💾 Archived View for spam.works › mirrors › textfiles › virus › virusbro.vir captured on 2023-06-16 at 21:05:56.

View Raw

More Information

-=-=-=-=-=-=-








                         Computer Viruses and Trojan Horses;
                         A Guide to Protecting Your Computer

                                   by Ted Landberg
                                       3/8/88


          This bulletin discusses software called viruses and trojan horses
          and what precautionary steps you should  take to  prevent harm to
          your computer based information.


          Introduction

          Recent  newspaper  and  magazine articles have publicized several
          incidences of  malicious software  known as  computer viruses and
          trojan  horses.    Serious  questions  are being raised about how
          computer-based information can be  protected  from  this  type of
          software.   Presently, there are no absolute safeguards from this
          malicious software short  of  isolating  your  computers, however
          adequate protection can be achieved by employing a combination of
          traditional safeguards and some common sense about where  and who
          you get software from.


          What is a virus?

          A computer  virus has been described as a set of "extra" computer
          instructions capable  of  replicating  itself  into  other files,
          usually  programs.    This  self-replicating  code is hidden in a
          "host" program, referred to as a trojan horse.   When  the "host"
          program is  executed, so  are the "extra instructions.  A program
          can be a trojan horse i.e. have "extra" instructions that  may or
          may not be a virus (self-replicating). 

          Trojan  horses  and  viruses  can  be  malicious.    Examples  of
          malicious  action  include  deleting  data  files,  or  rendering
          computer systems  unavailable by  modifying software libraries.  
          This  type  of  software  presents  a  distinct  threat   to  the
          integrity of computer systems.


          How do these virus programs enter a computer system?

          Generally, viruses  enter a computer system by using an appealing
          program as a  'host'  to  harbor  the  self  replicating computer
          instructions.   The host can be one of the operating system tools
          such  as  compilers,  editors,  file  utilities  or  one  of  the
          embedded  macro  languages  found  in  spreadsheets  or data base
          management software, and sometimes even in games.


                                          1                Computer Viruses





          Distribution  of  malicious  software   depends  on   getting  an
          unsuspecting user  to accept a program where visual inspection of
          the product  is difficult,  and the  author or  source can remain
          anonymous.   Public or  private conferencing systems, timesharing
          networks and electronic bulletin boards  as  well  as  user group
          software  exchanges   and  computer  "flea  markets"  meet  these
          requirements.


          What should I do to protect myself? 

          Isolating the computer system  from contact  with outside sources
          of  software  is  the  best  way  to  insure the integrity of the
          system.  This is very difficult for multi-user systems and  not a
          particularly  attractive  solution  if  the  computer is going to
          continue be useful over time.

          One alternative approach is to detect the existence  of malicious
          or self  replicating computer  instructions.   This requires some
          knowledge of the target  of the  attack and  the means  used by a
          virus to  self replicate.   A  generic solution is difficult, but
          several programs  have  been  developed  for  identifying certain
          types of computer instructions that could present risks. 

          These  programs  check  for  extraneous file operations including
          opens, closes, reads  and  writes  that  bypass  operating system
          functions.    A  partial  list  of available software products is
          found in Appendix A.

          Another  solution  is  to  stop  the  virus  from  replication by
          preventing the rewriting of 'infected' files.  Confining programs
          to libraries on storage devices with 'write disable'  hardware is
          one approach.   Many large scale computer peripheral devices have
          such  a  switch,  however  these  features  are  rarely  found on
          desktop computers.   An alternative to a hardware 'write disable'
          switch is a software 'read only'  feature.   Unfortunately, these
          options are  found only  on mini and mainframe computer operating
          systems.  The "read-only" attribute in MS-DOS is not an effective
          protection mechanism  because File Allocation Tables (FAT) can be
          changed from user written programs. 

          Popular  microcomputer  operating  systems   allow  execution  of
          computer  instructions  that  can  directly  address  and operate
          storage devices  bypassing normal  operating system  calls.  Thus
          there is  a constant  exposure of  disk storage devices and their
          file directories to destruction or modification.







                                          2                Computer Viruses






          A Five Point Program 

          There is no single set  of  solutions.    Each  installation must
          assemble its  own procedures for containing the problem.  However
          this 5 step process is suggested.

          1.   Education

               All users of computers should be told about the existence of
               Trojan Horses  and Computer  Viruses, what  they are and how
               to tell whether their  system has  been infected.   Be frank
               when discussing the threat of computer viruses.

          2.   Backup and recovery procedures.

               Develop  easy  procedures  for  routine  backup of important
               computer files.   Make  backup  hardware  (i.e.  tape units)
               readily available  to all  users.   Users connected to  LANs
               should  use  automatic  backup   features.     Suggest  file
               organization structures  that facilitate backup and recovery
               of disks that have been ruined by computer viruses.

          3.   Isolate Software Libraries

               On larger computer systems, consolidate libraries into 'Read
               Only'  directories.    In  general system or shared software
               should have limited update and write attribute privileges.

          4.   Implement Software Library Management Procedures

               Enforce  program  testing,  version   control,  and  quality
               assurance checking for all software libraries.  Use software
               library management  tools  to  control  and  audit programs.
               Assign responsibility for testing public domain software and
               providing "approved" copies of that kind of software.  Known
               source   of   software,   inspect   distribution  media  and
               documentation for  tapering,  and  develop  a  "master copy"
               system.

          5.   Develop an Virus Alert Procedure

               Getting the  word out  about potential  or known viruses can
               contain or minimize the eventual spread  and harmful effects
               of  a  computer  virus.    Notices,  telephone  trees to ADP
               coordinators,  phone  or  electronic   mail  are   all  good
               vehicle.   Procedures for containment and eradication should
               be  thought  out  before  hand.    These  procedures usually
               require  shutting  system  down,  reformatting  disk or tape
               storage media  and  re-building  software  libraries  with a
               known uninfected copies.


                                          3                Computer Viruses







                                     Appendix A


                                Virus Detection Tools



          All Software  Listed below  is in the Public Domain and available
          off of the NBS/ICST Security  Bulletin  Board  (301)  948-5717 or
          5718.


           
               CHK4BOMB       Checks  for  "write" instructions to absolute
                              disk sectors.


               BOMBSQUAD      A  memory  resident  program  that intercepts
                              read,  write  and  verifies to floppy or hard
                              disks.      Sends   message    on   suspected
                              operations.


               FLUSHOT3       Monitors  COMMAND.COM  file  for  writes  and
                              updates.   Will  not  allow  a  write  to the
                              COMMAND.COM   file.      Note:  some  earlier
                              versions of this program had their  own virus
                              in it.


               HDSENTRY       Protects  hard  disks  from  malicious writes
                              during testing of uncertified software.


               EARLY          Checks programs for incidence  of use  of OUT
                              instruction, INT 13H and DOS INT 26H.















                                          4                Computer Viruses