💾 Archived View for spam.works › mirrors › textfiles › virus › talons02.txt captured on 2023-06-16 at 21:04:50.

View Raw

More Information

-=-=-=-=-=-=-

	    NuKE_NuKE_NuKE_NuKE_NuKE_NuKE_NuKE_NuKE_NuKE_NuKE_N
	    uK                                               Nu
	    KE          The true story about Talon           uK
	    E_                                               KE
	    _N                    By                         E_
	    Nu                 T a L o N                     _N
	    uK                                               Nu
	    KE_NuKE_NuKE_NuKE_NuKE_NuKE_NuKE_NuKE_NuKE_NuKE_NuK

NuKE Info-Journal #8
April 1994


The true story about T?L?N... by T?L?N
~~~ ~~~~ ~~~~~ ~~~~~ ~~~~~
For a while I didn't have any interactions with anybody remotely
connected with either the AV or Vx worlds, because of the local scene
breakdown, and my exclusion from NuKENet for reasons unknown at the time
(which this article shows to be mostly fabrications and distortions of
truth).  As a result, only my older work stood as an example of my
capabilities.  This in combination with other things led to my
misrepresentation and misunderstanding among the Vx community.  This
article hopes to dispel or at least straighten out some of these
problems.

This article refers to articles which aren't altogether new, but until
now I hadn't seen them, let alone have the exposure enough to reply to
them.  These are, Crypt Newsletter 18 ("An incredibly complicated tale
of mystery and intrigue", September 1993) and 40Hex release
11, article 001 ("Life, the Universe, and 40Hex", June 1993).

____

I think it's about time that the story, the TRUE story, was let out for
all to read and digest.  Forget everything (well most things) that
you've heard, read, eavesdropped on etc, because there's a good chance
it's bullshit.

It's a bit hard to choose where to start the tale.  I guess i'll start
by rebutting some of the things which have been said about me, for
example, NuKE infojournal #7 perhaps ?  Or, more recently, Crypt
Newsletter 18 ... and I quote:

	"Confusion to your enemies" could be TaLon's motto and
	you'll agree after reading this whopper. Originally,
	the writer of the PuKE/Harry McBungus viruses, Talon created
	Harry McBungus and Terminator-Z as electronic beards for a
	group predominatly interested in optimizing virus code and
	poking fun of the NuKE virus-programming group.  But, fate took a
	hand and made the PuKE virus famous down under when it infected
	a company and the event was publicized in a newspaper. Talon,
	according to sources, saw the article, called the newspaper and
	gave them an interview, perhaps thinking editors would keep his
	name secret.  They didn't.

(for a start, this extract, and following extracts, were based upon old,
second-hand and whats more _incorrect_ "facts").

The above extract is essentially true.  (almost).

In about 1990 I decided to teach myself assembly language, and quickly
developed an insane fascination with cracking and viruses.  As
Terminator Z, when Gnarly Beast ran the Australian iNC headquarters
(Hellzone/Crime Syndicate), I was a part-time cracker for iNC and stuff
like that.

But quickly my appetite for viruses overcame, and I created my first
virus at the age of 15.  Now that my previous aliases have been
released, I might as well make no secret of the fact that I wrote
X-Fungus, which did actually infect a prominent institution in Brisbane,
which made headlines.  This was my first ever virus, which was TSR,
infected COM and EXE files, hid the file size increase on the directory,
and included an encrypted text message which was displayed on certain
dates.  My first virus.  1422 bytes.  And for which I had absolutely no
reference material to learn from.  Not trying to blow my own horn, just
stating the facts, other people at the time were writing simpler viruses
which were twice the size.

I then cut that down and optimized it to create No Frills, which was to
be a 'skeleton' from which other ones could me made.  A few others, such
as K-Lame Kreation, No Frills 2.0 and No Frills 3.0 were created from
this.  (NF2.0 was a bug-fix of 1.0, and K-Lame Kreation was never
released).

But before all this happened, I showed a number of people my virus
sources and what the viruses could do - but never gave anybody a copy.
This is where good friendships came into effect.  Sombody flogged them.
(somthing which has occurred more than once in my career unfortunately,
but more on that later).  My source codes turned up on a few local BBSs.
I was spewing.

It was soon after this that I learned that X-Fungus had hit this famed
institution .. (as you can see this is a bit out of chronological
order..).  But the newspaper report was full of shit, they called it the
"K-Mart" virus.. so I called the newspaper and told them they were
wankers, and he being a reporter, juiced more info out of me (not that I
cared, what could a reporter do). ... re:

	Editors passed his name along to the Fraud Squad, a branch of
	the Australian national crime-fighting force which focuses on
	computer crime.  ...

This is partly true.  In the meantime, No Frills 2.0 had made the rounds
of large numbers of public & private high schools, and No Frills 3.0
actually hit the network of one of Brisbane's largest private schools.

It was then that I found out that the cops were after me, because a
friend of mine was brown-nosing the computer administrator, and he found
that they (the cops) came up to the school and asked if they were
interested in supplying evidence for their "case".

Anyway the case came to pass, I was interrogated over the course of two
days.  They TOLD me that they wouldn't have bothered with the
investigation, it was so hard to prove, but they had to try since that
institution had lodged a formal complaint to the fraud squad.  I NEVER
told them any names (I knew none at the time anyway).  I NEVER dobbed
anyone in.  Anyway read the entire article, and I will continue...

(from crypt letter 18, verbatim..)

	>An incredibly complicated tale of mystery and intrigue:

	Former NuKE virus-programmer Talon, of Brisbane, Australia,
	makes it into Fictual Facts this month for making life just
	a little more brutish than it ought to be.

	"Confusion to your enemies" could be TaLon's motto and
	you'll agree after reading this whopper. Originally,
	the writer of the PuKE/Harry McBungus viruses, Talon created
	Harry McBungus and Terminator-Z as electronic beards for a
	group predominatly interested in optimizing virus code and
	poking fun of the NuKE virus-programming group.  But, fate took a
	hand and made the PuKE virus famous down under when it infected
	a company and the event was publicized in a newspaper. Talon,
	according to sources, saw the article, called the newspaper and
	gave them an interview, perhaps thinking editors would keep his
	name secret.  They didn't.

	Editors passed his name along to the Fraud Squad, a branch of
	the Australian national crime-fighting force which focuses on
	computer crime.  Agents from the Fraud Squad promptly rounded
	up Talon and here's where the story gets tricky.  Talon, by
	adroitly using the aliases of Harry McBungus and Terminator-Z,
	was able to sufficiently confuse the investigation by pushing
	authorship of the PuKE virus onto people, who essentially, didn't
	exit.

	At this point, TaLon applied for membership to NuKE and submitted
	the Daeman virus.  Shortly therafter, the Daeman virus infected
	a PC network belonging to Australian Telecom, sufficiently
	inconveniencing the company so that it summoned the Fraud Squad.
	It was "round up the usual suspects" time and Talon again went
	into the bag. This time, he shifted suspicion onto two other
	Australian hackers and NuKE members, Phrozen Doberman and Screaming
	Radish. NuKE promptly terminated TaLon's membership for this
	graceless cybersocial faux pas, but did publish the Daeman source
	code in its InfoJournal #7 before wishing him luck with Australian
	authorities.

	TaLon promptly uploaded a fakeware archive called VCL20.ZIP
	into some US virus exchange bulletin board systems.  Advertised
	as the Virus Creation Laboratory v. 2.0, the archive was
	"password protected" with the phrase "Nowhere Man Sucks."
	It was a hoax.

	[NuKE Infojournal #7, with the source code to the Daeman virus,
	is available on most of the systems listed at the end of this
	issue.]


Now I can say a few more things.

Most people who know me or have read my posts will know my standpoint on
the creation of millions of sad-arse viruses for the pleasure of saying
"Ive written XXXXX number of viruses, I'm so cool" versus writing REAL
viruses which will actually be any good.

In its infancy, NukE was an outfit which couldn't really program
viruses, and although they'd progressed past overwriting they were still
only sad direct-infectors, and still managed to inflate their dolls over
them.  At the time I was writing better viruses, smaller viruses, more
viable viruses, and thus PuKE was formed.  A pretty bogus group and I
make no secret of that.  I was PuKE, the only member.

Yes I eventually gave the newspaper an interview, along with 3 others,
including Storm Waterdrain (now seemingly retired).  We went into the
interview with the intention of helping to educate the public on what
the whole deal was about, to help maybe reduce the crap and stigma that
surrounds the whole deal ..  but nooooooooooo.. typical reporter etc etc
and I ended up getting _totally_ burnt, a maladjusted misfit hell-bent
on screwing peoples' computers up.

As if a newspaper isn't going to be sensationalistic.  You can't get
sensationalism out of education.  You get it out of portraying people
like me and the rest of the Vx as monsters, feeding the public exactly
what they want to hear. I was a victim of all that shit.

Anyways enough of that.  Back to the Crypt article...

	At this point, TaLon applied for membership to NuKE and submitted
	the Daeman virus.  Shortly therafter, the Daeman virus infected
	a PC network belonging to Australian Telecom, sufficiently
	inconveniencing the company so that it summoned the Fraud Squad.

I didn't join NuKE and just upload DaeMaen, I was conferencing with Rock
Steady for a number of weeks and mainly brainstormed new ideas and
tricks and stuff.  Ask him about it.  A lot of ideas came into effect
and many of them did go into the creation of Daemaen.

I did join nuke.. But under the condition that none of my previous
aliases and stuff were mentioned, for the simple reason regards the
investigation - trying to make a clean break, not get NuKE tangled up in
my previous endeavours.  And also that DaeMaen wasn't to be published.
Both were violated.. not happy..  Apparently justified by the fact that
i'd dobbed people in, which was BULLSHIT. ABSOLUTE BULLSHIT.

Daemaen didn't work on dos versions above 3.3 for the simple reason that
it does a dodgey search method for the original interrupt 13 vector, and
the structure changed for higher dos versions...  so it didn't matter
anyway.

So it couldn't possibly have been DaeMaen that infected Australian OTC.
I know for a fact it wasn't, because the virus that did was called the
Dudley virus, which just happens to be based around No Frills but with a
mutation engine thrown on top.  I didn't write this, well not exactly,
but wrote half the mutation engine then gave it to someone else, who
then coupled it up with the unofficially-released No Frills source and
then released the resulting virus under the PuKE banner (I didn't know
this until later). ...

	It was "round up the usual suspects" time and Talon again went
	into the bag. This time, he shifted suspicion onto two other
	Australian hackers and NuKE members, Phrozen Doberman and Screaming
	Radish. NuKE promptly terminated TaLon's membership for this
	graceless cybersocial faux pas, but did publish the Daeman source
	code in its InfoJournal #7 before wishing him luck with Australian
	authorities.

100% CRAP (except for the membership termination and the publishing of
the source code).  I later learn that most of the bullshit was informed
to NuKE by none other than Phrozen Dobermann.  I have no knowledge of
ever offending him, nor anyone else, but I dont care and this was told
to me by several members.  Rock Steady said he found out from NuKE
Melbourne, and god knows where they heard it from.

As for the second investigation, i'm still waiting...

	TaLon promptly uploaded a fakeware archive called VCL20.ZIP
	into some US virus exchange bulletin board systems.  Advertised
	as the Virus Creation Laboratory v. 2.0, the archive was
	"password protected" with the phrase "Nowhere Man Sucks."
	It was a hoax.

Well well well, if the bit before was 100% crap, this is 200% absolute
bullshit.  For a start I consider myself a person of some sort of common
decency (some in the public world would disagree, though :) ) and would
never resort to such pathetic, underhand "tactics".  I piss on the grave
of whoever took it upon themselves to do this.  Anyway, I wasn't calling
out and don't have access on ANY boards in the States, simply because I
never call there.  If I did, I would have discounted this trend before
now - this is my first opportunity.

	[NuKE Infojournal #7, with the source code to the Daeman virus,
	is available on most of the systems listed at the end of this
	issue.]

Which didn't work... and is a major embarassment to me since it's
largely crap.

Another virus was eventually built out of that, which emerged as
"1984", which also wasn't to be released.  A few would find my story a
little hard to believe -- first time things were stolen ,,, but a SECOND
time ?  yeah , sure.  Well to all of you who think that, go shove it up
your arse, there are a number of things which point to the fact that it
was stolen :

       1.  1984 was to be 1984 bytes long.  The in-the-wild version is
	   1979 bytes long.
       2.  The infection counter on the SCAN trojanned with 1984 is
	   infection number 7.
       3.  There are several buggy and unoptimized bits in the virus
	   which I wouldn't ever have released.
       4.  The virus code on the disk boot sector infection isn't
	   encrypted, this was fixed long before I saw 1984 (without
	   encryption) in the wild.
       5.  The boot sector infection routine will bug out on
	   high-density disks.  This reduced the bandwidth of the virus
	   by a large degree.  This was also fixed.

Anyway I hope I've set a few things straight here and stamped out a lot
of shit rumours and speculations.  Problem is, until now I haven't been
able to stamp them out because of the very fact that I was still
percieved as a narc until a very short time ago, when Screaming Radish
finally called me voice and I cleared the air.  I had my banishment from
NuKENet lifted, among other things.

I'm a bit sick of the entire virus deal, but at least my faith has been
partly restored.  Perhaps even the author of the above section of Crypt
Newsletter 18 will publish something now that he knows the real story ?
Who knows.

That doesn't mean to say that I've retired, mind you...  there's still
stuff in the pipeline.

Hmm This reminds me of what I read in 40Hex issue 11, where a particular
Dark Angel, whom I have had no previous interaction with, but all the
while I respected him for his work, took it upon himself to make a
judgement on the little available information about me.  He didn't
actually state any names, but it's pretty obvious to those who know..

Interestingly enough, my little tale was told (not the tale about the
feds etc, but my virus writing) inside an article complaining about all
the lame biting-ass virus "groups" out there.  Here's the business half
of the article.  (This appears in the 11th issue of 40Hex magazine, the
file 40HEX-11.001).

       It is apparent to even the blindest of observers that the virus
  phenomenon has caught on.  Everyone and his kid brother has decided to start
  a virus group, whether or not they have programmers capable of creating a
  viable (read: parasitic) virus.  While this in itself is merely offensive,
  it is the sheer arrogance of these meta-groups which is irritating.  Of
  course, no names will be mentioned, as that would be mean and we all wish
  for a happy world.
       The most common trait of these pseudo-groups is for a member to state
  that all code that was written was "developed on my own."  Of course, this
  is seldom the case.  Often, the "original source code" to their viruses
  clearly originated at some point from a Sourcer disassembly.  Heck, when you
  see "seg_a" or "loc_0027," you know they're just poor hacks.  Of course, the
  the disparate coding styles in the "source" also reveals the nature of the
  virus.

If the reader reads on, about the 387-byte TSR COM/EXE infector, about
self-developed techniques, about other shit which I said, the above
reference may not be understood unless it's stated that the source code
to this 387-byte virus was lost in a HD crash, and I had to use sourcer
to recover it.  (I had the .bin image of the virus in question on a
backup disk).  I'd imagine the statement of the "loc_0027" above is
referring to this fact, attacking my integrity as a self-respecting
programmer.

       [irrelevant paragraph skipped]

       Every group goes through a phase in which they hack viruses; they
  should not be proud of these viruses.  But it is merely the first step and
  most grow out of it.  Skism-1, for example, was a Jerusalem hack.  It is
  ancient history.  I might also point out that the Phalcon/Skism viruses
  published in both the last issue and this one are far superior to Skism-1.
  Phalcon/Skism does not release the source code to half-baked viruses just so
  40Hex can look larger.  Every virus programmer has a few experimental
  viruses; yet it is not necessarily appropriate to print all of them.  If I
  wrote a virus which had several hundred bytes of repetitious code, I would
  be ashamed to print it.  It's like releasing a program which has only been
  half-completed.

This I agree with, it's pointless releasing every revision of every
virus you've ever written.  My standpoint on this issue is pretty clear,
I have written a fair few, and none I have actually released myself, and
I wouldn't want all of them to have been released for the simple fact
that I dont want to be seen to be writing almost identical viruses and
being "proud" to put my name to them.  What's the point in that?  I dont
respect people like that, and from all indications neither does the
author of this article (Dark Angel).  And no, I never hacked another
virus, and didn't think about it for a second.  I've borrowed some
techniques (but not code) and gained inspiration from some viruses, but
nothing of the likes of Dark Avenger or Jerusalem!

       When a virus programmer additionally claims, "This virus was written
  two years ago, so it sucks, but I'm going to release it anyway because it's
  good to learn from," I have my doubts.  When s/he further hurridly states,
  "My other viruses are better," then my doubts grow.  Where, pray tell, are
  these superior viruses?  Why publish that which you admit sucks?  Of course,
  anyone that makes such a claim, or one such as, "Next time, I'll release a
  COM/EXE/SYS/MBR/OV?/DAT/DOC/TXT/ANS/ASC polymorphic, stealth infector that I
  wrote last week," is suspicious.
       As an example of the mindless boasting, observe the following:  (Note:
  the following should not be construed as a personal attack against either
  the person or group in question.)

Now this is only _slightly_ directed towards me (not).  OK then, that
source code was released - I had nothing better at the time - becuase I
was in the _middle_ of writing the super-duper
"COM/EXE/BIN/SYS/OVL/MBR/Boot Sector/Dir Stealth/Partition Stealth"
virus in question, which Dark Angel slanders me for for being
"bullshit".

So, my other viruses ARE better.  Have no doubt, Dark Angel obviously
drew invalid assumptions from a poor pool of information.  Mindless
boasting? hmf. Anyway i'll quote the next paragraph.

       This person wrote, "As with many of my routines, stuff which took many
  other virus writers a few pages of code took me one page... that's not bad!
  I have many other goodies up my sleeve, like a 387-byte generic COM/EXE
  parasitic infector on execution, the smallest of its kind in the WORLD...
  (with room for improvement!)."

I do not deny stating this, but my I say it was mostly to burn off some
lamer in Sydney who rang me up telling me he was hot shit, so I had to
do something about it.  And it's true, I squashed both the COM and the
EXE infection routines into just over a single page (24 lines),
something most viruses at the time had a good 200 bytes devoted to.

Somethign else must be said though.  One must remember the time frame in
which my viruses were written.  If viruses of that quality were written
today, then big deal, but they were written 2 years ago, in an
environment where 1024-byte TSR COM/EXE infectors was considered GOOD.
It must also be pointed out that at the time, the smallest TSR COM/EXE
infector was the Ontario viurs (512 bytes; mine was 387), ... Which _Just
So Happened_ to be written by Dark Angel himself.

My virus, when included with the text string "[PuKE]" hence the name
Puke393, was absolutely functionally equivalent to Ontario 512, unlike
the virus included later in Dark Angel's article.. but more on that
later.

       Please do not boast if you cannot substantiate your claims.  For
  example, these claims are easily shredded by counterexample.  Let us examine
  the Voronezh-370 virus.  It is a generic parasitic COM/EXE infector and it
  is indeed less than 387 bytes.  If 387 bytes is the smallest in the world,
  then this may very well be the smallest in the universe.  With only two
  hours of fiddling, I came up with the following virus (278 bytes), which may
  yet be the smallest of its kind in all of creation!  Actually, I make no
  such claim, as a smaller one _can_ be written.  The point was to show that
  this claim was not all that impressive and was, in fact, dead wrong.  Let us
  not be o'erhasty to boast next time.
       As with many of my viruses, stuff which took many other virus writers
  over 380 bytes took me under 280... that's not bad!  Humour aside, I might
  point out that this virus is _over_ 100 bytes less than the boaster's
  attempt, so it is _significantly_ smaller.  Gee, I wonder what those extra
  109 bytes are used for.

It must be stated again, that it WAS the smallest in the world _at the
time_ - it's not as if I was lying.  What's more, the above paragraphs
imply that I'd said it couldn't be beaten -- I made no such claim.  I
wouldn't.  That sort of thing is only for the self-important, blinded by
their own stupidity.  So, when the virus was written, 387 bytes WAS the
smallest in the world for what it did.

The article goes on to list the source code of the sub-280 byte virus,
  ; Phalcon/Skism _Small virus
  ; Written by Dark Angel of Phalcon/Skism
  ; 278 byte generic COM/EXE infector
again written by Dark Angel.  But what I failed to point out, is that
387 bytes is pretty small considering that it sacrifices absolutely NO
"safety features".  The PS Small virus DOES.  This makes it unstable,
and in terms of wild viability, a failure.

As I said, to make the code smaller, Dark Angel sacrificed a number of
features (hence the 109 byte deficit).  I'm not saying that DA's
programming is shoddy; the opposite, he is quite a competent coder
(credit where it's due, I admit it at least).

The Small virus will not infect programs with a Read Only attribute; the
Small virus wil not disable the critical error handler; the Small virus
will infect EXE programs with internal overlays (potentially damaging
them); the Small virus will update the file's date/time to time of
infection; and what's more, the Small virus will return control to its
host with dirty registers, and considering that a lot of programs assume
clean regiters, with CS=DS=ES, this is a bad move if a viable virus is
what you want.  PuKE393 sacrifices none of these important safety
features.  It is a viable virus in the wild.

If I were out to make the smallest virus in the world, full stop, I too
would remove these features, and would also derive a virus of similar
size to that which Dark Angel proudly whipped up in two hours.  So you
see, the statement..

       I think the informed virus and anti-virus person recognises these
  claims as the baseless boasts they are.  Let me assure you that you will see
  none of that in 40Hex.

		    ..applies equally well to the author of the article.
I am just as capable, but prefer to have a stable virus rather than an
exceedingly small one.  A decent exercise to satisfy any curiosity
perhaps, but not to try and prove the point that someone's a bad
programmer.  If anything, it proves the reverse.  But anyway.

I also have to mimic one of the article's paragraphs, and state that
"this article does not serve as a platform to personally attack the
person or group in question."

In fact, from all indications, Dark Angel appears to be an intelligent
and capable programmer.  It's just a shame he had to draw his
conclusions from such a small source of information -- but in his
position, I probably would have done the same thing.  After all, PuKE
was formed to do exactly the same thing to NuKE when they were
unwarrantedly calling themselves Kings of the Mountain.  So, by this, I
mean no hard feelings towards Dark Angel (if anything, I wouldn't say No
to any mutual exchange of information with him, or at least a chat).

Anyway, DA, if it's goodies you're after, all you have to do is ask, I
do have them, they're just not on public display.  It's a shame, because
you seem to abuse me for going on about them and not having done them.
I look forward to some sort of interaction, if you're interested, and
I'm sure something can be gained by all.

Actually it's pretty funny, because when I applied for NuKENet all that
time ago when I was in the process of writing the now-common 1984 virus,
I stated such on the net.  "com/exe/bin/sys/ovl/mbr/bs/stealth etc" ?
Rock Steady immediately attacked me, "Piss off, and come back when
you've actually written it.  Unlike you, we write the Proto-T.  When VCL
2.0 comes out even you'll be able to write the k0oL viruses you say you
can".  However his tune changed when he realized I actually was the
genuine article, and .. (quoted from IJ#6, nuke timeline, i believe)
__________________________________________________________________________

January 10th, 1993
T?L?N enough respect goes out to this charm... He too has succeeded the    
wild-bush hunt of the Aussie, though he was never the same afterward...    
<hehe> Just as Compton was put on the map by the Brothers, T?L?N is the    
one to put Aussie onto the map. For that I gave him a whole paragraph      
in this intro...
__________________________________________________________________________

Side note, it appears that Dark Angel and I have made around about the
same achievements, if not in viral common-ness, in viral technology.
Whether this is true or not is debatable.  Both he and I can write small
TSR COM/EXE infectors.  Both he and I wrote SYS infectors at around the
same time, using similar techniques (convergent evolution?  great minds
think alike? :) ).  Both he and I have written mutation engines of
similar calibre (perhaps DA's has slightly more features, but mine is a
fair bit smaller. I won't boast about its size this time ;) ).  I'm sure
DA has written a multipartite infector by now.

Another side note, DA implies I can't write the "com/exe/bin/sys/ovl/
/mbr/bs/directory stealth/mbr-bs stealth/file stealth/polymorphic"
virus.  I admit that I've never actually sat down and fully debugged a
full-stealth virus and got it 100% working, but I can and I will
eventually.  I had written one which does all of the above minus the
full stealth, but can't get the i21 hooking off bootup when DOS=High
working properly yet.  This will have to wait.  Since 1984 I've
corrected and optimized a lot of code, and it will now do stealth on not
just partition tables but floppy disks of all capacities.  If you don't
believe me, you'll probably see it in the next infojournal.

So there you have it.  Hopefully a little educational to some.

Cheers
T?L?N