| ==Phrack Inc.== |
|
|
| Volume Three, Issue 29, File #11 of 12 |
|
|
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN PWN |
| PWN P h r a c k W o r l d N e w s PWN |
| PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN |
| PWN Issue XXIX/Part 2 PWN |
| PWN PWN |
| PWN November 17, 1989 PWN |
| PWN PWN |
| PWN Created, Written, and Edited PWN |
| PWN by Knight Lightning PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
| Offensive Message Flashes At Busy City Corner October 25, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Linda Wheeler (Washington Post) |
|
|
| An offensive message that mystified the owners of an electronic information |
| board was flashed Monday, October 23 at Connecticut Avenue and L Street NW, one |
| of the city's (Washington DC) busiest intersections. |
|
|
| A Georgetown University law student, Craig Dean, said he saw the message; |
|
|
| "HELP STAMP OUT A.I.D.S. NOW: KILL ALL QUEERS AND JUNKIES" |
|
|
| It flashed five times in 25 minutes. Minutes after seeing the message, he |
| called the city Human Rights Office and the Washington Blade, a gay community |
| newspaper. |
|
|
| Doug Hinckle, a staff photographer for the Blade, saw the message flash once |
| and photographed it. |
|
|
| Judith Miller, president of Miller Companies, which own the building at 1101 |
| Connecticut Avenue NW and the message board, said she did not know how the |
| statement got onto the board. She refused to believe it had appeared until she |
| was shown of the photographs. |
|
|
| Her company has complete control of the board and does not accept any paid |
| messages or advertisements, Miller said. "I would never do anything like |
| that," she said. "There is no way I would allow such a statement to appear." |
|
|
| Yesterday, Keller, a five-year employee of the Miller Companies, said he did |
| not write the statement and does now know how it became part of the normal flow |
| of headline news. |
|
|
| Miller said she believes her computer system may have a "virus" and will have |
| experts search to find where the unauthorized statement originated. "How |
| absolutely awful," she said of the message. |
| _______________________________________________________________________________ |
|
|
| "WANK" Worm On SPAN Network October 17, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| >From The Computer Emergency Response Team |
|
|
| On October 16, the CERT received word from SPAN network control that a worm was |
| attacking SPAN VAX/VMS systems. This worm affects only DEC VMS systems and is |
| propagated via DECnet protocols, not TCP/IP protocols. If a VMS system had |
| other network connections, the worm was not programmed to take advantage of |
| those connections. The worm is very similar to last year's HI.COM (or Father |
| Christmas) worm. |
|
|
| This is NOT A PRANK. Serious security holes are left open by this worm. The |
| worm takes advantage of poor password management, modifies .com files, creates |
| a new account, and spreads to other systems via DECnet. |
|
|
| It is also important to understand that someone in the future could launch this |
| worm on any DECnet based network. Many copies of the virus have been mailed |
| around. Anyone running a DECnet network should be warned. |
|
|
| R. Kevin Oberman from Lawrence Livermore National Labs reports: |
|
|
| "This is a mean bug to kill and could have done a lot of damage. |
| Since it notifies (by mail) someone of each successful penetration |
| and leaves a trapdoor (the FIELD account), just killing the bug is |
| not adequate. You must go in an make sure all accounts have |
| passwords and that the passwords are not the same as the account |
| name." |
|
|
| The CERT/CC also suggests checking every .com file on the system. The worm |
| appends code to .com files which will reopen a security hole everytime the |
| program is executed. |
|
|
| An analysis of the worm appears below and is provided by R. Kevin Oberman of |
| Lawrence Livermore National Laboratory. Included with the analysis is a DCL |
| program that will block the current version of the worm. At least two versions |
| of this worm exist and more may be created. This program should give you |
| enough time to close up obvious security holes. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Report on the W.COM worm. |
| R. Kevin Oberman |
| Engineering Department |
| Lawrence Livermore National Laboratory |
| October 16, 1989 |
|
|
| The following describes the action of the W.COM worm (currently based on the |
| examination of the first two incarnations). The replication technique causes |
| the code to be modified slightly which indicates the source of the attack and |
| learned information. |
|
|
| All analysis was done with more haste than I care for, but I believe I have all |
| of the basic facts correct. |
|
|
| Here is a description of the program: |
|
|
| 1. The program assures that it is working in a directory to which the owner |
| (itself) has full access (Read, Write,Execute, and Delete). |
|
|
| 2. The program checks to see if another copy is still running. It looks for a |
| process with the first 5 characters of "NETW_". If such is found, it |
| deletes itself (the file) and stops its process. |
|
|
| Note: A quick check for infection is to look for a process name starting |
| with "NETW_". This may be done with a SHOW PROCESS command. |
|
|
| 3. The program then changes the default DECNET account password to a random |
| string of at least 12 characters. |
|
|
| 4. Information on the password used to access the system is mailed to the user |
| GEMPAK on SPAN node 6.59. Some versions may have a different address. |
|
|
| 5. The process changes its name to "NETW_" followed by a random number. |
|
|
| 6. It then checks to see if it has SYSNAM priv. If so, it defines the system |
| announcement message to be the banner in the program: |
|
|
| W O R M S A G A I N S T N U C L E A R K I L L E R S |
| _______________________________________________________________ |
| \__ ____________ _____ ________ ____ ____ __ _____/ |
| \ \ \ /\ / / / /\ \ | \ \ | | | | / / / |
| \ \ \ / \ / / / /__\ \ | |\ \ | | | |/ / / |
| \ \ \/ /\ \/ / / ______ \ | | \ \| | | |\ \ / |
| \_\ /__\ /____/ /______\ \____| |__\ | |____| |_\ \_/ |
| \___________________________________________________/ |
| \ / |
| \ Your System Has Been Officically WANKed / |
| \_____________________________________________/ |
|
|
| You talk of times of peace for all, and then prepare for war. |
|
|
| 7. If it has SYSPRV, it disables mail to the SYSTEM account. |
|
|
| 8. If it has SYSPRV, it modifies the system login command procedure to |
| APPEAR to delete all of a user's file. (It really does nothing.) |
|
|
| 9. The program then scans the accounts logical name table for command |
| procedures and tries to modify the FIELD account to a known password with |
| login form any source and all privs. This is a primitive virus, but very |
| effective IF it should get into a privileged account. |
|
|
| 10. It proceeds to attempt to access other systems by picking node numbers at |
| random. It then used PHONE to get a list of active users on the remote |
| system. It proceeds to irritate them by using PHONE to ring them. |
|
|
| 11. The program then tries to access the RIGHTSLIST file and attempts to access |
| some remote system using the users found and a list of "standard" users |
| included with the worm. It looks for passwords which are the same as that |
| of the account or are blank. It records all such accounts. |
|
|
| 12. It looks for an account that has access to SYSUAF.DAT. |
|
|
| 13. If a priv. account is found, the program is copied to that account and |
| started. If no priv account was found, it is copied to other accounts |
| found on the random system. |
|
|
| 14. As soon as it finishes with a system, it picks another random system and |
| repeats (forever). |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Computer Network At NASA Attacked By Rogue Program October 18, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by John Markoff (New York Times) |
|
|
| A rogue computer program attacked a worldwide network of the National |
| Aeronautics and Space Administration on Monday, October 16, inflicting no |
| damage but forcing officials to disconnect the network from sensitive military |
| and space systems. |
|
|
| Security experts speculated that the program was written by someone who opposed |
| Tuesday's (October 17) scheduled launching of the space shuttle Atlantis, which |
| was to carry a nuclear-powered satellite into orbit. The launching was |
| postponed because of bad weather. |
|
|
| NASA officials said the rogue program attacked an academic and research |
| network, the Space Physics Analysis Network, which is not used for space |
| shuttle mission control. |
|
|
| But a NASA official said the agency felt compelled to disconnect several links |
| between the network and an operational space shuttle network as a precaution. |
|
|
| Computer security experts at several national laboratories said the Department |
| of Defense had also severed the connection between commercial and research |
| networks and nonclassified network that connects United States military |
| installations and contractors around the world. |
|
|
| The program was designed to copy itself secretly and send unwanted, sometimes |
| vulgar messages to users of the NASA network. It also tricks users into |
| thinking that data have been destroyed, although no data are damaged. |
|
|
| Like similar programs that have been sent into computer networks by pranksters |
| and saboteurs, it exploited a flaw in the security system designed to protect |
| the computers on the network. |
|
|
| Computer security experts said Tuesday that they knew of about 60 computers |
| that had been affected by the program. A NASA spokesman said the program was |
| still spreading. |
|
|
| While the network is widely available to academic researchers with personal |
| computers, the rogue program was designed to attack only 6,000 computers |
| manufactured by the Digital Equipment Corporation. |
|
|
| The flaw in the security of the Digital Equipment computers had been widely |
| publicized over a year ago even before a similar rogue program jammed a group |
| of interconnected international networks known as the Internet. NASA officials |
| said the program was only able to attack computers in which the necessary steps |
| had not been taken to correct the flaw. |
|
|
| Among the messages the program displayed on all infected computers was one that |
| read: "Worms Against Nuclear Killers. You talk of times of peace for all, and |
| then prepare for war." |
|
|
| Computer scientists call this kind of program a worm, a reference to a program |
| first described in the novel "Shockwave Rider" by a science fiction writer, |
| John Brunner. |
| _______________________________________________________________________________ |
|
|
| Virus Controversies Again October 6, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by John Markoff (New York Times) |
|
|
| "The issue has also sparked interest among computer scientists." |
|
|
| Harold Highland, editor of Computers & Security, a professional journal, said |
| he had received two research papers describing how to create such anti-virus |
| programs. |
|
|
| He has not decided whether to publish them. |
|
|
| "No one has raised the obvious ethical questions," he added. "I would hate to |
| see a virus released to fight viruses. Until it's tested you don't know |
| whether it's going to do more damage than the program it is designed to fight." |
|
|
| A number of these programs have already been written, computer researchers |
| said. |
|
|
| The one that destroyed the data on business and governmental personal computers |
| in the United States was reportedly designed by a Venezuelan programmer. How |
| many computers were affected and where they were is unclear. |
|
|
| That program is called Den Zuk, or Search. It was intended to attack a |
| destructive program known as the Brain Virus that was distributed in 1986 by |
| two brothers who owned a small computer store in Pakistan. |
|
|
| Errors in the design of the program illustrate the potential danger of such |
| viruses, critics say. Fridrik Skulason, a microcomputer specialist at the |
| University of Iceland in Reykjavik, who has disassembled the program, said the |
| author of Den Zuk had failed to take into account the different capacities of |
| disks available for IBM and IBM-compatible machines. |
|
|
| Because of that simple error, when the program infects a higher-capacity disk |
| it destroys data. |
|
|
| "They probably wrote with good intention," he said. "The only problem is that |
| the programmers were not able to do their job correctly." |
|
|
| At least two other anti-viral viruses have already been devised, said Russell |
| Brand, a computer security researcher at Lawrence Livermore. |
|
|
| He said programmers at one company, which he would not identify, had written |
| the programs to combat the Scores virus, a program that infected Macintosh |
| computers last year. |
|
|
| He added that even though the programs were designed so they could not go |
| beyond the company's own computers, there had been a heated debate over whether |
| to deploy the programs. He said he did not know how it was decided. |
|
|
| Brand said a group of computer researchers he works with at Lawrence Livermore |
| had written several self-replicating programs after the appearance of the rogue |
| program that Morris of Cornell is accused of writing. But he added that the |
| group had never given permission to release the programs. |
|
|
| The debate over vigilante viruses is part of a broader discussion now taking |
| place among some computer researchers and programmers over what is being termed |
| "forbidden knowledge." |
|
|
| "There are ethical questions any time you send something out there that may |
| find itself invited on to somebody else's computer," said Pamela Kane, author |
| of a book on computer virus protection. |
|
|
| In California this month a group of computer hackers plans to hold a forum on |
| "forbidden knowledge in a technological society." |
|
|
| While the role of the computer hacker has been viewed as mischievous in a |
| negative way, hackers have consistently played a role as innovators, said Lee |
| Felsenstein, a Berkeley, California, computer expert who designed several early |
| personal computers. |
|
|
| "Computer hacking was originally a response to the perception of a priesthood's |
| control over immensely powerful technological resources," he said. "Informed |
| individuals were able to break the power of this priesthood through gaining and |
| spreading the body of forbidden knowledge." |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Dreaded Personal Computer Virus May Be Only A Cold October 6, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Don Clark (New York Times) |
|
|
| It won't be much of a plague. But the hysteria anticipating it has been |
| world-class. |
|
|
| Those observations come from computer-security experts as they await Datacrime, |
| a virus program set to attack IBM-compatible personal computers starting |
| Thursday, October 12, 1989. |
|
|
| Analyses of the program, also called the Columbus Day Virus, show that it is |
| indeed destructive. It just hasn't spread very far. |
|
|
| "It's going to be the week of the non-event," predicted John McAfee, a Santa |
| Clara, California, consultant who serves as chairman of the Computer Virus |
| Industry Association. "You have more chance of being hit by a meteor than |
| getting this virus." |
|
|
| McAfee Associates, which acts as a clearinghouse for virus information, has |
| received just seven confirmed reports of Datacrime in six months -- compared |
| with three to 50 reports per day about another virus that originated in Israel |
| in 1987. He thinks only 50 copies of Datacrime exist, and 40 of those are in |
| the hands of researchers. |
|
|
| "It's gotten more publicity than it deserves," agreed Russell Brand, another |
| virus expert, who advises Lawrence Livermore National Laboratory. |
|
|
| Brand expects to find just 20 copies among the 75,000 computers he monitors at |
| 1,000 sites. |
|
|
| Such projections are disputed by some. They are based on how often Datacrime |
| has been detected by computer users using special software that scans their |
| systems for the virus. |
|
|
| The virus could have infected many users who have not bothered to scan their |
| systems, McAfee concedes. |
|
|
| Fears have been whipped up by the news media and computer managers at companies |
| and government agencies. Companies promoting products to eradicate viruses |
| also have played a role -- understandably. |
|
|
| Staid IBM Corporation this week took the unusual step of offering a program |
| that checks systems for viruses. The company hasn't detected the virus in its |
| own operations, but concedes that many customers are worried. "They are asking |
| us how we protect our software-development operations from viruses," said Bill |
| Vance, who was appointed a year ago as IBM's director of secure systems. |
|
|
| Bank of America, a huge IBM customer with 15,000 PCs, recently put out a |
| company-wide notice advising users to make backup copies of their computer data |
| by Wednesday, the day before the virus is programmed to strike. |
|
|
| Three different government agencies have panicked and sent out multiple |
| versions of incorrect advice," Brand said. |
|
|
| Worried calls have deluged McAfee's office, which has just three lines for |
| computer communications and three for voice. |
|
|
| "We put the phone down and it's 30 seconds before it rings again," he said. |
|
|
| Computer sleuths detected Datacrime -- and have detected other viruses -- by |
| looking for changes in the size of data files and in the way programs operate. |
| The underlying code used to write the program, once disassembled by experts, |
| indicates when the program will activate itself. |
|
|
| The identity of Datacrime's author isn't known, although some reports have |
| linked the virus to an anonymous hacker in Austria. It first began showing up |
| in March, McAfee said, and gained notoriety after it was discussed at the |
| midsummer Galactic Hackers Conference in Amsterdam. |
|
|
| It appears to be relatively prevalent in the Netherlands and other European |
| countries. Dutch computer users have reportedly bought hundreds of programs |
| that are said to detect and destroy the program. |
|
|
| Like other viruses, Datacrime rides along with innocuous programs when they are |
| exchanged over a computer network or computer bulletin board or through |
| exchange of infected disks. Unlike many viruses, it has been designed to later |
| insert itself in data files that users don't often examine. |
|
|
| If one of the programs is executed after the target date, Datacrime proceeds |
| with its dirty work -- destroying the directory used to keep track of files on |
| a computer's hard disk. The crime is analogous to destroying a card file in |
| the library. |
|
|
| "By destroying this one table you can't find where any of your data is," said |
| Brand. |
|
|
| But no one should really be in a fix if he makes backup copies of data, experts |
| say. The data, once safely stored on another disk drive or on magnetic tape, |
| can be restored by computer professionals even if the virus has infected the |
| backup files. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| "Vaccines" To Hunt Down Rogue Programs October 6, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by John Markoff (New York Times) |
|
|
| Ever since a rogue program created by a graduate student jammed a nationwide |
| computer network last year, the rapid spread of such disruptive software, often |
| known as viruses, has caused growing alarm among computer users. |
|
|
| Now, to fight fire with fire, some companies, individuals and even a government |
| research laboratory are crafting a new breed of what have been called |
| anti-viruses to hunt down intruders. |
|
|
| The trouble is, some computer security experts say, the problem of viruses may |
| be exaggerated -- and the new crime fighter may do even more damage than the |
| criminal. |
|
|
| Much like an infection, a well-intended but badly designed program to stop |
| viruses can run amok, knocking out thousands of computers or destroying vast |
| amounts of data. |
|
|
| Indeed, one of the anti-virus programs intended to defeat a known virus has |
| already destroyed data on business and governmental personal computers in the |
| United States. |
|
|
| The issue has touched off a heated debate over whether the creation of these |
| high-technology vigilantes is a responsible action. "The risks are just |
| enormous," said Peter Neumann, a computer security expert at SRI International, |
| a technology research center in Menlo Park, California. "It's an unbelievably |
| unsafe thing to do." |
|
|
| But Chris Traynor, a programmer at Divine Axis, a software development company |
| in Yonkers, New York, argues that anti-virus programs can be contained so that |
| they do not spread out of control, reaching and possibly damaging data in other |
| computers. His company is now trying to design such a program. |
|
|
| Computer researchers at the Lawrence Livermore Laboratory, a federal weapons |
| center in Livermore, California, have designed similar programs that patrol |
| computer networks in search of breaches through which viruses could enter the |
| system. |
|
|
| Viruses, which got their name because they mimic in the computer world the |
| behavior of biological viruses, are programs, or sets of instructions, that can |
| secretly be spread among computers. |
|
|
| Viruses can travel either over a computer network or on an infected disk passed |
| by hand between computer users. |
|
|
| Once the infection has spread, the virus might do something as benign as |
| displaying a simple message on a computer screen or as destructive as erasing |
| the data on an entire disk. |
|
|
| Computer security experts have been concerned for several years by the |
| emergence of vandals and mischief makers who deliberately plant the destructive |
| programs. |
|
|
| But in recent weeks international alarm has reached new heights as rumors have |
| spread that a virus program will destroy data on thousands of computers this |
| month, on Friday the 13th. |
|
|
| Computer security researchers said the virus, known as Datacrime, was one of at |
| least three clandestine programs with internal clocks set to destroy data on |
| that date. |
|
|
| As is usually the case, no one knows who wrote the program, but U.S. military |
| officials have mentioned as possible suspects a European group linked to West |
| German terrorists and a Norwegian group displeased with the fame of Christopher |
| Columbus, who is honored next week. |
|
|
| Largely in response to customer concerns, IBM said on Monday that it was |
| offering programs for its personal computers that would scan for viruses. |
|
|
| But several computer security experts say public fears are largely exaggerated. |
|
|
| They note that there have been fewer than a dozen reported appearances of the |
| Datacrime virus in the United States, and contend that the whole issue is |
| overblown. |
|
|
| Still, in the personal computer world, where many users have little knowledge |
| of the technical workings of their machines, concern over computer viruses has |
| become widespread. |
|
|
| The issue got the most attention last November, when, it is charged, Robert |
| Morris, a graduate student at Cornell, unleashed a rogue program that because |
| of a small programming error, ran wildly out of control, copying itself |
| hundreds of times on thousands of computers, overloading a national network, |
|
|
| As a result of the mounting concern, a new industry has blossomed offering |
| users protective programs known as vaccines, or anti-viral software. |
|
|
| These programs either alert users that a virus is attempting to tamper with |
| their computer or scan a computer disk and erase any rogue program that is |
| detected. |
|
|
| These conventional programs do not automatically migrate from computer to |
| computer, but now some experts are exploring fashioning programs that graft the |
| powers of the vaccines onto viruses in order to pursue and stop them wherever |
| they go. |
|
|
| Designing and spreading such programs was proposed in August by several people |
| attending an international gathering of computer hobbyists, or "hackers," in |
| Amsterdam. |
|
|
| They suggested that it was a good way for members of the computer underground |
| to make a positive contribution. |
|
|
| But many researchers believe the idea is dangerously flawed because of the |
| possibility of accidentally doing great damage. |
|
|
| Some computer security researchers worry that writing an infectious program to |
| stop viruses may be taken as an intellectual challenge by hackers who are well |
| meaning but do not grasp what problems they could create. |
|
|
| "One of the questions that the hacker community is now addressing is what you |
| do about young hackers," said Stewart Brand, a writer in Sausalito, California, |
| who is working on a book on outlaw cultures and high technology. |
|
|
| "They don't have a sense of responsibility; they have a sense of curiosity. |
| These are deliciously debatable issues, and I don't see them going away." |
|
|
| >--------=====END=====--------< |
|
|