💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › CRYPT › crptlettr7.vir captured on 2022-06-12 at 10:43:59.

View Raw

More Information

-=-=-=-=-=-=-


                  *******************************************
                  The CRYPT Newsletter (#7) - Early Oct.,1992
                  Another in a continuing series of info-glutted
                  humorous monographs solely for the enjoyment
                  of the virus programmer or user interested
                  in the particulars of cyber-electronic data 
                  replication and corruption.  

                  --Edited by URNST KOUCH
                  ********************************************

                  This issue's top quote!
                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
                  "Ross Perot is an empty valise."
                         -Ed Koch on the former Electronic Data
                         Systems leader's re-entry into the
                         presidential race.

                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

       IN THIS ISSUE:  SPECIAL Election Day viruses: VOTE and
       VOTERASE...the DEICIDE virus...FIDO news...INCAPABILITIES: 
       Off-the-cuff evaluations & fear and loathing on PRODIGY...
       from the Reading Room: "Cyberpunk" by Hafner and Markoff
       ...McAfee Associates close in on "fuck you money"...Vidkun
       Quisling Medal awarded...more...
       ----------------------------------------------------------



   NEWS! NEWS! NEWS! VITRIOL! NEWS!

       This issue we award the Vidkun Quisling Gold Medal of Rank 
       Hypocrisy to Gary Watson of Data Systems.

       Here at the newsletter bungalow we couldn't help but notice
       programmer Gary Watson's insistence that he has 
       been the victim of a disinformation campaign launched by virus
       exchange BBS's. "Do I upload source codes to virus 
       boards, not so, not so!" is the essence of this claim, aired
       on the FidoNet VIRUS_INFO echo.
       
       To help get at the truth, we're releasing a log and archive
       listing documenting Watson's visit to the Dark Coffin BBS in 
       Pennsylvania.

       What follows is a reprint of a BBS log generated by WWIV 4.21,
       the software in use on Dark Coffin:

  1702: Gary Watson #58 23:54:19 08/07/92    [Torrance CA]

     Q, S, X, >, >, >, S, Q, Q, X, T, L, >, >, >, *, Q, X, T, *, X, Q,  , Q
     //S**T! I GOTTA CHECK THE F****N MESSAGE BASES...., T, ?, U, Z, <, >, <, <
     <, <, <, <, <, F, //WELL, ONE OF EM AT LEAST, *, U, X, U
     >>>+DANGER  .ZIP uploaded on NEW UPLOADS<<<
     C, C, H, A, T, X, /, \, \, Q, Q, ?, O, 
  Read: 20   Time on: 16

All comments following // are command line messages one of us used to
type to the other.  Notice upload of DANGER.ZIP. Next, the PKUNZIP
listing of what was kept from that archive:

PKUNZIP (R)   FAST!   Extract Utility   Version 1.93  ALPHA  10-15-91
Copr. 1989-1991 PKWARE Inc. All Rights Reserved. PKUNZIP/h for help
PKUNZIP Reg. U.S. Pat. and Tm. Off.

Searching ZIP: DANGER.ZIP

 Length  Method   Size  Ratio   Date    Time    CRC-32  Attr  Name
 ------  ------   ----- -----   ----    ----   -------- ----  ----
  24704  Implode   7072  72%  09-25-91  10:44  26dbaec9 --w-  MIX1.ASM
   3193  Implode   1527  53%  03-05-89  22:21  1d1d5ed8 --w-  AMST-847.ASM
  13009  Implode   3179  76%  01-01-80  00:06  ec3b2f22 --w-  BADBOY2.ASM
  19037  Implode   6318  67%  06-05-90  11:54  ce10ca04 --w-  MURPHEXE.ASM
  12453  Implode   2783  78%  04-04-90  17:35  78c45414 --w-  STONE.ASM
  26586  Implode   5754  79%  04-04-90  17:35  50ad447b --w-  DATACRIM.ASM
  19495  Implode   7985  60%  01-03-90  23:19  31f550c8 --w-  EDDIE.ASM
   8897  Implode   2914  68%  05-05-90  18:13  0953d928 --w-  DIAMOND.ASM
  45577  Implode  10889  77%  05-05-91  18:51  065542d3 --w-  V2100_.ASM
  15042  Implode   2663  83%  04-18-91  16:58  19fc2ef6 --w-  LEECH.ASM
  58090  Implode  12176  80%  08-11-92  22:43  ddccc22e --w-  VSOURCE.ASM
  19310  Implode   6330  68%  03-09-91  15:53  50e8c26a --w-  HORSE2.ASM
  47596  Implode  11030  77%  03-13-91  18:29  21efc392 --w-  4096.ASM
   3042  Implode   1139  63%  12-28-88  12:32  a7404cb9 --w-  BOOT1.ASM
  10830  Implode   2939  73%  08-11-92  22:43  a7ae08a6 --w-  DIR2.ASM
   7212  Implode   2215  70%  08-11-92  22:47  4de925cf --w-  MASTER.ASM
 ------          ------  ---                                  -------
 334073           86913  74%                                       16

   And an extracted header from one of the source codes, STONE.ASM:

; IMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM;
; :                 British Computer Virus Research Centre                   :
; :  12 Guildford Street,   Brighton,   East Sussex,   BN1 3LS,   England    :
; :  Telephone:     Domestic   0273-26105,   International  +44-273-26105    :
; :                                                                          :
; :                         The 'New Zealand' Virus                          :
; :                Disassembled by Joe Hirst,   November 1988                :
; :                                                                          :
; :                   Copyright (c) Joe Hirst 1988, 1989.                    :
; :                                                                          :
; :      This listing is only to be made available to virus researchers      :
; :                or software writers on a need-to-know basis.              :
; HMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM<


     Now, while this isn't IRONCLAD proof of Gary Watson's
     duplicity, it IS close enough for most purposes. And, yes, here
     at the bungalow we can still imagine cries of "Disinformation!"
     or "It's a FRAME-UP!" or "I never did that!" We feel confident 
     that the reasonable Crypt reader will weigh the veracity of a Gary 
     Watson (who self-admittedly views those unlike him as "targets" and 
     has an ego so big he is easily stroked into flaming on the
     FidoNet by barbs from those much younger than he) against that 
     of the urbane and always courteous editors of the Crypt
     Newsletter. 
     
     We are pleased to award Gary Watson the Quisling Medal.  

     When ex-New York City mayor Ed Koch was asked to comment on the
     Quisling award, he said, "Gary Watson is an empty valise."

     A HOT TIP!  

     Nowhere Man informs the Crypt Newsletter that he is readying 
     a polymorphic encryption module for domestic release. This is
     in addition to his work on VCL 2.0 which could be coming to
     you sometime around the holiday season!
     
     *****************************************************************
     A CRYPT NEWSLETTER SPECIAL: VOTE and VOTERASE, custom Election
     Day viruses!!!
     *****************************************************************

     In this issue, we give the readers the VOTE!  VOTE (or VOTE, SHITHEAD)
     is a memory resident, spawning virus which is not detected by the
     recent versions of SCAN, Thunderbyte's tbSCAN, Datatechnik's AVScan, 
     NORTON Antivirus or Central Point Antivirus.

     Upon installation, VOTE will reside in a small hole in system memory
     invisible to all but the most discerning eye. It hooks INT 21 and
     monitors the DOS load function. From there, it will create hidden/
     read-only 'companion' files for every .EXE program called.  All
     of these 'infected' programs will continue to function normally;
     VOTE's disk writes are minimal and not likely to be noticed by
     anyone NOT looking for the virus.  VOTE will accumulate on the
     infected system's hard file in an almost totally transparent 
     manner until Election Day.  On Election Day, at the start of the 
     morning's computing, the first .EXE executed which has a VOTE 
     'companion' counterpart will result in activation. VOTE will lock 
     the machine into a loop in which the user is gently but insistently 
     reminded to go to the polling place. Computing will be impossible 
     on Nov. 3rd, unless VOTE is completely removed from the system. 
     After Nov. 3rd, VOTE will again become transparent.

     VOTE is an ideal virus and we encourage the Crypt reader to do his
     bit (ouch!) to reawaken democracy in this country. VOTE will not harm
     files in any way. VOTE is simply removed by booting from
     a clean disk, tallying up all the 'hidden/read-only' 348 byte .COM 
     duplicates of .EXE files, and deleting the .COMfiles. No special 
     anti-virus software is necessary, as long as the user knows VOTE is 
     afoot and what to look for.

     The Crypt reader will remember the basic characteristics of the
     INSUFF spawning virus in issue #6. VOTE utilizes the same principles,
     attacking poorly implemented systems auditing and integrity checking
     software like that found in CPAV. In fact, VOTE can operate IN THE
     TEETH of a number of a-v software default installations. Unlike
     unknown resident viruses which instantly attempt to infect a-v 
     software as it fires up, thus making the set upon program squeal
     about file modification, VOTE can successfully 'infect' any 
     program which can't scan it. It will instantly create a 'companion' 
     which will go resident any time the a-v program is subsequently
     used.  Tested against CPAV, SCAN, tbSCAN, AVScan and Leprechaun's
     Virus-Buster, VOTE capably created 'companions' for each executable
     as they were employed. And none of the packages seemed to mind.
     
     
     Some a-v types prefer to refer to viruses like VOTE as "worms," because 
     like the archetypical INTERNET "worm," they do not alter the programs
     they 'infect.' Recently, another corporate-military-security stiff 
     even suggested the term "viro-worm" on the CSERVE VIRUSFORUM.  This 
     is an example of idiot-savant jargon. Good for cowing the uninitiated, 
     it serves the additional purpose of convincing a dupe that he has 
     actually gotten value for his money if ever he hands over a certified 
     check for someone's "computer security paper."  You should know 
     "companion virus" remains a perfectly acceptable term for programs 
     like VOTE. It is clear, concise and descriptive, something 
     "viro-worm" is not.

     
     The source code for the VOTE "companion virus," as well as its 
     DEBUG script, are included in this issue. The TASM listing invites 
     the reader to extend the life of VOTE beyond November 3rd by simply 
     changing the activation. 
     
     However, for those Crypt subscribers convinced that democracy has failed
     and that Election Day is a mere sham perpetrated by the ruling elite,
     we include VOTERASE.  VOTERASE is exactly like VOTE, EXCEPT on Election
     Day it wakes up and expunges all files from an infected system.
     VOTERASE displays no message, it merely makes Election Day into an
     even harder working day. VOTERASE is quick. Files disappear in mere
     fractions of a second. A heavily infected disk could, theoretically, 
     be emptied in minutes after the start of the day's computing on Nov. 3rd.
     The DEBUG script for VOTERASE is included with this issue. (Note:
     VOTERASE will not damage the partition table of the hard file or
     overwrite programs with gobble.  The hard disk will experience boot 
     failure if its command processor and system files are removed by 
     VOTERASE. In most cases, a simple restoration from backup after 
     elimination of VOTERASE should get things moving again.)
     
     The Crypt Newsletter has included the VOTE viruses to commemorate
     America's long tradition of rule by and for the people!

     Disclaimer: The VOTE viruses are non-partisan. Neither recommend
     you vote for any particular candidate.

     So remember, just VOTE!!! Your computer could be watching!!

     ***********************************************************************

     ***********************************************************************
     INCAPABILITIES: PRODIGY USERS GRUMBLE ABOUT NORTON ANTIVIRUS 2.1
     ***********************************************************************

     In Crypt newsletter #6, we reprinted an ad issued by SYMANTEC touting
     the new Norton Antivirus's ability to scan for Mutation Engine-loaded 
     viruses.

     To make a point, we created the INSUFF viruses to poke a hole in
     this claim. Our tests showed that Norton Antivirus 2.1 did not detect
     ANY mutations generated by ANY of the MtE-loaded INSUFF viruses.

     Now users of NAV 2.1 are starting to complain on PRODIGY, the
     Sears Roebuck electronic info service for novice
     computerists, that the SYMANTEC software detects the MtE in some
     data files.  Henri Delger, a virus watcher on PRODIGY who
     advises people with questions on rogue programming, has chronicled
     this as a nasty false-positive bug inherent in  NAV 2.1. He 
     recommends users demand free upgrade to the next version. Delger
     estimated that NAV 2.1 reliably detects about 40% of known
     viruses.

     Smart consumer advice: NAV 2.1 will detect false MtE images in your
     data, but remains incapable of detecting real MtE infections.
     
     In a spot evaluation of Central Point Software's
     Anti-Virus, we ran its scanner against 350 virus samples 
     generously obtained from Long John Silicon by way of Todor
     Todorov's virus collection. CPAV identified 68% of the samples,
     as contrasted to F-PROT 2.05, which detected a full 98%.
     
     Smart consumer advice: Why pay $100 for something which works 
     poorly, when you can have a finely tooled racin' machine for free?
     ********************************************************************

     ADDITIONAL DATA ON HILGRAEVE's HyperACCESS/5 COMM PROGRAM:

     You may still be interested in the virus scanner part of Hilgraeve's
     HA/5, commented on only briefly in the previous issue. But you
     require more information before you unhitch your trucker's wallet.

     Here, then, in Hilgraeve's own words:

     "To give you the most comprehensive, up-to-date protection possible,
     Hilgraeve uses the same signatures as the IBM Virus Scanning
     Program, with IBM's consent. This is an excellent source, because
     IBM devotes tremendous effort to collecting and identifying
     viruses."

     Sez who? Does anyone you know actually use IBM software?

     Anyway, while HA/5 remains a fine terminal program we continued 
     to be dismayed at its HyperGuard 'virus filter' performance as we 
     used it to transfer samples between BBS's in eastern Pennsylvania.
     Eventually, we just turned the 'filter' off. As of now, BBS and comm
     program scanners have a long way to go before they are of much
     practical use.  And that doesn't even begin to deal with
     programming tricks like PKliting and stand-alone encryption which 
     are used to 'conceal' scanned viruses and logic bombs during
     electronic transfer.

     We recommend Hilgraeve delete this feature from future versions of
     HA/5 and replace it with an in-line file archiver to complement
     the software's handy "Unpack" de-archiver.


MCAFEE GOES PUBLIC, TRANSLATION: EMPLOYEE STOCKHOLDERS GET 'FUCK YOU'
MONEY - DON'T YOU WISH YOU DID??
Purloined from CSERVE's Online Today, Oct. 7, 1992

Online Today

MCAFEE ASSOCIATES GOES PUBLIC 

  (Oct. 7) 
  McAfee Associates Inc., known for its line of anti-virus
software, has gone public and investors gave the stock of the Santa
Clara, Calif., firm a warm reception. On its first day of public
trading, the stock rose 25 percent over its initial price. 
  According to United Press International, McAfee offered 1.05
million shares, with the remaining 1.55 million coming from
stockholders. It has 11 million shares of common stock outstanding
after the offering. 
  Yesterday, McAfee shares closed at $20.125 in over-the-counter
trading. Its 2.6-million-share offering was priced at $16 a share. 
  Besides its anti-virus software, McAfee recently released it first
two general purpose utilities to enable users to repair damaged
files and disks. 
  Reports from United Press International are accessible in
CompuServe NewsGrid database (GO NEWSGRID) and through the Executive
News Service (GO ENS). 
  --Charles Bowen [Well, look who it is!]

     
     
     
     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
     IN THE READING ROOM: "Cyberpunk: Outlaws and Hackers on the 
     Computer Frontier" by Katie Hafner and John Markoff
     (Simon & Schuster paperback)

     Divided into three discrete sections, "Cyberpunk," for the most part,
     attempts to retell the tale told by Cliff Stoll in "The Cuckoo's
     Egg."  And why not? The story of a bunch of disgruntled, drug-gobbling 
     Huns attempting to steal phony U.S. defense secrets off the INTERNET 
     for a computer-ignorant KGB is too fantastic to be anything less than 
     riveting.  
     
     And so what if it's old news! It's the telling that counts and though
     it's fairly obvious that the authors know about as much about 
     computers as the journalists who covered Michelangelo, "Cyberpunk" is
     still a better read than anything a systems programmer could dream up. 
     [Well, maybe I'm a little unfair to the authors. Katie Hafner WAS an 
     editor at Data Communications magazine, so she MUST know what a 
     computer is. However, John Markoff reports on the industry for the New 
     York Times and as far as I can tell there's never been any sign of 
     sentient life in 'tech' reporting from that quarter.]
     
     As for the virus story there's almost none unless you count
     Robert T. Morris, Jr's, INTERNET "worm." But, you'll thrill to the
     description of Morris's father, anyway. You'll be able to picture him
     as just the kind of patronizing, intellectual turd you'd expect would
     be asked to be the head of a NSA research arm secretly figuring out 
     new ways to break codes, new ways to open people's mail, still more 
     interesting and new ways to listen in on your telephone conversations, 
     even more fun and interesting ways to waste taxpayer money without 
     having to tell you about it, yet more ways to raise a kid who uses 
     tips you've given him from the NSA to create a national scandal, 
     new and great ways to be a king-asshole snoop gr-zz-rrz-zzzz, etc. 
     Yeah, that's hot!

     And "Cyberpunk" has all the info on "hacker" Kevin Mitnick who 
     terrorized small businesses, the phone company and numerous
     college administrators in Southern California. His was a glorious 
     life, spending long hours cajoling lonely business secretaries 
     into giving away system passwords over the phone, just like the cons 
     at the local jail who even as you read this are no doubt ripping off
     someone stupid from the pay phone in the prison lounge. 
     Yes, a most excellent "phone-phreak" life, where you take off for 
     a weekend of brute-force hacking ensconced in the luxurious 
     digs of the local "hooker" crashpad. Yup, learn how to be an 
     elite "cyberpunk," cuffed to a chair in the night watchman's office 
     like a common piss-soaked drunk caught wandering the campus of a 
     local community college. That's where it's at, man.  And "Cyberpunk" 
     will give you a good idea on just how to go about it. 
     
     The Crypt Newsletter recommends "Cyberpunk"!

     
     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
     666 - the DEICIDE virus, for all the Crypt Newsletter's Slayer fans 
     
     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

     DEICIDE is a simple, horribly destructive overwriting virus. It
     will attempt to infect all .COM files except COMMAND.COM in the
     root directory on any disk. Once it has run out of .COM files to
     infect, it will smash the C: hard file by meddling with its first 80 
     sectors.

     Programs infected by DEICIDE are completely destroyed. When called
     DEICIDE will display  "File corruption error," just the kind of
     cryptic DOS message that will send a new computer user into
     paroxysms of confusion.

     The A86 source of DEICIDE is included in this issue. Liner notes
     and an 'altered' DEBUG script are also provided, supplying a 'new' 
     copy of DEICIDE to readers interested in further study.

     DEICIDE is not very long-legged as viruses go; in fact, one might
     consider it more along the lines of a slightly 'delayed' trojan.

     Its author, "Glen Benton," has written a number of other similar
     viruses from his refuge in Holland.
     
     **********************************************************************
     ADDITIONAL SOFTWARE DOCUMENTATION FOR CRYPT NEWSLETTER #7:
     **********************************************************************

     By now, perhaps, you know the drill. Software described in the
     Crypt newsletter is supplied as source code, DEBUG scripts, or
     both.  For those without an assembler, copy the .SCR files in
     this archive into a directory and bring up the C:> prompt.

     If the DOS program DEBUG is in your path, merely type

             DEBUG <*.scr

      where *.scr is the .scr file for the software you wish to 
      produce.  Then hit <enter>.

      After a few moments, the program should be ready for you in
      the current directory.

      [If even this seems like a mystery, feel free to get someone
      to help who knows what he's doing. We recommend, however, that
      in this case you NOT try executing Crypt Newsletter software.]
      
      This issue contains the VOTE viruses. VOTE is included as
      a listing and DEBUG script, while VOTERASE is supplied only
      as a script. In addition, you will found the A86 source
      listing for the DEICIDE virus and its corresponding scriptfile.

      Additional user notes for this issue are found in the 
      headers of the accompanying assembly listings.

      Remember, that programs included with the Crypt Newsletter
      are quite capable of destroying your data, executable valuables 
      and/or making your day seem overlong. In fact, your computing day 
      WILL be made longer if you are stupid and careless with them.
      Indeed, your father, wife or significant other will probably not 
      find DEICIDE clever and amusing at all if it gets loose for half 
      an hour on the family system while the company news organ or some 
      equivalent, but necessary, twaddle is being prepared.
      ******************************************************************

      This issue of the Crypt Newsletter SHOULD contain:

            CRPTLET.TR7 - this text
            VOTE.ASM - TASM source listing for the VOTE virus
            VOTE.SCR - DEBUG script for the VOTE virus
            VOTERASE.SCR - DEBUG script for the VOTERASE virus
            DEICIDE.ASM - A86 listing for Glen Benton's DEICIDE virus
            DEICIDE2.SCR - DEBUG script for the DEICIDE virus

      If any of these files are missing: Complain at once,
      go to any of the BBS's listed following this text, and
      grab a COMPLETE copy.
      ******************************************************************

      Additional note: Vidkun Quisling is an in-famous trademark of
      the Norwegian government. Quisling, a WWII Axis collaborator,
      aided Adolf Hitler in his conquest of Norway in 1940. In gratitude,
      Der Fuehrer made him Norway's puppet ruler. After the war ended,
      angry Norwegians tried Quisling for treason, won an easy conviction
      and had him shot.

      ******************************************************************


   Readers should feel free to send e-mail to editor URNST KOUCH 
   on any of the BBS's listed in this file. On Hell Pit, I can be
   reached as COUCH.

   To ensure you don't miss an issue of the newsletter, I invite you
   to come to DARK COFFIN and e-mail me with a data number of your
   favorite BBS. I'll include it in my database and begin delivery if
   they'll have it. This guarantees you'll be the first on your block
   to get fresh issues.

   The Crypt newsletter is distributed first at the following sites:



     ??????????????????????????????????????????????????????????????????????
     ? This V/T info phile brought to you by ????,                        ?
     ? Makers/Archivists/Info Specialists on Viruses/Trojans.             ?
     ??????????????????????????????????????????????????????????????????????
     ? Dark Coffin ???????????????????? HQ/Main Support ??? 215.966.3576  ?
     ??????????????????????????????????????????????????????????????????????
     ? VIRUS_MAN ?????????????????????? Member Support ???? ITS.PRI.VATE  ?
     ? Callahan's Crosstime Saloon ???? Southwest HQ ?????? 314.939.4113  ?
     ? Nuclear Winter ????????????????? Member Board ?????? 215.882.9122  ?
     ??????????????????????????????????????????????????????????????????????