Copy Link
Add to Bookmark
Report

Chaos Digest Volume 01 Numero 05

eZine's profile picture
Published in 
Chaos Digest
 · 4 years ago

  

Chaos Digest Lundi 25 Janvier 1993 Volume 1 : Numero 5

Editeur: Jean-Bernard Condat (jbcondat@attmail.com)
Archiviste: Yves-Marie Crabbe
Co-Redacteurs: Arnaud Bigare, Stephane Briere

TABLE DES MATIERES, #1.05 (25 Janv 1993)
File 1--Un pirate a l'abordage de la Banque de France
File 2--Le coup d'un genie de l'informatique
File 3--Definition des codes parasites autopropageables (CPAs)
File 4--Le Pheacking americain vu du cote francais
File 5--Horloge en panne, pourquoi?
File 6--Jeune Lettonien a la recherche de correspondants

Chaos Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost from jbcondat@attmail.com. The editors may be
contacted by voice (+33 1 40101775), fax (+33 1 40101764) or S-mail at:
Jean-Bernard Condat, Chaos Computer Club France [CCCF], 47 rue des Rosiers,
93400 St-Ouen, France

Issues of Chaos-D can also be found on some French BBS. Back issues also
may be obtained from the mail server at jbcondat@attmail.com: all incoming
messages containing "Request: ChaosD #x.yy" in the "Suject:" field are
answered (x is the volume and yy the issue).

CHAOS DIGEST is an open forum dedicated to sharing French information among
computerists and to the presentation and debate of diverse views. ChaosD
material may be reprinted for non-profit as long as the source is cited.
Some authors do copyright their material, and they should be contacted for
reprint permission. Readers are encouraged to submit reasoned articles in
French, English or German languages relating to computer culture and
telecommunications. Articles are preferred to short responses. Please
avoid quoting previous posts unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Chaos Digest contributors
assume all responsibility for ensuring that articles
submitted do not violate copyright protections.

----------------------------------------------------------------------

Date: Sat Jan 23 00:09:28 +0100 1993
From: langlois@ciril.fr (Langlois Ph. )
Subject: File 1--Un pirate a l'abordage de la Banque de France
Copyright: Agence France Presse, 1993

Divers escroquerie - Arrestation d'un jeune escroc qui avait perce
les secrets de la Banque de France- GRENOBLE, 17 jan 93 (250 MOTS)
Un jeune homme de 22 ans qui avait reussi, par un stratageme non
revele par les policiers, a percer un secteur secret de la Banque de
France en s'infiltrant dans le systeme informatique, a ete arrete et
ecroue samedi apres avoir ete presente au Parquet de Grenoble.
Laurent Darvey, domicilie a Fontaine (Isere) et passionne
d'informatique, a reussi a connaitre le code donnant la liste des
chequiers voles centralisee a la Banque de France, a-t-on indique de
source policiere.
Ayant derobe des chequiers, il a pu disposer librement de ceux qui
ne figuraient pas sur ces listes. C'est ainsi qu'au cours des deux
dernieres annees, il a utilise les formulaires de six chequiers ne
lui appartenant pas et "depenser" la somme relativement modeste de
40.000 francs. Pour mieux ecouler ces cheques, il avait egalement
derobe trois cartes d'identites qu'il a falsifiees.
Il a ete demasque par un commercant qui avait releve le numero
de la carte d'identite presentee mais egalement celui de l'automobile
au volant de laquelle l'escroc repartait. Les plaques mineralogiques
etaient egalement fausses mais le signalement precis du commercant a
permis l'arrestation du jeune homme qui s'est vu signifier une
inculpation de faux, usage de faux et escroquerie.
HM/jmg

------------------------------

Date: Fri Jan 22 13:52:48 -0500 1993
From: Mike.Swartzbeck@p816.f70.n109.z1.fidonet.org (Mike Swartzbeck)
Subject: File 2--Le coup d'un genie de l'informatique
Copyright: Serge Pueyo, France Soir, 1993

UN PIRATE A L'ABORDAGE DE LA BANQUE DE FRANCE

Il annulait les oppositions faites sur les cheques voles.
Exploit technique mais maigre butin

Laurent Darvey a 22 ans. Domicilie a Fontaine, pres de Grenoble
(Isere), il a une passion: l'informatique, ou plus exactement le piratage
informatique. En 1991, il se procure sous une fausse identite un document
informatique qui lui permet d'acceder au fichier de la Banque de France,
fichier contenant les identifications des cheques voles. Grace a son
ordinateur et par un procede de son invention, qui n'a pas ete revele,
Laurent Darvey reussit a annuler les procedures d'opposition faites sur les
chequiers qu'il a derobes.

Le jeune homme ne se contente pas de pirater la Banque de France. Il
est aussi voleur et faussaire a ses heures. Il a ainsi vole a plusieurs de
ses collegues de travail leurs chequiers et leurs papiers, qu'ils
s'empressait aussitot de maquiller habilement. De plus, il circulait avec
un voiture faussement immatriculee. Laurent Darvey ne semblait pas avoir de
gros besoins, puisqu'en un peu plus d'un an, il n'aurait emis que 40.000 F
de cheques voles.

Mais une habitante de Voiron (Isere) va mettre les policiers sur ses
traces. En decembre, Laurent darvey lui achete pour 5.500 F un ordinateur,
qu'il revend aussitot. Mefiante, la dame releve toutefois le numero de sa
carte d'identite et, a la derobee, le numero de sa plaque
d'immatriculation. Au cas ou...


CARTE VOLEE. Decouvrant qu'elle a ete payee avec un cheque en bois, elle
porte plainte. Les enqueteurs s'apercoivent alors que la fausse carte
d'identite de l'escroc a ete volee en juin 1991 dans un centre de formation
professionnelle pour adultes, a Pont-de-Claix. Ils se font donc remettre
tous les dossiers des stagiaires--soixante-six au total--parmi lesquels se
trouve celui de Laurent Darvey, puisqu'il avait suivi une formation dans ce
centre.

Sa victime le reconnait sur photo. Les policiers ont arrete jeudi
dernier le jeune homme a son domicile, ou ils ont retrouve d'autres
chequiers voles, des cartes d'identite falsifiees et du materiel
informatique, vole lui aussi. Laurent Darvey a reconnu sans difficulte les
faits qui lui sont reproches. Il a ete ecroue a la prison de Varces, pres
de Grenoble.

Comme le prejudice n'est pas tres eleve, on peut penser que, pour le
petit genie de l'informatique, pirater la Banque de France, reputee
inviolable, etait finalement le but du jeu. Un petit jeu qui s'acheve
pourtant derriere les barreaux.

------------------------------

Date: Sat Jan 23 13:49:00 -0600 1993
From: roberts@decus.arc.ab.ca ("Rob Slade, DECrypt Editor, VARUG NLC rep,
604-984-4067" )
Subject: File 3--Definition des codes parasites autopropageables (CPAs)
Copyright: Robert M. Slade, 1991, 1993


Towards a Definition of computer Viral Programs
Robert Slade

(The following is excerpted from Robert Slade's weekly column on
Computer Viral programs published in VIRUS-L and on Fidonet. These
articles originally appeared in July, 1991.)

The "man on the street" is now often aware of the term "computer virus"
even if he (or she) does not use a computer. However, it is often the case
that those who are otherwise technically literate do not understand some of
the implications of the phrase. This is not surprising in that the term is
slang, is often misused, and that "hard" information is difficult to come
by.

It is important to know what a computer virus is if you are going to defend
yourself against the many that are "out there." It is also important to
know what a computer virus is not. There are other types of programs and
situations which can do damage to your computer or data, and many of these
will not be caught by the same methods which must trap viral programs.

A biological analogy, which we find in the dictionary, is helpful. The
Oxford English Dictionary, which speaks of:
"...a moral or intellectual poison, or poisonous influence..."
while satisfying to the wounded ego of those who have been hit is not
terribly helpful in a technical sense. Webster, however, steers us in a
more helpful route in stating that a virus is:
"...dependent on the host's living cells for their growth and
reproduction..."

By eliminating the biological references, we can come to the definition
that a virus is an entity which uses the resources of the host to spread
and reproduceitself without informed operator action. Let me stress here,
the word "informed." A virus cannot run completely on its own. The
computer user must always take some action, even if it is only to turn the
computer on. This is the major strength of a virus: it uses *normal*
computer operations to do its dirty work, and therefore there is no single
identifying code that can be used to find a viral program.

I must make mention, before I continue, of the work of Fred Cohen. Dr.
Cohen is generally held to have coined the term "computer virus" in his
thesis, published in 1986. However, his definition covers only those
sections of code which, when active, attach themselves to other programs.
This, however, neglects many of the programs which have been most
successful "in the wild". Many researchers still insist on this
definition, and therefore use other terms such as "worm" and "bacterium"
for those viri which do not attack programs.

Having established that viral programs copy themselves, and before going on
to related types of programs, let me list a few things that viri are *not*.

Let me first say that computer viral programs are not a "natural"
occurrence. These are programs which are written by programmers. They did
not just appear through some kind of electronic evolution. Viral programs
are written, deliberately, by people. (Having studied the beasts almost
from their inception, I was rather startled when a young, intelligent, well
educated executive proposed to me that viri had somehow "just grown" like
their biological counterparts.)

The popular press has recently started to publicize the term computer
virus, but without giving any details other than the fact that viri are to
be feared. (Often the reports talk about "main storage destroyed" and other
such phrases which have very little meaning.) This has given most people
the impression that anything that goes wrong with a computer is a virus.
>From hardware failures to errors in use, everything is blamed on a virus.
*A VIRUS IS NOT JUST ANY DAMAGING CONDITION.*

Likewise, it is now considered that any program that may do damage to your
data or your access to computing resources is a virus. We will speak
further about trojan horse programs, logic bombs and worms, but it is
important to note that viral programs have common characteristics that
other damaging or security breaking programs may lack. Viri are not just
any damaging program.

Indeed, viral programs are not always damaging, at least not in the sense
of being deliberately designed to erase data or disrupt operations. Most
viral programs seem to have designed to be a kind of electronic graffiti:
intended to make the writer's mark in the world, if not his or her name.
In some cases a name is displayed, on occasion an address, phone number,
company name or political party (and in one case, a ham radio license
number.)

On the other hand, viral programs cannot be considered a joke. Often they
may have been written as a prank, but even those which have been written so
as not to do any damage have had bugs, in common with any poorly written
program. The author of Stoned obviously knew nothing of high density
floppies or RLL drive specifications. In fact, it appears that the
trashing of data by the Ogre/Disk Killer virus, one of the most damaging,
was originally intended to be reversible, were it not for an error on the
part of the programmer. Any program which makes changes to the computer
system that are unknown to the operator can cause trouble, the more so when
they are designed to keep spreading those changes to more and more systems.

However, it is going to far to say, as some have, that the very existence
of viral programs, and the fact that both viral strains and numbers of
individual infections are growing, means that computers are finished. At
the present time, the general public is not well informed about the virus
threat, and so more copies of viri are being produced than are being
destroyed. As people become aware of the danger, this will change.

If we stick to a strictly "Cohenesque" definition of viral programs as only
those which attach to specific programs, then there are some difficulties
with defining other, similar, programs which reproduce themselves, but
without being linked to a specific program.

Unfortunately, although attempts have been made to address this issue,
there is, as yet, little agreement as to the terminology.

In early multi-tasking operating systems, programs often "broke the
bounds", and would overwrite sections of other programs or data. Since
this damage was generally random, the pattern of damage, when mapped, gave
the appearance of twisting tracks which appeared and disappeared. This
closely resembled the patterns seen when cutting through a piece of worm
eaten wood, giving rise to the term "worm" for such rogue programs. One
such program escaped not only from its own partition within the computer,
but actually escaped from the original computer to another over an early
computer networking system. The term "worm" has therefore come to be used
to refer to viral programs which do not attach to specific programs, and,
more specifically, to those which use network communications as a vehicle
for spreading and reproduction.

Two examples of this usage are the famous Morris/Internet/UNIX worm of late
1988, and the lesser known CHRISTMA EXEC mail worm of December 1987.

This still leaves a class of viral programs which do not attach
specifically to programs. There are actually many sub-groupings within
this group, and there are within viral programs generally. However,
European researchers, particularly those from France, often refer to such
programs as "bacteria", rather than viri.

In these areas of terminology there is often much debate about whether a
given virus, or type of viral program, fits into a given class. Boot
sector infectors, for example, would not appear to fit the definition of a
virus as infecting another program, since BSI's can be spread by disks
which do not contain any program files. However, the boot sector of a
normal disk, whether or not it is a "system" or bootable disk, always does
contain a program (even if it only states that the disk is not bootable),
and so it can be said that a BSI is a "true" virus.

Two other groups of security breaking programs are very often confused with
viri. The first is the "trojan horse", the second the "logic bomb." The
confusion is understandable, as viral type programs, trojan horses and
logic bombs make up the three largest distinct groups of security breaking
software, and often one may "contain" the code of one another.

A trojan horse is a program which pretends to do one thing, while
performing another, unwanted action. The extent of the "pretence" may vary
greatly. Many of the early PC trojans relied merely on the filename and a
description on a bulletin board. "Login" trojans, popular among university
student mainframe users, will mimic the screen display and prompts of the
normal login program, and may, in fact, pass the username and password
along to the valid login program, as well as stealing it. Some trojans may
contain actual code which does what it is supposed to be doing, while
performing additional nasty acts that it does not tell you about. (I make
the distinction that trojans are always malicious, as opposed to "joke" or
"prank" programs.)

(A recent example of a trojan is the "AIDS Information Disk", often
incorrectly identified in both the general and computer trade press as a
virus. Not to be confused with the, fairly rare, AIDS I and II viri, this
program appears to have been part of a well organized extortion attempt.
The "evaluation disks" were shipped to medical organizations in England and
Europe, with covers, documentation and license agreements just like any
real commercial product. When installed and run, it did give information
and an evaluation of the subject's risk of getting AIDS, but it also
modified the boot sequence so that after 90 reboots of the computer all
files on the disk were encrypted. The user was informed that, in order to
get the decryption key, a "license fee" had to be paid.)

Trojan horse programs are sometimes referred to as an "Arf, arf" or
"Gotcha" program from the screen messages of one of the first examples. A
trojan horse may be used to plant a virus simply by infecting any existing
program.

A logic bomb is a malicious program which is triggered by a certain event
or situation. Logic bomb code may be part of a regular program, or set of
programs, and not activate when first run, thus having some of the features
of a trojan. The trigger can be any event that can be detected by
software, such as a date, username, CPU id, account name, or the presence
or absence of a certain file. Viral programs and trojans may contain logic
bombs.

------------------------------

Date: Sun Jan 24 09:37:49 EST 1993
From: mis@seiden.com (Mark Seiden )
Subject: File 4--Le Pheacking americain vu du cote francais
Copyright: Agence France Presse, 1992

Eco. TIE. ind. - USA/piratage telephonique: un prejudice croissant
pour les entreprises- par Souk CHANTHALANGSY- WASHINGTON, 7 nov 92
(600 MOTS)
Devenu une affaire lucrative et presque sans risque, le piratage
telephonique atteint des proportions inquietantes aux Etats-Unis ou,
selon les experts, il fait perdre chaque annee des centaines de
millions de dollars aux entreprises americaines.
Ce type de fraude est d'autant plus redoutable qu'il n'existe, a
l'heure actuelle, aucune parade d'une efficacite absolue contre ces
pratiques qui font appel a des techniques informatiques
sophistiquees, selon un groupe d'experts reuni recemment sur ce sujet
a Washington par la Commission federale sur les communications (FCC).
Ainsi, entre 1989 et 1992, plus de 550 cas de piratage
telephonique ont ete recenses au sein des quelque 700 entreprises
formant l'Association internationale des communications (ICA). Le
prejudice a ete evalue a 73,5 millions de dollars representant en
grande partie des appels internationaux, soit une moyenne de plus de
130.000 dollars pour chaque fraude.
La quasi-totalite de ces piratages a ete menee par intrusion dans
les standards informatises ("private branch exchange", PBX) et/ou
dans les boites aux lettres vocales ("voice mail") des societes
piratees. Un autre type de fraude consiste a utiliser des cartes de
credit telephoniques dont le code secret a ete prealablement "casse".
"Ces pratiques constituent un exemple flagrant de la fragilite de
l'industrie des telecommunications", a estime le vice-president de
l'ICA, Lawrence Gessini.
Les exemples de fraudes, evoques devant la FCC, sont nombreux. En
juin, une banque du groupe financier americain Leucadia Financial
Corporation a vu le nombre d'appels sur son numero gratuit passer
d'une centaine a plus de dix mille. La fraude n'a ete decouverte
qu'apres reception de la facture de la compagnie ATT: 250.036 dollars
pour ce seul mois, dont plus de 215.000 pour des appels en Republique
dominicaine.
Selon un responsable du groupe bancaire Thomas Mara, les pirates
sont entres avec un ordinateur dans la ligne telephonique gratuite de
l'etablissement. En forcant le systeme de boite aux lettres vocales
et en essayant toutes les combinaisons d'acces a partir du zero, ils
ont trouve le mot de passe actionnant la ligne.
D'apres William Cook, un ancien procureur de Chicago devenu
specialiste de la lutte contre les fraudes informatiques, des
centaines d'intrusion dans les standard telephoniques sont tentees
chaque jour aux Etats-Unis. En 1989, au cours d'un week-end prolonge,
une entreprise avait ainsi perdu 1,4 million de dollars, ses lignes
ayant ete "piratees" par des inconnus.
Les equipementiers en materiels telephoniques accusent
generalement les victimes de n'avoir pas su proteger leur systeme
PBX, les victimes font grief aux equipementiers de ne pas les avoir
prevenues de la vulnerabilite du systeme et les deux se tournent vers
les compagnies de telephone. Entre 25 et 30 % du prejudice est
generalement assume par les compagnies de telephone.
Une unite d'action est necessaire, selon les experts, pour
lutter contre ce piratage qui se traduit chaque annee par "des
milliards de dollars de manque a gagner pour l'economie" et qui
"menace la solvabilite de plusieurs centaines de petites entreprises
du pays", affirme M. Cook qui preconise un renforcement des sanctions
afin de dissuader les malfaiteurs.
"Les risques sont si peu importants et les condamnations si
faibles que des trafiquants de drogue quittent le secteur des
stupefiants pour se lancer dans la fraude telephonique", a-t-il
encore indique.
sc/rok/mpf

------------------------------

Date: Wed Jan 20 21:31:33 PST 1993
From: eggert@twinsun.com (Paul Eggert )
Subject: File 5--Horloge en panne, pourquoi?

A stopped clock never foils?

One way to discourage intruders from using covert channels to foil security is
to turn off the system clock, or at least to hide it from users. But this
breaks a lot of software, so it's too drastic for all but the most
security-conscious sites. So I was surprised to see J.-B. Condat's letter in
RISKS 14.28, which began:

Date: 31 Dec 69 23:59:59 GMT
From: jbcondat@attmail.com
Subject: New E-journal on computer security
[...]

Unix cognoscenti will recognize that date: it corresponds to the internal Unix
time value of -1, which is returned by system functions when the clock is not
available. I guess Condat and the Chaos Computer Club France must really be
practicing what they preach!

+++++++

Date: Wed Jan 6 06:47:56 CST 1993
From: HART@vmd.cso.uiuc.edu ("Michael S. Hart" )

On 31 Dec 69 23:59:59 GMT you said:

Your message took about a week to get here. . .and thus was very hard to find,
as my mailer sorts by date, and yours was at the bottom.

Therefore I would suggest you preface your subject lines with !!! to make them
easier for me to spot.

Thank you for your interest,

Michael S. Hart, Professor of Electronic Text
Executive Director of Project Gutenberg Etext
Illinois Benedictine College, Lisle, IL 60532
No official connection to U of Illinois--UIUC
hart @uiucvmd.bitnet or hart@vmd.cso.uiuc.edu

+++++++

Date: Sat Jan 23 14:14:46 PST 1993
From: levene@aplpy.jhuapl.edu (Robert A. Levene )

----
> my message are date-stamped with the same time :-)
----

Please let him know that in English, this is known as a
"mistake which needs explaining" or a "lie."

------------------------------

Date: Sat Dec 26 12:31:11 GMT 1992
From: uldis@inkomi.riga.lv (Uldis Bojars )
Subject: File 6--Jeune Lettonien a la recherche de correspondants

To: Jean-Bernard CONDAT
Chaos Computer Club France [CCCF]


Hello !

Harry Bush published some information about CCCF in our local
echo. I read it and decided to write You !

At first let me wish You a Merry Christmas and happy New Year.


I'm latvian teenager (i'm 18) and am studying computer sciences
now. My name is Uldis Bojars. My interests lay mainly in
programming and hacking field. I'm interesting about phreaking,
too, but have never built bluebox or somewhat like that. Favorite
programming language - C, but i wanna program in Asembler, too.

It would be nice to have a penfriend in France. I'll be happy
to discuss about life, programming, and much more. I can't
write French because I'm learning it about 2 months only. But
i think i will be able to understand French text...

I'll try to call Your BBS to get to know more about CCCF.
And - is it possible to get book You mentioned in letter
- '_C'est decide! J'ecris mon virus' ?
I'm not writing viruses, but i haven't got any literature
about computers in French.

I'll be happy to receive letters from CCCF. /\
/ \
Sincerely Yours, / \
Uldis / \
/- -\
Bon et heureux Noel ! ||
----------------------------------------------------------------------
About myself: Uldis Bojars
18 years old
Email: uldis@inkomi.riga.lv
i like science fiction, music (especially Beatles)
i'm runing my own BBS

------------------------------

End of Chaos Digest #1.05
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT