VIRUS-L Digest Thursday, 8 Dec 1988 Volume 1 : Issue 39
Today's Topics:
RE: CERT organization
General Macintosh virus query
re: $95 million cost of Internet Worm
Spinrite (PC)
Bursting "HUNT, DOUG" <
[email protected]>
Subject: RE: CERT organization
The CERT organization is not a single "team" of individuals, but
rather a network of the best and drightest "hackers" or wizards as
DARPA calls them at the colleges, universities and research
institutions which compose the ARPANet. These folks are intended to
be on call in the case of an emergency and coordinated through various
local points where communication and processing resources can be amde
available even if the NET goes down.
In a sense it is formalizing (but not too much) the actual ad hoc
activity that occurred around the last event. It also adds resources
and what not to support the activity and ensure that there are
reliable channels of communication and coordination for the ARPAnet
and Internet users. IT is focused on the Unix users community and is
actually coordinated out of SEI.
It is not truly a DoD activity although it has been organized and
supported by the DARPA folks.
ery
Hello,
I am an Academic Programmer at the University of Akron, Ohio. I am
interested in obtaining more information about viruses and the
Macintosh. I know that this is a fairly general request -- but I
don't have any specific questions.
We have experienced viruses on the Macintosh, but have not been able
to detect what they are nor do we have any vaccines for them. So I
would like any and all information relating to viruses and vaccines
that are available.
I would guess that there are several vaccines available as public
domain and I would like information about them. However, I have a
user who would like to purchase a vaccine (to insure integrity, etc.)
so if anyone has any information about vaccines available for purchase
I would like that also.
I am not on this list so any reponses can be sent to my E-Mail
address:
DUBOSE@AKRONVM
Thank you,
Kathy DuBose
The University of Akron
------------------------------
Date: Thu, 8 Dec 88 10:05:84) quotes an estimate
from USA TODAY saying that the cost of the incident exceeds
$95 million.
"This is based on 6200 computer affected, requiring 12 programmers at
each site to spend 36 hours each (at $22 per hour) checking out every
system that might have been affected, and adding in lost computer
time (16 hours per system at $372 per hour). However, even if this
figure substantially overstates the case, there is no doubt that the
true costs were indeed in the millions of dollars."
..End Quote
Like many others, when I read this I pulled out my calculator to
check how they combined those numbers (ie how many computers are
they assuming per "site"?). Sure enough, $95 million comes from
assuming one computer per site. I think that's nonsense. I'll
bet the average is AT LEAST ten computers per site. We're pretty
small potatoes here and we had something like fourty computers
get hit. That means in order to keep up with the Jones'es, we
should have thrown 12x40 = 480 programmers at the problem. You
should not be surprised to say that we managed to handle the
incident with less than one dozen programmers total. Computers
and programming does not scale in the normal manner. Chances
are, as the number of computers at a site went up, the number of
programmers required per machine went down nearly exponentially
(if you only have three machines, you probably have no idea about
how they are connected, but if you have 200, you know EXACTLY how
every one is connected to every other).
If we re-do the NCSC's calculation assuming 10 machines per site
and 12 programmers per site, we get a cost of only $40 million.
If we then note that the widely quoted 6000 machine number
originated in a press conference at MIT where somebody (Jeff
Schiller?) made a complete guess, then we have to wonder about
the 6200 number (6000 +200 to give it an extra significant
digit?). I've heard much smaller numbers sugested by others
(such as three thousand). That would pull the cost down to more
like $20 million.
I don't mean to imply that my number is any better than theirs,
but if somebody gives you some numbers and then draws a
conclusion from them, you have an obligation to see if their
conclusion agrees with their numbers, and I think in this case
that the answer is that it doesn't. One computer does not a site
make.
Sorry about that... my two sentence flame
seems to have gotten a little out of hand.
thanks for staying with me...
- Don Alvarez
+ ----------------------------------------------------------- +
| Don Alvarez MIT Center For Space Research |
|
[email protected] 77 Massachusetts Ave 37-618 |
| (617) 253-7457 Cambridge, MA 02139 |
+ ----------------------------------------------------------- +
------------------------------
Date: Thu, 8 Dec 88 11:00:58 CDT
From: Len Levine <
[email protected]>
Subject: Spinrite (PC)
>From: 3ZLUFUR@CMUVM
>Subject: Low level format (PC)
>
>In v. l:31, H. Smith asks about reformatting hard disks. I'm not a
>tekkie, but I assume SpinRite will do the job. It is advertised
>mainly as a way to low level format hard disks while leaving all data
>in place.
>
>It is put out by Gibson Research Corp (Box 6024, Irvine, CA 92716) and
>I think my copy was about $60. This is the Gibson that writes a
>column for Inforworld.
I use it regularly. Spinrite will NOT clean out viruses that have
been written to your disk, it will very carefully remove them,
reformat the disk, and then replace them, just like it does with any
other code.
It will, however, "fix" bad blocks that a virus has used to secrete
stuff, and make them available to the disk again.
No, if you want to truly clean out any stuff on the disk, a true low
level reformat with all stuff deleted is the only way.
As stated earlier in this newsletter, low level formatting is nuclear
warfare against a virus.
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
| Leonard P. Levine e-mail
[email protected] |
| Professor, Computer Science Office (414) 229-5170 |
| University of Wisconsin-Milwaukee Home (414) 962-4719 |
| Milwaukee, WI 53201 U.S.A. Modem (414) 962-6228 |
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
------------------------------
Date: Thu, 8 Dec 88 13:14 EST
From: "SysOp: HelpLine BBS (703) 269-4802"
<STU_CWHITES@JMUVAX1>
Subject: Bursting Digests for VAX/VMS?
Although I do like the new digest format, when I want to
forward one message from a digest to someone I have to
extract it from mail, and then edit out the particular
message. Does anyone know of a way to burst the digest
into individual messages? Our system is a VAX. Thanks!
Chip Whiteside
STU_CWHITES@JMUVAX1
[Ed. GNU EMACS is available for VMS machines (we have it running on
ours), and it does have an undigestifer. However, it's undigestifer
is meant to work with standard Unix RMAIL files, and it may take some
work to get it to work in VMS. Anyone out there have any better
solutions for VMS machines? How about others, like IBM VM/CMS?]
------------------------------
Date: Thu, 08 Dec 88 14:33:26 EST
From: "Christian J. Haller" <
[email protected]>
Subject: Re: Cost of the RTM worm
>The Computenewsletter (#84) quotes an estimate
>from USA TODAY saying that the cost of the incident exceeds
>$95 million.
> "This is based on 6200 computer affected, requiring 12 programmers at
> each site to spend 36 hours each (at $22 per hour) checking out every
> system that might have been affected, and adding in lost computer
> time (16 hours per system at $372 per hour). However, even if this
> figure substantially overstates the case, there is no doubt that the
> true costs were indeed in the millions of dollars."
- ---------------------
I heard a reporter called somebody at UC Berkeley and asked how many
computers they had (around 1000) and what percentage were affected
(around 10%), and then blindly applied this percentage (for a highly
networked campus) to the number of computers on the Internet. The
real percentage is probably much lower.
Also, what is this about 12 programmers at each site spending 36 hours
each at $22. per hour? Most of the computers I know aboey, either.
These estimates seem like the most hoked-up, self serving bull!**!
The commercial sources of them should be ashamed.
- -Chris Haller, Cornell University
Disclaimer: My opinions are independent of any official positions of
my employer. And I don't know RTM. And maybe he didn't even do it.
Acknowledge-To: <CJH@CORNELLA>
------------------------------
Date: Thu, 8 Dec 88 14:55:10 EST
From: Don Alvarez <
[email protected]>
Subject: re: CERT/SWAT teams
Conventional SWAT teams are effective because the law enforcement
community has been able to identify a relatively small number
of basic scenarios which cover 95% of the crimes they need to
respond to. The SWAT teams are then able to drill the heck out
of those scenarios (hostage-taking, bank-robbery, etc.).
When they move in, the SWAT team has the advantage of already
having been under fire, and of having practiced against exactly
the scenario in question. The cand is not well understood. People
don't understand network vulnerability well enough to develope
the same sorts of detailed scenarios that the guns and bombs guys
use. Even worse, the possible responses to computer crime are
fairly limited and easy to predict, so in this case the criminal
has the advantage of a relatively inexperienced adversary with
a limited set of options -- exactly the reverse of the case that
the SWAT team relies on.
The other advantage that a SWAT team has is detailed knowledge
of their comrades strengths and weaknesses. There does not
need to be any discussion as to who will handle a given task:
the choice is always obvious in a well prepared team. This IS
something that a CERT-type team could work on. Another advantage
of a SWAT team is that it can mobilize in a hurry and has good
communications facilities. This is another thing which a CERT
team could use to its advantage. One you were on the same side. Basically, in my opinion a CERT team
would basically be an exercise in group dynamics, collecting and
organizing a group of people who through the course of their
everyday work have acquired the requisite knowledge to attack the
problem. If done proberly, this could be extremely effective.
If done improperly, it could actually reduce your ability to
respond because one would place too much trust in the capabilities
of the members of the team.
It all boils down to who is on the team and how you handle them.
Even a single piece of paper with names and phone numbers on it
could make an incredible difference. It would not, however, be
a SWAT team. There are a lot of people in the military who
spend their time studying group dynamics. If you can find someone
who understands both group dynamics and computer crime, and bring
them into the picture, then you have the possibility of turni- Don Alvarez
+ ----------------------------------------------------------- +
| Don Alvarez MIT Center For Space Research |
|
[email protected] 77 Massachusetts Ave 37-618 |
| (617) 253-7457 Cambridge, MA 02139 |
+ ----------------------------------------------------------- +
------------------------------
End of VIRUS-L Digest
*********************
Downloaded From P-80 International Information Systems 304-744-2253