Copy Link
Add to Bookmark
Report
Tolmes News Service 35
#######################################
# #
# #
# ======== =\ = ====== #
# == = \ = = #
# == = \ = ====== #
# == = \ = = #
# == = \= ====== #
# #
# #
# <Tolmes News Service> #
# ''''''''''''''''''''' #
# #
# #
# > Written by Dr. Hugo P. Tolmes < #
# #
# #
#######################################
Issue Number: 35
Release Date: April 30, 1988
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
TITLE: Virus Wars: A Serious Warning
FROM: PC Magazine
DATE: February 29, 1988
by: John C. Dvorak
-----------------------------------------------------------------------
A new computer virus is infecting microcomputers around the world.
Where is the utility that will prevent our PCs from becoming victims in
this epidemic?
-----------------------------------------------------------------------
A computer virus (sometimes called a Trojan horse or a worm) is a
small and sinister piece of software code that literally infects your
machine. It is inserted into a public-domain or bootleg program and,
when the program is used, the virus code is alerted and rewrites itself
into something in your system and typically (and eventually) calls a
hard disk routine and tells the disk to erase itself. Computer
sabotage. It's getting worse and we should all be aware of it. On the
West Coast a battle wages where Apple Macintosh users and IBM PC users
are loading software with viruses to "attack" their foe: a user of the
other kind of machine.
THE LEHIGH VIRUS
Meanwhile, one virus has made headlines. It was released at Lehigh
University. Here's an excerpt from a memo sent out over UseNet from
Kenneth R. van Wyk, User Services Senior Consultant, Lehigh University
Computing Center. It describes the virus that was set loose just
before Thanksgiving last year and is now floating around the world.
"Last week, some of our student consultants discovered a virus
program that's been spreading rapidly throughout Lehigh University. It
has the chance of spreading much farther than just our University. We
had no idea where the virus started, but some users have told me that
other universities have recently had similar problems.
"The virus itself is contained in the stack space of COMMAND.COM.
When a PC is booted from an infected disk, all a user need do to spread
the virus is to access another disks via TYPE, COPY, DIR, etc. If the
other disk contains COMMAND.COM, the virus code is copied to the other
disk. Then, a counter is incremented on the parent. When this counter
reaches a value of 4, and and every disk in the PC is erased
thoroughly. The boote the FAT tables, etc.
All Norton's horses couldn't put it back together again. This affects
both floppy and hard disks. Meanwhile, the four children that were
created go on to tell four friends, and then they tell four friends,
and so on, and so on.
"Detection: while the virus appears to be very well written, the
author did leave behind a couple footprints. First, the write date of
COMMAND.COM changes. Second, if there's a write protect tab on an
uninfected disk, you will get a WRITE PROTECT ERROR. So, boot up from a
suspected virus'd disk and access a write-protected disk--if an error
comes up, then you're sure. Note that the length of COMMAND.COM Does
not get altered.
"I urge anyone who comes in contact with publicly accessible disks to
periodically check their own disks. Also, exercise safe computer--
always wear a write protect tab.
"This is not a joke. A large percentage of our public site disks has
been gonged by this virus in the last couple days."
The mainstream computer magazines seldom discuss these destructive
little gags, even though there are plenty of them. PC users must make
themselves aware of these things. If a virus program got into a
corporation and started eating hard disks, you can be sure that the
next time someone brought in some software from home, it would quickly
be confiscated. This kind of thing only encourages MIS departments to
take total control of the microcomputer installation. Remember, that
most talented of the hackers love to design programs like this just to
harass the average PC user.
We need some utilities that check the integrity of our computer
systems. Of course, these programs would be quickly defeated by some
maniac who would find the loophole in the algorithm, and the integrity
checker would have to be forever updated. (Sounds like a money-maker!)
Some say that the solution to these sick jokes is to perpetually back
up the hard disk like a good little boy. Great. I back up my hard
disk once a year whether it needs it or not. So what am I (and most
users) supposed to do in between times?
All you can do is be careful and know that someone out there is about
to make your life miserable if you're not prudent.
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
NOTA:
Viruses seem to be a very hot item these days as I've explained in previous
issues of TNS. Besides the many articles on viruses that have been published
(many of which are in previous issues of TNS or future issues) I have seen
several news reports on the dangers of computer viruses. All of this hysteria
has been caused by a few incidents at several universities here and Hebrew
University. Other tensions are still around because of the Chaos Computer
break-ins in NASA's SPAN network.
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
TOLMES NEWS SERVICE INDEX:
--------------------------
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #1
----------------------------
Introduction to TNS Magazine
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #2
----------------------------
Introduction to Issue #2
They Sure Can Talk in Raleigh
Teaching Computer Ethics in the Schools
Cash-Machine Magician
Cheaper Electronics Makes It a Snap to Snoop
Los Alamos Nuclear Facility Security Boost
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #3
----------------------------
Making Computers Snoop-Proof
War Against Phone Hacking Heats Up
Toll Fraud Trial Sets New Tone
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #4
----------------------------
Cellular Technology
Pirate BBS
Scanning Bust
Rip Offs
How the Soviets Are Bugging America
Deadly Bugs
The Newest Dating Game
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #5
----------------------------
Electronic Cryptography Report
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #6
----------------------------
HD Sentry: Hard Disk Protection from Trojan Horse Programs
Check This: Ma Bell is a Generous Soul
Sign In and then Sign On
How To Beat Phone Assault
Prisoner Phone Phreaks
Suburban Kids Are Too Dumb to Steal
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #7
----------------------------
Federal Sting Nets 25 for Cellular Phone Fraud in NYC
18 Are Seized in Illegal Use of Mobile Telephones
Hello Anywhere
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #8
----------------------------
Keeping the Secrets Inside the Computer
Bugging
Urine Hot-Line
Innovation? Just Hold the Phone
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #9
----------------------------
The National Guards
The Caller That Isn't Long-Winded
A Call to Stop Long-Distance Scam
Online Junkies- Artificial Intelligence
Hacking Through NASA: A Threat- Or Only an Embarassment
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #10
-----------------------------
The Bust of Shadow Hawk
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #11
-----------------------------
Shadow Hawk's Bust: Continued from TNS Issue #10
US Sprint Sues "Ring" of Hackers for $20 Million
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #12
-----------------------------
The Blue Box and Ma B- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #13
-----------------------------
Capt. Zap: Informant?
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #14
-----------------------------
411: Life at Directory Assistance
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #15
-----------------------------
The Max Headroom TV Pirate
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #16
-----------------------------
The Celling of America
Tales That Do Not Compute
Responses to Issue #12's Article
Introduction: TNS QuickNotes
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #17
-----------------------------
New Security Measures at ITT
Capt. Zap's Defense
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #18
-----------------------------
2600 Magazine's Official Bulletin Boards
Some Things about Phrack Inc.
Syndicate Report: Will It Return?
TNS QuickNotes
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #19
-----------------------------
'If You Need Help, Press 3'
Satellite Paging
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #20
-----------------------------
AT&T's Attempt at a Comeback
The 1-900 Report
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #21
-----------------------------
AT&T and Sun Microsystems
1-900's
AT&T Credit Card Fraud Causes a $5,430 Bill
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #22
-----------------------------
TNS Issue Directory
FON Card Review
Credit Card Fraud Arrests
Radio ANI
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #23
-----------------------------
Dial-a-Porn Restrictions
Changes at 2600
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #24
-----------------------------
1-900 Abuses
Gab Lines
Phone Aid
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #25
-----------------------------
Return of The Rebel
Problems for Mafia Dude
The Foreign Legion
Return of the Private Connection
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #26
-----------------------------
Computer Terrorism!
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #27
-----------------------------
Changes at 2600 Magazine
Virus Report
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #28
-----------------------------
Viruses Threatening an Era of Computer Freedom
The Tulsa Busts
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #29
-----------------------------
Telecom Update
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #30
-----------------------------
Federal Phone Snafu
The Trojan Wars
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #31
-----------------------------
Computer Systems Under Seige
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #32
-----------------------------
Computer Terror
Youths Suspected in Phone Fraud
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #33
-----------------------------
Breaking and Entering: High Tech Style
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Tolmes News Service Issue #34
-----------------------------
Multi-State Computer Theft Ring
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$