAX>
Subject:  How do you remove nVir from hard disk? (MacIntosh)

Hi y'all,

    My boss came in the lab a few ago, and said "Hey Frank, you had a
virus on your computer last year?  How did you fix it?"  I told her i
did a low-level format on my XT.  (At this point a frown came to her
face) Anyway, the point of this is that a friend of hers managed to
catch nVir on his PC.  Of course, he doesn't have any backups, and has
four years worth of work that can't be easily replicated.  Does anyone
know if it is possible to disinfect a hard drive contaminated with
nVir?


                         Thanks a lot,

                               Frank Gauthier
                               Academic Computing Serices
                               Loyola College, Baltimore.



P.S.  This could definitely be worth a serious Christmas bonus.  :-)

[Ed. Take a look at the next message...]

------------------------------

Date: Mon, 28 Nov 1988 22:06:20 PST
From: William Lipa <[email protected]>
Subject: Warning init available (MacIntosh)

I have written an init for use on Macintosh computers which checks for
the presence of the nVIR and Scores viruses each time you start the
system. If it finds an infected System, the user is presented with an
alert which describes the situation. One can Shut Down, Continue, or
(eventually) Repair the disk.

The program is designed to be transparent in use so that it is
suitable for novice users. Just throw it in your System Folder and
forget about it (unless you have a virus, that is). It does not yet
provide the same level of protection as Vaccine, however. It is for
those people who do not want to deal with a more technical defense
against viruses but who want some warning before all their
applications get infected.

I'll send it to whomever requests a copy.

Bill Lipa

Bitnet: lipa%polya@stanford
Arpanet: [email protected]

------------------------------

End of VIRUS-L Digest
*********************
Downloaded From P-80 International Information Systems 304-744-2253