VIRUS-L Digest Thursday, 26 Oct 1989 Volume 2 : Issue 223
VIRUS-L is a moderated, digested mail forum for discussing computer
virus issues; comp.virus is a non-digested Usenet counterpart.
Discussions are not limited to any one hardware/software platform -
diversity is welcomed. Contributions should be relevant, concise,
polite, etc., and sent to
[email protected] (that's
LEHIIBM1.BITNET for BITNET folks). Information on accessing
anti-virus, document, and back-issue archives is distributed
periodically on the list. Administrative mail (comments, suggestions,
and so forth) should be sent to me at:
[email protected].
- Ken van Wyk
Today's Topics:
re: IBM's Virscan Program (PC)
Another suggestion for preventing viral spread (PC)
RE: Apple II virus - LODE RUNNER
INIT 29 vs. locked disk (Mac)
Re: Jerusalem Virus Version B detected (PC)
DataCrime Strikes!! (PC)
Xeno--possible new virus? (AMIGA)
SCANv45 and UNVIRUS (PC)
reposting of FICTITIOUS virus story (UNIX)
---------------------------------------------------------------------------
Date: 25 Oct 89 00:00:00 +0000
From: "David.M..Chess" <
[email protected]>
Subject: re: IBM's Virscan Program (PC)
This is the information I have; I think it's still correct (I'm
sure everyone will tell me if I'm wrong!):
IBM Personal Computer and PS/2 customers may
order the virus detection program by calling 1-800-426-7282
from 8 a.m. to 8 p.m. Eastern time through December 31,
1989 and requesting the IBM Virus Scanning Program, part
number 64F1424. The $35 fee can be charged to
VISA, MasterCard, American Express, or the IBM Credit Card.
There were also a bunch of security-related announcements from IBM
yesterday that I haven't finished reading yet; there may have been
something of relevance in there. I haven't seen any mention of
official updates to the signature files.
This program is very similar to the internal version of VIRSCAN that
you saw while working for IBM.
While I'm here, I'll also mention that it's a good idea to get
anti-virus software direct from the owner whenever possible, and not
trust indirect or pirated versions from questionable sources.
Anti-virus programs are obvious candidates for malicious Trojan-Horse
hacks!
DC
------------------------------
Date: 25 Oct 89 09:59:00 -0400
From: "Damon Kelley; (RJE)" <
[email protected]>
Subject: Another suggestion for preventing viral spread (PC)
Earlier this week I was reading a book by Peter Norton. There was
a passage about the importance of .OBJ files created by compilers
(esp. assembly). While I was pondering the importance of .OBJ files,
an idea hit me: since this type of file is non-executable and can only
run when linked, wouldn't self-attaching viruses be scrambled when the
"host" file is changed to an .EXE?
Of course, the following factors would come into play:
-the linker and the compiler must not be infected;
-there are no viruses present in RAM or the disk(s) of the user;
-the user must be willing to buy some compilers and linkers with
as little economic discomfort as possible;
-virus writers don't know very much about manipulating .OBJ files
correctly; and
-the .OBJ file was not compiled with an attached virus.
In other words, wouldn't it be safer if all programs came .OBJ
files (or ASCII)? That would eliminate much of the virus transmission
going on now, I think.
Counterpoints welcome.
Damon Kelly
jnet%"damon@umbc" "What? Do I speak for anyone
[email protected] else?? Does Reagan remember
[email protected] what he did between 1980-'88??"
------------------------------
Date: Wed, 25 Oct 89 14:21:37 +0000
From:
[email protected]
Subject: RE: Apple II virus - LODE RUNNER
"Non-destructeur" means: that does not destroy info. (So I would guess that
it does not alter info on disks)
Olivier Crepin-Leblond (and YES, I am French...)
Computer Sys & Elec. , Electrical & Electronic Engineering,
King's College London, UK.
------------------------------
Date: Wed, 25 Oct 89 11:45:21 -0400
From: Joe McMahon <
[email protected]>
Subject: INIT 29 vs. locked disk (Mac)
"Thomas R. Blake" <TBLAKE%
[email protected]> writes:
>>(Prior to INIT29, I had been advising my users that if they go
>>to Kinko's they would be safe if they took only their data diskette.
>>But if a data infection can spread to their application disks,
>>this would not be good advice.)
>>
>>Anyone got the REAL answer?
>
>Well, I assume they're going to Kinko's to print. (Yes/No?) I'd say
>if they write-protect their diskettes they have no need to worry.
>
>Macintosh viruses will not spread to write-protected diskettes.
The problem with INIT 29, though, is that inserting a locked disk into
the drive will get the "This disk needs minor repairs..." dialog. If
they don't unlock it the disk will be rejected. If they do, it will be
infected. Cute, huh?
Best option is to COPY the files to another floppy, take it, use it,
bring it home, and INITIALIZE IT IMMEDIATELY.
--- Joe M.
------------------------------
Date: 25 Oct 89 20:51:54 +0000
From:
[email protected] (Jim Wright)
Subject: Re: Jerusalem Virus Version B detected (PC)
In article <
[email protected]>
[email protected]
du writes:
| After running Scan 1.1V45 on my hard drive I detected the Jerusalem Virus
| Version B on one of my files. The file that I detected the virus on had
| not appeared in earlier runs of Scan.
|
| The infected file is UNVIRUS.EXE. The archive I got it out of was
| UNVIRUS.ARC. I downloaded this file from the SIMTEL20 PD archives. I
| immediately deleted the file. I have never had a reason to the
| program (and I would think that running the program on itself would
| have adverse affects).
I uploaded unvirus.arc to SIMTEL20, after it was sent directly to me
by the author. I will assert there is no virus in that file. Of course,
for the program to be able to deal with the Jerusalem-B virus, it must
first identify it. Apparently scanv is setting off false alarms based
on the identification code present in unvirus. Scanv previously had
problems with false alarms with one of the author's own programs.
Unvirus.arc is an old version that was removed from distribution at
the request of the author. No problems, but a newer version has been
released. Please get unvir6.arc from any of the IBMPC anti-viral
archives. Unvir6.arc also replaces the file immune.arc.
Now, as for scanv. The author said previously that he regularly changes
the methods he uses to identify viruses, thus hopefully discouraging
crackers from releasing minor modifications of existing viruses. It
seems that this incarnation of scanv is triggered by what it sees in
unvirus.
I tested both scanv45 and scanv42. 45 choked on it, 42 gave no false
alarms. One more curious point. Scanv45 insisted that Jerusalem-B
was present in memory! How to explain this? I *never* executed
the unvirus program, so even it it did have a virus it couldn't load
itself. No other file set off any alarms. Where did it come from?
Well, when I unarchived unvirus.arc or unvir6.arc, the archiving
program used more memory than scanv. Since MS-DOS doesn't clear
memory after programs execute, there was still an image of unvirus
left where the archiver had been working. Scanv45 barfed on this!
To verify this, I unarchived unvir6.arc, then ran DBASE III+, then
ran scanv45. This time no virus found in memory.
So in summary, replace unvirus.arc with the current release unvir6.arc.
Apparently scanv45 sets off a false alarm with unvirus (either version).
Neither author should be faulted for this. But everyone should be
made aware of it. And don't put blind faith in any one program!!
- --
Jim Wright
[email protected] (ignore the Reply-To: line)
------------------------------
Date: Wed, 25 Oct 89 13:51:33 -0500
From: GX6692%
[email protected] (Vince Laurent - work id)
Subject: DataCrime Strikes!! (PC)
I just got back to work today and was notified that ALL our hard drives
at work had to be reformatted since they had the virus on them. We used
IBM's release of VIRUSCAN and the tests were positive - we were hit. I
don't know the extent of the damage on campus yet but other departments
are worried. Is there a 'cure'? Please contact me directly ASAP! Thanks!
---------------------------------------------
| Vincent J. Laurent |
| Computing Information Center & |
| Computer Learning Center 1 |
| Southern Illinois University - Carbondale |
| GX6692@SIUCVMB |
---------------------------------------------
------------------------------
Date: 25 Oct 89 21:11:00 +0700
From: "Okay S J" <
[email protected]>
Subject: Xeno--possible new virus?(AMIGA)
I received this from Amiga-relay this morning....From all reports, it
appears that Xeno, if it is a virus, is the 1st non-boot infector virus
in the Amiga community. All the others I've seen so far live in the boot
sector and most Amiga anti-virals seem to only worry about the boot sector
and in RAM at the time.
I'll cross-post anything I hear from either side to their respective
lists.
- ---Steve
- ----------
Stephen Okay Technical Aide, The MITRE Corporation
x6737
[email protected]/
[email protected]
*************************CUT HERE CUT HERE*********************************
Date: 24 Oct 89 11:21:03 GMT
From: MTR780::WINS%"<
[email protected]>" 24-OCT-1989 13:36:26.00
Subj: Xeno - Another bad virus?
From: Anssi Ahonen <
[email protected]>
Newsgroups: comp.sys.amiga
Subject: Xeno - Another bad virus?
Does anyone have information about virus called 'xeno'? This little
beast is living on my hard disk (30 meg Supra, A500) and after many
unsuccesful tries I still haven't find it. It first showed up a few
days ago when I opened the shell and tried to get directory with
'ls'-command. The shell just gave me 'unknown command ls', and after
that I noticed that also 'CD'-command didn't work. Strangely, the
programs were still in c-dir, just as usual. I loaded my favourite
debugger and examined the broken cli-commands. Both programs were
modified so that they only used DOS.Write to print out 'unknown
command'. The weirdest thing was yet to come! I found a strange file
named '!' in devs-directory. This file was an IFF-picture, black
border, white topaz font text : "You will never catch me, the
allmighty Xeno"
So, this is probably the first virus to write iff-files on your hard disk?
I have now examined most of the programs on my hard disk with debugger,
searching for 'virus-signs', extra code hunks, xor-loops etc, but no luck.
The only facts I know are: Xeno is not a bootblock virus.
It doesn't change reset-vectors.
I am pretty sure it is some kind of link virus
(like IRQ), but much harder to beat.
*********************END FORWARDED MESSAGE***********************************
------------------------------
Date: Wed, 25 Oct 89 18:23:50 -0400
From: Tom Young <XMU%
[email protected]>
Subject: SCANv45 and UNVIRUS (PC)
RE: Posting by Sean Haynes of Northeastern in vol. 2, issue 222.
I, too, have a report that SCANv45 is generating a positive for
Jerusalem-B when checking UNVIRUS.EXE. I don't have v45 yet, so cannot
confirm. But the copy of UNVIRUS that I've distributed here came from
the hotel.cis.ksu.edu server, not SIMTEL20. And I have successfully
used UNVIRUS to remove Jerusalem-B infections. My copy of UNVIRUS does
not set off SCANv42. I suspect that the fault lies with the newer
version of John McAfee's program. Someone should confirm this before
people start doubting the integrity of the virus archive sites.
Thanks.
Tom Young, Cornell Information Technologies
[Ed. See Jim Wright's message (in this digest) about SCANv45 producing
false alarms.]
------------------------------
Date: Tue, 24 Oct 89 20:24:16 -0500
From: Peter da Silva <peter%
[email protected]>
Subject: reposting of FICTITIOUS virus story (UNIX)
This is the "UNIX VIRUS" article I referred to in a previous digest. It
was posted in this form, complete with postscript.
No more than a week later the Internet Worm was loose. I was originally
amused by the irony, but as it became clear that the IW was relatively
uninfective (only infected Sun-3s and VAXen) I felt more secure about my
final paragraph. I still do.
The debate "raging in comp.sys.amiga" at the time was about whether UNIX
was as susceptible to viruses as PCs were. :->
- -----------8<----8<--------------------------------------------------`-_-'--
The Usenet virus: a case history.
A cautionary tale.
The Usenet virus was detected when a user discovered that
a program he had received from the net seemed to have two
versions of malloc included with the source. One version of
malloc might be odd, but people have never tired of reinventing
the wheel. Two versions were suspicious, particularly since they
lead to a name conflict when the program was linked.
The first, lmalloc.c, seemed to be identical to the
malloc listed in Kernighan and Ritchie. The second, bmalloc.c,
was rather strange, so we concentrated our efforts on it... this
time was later found to have been wasted.
After a little work during spare moments over the course
of a week we decided it was actually a clumsy version of the
buddy system (a fast but space-inefficient method of memory
allocation). It might make a good example of how not to write
readable code in some textbook, but it wasn't anything to get
worried about.
Back to the first. It made use of a routine named
speedhack() that was called before sbrk() the first time the
malloc() was called. There was a file speedhack.c, but it didn't
contain any code at all, just a comment saying that it would be
implemented in a future version. After some further digging,
speedhack was found at the end of main.c. The name was disguised
by some clever #defines, so it never showed up in tags and
couldn't be found just by grepping the source.
This program turned out to be a slow virus. When it was
run, it looked for a file 'lmalloc.c'. If it found it, or it
didn't find Makefile, it returned. From then on malloc ran
normally.
If it didn't find it, it reconstructed it using a series
of other routines with innocuous names tagged on to the end of
other files. This was apparently an attempt to avoid overly
increasing the size of any one of the files in the directory.
Then it went into Makefile or makefile (it looked for
both) and added lmalloc.o onto the end of the first list of '.o'
files it found. It then reconstructed each of the extra routines,
and speedhack itself, using techniques familiar to any reader of
the obfuscated 'C' contest. These were tagged onto the ends of
the '.c' files that corresponded to the '.o' files in this same
list. The program was now primed to reconstruct the virus.
On inspection, we discovered that about 40% of the
sources on our system were infected by the speedhack virus, We
also found it in one set of shell archives that we'd received
but never unpacked or used, which we took as evidence that it had
spread to a number of other systems.
We have no idea how our system was infected. Given the
frequency with which we make modifications and updates, it's
likely that the original speedhacked code is no longer on the
system. We urge you to inspect your programs for this virus in
an attempt to track it to its source. It almost slipped by
us... if the author had actually put a dummy speedhack in
speedhack.c we would have merely taken lmalloc.o out of the
Makefile and defused *this* copy of the virus without being any
the wiser.
There are other failings in this program that we have
thought of. We have decided not to describe them to avoid giving
the author of this program ideas we might regret. Some ways that
programs like this can be defeated include 'crc' checks of source
files and, of course, careful examination of sources received
from insecure sites.
- -----
Now I have to make a confession. This whole document is a hoax intended
to dramatize the problems involved with viruses and Usenet. I suspect that
most of you were clued to this by the Keywords line. While playing with the
idea and writing this article several things occurred to me:
First of all, this virus is a much more complex program than any of the
viruses that have been spotted on personal computers. I think it has to be,
based on the design goals that a REAL UNIX virus must satisfy. I have not
attempted to actually implement it because of this.
It must be small, to avoid detection. It must not cause files to
grow without bound.
It must infect foreign files, otherwise it's not a virus... just a
Trojan Horse (like the bogus ARC and FLAG programs on the PC). Trojan horses
are a dime-a-dozen.
It must infect source files, since this is the primary software
distribution channel for UNIX. A virus stuck on one machine is a boring
one.
It must not break the infected program (other than what it might
care to do deliberately).
It must not be obvious from a simple examination of the source (like,
changing main to Main and having a virus-main call Main).
I believe that given these goals (which are, of course, subject to
debate) a simpler program would be unsuccessful in infesting more than a
small fraction of the machines that (say) comp.sources.misc reaches.
There are systems immune to this particular attack, of course. Ones not
running UNIX, so sbrk() doesn't work. Or ones with radically different
versions of malloc(). Ones with no 'c' compiler. They are in the minority,
though.
On the other hand a virus of this type could infest a large proportion
of the net before it was found. The virus I described does not cause any
direct damage, except for using up a relatively small amount of disk
space. A more vicious virus is possible.
Other variations of this virus are obviously possible. For example, it
could be tagged onto any standard 'C' library routine... I chose malloc
merely because source was available and because it's something that people
complain about, so they wouldn't be likely to find an extra copy suspicious.
Another good routine would be perror(), for the same reason. This would have
the additional benefit of making the spread of the infection dependent on
an additional random factor, making it harder to detect the virus.
Do I think something like this is likely? No. Especially not now that
I've written this little piece of science fiction. I'm sure that
eventually someone will try something unlike this, I suspect that their
virus would get caught much sooner than 'speedhack', because I think
that more people look at the source than conventional wisdom would lead
you to believe. But, again, this is just my personal opinion. Debate is
welcomed... that's why I did this in the first place: to inject some
sense into the debate currently raging in comp.sys.amiga.
- ---
Peter da Silva, *NIX support guy @ Ferranti International Controls Corporation.
Biz:
[email protected], +1 713 274 5180. Fun:
[email protected]. `-_-'
"That particular mistake will not be repeated. There are plenty of 'U`
mistakes left that have not yet been used." -- Andy Tanenbaum (
[email protected])
-----------------------------
End of VIRUS-L Digest
*********************
Downloaded From P-80 International Information Systems 304-744-2253