💾 Archived View for spam.works › mirrors › textfiles › virus › stealth.txt captured on 2023-06-16 at 21:04:40.

View Raw

More Information

-=-=-=-=-=-=-

             Elusive New Viruses Can Avoid Detection                       

By Dennis Flanders

While computer users nationwide took time to download anti- virus
software to detect the latest viral strains, someone was busy creating
the electronic version of the stealth bomber.  The "stealth" viruses are
the deadliest infection to date.

At one time the message "126 files scanned - No viruses detected"
would cause a sigh or relief.  Now it may mean "126 files scanned -
126 files infected."  Not only do these evasive new bugs elude
detection, they can turn your favorite scan program into a "typhoid
Mary."

Most viruses announce their presence by doing such obvious things as
consuming system resources, destroying files or causing distinctly
abnormal actions on the screen.  The stealth virus, on the other hand,
quietly sits in the computer's memory doing nasty things to your
system over a long period.

The 4096 virus is destructive to both data and executable files. 
Because the virus slowly cross-links files on the system's disk, it gives
little indication of its presence.  The cross-linking occurs so slowly that
it appears there is a hardware problem when it is the result of the
virus manipulating the FATs and changing the number of available
sectors.

Masquerading as hardware failures, stealth viruses can cause much
time and money to be wasted chasing the wrong problem and repairing
good equipment.  After finally discovering the virus the infected PC's
data and programs may be beyond recovery.  Often several generations
of backups will contain files contaminated or destroyed by the virus.

Currently 4096 and Joshi-B are the most prevalent of the stealth
viruses.  Once installed in memory, a typical stealth virus will
insinuate itself between DOS and the user.  It will protect itself by
filtering information passed between DOS and programs.

Whenever DOS opens a file, the virus will intercept the call and
manipulate the file.  If the opened file is not infected, it will become
infected.  If the file is infected the virus will make it appear to be
"clean" by removing itself.  Thus anti-viral scanners are unable to
detect its presence.

If the anti-viral software does not scan memory, the stealth virus will
go completely undetected.  In fact anti-viral programs will lie and
report that the PC is "clean" even as it becomes the primary vehicle for
infection.  Commonly used programs often become the primary source
for contamination. For instance, typing COPY or XCOPY will cause the
virus to infect both the original and the new files.      Viruses always
add code to the programs they infect.  For instance the 4096 virus will
increase the size of an infected file by 4096 bytes.  Stealth viruses also
manipulate commands such as DIR that report file lengths.  They will
subtract the length of the viral code from the file size before passing it
on to the requesting program, making it appear normal. 

Programs that depend on CRC checks to validate the existence of a
virus are not effective.  They perform their calculations on a "sanitized"
version of an infected program.  This causes the CRC to be correct. 

The only sure protection is prevention.  In the past genuine hardware
problems have been blamed on viruses.  We may now have come full
circle.  Genuine virus problems may be blamed on hardware glitches,
according to David Stang, chairman of the National Computer Security
Association.  Stang went on to say that the association's BBS (see
insert) has software and clear instructions for dealing with stealth
viruses. 

Insert: 
The National Computer Security Association 4401-A Connecticut Ave.
NW, Suite 309 Washington, DC  20008 202-364-8252 (Voice)
202-364-1304 (Data)