💾 Archived View for spam.works › mirrors › textfiles › virus › cpi-1.txt captured on 2023-06-16 at 21:01:45.

View Raw

More Information

-=-=-=-=-=-=-

               Computer Viruses - A Protagonist's Point Of View
           -----===] CORRUPTED PROGRAMMING INTERNATIONAL [===-----

                            == CPI Newsletter #1 ==
                    [ Article Written By Doctor Dissector ]
                           Released : June 30, 1989

                           Call The CPI Headquarters
                                 619-566-7093
                        1200/2400 Baud :: Open 24 Hours



                              [1.1] Introduction:
                              -------------------

      Welcome  to  "Computer  Viruses  - A Protagonist's Point Of View." This
 letter,  perhaps  the  beginning of a small newsletter. Well, this "letter,"
 is  written  by  one person right now, maybe I'll get some people to send in
 more  info,  ideas,  and  examples  to CPI. If you would like to contribute,
 please  upload  text  files to CPI Headquarters (see heading for number) and
 leave a note to me telling me you are contributing to our magazine.

      Well,  as  an  overview,  this  article will cover a few topics dealing
 with  viruses; however, there will be no examples covered as we are short of
 programmers  at  the  moment. That reminds me, if you would like to become a
 member  of  CPI, fill out the accompanying text file and upload it to CPI HQ
 as  an upload to the Sysop, then leave me and the Sysop some mail to tell us
 you  registered  to  become  a  member.  We  will get back to you as soon as
 possible.

      The  purpose  of  this  magazine  is  to expand and broaden the general
 computer  user's  view and knowledge of the dreadful computer Virus, as well
 as  a  bit  on  Trojans  (not  the hardware, the SOFTWARE!). Then, after the
 knowledge  of  these  computer  crackers  is  better  understood, the second
 purpose  of  this  newsletter  is  to  teach  both methods of developing and
 executing  a  better  virus/trojan.  We, CPI, feel viruses and trojans are a
 vital  part  of  the  computer  world,  and should stand along the trades of
 hacking,  phreaking, cracking, pirating, and pyro as an equal, not something
 to be looked down upon (unless you are hit by one...).

      In  the  future,  we  hope CPI will grow and spread, just like a virus,
 and  encompass  a large domain of the crackers, hackers, and other elite out
 there  so  that  the  life  of  this group will be maintained, and that this
 newsletter,  hopefully,  won't  be  the only issue to be released during the
 group's existence.

      Also, please note that this  newsletter is purely for the spread of new
 ideas and to educate  the reader of this "new" software technonlogy, and the
 document, and  the  author  of the document  do not encourage or support any
 illegal  use  of  the  information  contained,  and  the  reader  is  solely
 responsible for their actions after aquiring this document.

                                             Doctor Dissector
                                             CPI/ANE/TPH Author/Editor
                                             Phortune 500

  --[ Table Of Contents ]----------------------------------------------------

     Phile    Subject                                  Author
     -----    ---------------------------------------------------------
      1.1     Introduction & Table Of Contents.........Doctor Dissector
      1.2     Viruses- What, Where, Why, How...........Doctor Dissector
      1.3     Aspects Of Some Known Viruses............Doctor Dissector
      1.4     Ideas For Future Viruses.................Doctor Dissector
      1.5     Suggested Reading........................Doctor Dissector
      1.6     Conclusion...............................Doctor Dissector
      1.x     CPI Application..........................Doctor Dissector

Subject:  CPI Issue 1 2/6


     ----------------------------------------------------------------------

                      [1.2] Viruses- What, Where, Why, How


          If  you  are a beginner in this field, you may be curious to what
     a  virus/trojan  is.  Perhaps  you heard about it through some BBS, or
     known  someone  who had their system crashed by one. Well, this is for
     you.

          In  the  Trojan  War,  way  back  when,  there existed the Trojan
     Horse,  right? Well, nowadays, there is a modern version of the Trojan
     Horse  existing  is  software.  The  modern, computer, Trojan horse is
     really  simple,  a psychedelic hacker implants destructive code into a
     normal  (or  fake)  file.  This modified/fake file, when executed will
     destroy  or  remove  something  from the host computer, usually format
     the  hard  drive,  delete all files, or something similar. In order to
     distribute  the corrupt phile, the hacker goes and does one or more of
     various  things;  depending on how deranged this individual is (hehe).
     These things are covered in the following section.

          A  virus,  in  normal  terms  is an organism which spreads malign
     from  one  host  to  another,  transmitting  itself through biological
     lines  so  that  both  the  previous  host  and the future host become
     infected  with  the virus. Today, there are computer viruses, and just
     like  biological viruses, they spread from file to file, host to host,
     infecting  everything  it  "sees."  These  computer viruses can either
     destroy  the  code  it  infects immediately, or over a period of time,
     corrupt  or  damage  the  host  system it thrives upon. For example, a
     virus  hidden in a file on a BBS could be downloaded to a host system.
     Then,  the  user  who  downloaded it executes the file, which executes
     normally  (as  seen  by the operator), but at the same time, the virus
     attacks  other files, and infects them, so that each file owned by the
     user  becomes  infected  with the virus. Then, at a given time or when
     something  is fulfilled by the host system, the virus becomes a trojan
     and  destroys,  encrypts, or damages everything available, infected or
     un-infected.  In  general,  a  virus is a timed trojan that duplicates
     itself  to  other  files,  which, in effect sustains the virus's life-
     span  in  the  computer world, as more host systems are infiltrated by
     the disease.

          Now  that  I've given you a description of the computer virus and
     trojan, we can go onto more complex things... well, not really...

          Ok,  now, let's trace the life of a virus. A virus/trojan is born
     in  the  mind  of  some  hacker/programmer  that  decides  to  develop
     something   out   of   the   ordinary,  not  all  viruses/trojans  are
     destructive,  often, some are amusing! Anyway, the hacker programs the
     code  in  his/her  favorite  language;  viruses  can be developed with
     virtually  any  language,  BASIC,  Pascal,  C, Assembly, Machine Code,
     Batch  files,  and  many  more. Then, when the disease is complete and
     tested,  the  hacker intentionally infects or implants the code into a
     host  file,  a  file  that  would be executed by another un-suspecting
     user,  somewhere  out there. Then, the hacker does one or more of many
     things  to  distribute  his  baby.  The hacker can upload the infected
     file  to  a local BBS (or many local/LD BBS's), give the infected file
     to  a  computer  enemy,  upload the infected file to his/her workplace
     (if  desired...hehe),  or  execute  the  phile  on  spot,  on the host
     system.  Then,  the virus, gets downloaded or executed, it infiltrates
     the  host  system,  and  either  infects  other  files, or trashes the
     system  instantly.  Eventually,  the infected system's user gets smart
     and either trashes his system manually and starts fresh, or some mega-
     technical  user  attempts  to recover and remove the virus from all of
     the  infected files (a horrendous job). Then, the virus dies, or other
     host  systems that were previously infected continue, and accidentally
     upload  or  hand out infected files, spreading the disease. Isn't that
     neat?

          Now,  to  answer  your  questions;  I  already  explained  what a
     virus/trojan  is  and  how they are developed/destroyed. Now, where do
     these  suckers come from? Why, some hacker's computer room, of course!
     All  viruses  and  trojans  begin at some computer where some maniacal
     hacker  programs  the  code  and implants it somewhere. Then, you ask,
     why  do they do this? Why hack? Why phreak? Why make stupid pyro piles
     of  shit?  Think about it... This is an ART! Just like the rest. While
     Hacking  delivers  theft  of  services,  Phreaking  delivers  theft of
     services,  Cracking/Pirating  delivers theft of software and copyright
     law  breaks,  Pyro  delivers  unlawful  arson/explosives,  Viruses and
     Trojans  vandalize  (yes,  legally  it is vandalism and destruction of
     property)  computer  systems  and  files. Also, these are great to get
     back  at arch-computer enemies (for you computer nerds out there), and
     just  wreak  havoc  among  your computer community. Yeah, PHUN at it's
     best...

     ----------------------------------------------------------------------
Subject:  CPI Issue 1 3/6


     ----------------------------------------------------------------------

                       [1.3] Aspects Of Some Known Viruses


          Many  viruses  have  been  written  before and probably after you
     read  this article. A few names include the Israeli, Lehigh, Pakistani
     Brain,  Alameda,  dBase,  and  Screen.  Keep in mind that most viruses
     ONLY  infect COM and EXE files, and use the Operating System to spread
     their  disease.  Also,  many viruses execute their own code before the
     host  file  begins  execution,  so  after  the virus completes passive
     execution  (without  "going  off")  the  program will load and execute
     normally.

          Israeli  - This one is a TSR virus that, once executed, stayed in
     memory  and  infected  both COM and EXE files, affecting both HARD and
     FLOPPY  disks.  Once  executed, the virus finds a place to stay in the
     system's  memory  and upon each execution of a COM or EXE file, copies
     itself  onto the host phile. This one is very clever, before infecting
     the  file,  it  preserves  the  attributes  and date/time stamp on the
     file,  modifies  the  files attributes (removes READ only status so it
     can  write  on it), and then restores all previous values to the file.
     This  virus  takes very little space, and increases the host file size
     by  approximately  1800  bytes.  The trigger of this virus is the date
     Friday  the  13th.  This  trigger will cause the virus to either trash
     the  disk/s  or delete the files as you execute them, depending on the
     version. Whoever wrote this sure did a nice job....

          Lehigh  -  This one infects the COMMAND.COM file, which is always
     run  before bootup, so the system is ready for attack at EVERY bootup.
     It  hides  itself  via  TSR type and when any disk access is made, the
     TSR  checks  the  COMMAND.COM  to  see  if  it is infected. Then if it
     isn't,  it  infects  it,  and  adds  a  point to its counter. When the
     counter  reaches  4,  the  virus  causes  the disk to crash. This one,
     however,  can be stopped by making your COMMAND.COM Read-Only, and the
     date/time  stamp  is  not  preserved,  so  if  the  date/time stamp is
     recent,  one  could  be  infected  with  this  virus.  This  virus  is
     transferred  via  infected  floppy disks as well as a clean disk in an
     infected  system.  It can not infect other hosts via modem, unless the
     COMMAND.COM is the file being transferred.

          Pakistani  Brain  -  This one infects the boot sector of a floppy
     disk.  When  booting off of the disk, the virus becomes a TSR program,
     and  then  marks  an  unused portion of the disk as "bad sectors." The
     bad  sectors,  cannot be accessed by DOS. However, a disk directory of
     an  infected  disk  will show the volume label to be @ BRAIN. A CHKDSK
     will  find  a few bad sectors. When you do a directory of a clean disk
     on  an  infected  system, the disk will become infected. The virus has
     no  trigger  and  immediately  begins  to mark sectors bad even though
     they  are  good. Eventually, you will have nothing left except a bunch
     of  bad  sectors  and  no  disk  space. The virus itself has the ASCII
     written  into  it with the words "Welcome the the Dungeon" as well the
     names  of  the  supposed  authors of the virus, and address, telephone
     number,  and  a  few  other  lame  messages.  To inoculate your system
     against  this  virus,  just type 1234 at byte offset location 4 on the
     boot track (floppy disks).

          Alameda  -  This  virus  also infects the boot sector of the host
     system.  It  is  very  small  and  inhabits  ONE sector. This one only
     damages  floppy  disks.  If  you  boot from a diseased disk, the virus
     loads  itself  into  HIGH memory and during a warm boot, it remains in
     memory  and  infects  any  other  clean disks being booted from on the
     infected  system. It then replaces the boot track with the virus track
     and  replaces  the  boot  track  on the last track of the disk, so any
     data  located  on  the  last  track  is  corrupted.  All  floppy disks
     inserted  during  reboot can catch this virus. This virus only infects
     IBM PC's and XT's, however, it does not infect 286's or 386's.

          dBase  -  This  one is a TSR virus that works in a manner similar
     to  the  Israeli  virus. It looks for files with a DBF extension, then
     it  replicates  itself in all DBF files, preserving file size, and all
     attributes.  After  the  first  90  days, the virus destroys your file
     allocation  table  and  corrupts all data in the DBF files. This virus
     creates  a  hidden  file,  BUG.DAT that indicates the bytes transposed
     (in  order to preserve file specifications). Run a CHKDSK to make sure
     you  don't  have  any  extra  hidden  files or a BUG.DAT in your dBase
     directory.  If  you  create a BUG.DAT file manually in your directory,
     making it read-only, you will be safe from this virus.

          Screen  -  This  one  is  another TSR virus that comes on and off
     periodically.  When  it is on, it examines the screen memory and looks
     for  any  4  digits  starting at a random place on the screen. Then it
     transposes  two  of  them,  this is not a good thing. It infects every
     COM  file  in  your  directory, HARD and FLOPPY disks can be infected.
     You  can  use  a  ASCII  searcher  to  check  if  you  are infected by
     searching  for  "InFeCt"  in your COM files. If you have this written,
     read  the  4  bytes immediately preceding it and overwrite the first 4
     bytes  of  the program with their value. Then, truncate the program at
     their  stored  address. You will rid yourself of this virus. Make sure
     you use a clean copy of you editor for this.

          Other  viruses  include  MAC, AMIGA, and many other environments.
     By  the way, other computer systems other than IBM/DOS may become part
     of CPI if you qualify.

          Anyway,  these  are  a few viruses I have read on and thus passed
     the  information  to  you, I hope you can learn from them and get some
     ideas for some.

Subject:  CPI Issue 1 4/6


     ----------------------------------------------------------------------

                         [1.4] Ideas For Future Viruses


          Since  I  have  covered  viruses  already in existence, lets talk
     about  viruses that can or may exist in the near future. These are not
     even   close   to   half  the  ideas  possible  for  destruction  with
     trojans/viruses  available,  but  will  pose as a challenge to you who
     are short of ideas.

          CSR  Virus  - A CMOS Stay Resident VIRUS that will implant itself
     in  the  CMOS  memory of the AT (286/386/486?) which will execute upon
     every bootup. This one would be VERY nice.

          Failsafe  Virus  - Preserves ALL attributes, Preserves file size,
     remains  TSR  but hidden to TSR location programs, Modifies attributes
     to  get  around  Read-Only  files, Infects ALL files (Not only COM and
     EXE),  encrypts  all  data  on  trigger  (irreversible)  but preserves
     original file size/attributes.

          Format  Virus - A virus which is TSR and when a DOS format or any
     other  FORMAT  type  of call is called, will FORMAT every other track,
     but will not allow DOS to notice.

          Write  Virus  -  A  virus  that  intercepts  write to disk, which
     deletes the disk write, and marks sector as bad at write point.

          ASCII  Virus  -  Virus that would scramble ASCII text in any file
     at trigger.

          Low  Level  Format  Virus  -  Virus  that  low level formats (BAD
     format)  HD  in background with data still intact. I have seen regular
     background  LLF  programs,  and it keeps data in place, but it does it
     correctly... hmmm...?

          Hide Virus - A Virus that hides files slowly.

          Crash  Virus - Virus that emulates typical system crashes/freezes
     occasionally.  Causes  BIOS to freeze and write BIOS ERROR messages on
     screen.

          Modem  Virus  -  One  that  remains  in  boot  sector and TSR and
     monitors  data  from  serial  ports,  puts in "artificial" line-noise.
     NICE!

          These  are  just  a  few  I  thought  up... these could be really
     good... Think of some more and call CPI HQ TODAY!

Subject:  CPI Issue 1 5/6


     ----------------------------------------------------------------------

                             [1.5] Suggested Reading


          The  following list is a compiled listing of some material I have
     read   as  well  as  other  sources  you  MIGHT  find  information  on
     concerning viruses and trojan horses. Happy trashing....


          "Know Thy Viral Enemy" by Ross M. Greenberg
           BYTE Magazine
           June 1989, pg 275-280

          "Viruses: Assembly, Pascal, BASIC & Batch" by Tesla Coil ][
           Phreakers And Hackers Underground Network Newsletter (PHUN)
           Issue #3, Volume 2, Phile #2

          "A Boot Sector Virus" by Southern Cross
           Phreakers And Hackers Underground Network Newsletter (PHUN)
           Issue #4, Volume 2, Phile #3

          "Computer Viruses: A High Tech Disease" by Abacus
           2600 Magazine
           Volume 5, Number 2

Subject:  CPI Issue 1 6/6


     ----------------------------------------------------------------------

                                [1.6] Conclusion


          Thus   ends  the  first  issue  of  CPI's  "Computer  Viruses:  A
     Protagonist's  Point  Of  View." We hope you enjoyed it and we hope it
     was informative and complete (at least about the specific issues).

          We,  CPI,  hope that you will share your information and comments
     with  us  at  CPI  Headquarters,  as this newsletter will require both
     information  and  an expansion of our current member base. If you feel
     you  have  what  it takes to gather, read, or program for CPI, send us
     an application today.

          Oh  yeah, if  this  happens to be the only issue of CPI, oh well,
     and  many thanx to those who read it at least once, and enjoyed it (or
     laughed  at  it).  Until our (my?) next issue, have phun and don't get
     toooo wild......




      =====[ CPI Headquarters * 619-566-7093 * 1200/2400bps * 24Hrs ]=====