Copy Link
Add to Bookmark
Report
Tolmes News Service 36
#######################################
# #
# #
# ======== =\ = ====== #
# == = \ = = #
# == = \ = ====== #
# == = \ = = #
# == = \= ====== #
# #
# #
# <Tolmes News Service> #
# ''''''''''''''''''''' #
# #
# #
# > Written by Dr. Hugo P. Tolmes < #
# #
# #
#######################################
Issue Number: 36
Release Date: May 2, 1988
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
TITLE: Is Your Computer Infected?
FROM: Newsweek
DATE: February 1, 1988
Systems fall to silent- and contagious - killers
Last fall nurses at an Eastern medical center noticed an alarming
problem- patients' records were mysteriously disappearing from the
hospital's computer system. After several weeks experts found the
culprit: a small, maliciouls program known as a computer "virus" had been
injected into the system where it proceeded to destory nearly 40 percent
of the records. The person who apparently had planted it left his name
and phone numbers (in Pakistan) with a message embedded in the software:
"Beware of this virus, contact us for vaccination." Though they haven't
nabbed the culprit, officials stopped the destruction, but computers at a
nearby university remain infected.
Computer viruses are silent killers. Usually there are no obvious
signs of infection until the damage has already been done. Hence some are known
as "Trojan horses," while "logic bombs" come equipped with long fuses. The
viruses are highly contagious. They can travel unnoticed though the electronic
networks that link machines. They can also spread every time a contaminated
floppy disc is loaded; the virus will remain in the machine's memory (as long
as the power is on) and will damage other discs that are inserted. As a
result, computer with many users, such as dealer demonstration machines, are
especially prone to trouble. "In a matter of minutes, an entire system can
be infected," says security expert Robert Courtney.
Like other social disease, these viruses cut across all classes. Just
before Christmas, a virus attacked IBM's worldwide electronic-message
network. The program sent a holiday greetings to computer users and then
passed the same message to everyone on that person's mail-distribution list.
In a matter of hours, the massive electronic chain letter overloaded the
network. A different virus recently hit the University of Bethelhem, Pa.,
destroying data on students' computer diskettes. Another, spread by floppy
discs, has plagued some owners of Amiga computers. There are also rumors that
IRS computers have been attacked, though officials insist those rumors
are unfounded. "We've known about viruses for over 10 years, but we've
just started to really see them in action," says Donn Parker, a computer-security expert at SRI International
in Menlo Park, Calif.
Immune System:
Scientists worry that viruses could cripple a c
control computers. Building up their immune systems will be costly. "It will
require major changes in operating-system design," says computer security
expert David R. Wilson, of Ernst & Whinney.
In the meantime, experts are scrambling to cope with the problem.
"We shared information with the IRS, the Department of Defense, the National
Security Agency, the Federal Reserve Bank, the nuclear power industry...
anyone who has enemies," says Eric Hansen, a Minneapolis computer
scientist who wrote the Data Physician, software designed to protect against
viruses. Many fear that the electronic vandalism will only get worse. "It's
like mass murders or freeway shootings," says Peter Neumann, a researcher
at SRI. "You get one and then you get a whole raft of them."
WILLIAM D. MARBACH with
RICHARD SANDZA in Washington and
MICHAEL ROGERS in San Francisco
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
NOTA:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
"The person who apparently had planted it left his name and phone
numbers (in Pakistan) with a message embedded in the software:"
I have to wonder what has happened to this guy. This is the same virus that
has been mentioned in several other magazines with the same message. His
little message helps explain what computers are infected with that same virus.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
"Just before Christmas, a virus attacked IBM's worldwide electronic
message network. The program sent a holiday greetings to computer users and
then passed the same message to everyone on that person's mail distribution
list."
This incident has been covered in previous issues of TNS and will be
covered in future issues.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
"'We've known about viruses for over 10 years, but we've just started
to really see them in action,' says Donn Parker, a computer-security expert
at SRI International in Menlo Park, Calif."
Ahhhh yess... the ever-present quote from Donn Parker. An article on viruses
or hackers just wouldn't be right without a quote from Donn.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
One last thing that I would like to note. The writer of the article is
Richard Sandza along with others. Mr. Sandza is well known in the hacking
community for other articles on hacking which I won't mention.
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
TNS QuickNotes
--------------
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
I'm still trying to locate that article in the Houston Chronicle about Jack
the Ripper's bust. Even though I can't get ahold of it... it is established
that Jack the Ripper was busted.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
PC Pursuit is taking steps against hackers. They have established an
anti-hacker team to stop intruders from using the system. It is unknown at the
present time how effective it will be. Many people continue to use PC Pursuit
illegally.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
The long-distance service known as NTS is cracking down. NTS was a service that
accepted almost anything as a valid code and had codes that lasted for a
long time. Many people have received bills from the service.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
The rumor that has been spreading that 950-1055 has ANI is most likely false.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
There is a new underground magazine. It is:
Iron Feather Journal Magazine
PO BOX 4035
East Lansing, MI
The magazine is said to be similar to TAP and 2600. It deals with subjects
relating to hacking/phreaking/anarchy/carding/etc.
It costs about $1.00 for 3-5 issues (I'm told). I know very little about this
magazine so I suggest that people write first for information.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Golden Hawk called up Allnet claiming that he was writing a paper. He found
out that they are losing about $400,000 a month due to hackers and general
fraud.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Allnet has switched to 7 digits in SOME areas. Some areas also accept both
six and seven digits and are gradually eliminating the six digit codes.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Dragon Slayer has written an MCI Hacker that defeats MCI anti-hacker software
through the use of multiple port selection.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Crimson Death has become an editor of Phrack Inc. and it is said that
Shooting Shark will no longer be an editor of Phrack.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Thunder Seven is collecting wierd numbers for a list. People with strange
numbers might want to contact him.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Pennsylvania Magazine had a recent article all about John Maxfield. In the
article, Maxfield insulted all hackers and called them various names. He
claimed to know 5000 hackers.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
A file entitled "Amtrak" is going around from board to board. It is all about
getting free train fare. The techniques stated in the file do work and people
might be interested in reading it.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Telenet has begun changing all high level passwords as a security measure.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Turbo Transfe TCA's West Coast HQ.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Techninja called up one of his favorite boards and discovered that the sysop
had been nailed for hacking 950s. All of the sysop's equipment was taken
and the sysop was said to be liable for up to $20,000 worth of damage. This
is the third bbs that Techninja has been a member of and has gotten busted.
Bad luck.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ABC's Nightline reportedly had a show on hackers. The show was broadcast
sometime around April 11, 1988.
I've been unable to get any details on the show.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Saber's Edge is helping to put together a magazine entitled "Insider Trading."
The magazine, an on-line magazine, is supposed to be very similar to Phrack.
They are currently looking for articles.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
People are encouraged to join in on the StoryBook at Turbo Transfers to find
out about Oryan Quest... very humerous.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$