💾 Archived View for aphrack.org › issues › phrack29 › 11.gmi captured on 2022-03-01 at 15:37:48. Gemini links have been rewritten to link to archived content
⬅️ Previous capture (2021-12-03)
-=-=-=-=-=-=-
==Phrack Inc.== Volume Three, Issue 29, File #11 of 12 PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN P h r a c k W o r l d N e w s PWN PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN PWN Issue XXIX/Part 2 PWN PWN PWN PWN November 17, 1989 PWN PWN PWN PWN Created, Written, and Edited PWN PWN by Knight Lightning PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN Offensive Message Flashes At Busy City Corner October 25, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Linda Wheeler (Washington Post) An offensive message that mystified the owners of an electronic information board was flashed Monday, October 23 at Connecticut Avenue and L Street NW, one of the city's (Washington DC) busiest intersections. A Georgetown University law student, Craig Dean, said he saw the message; "HELP STAMP OUT A.I.D.S. NOW: KILL ALL QUEERS AND JUNKIES" It flashed five times in 25 minutes. Minutes after seeing the message, he called the city Human Rights Office and the Washington Blade, a gay community newspaper. Doug Hinckle, a staff photographer for the Blade, saw the message flash once and photographed it. Judith Miller, president of Miller Companies, which own the building at 1101 Connecticut Avenue NW and the message board, said she did not know how the statement got onto the board. She refused to believe it had appeared until she was shown of the photographs. Her company has complete control of the board and does not accept any paid messages or advertisements, Miller said. "I would never do anything like that," she said. "There is no way I would allow such a statement to appear." Yesterday, Keller, a five-year employee of the Miller Companies, said he did not write the statement and does now know how it became part of the normal flow of headline news. Miller said she believes her computer system may have a "virus" and will have experts search to find where the unauthorized statement originated. "How absolutely awful," she said of the message. _______________________________________________________________________________ "WANK" Worm On SPAN Network October 17, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~ >From The Computer Emergency Response Team On October 16, the CERT received word from SPAN network control that a worm was attacking SPAN VAX/VMS systems. This worm affects only DEC VMS systems and is propagated via DECnet protocols, not TCP/IP protocols. If a VMS system had other network connections, the worm was not programmed to take advantage of those connections. The worm is very similar to last year's HI.COM (or Father Christmas) worm. This is NOT A PRANK. Serious security holes are left open by this worm. The worm takes advantage of poor password management, modifies .com files, creates a new account, and spreads to other systems via DECnet. It is also important to understand that someone in the future could launch this worm on any DECnet based network. Many copies of the virus have been mailed around. Anyone running a DECnet network should be warned. R. Kevin Oberman from Lawrence Livermore National Labs reports: "This is a mean bug to kill and could have done a lot of damage. Since it notifies (by mail) someone of each successful penetration and leaves a trapdoor (the FIELD account), just killing the bug is not adequate. You must go in an make sure all accounts have passwords and that the passwords are not the same as the account name." The CERT/CC also suggests checking every .com file on the system. The worm appends code to .com files which will reopen a security hole everytime the program is executed. An analysis of the worm appears below and is provided by R. Kevin Oberman of Lawrence Livermore National Laboratory. Included with the analysis is a DCL program that will block the current version of the worm. At least two versions of this worm exist and more may be created. This program should give you enough time to close up obvious security holes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Report on the W.COM worm. R. Kevin Oberman Engineering Department Lawrence Livermore National Laboratory October 16, 1989 The following describes the action of the W.COM worm (currently based on the examination of the first two incarnations). The replication technique causes the code to be modified slightly which indicates the source of the attack and learned information. All analysis was done with more haste than I care for, but I believe I have all of the basic facts correct. Here is a description of the program: 1. The program assures that it is working in a directory to which the owner (itself) has full access (Read, Write,Execute, and Delete). 2. The program checks to see if another copy is still running. It looks for a process with the first 5 characters of "NETW_". If such is found, it deletes itself (the file) and stops its process. Note: A quick check for infection is to look for a process name starting with "NETW_". This may be done with a SHOW PROCESS command. 3. The program then changes the default DECNET account password to a random string of at least 12 characters. 4. Information on the password used to access the system is mailed to the user GEMPAK on SPAN node 6.59. Some versions may have a different address. 5. The process changes its name to "NETW_" followed by a random number. 6. It then checks to see if it has SYSNAM priv. If so, it defines the system announcement message to be the banner in the program: W O R M S A G A I N S T N U C L E A R K I L L E R S _______________________________________________________________ \__ ____________ _____ ________ ____ ____ __ _____/ \ \ \ /\ / / / /\ \ | \ \ | | | | / / / \ \ \ / \ / / / /__\ \ | |\ \ | | | |/ / / \ \ \/ /\ \/ / / ______ \ | | \ \| | | |\ \ / \_\ /__\ /____/ /______\ \____| |__\ | |____| |_\ \_/ \___________________________________________________/ \ / \ Your System Has Been Officically WANKed / \_____________________________________________/ You talk of times of peace for all, and then prepare for war. 7. If it has SYSPRV, it disables mail to the SYSTEM account. 8. If it has SYSPRV, it modifies the system login command procedure to APPEAR to delete all of a user's file. (It really does nothing.) 9. The program then scans the accounts logical name table for command procedures and tries to modify the FIELD account to a known password with login form any source and all privs. This is a primitive virus, but very effective IF it should get into a privileged account. 10. It proceeds to attempt to access other systems by picking node numbers at random. It then used PHONE to get a list of active users on the remote system. It proceeds to irritate them by using PHONE to ring them. 11. The program then tries to access the RIGHTSLIST file and attempts to access some remote system using the users found and a list of "standard" users included with the worm. It looks for passwords which are the same as that of the account or are blank. It records all such accounts. 12. It looks for an account that has access to SYSUAF.DAT. 13. If a priv. account is found, the program is copied to that account and started. If no priv account was found, it is copied to other accounts found on the random system. 14. As soon as it finishes with a system, it picks another random system and repeats (forever). - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Computer Network At NASA Attacked By Rogue Program October 18, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by John Markoff (New York Times) A rogue computer program attacked a worldwide network of the National Aeronautics and Space Administration on Monday, October 16, inflicting no damage but forcing officials to disconnect the network from sensitive military and space systems. Security experts speculated that the program was written by someone who opposed Tuesday's (October 17) scheduled launching of the space shuttle Atlantis, which was to carry a nuclear-powered satellite into orbit. The launching was postponed because of bad weather. NASA officials said the rogue program attacked an academic and research network, the Space Physics Analysis Network, which is not used for space shuttle mission control. But a NASA official said the agency felt compelled to disconnect several links between the network and an operational space shuttle network as a precaution. Computer security experts at several national laboratories said the Department of Defense had also severed the connection between commercial and research networks and nonclassified network that connects United States military installations and contractors around the world. The program was designed to copy itself secretly and send unwanted, sometimes vulgar messages to users of the NASA network. It also tricks users into thinking that data have been destroyed, although no data are damaged. Like similar programs that have been sent into computer networks by pranksters and saboteurs, it exploited a flaw in the security system designed to protect the computers on the network. Computer security experts said Tuesday that they knew of about 60 computers that had been affected by the program. A NASA spokesman said the program was still spreading. While the network is widely available to academic researchers with personal computers, the rogue program was designed to attack only 6,000 computers manufactured by the Digital Equipment Corporation. The flaw in the security of the Digital Equipment computers had been widely publicized over a year ago even before a similar rogue program jammed a group of interconnected international networks known as the Internet. NASA officials said the program was only able to attack computers in which the necessary steps had not been taken to correct the flaw. Among the messages the program displayed on all infected computers was one that read: "Worms Against Nuclear Killers. You talk of times of peace for all, and then prepare for war." Computer scientists call this kind of program a worm, a reference to a program first described in the novel "Shockwave Rider" by a science fiction writer, John Brunner. _______________________________________________________________________________ Virus Controversies Again October 6, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~ by John Markoff (New York Times) "The issue has also sparked interest among computer scientists." Harold Highland, editor of Computers & Security, a professional journal, said he had received two research papers describing how to create such anti-virus programs. He has not decided whether to publish them. "No one has raised the obvious ethical questions," he added. "I would hate to see a virus released to fight viruses. Until it's tested you don't know whether it's going to do more damage than the program it is designed to fight." A number of these programs have already been written, computer researchers said. The one that destroyed the data on business and governmental personal computers in the United States was reportedly designed by a Venezuelan programmer. How many computers were affected and where they were is unclear. That program is called Den Zuk, or Search. It was intended to attack a destructive program known as the Brain Virus that was distributed in 1986 by two brothers who owned a small computer store in Pakistan. Errors in the design of the program illustrate the potential danger of such viruses, critics say. Fridrik Skulason, a microcomputer specialist at the University of Iceland in Reykjavik, who has disassembled the program, said the author of Den Zuk had failed to take into account the different capacities of disks available for IBM and IBM-compatible machines. Because of that simple error, when the program infects a higher-capacity disk it destroys data. "They probably wrote with good intention," he said. "The only problem is that the programmers were not able to do their job correctly." At least two other anti-viral viruses have already been devised, said Russell Brand, a computer security researcher at Lawrence Livermore. He said programmers at one company, which he would not identify, had written the programs to combat the Scores virus, a program that infected Macintosh computers last year. He added that even though the programs were designed so they could not go beyond the company's own computers, there had been a heated debate over whether to deploy the programs. He said he did not know how it was decided. Brand said a group of computer researchers he works with at Lawrence Livermore had written several self-replicating programs after the appearance of the rogue program that Morris of Cornell is accused of writing. But he added that the group had never given permission to release the programs. The debate over vigilante viruses is part of a broader discussion now taking place among some computer researchers and programmers over what is being termed "forbidden knowledge." "There are ethical questions any time you send something out there that may find itself invited on to somebody else's computer," said Pamela Kane, author of a book on computer virus protection. In California this month a group of computer hackers plans to hold a forum on "forbidden knowledge in a technological society." While the role of the computer hacker has been viewed as mischievous in a negative way, hackers have consistently played a role as innovators, said Lee Felsenstein, a Berkeley, California, computer expert who designed several early personal computers. "Computer hacking was originally a response to the perception of a priesthood's control over immensely powerful technological resources," he said. "Informed individuals were able to break the power of this priesthood through gaining and spreading the body of forbidden knowledge." - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Dreaded Personal Computer Virus May Be Only A Cold October 6, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Don Clark (New York Times) It won't be much of a plague. But the hysteria anticipating it has been world-class. Those observations come from computer-security experts as they await Datacrime, a virus program set to attack IBM-compatible personal computers starting Thursday, October 12, 1989. Analyses of the program, also called the Columbus Day Virus, show that it is indeed destructive. It just hasn't spread very far. "It's going to be the week of the non-event," predicted John McAfee, a Santa Clara, California, consultant who serves as chairman of the Computer Virus Industry Association. "You have more chance of being hit by a meteor than getting this virus." McAfee Associates, which acts as a clearinghouse for virus information, has received just seven confirmed reports of Datacrime in six months -- compared with three to 50 reports per day about another virus that originated in Israel in 1987. He thinks only 50 copies of Datacrime exist, and 40 of those are in the hands of researchers. "It's gotten more publicity than it deserves," agreed Russell Brand, another virus expert, who advises Lawrence Livermore National Laboratory. Brand expects to find just 20 copies among the 75,000 computers he monitors at 1,000 sites. Such projections are disputed by some. They are based on how often Datacrime has been detected by computer users using special software that scans their systems for the virus. The virus could have infected many users who have not bothered to scan their systems, McAfee concedes. Fears have been whipped up by the news media and computer managers at companies and government agencies. Companies promoting products to eradicate viruses also have played a role -- understandably. Staid IBM Corporation this week took the unusual step of offering a program that checks systems for viruses. The company hasn't detected the virus in its own operations, but concedes that many customers are worried. "They are asking us how we protect our software-development operations from viruses," said Bill Vance, who was appointed a year ago as IBM's director of secure systems. Bank of America, a huge IBM customer with 15,000 PCs, recently put out a company-wide notice advising users to make backup copies of their computer data by Wednesday, the day before the virus is programmed to strike. Three different government agencies have panicked and sent out multiple versions of incorrect advice," Brand said. Worried calls have deluged McAfee's office, which has just three lines for computer communications and three for voice. "We put the phone down and it's 30 seconds before it rings again," he said. Computer sleuths detected Datacrime -- and have detected other viruses -- by looking for changes in the size of data files and in the way programs operate. The underlying code used to write the program, once disassembled by experts, indicates when the program will activate itself. The identity of Datacrime's author isn't known, although some reports have linked the virus to an anonymous hacker in Austria. It first began showing up in March, McAfee said, and gained notoriety after it was discussed at the midsummer Galactic Hackers Conference in Amsterdam. It appears to be relatively prevalent in the Netherlands and other European countries. Dutch computer users have reportedly bought hundreds of programs that are said to detect and destroy the program. Like other viruses, Datacrime rides along with innocuous programs when they are exchanged over a computer network or computer bulletin board or through exchange of infected disks. Unlike many viruses, it has been designed to later insert itself in data files that users don't often examine. If one of the programs is executed after the target date, Datacrime proceeds with its dirty work -- destroying the directory used to keep track of files on a computer's hard disk. The crime is analogous to destroying a card file in the library. "By destroying this one table you can't find where any of your data is," said Brand. But no one should really be in a fix if he makes backup copies of data, experts say. The data, once safely stored on another disk drive or on magnetic tape, can be restored by computer professionals even if the virus has infected the backup files. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - "Vaccines" To Hunt Down Rogue Programs October 6, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by John Markoff (New York Times) Ever since a rogue program created by a graduate student jammed a nationwide computer network last year, the rapid spread of such disruptive software, often known as viruses, has caused growing alarm among computer users. Now, to fight fire with fire, some companies, individuals and even a government research laboratory are crafting a new breed of what have been called anti-viruses to hunt down intruders. The trouble is, some computer security experts say, the problem of viruses may be exaggerated -- and the new crime fighter may do even more damage than the criminal. Much like an infection, a well-intended but badly designed program to stop viruses can run amok, knocking out thousands of computers or destroying vast amounts of data. Indeed, one of the anti-virus programs intended to defeat a known virus has already destroyed data on business and governmental personal computers in the United States. The issue has touched off a heated debate over whether the creation of these high-technology vigilantes is a responsible action. "The risks are just enormous," said Peter Neumann, a computer security expert at SRI International, a technology research center in Menlo Park, California. "It's an unbelievably unsafe thing to do." But Chris Traynor, a programmer at Divine Axis, a software development company in Yonkers, New York, argues that anti-virus programs can be contained so that they do not spread out of control, reaching and possibly damaging data in other computers. His company is now trying to design such a program. Computer researchers at the Lawrence Livermore Laboratory, a federal weapons center in Livermore, California, have designed similar programs that patrol computer networks in search of breaches through which viruses could enter the system. Viruses, which got their name because they mimic in the computer world the behavior of biological viruses, are programs, or sets of instructions, that can secretly be spread among computers. Viruses can travel either over a computer network or on an infected disk passed by hand between computer users. Once the infection has spread, the virus might do something as benign as displaying a simple message on a computer screen or as destructive as erasing the data on an entire disk. Computer security experts have been concerned for several years by the emergence of vandals and mischief makers who deliberately plant the destructive programs. But in recent weeks international alarm has reached new heights as rumors have spread that a virus program will destroy data on thousands of computers this month, on Friday the 13th. Computer security researchers said the virus, known as Datacrime, was one of at least three clandestine programs with internal clocks set to destroy data on that date. As is usually the case, no one knows who wrote the program, but U.S. military officials have mentioned as possible suspects a European group linked to West German terrorists and a Norwegian group displeased with the fame of Christopher Columbus, who is honored next week. Largely in response to customer concerns, IBM said on Monday that it was offering programs for its personal computers that would scan for viruses. But several computer security experts say public fears are largely exaggerated. They note that there have been fewer than a dozen reported appearances of the Datacrime virus in the United States, and contend that the whole issue is overblown. Still, in the personal computer world, where many users have little knowledge of the technical workings of their machines, concern over computer viruses has become widespread. The issue got the most attention last November, when, it is charged, Robert Morris, a graduate student at Cornell, unleashed a rogue program that because of a small programming error, ran wildly out of control, copying itself hundreds of times on thousands of computers, overloading a national network, As a result of the mounting concern, a new industry has blossomed offering users protective programs known as vaccines, or anti-viral software. These programs either alert users that a virus is attempting to tamper with their computer or scan a computer disk and erase any rogue program that is detected. These conventional programs do not automatically migrate from computer to computer, but now some experts are exploring fashioning programs that graft the powers of the vaccines onto viruses in order to pursue and stop them wherever they go. Designing and spreading such programs was proposed in August by several people attending an international gathering of computer hobbyists, or "hackers," in Amsterdam. They suggested that it was a good way for members of the computer underground to make a positive contribution. But many researchers believe the idea is dangerously flawed because of the possibility of accidentally doing great damage. Some computer security researchers worry that writing an infectious program to stop viruses may be taken as an intellectual challenge by hackers who are well meaning but do not grasp what problems they could create. "One of the questions that the hacker community is now addressing is what you do about young hackers," said Stewart Brand, a writer in Sausalito, California, who is working on a book on outlaw cultures and high technology. "They don't have a sense of responsibility; they have a sense of curiosity. These are deliciously debatable issues, and I don't see them going away." >--------=====END=====--------<