💾 Archived View for spam.works › mirrors › textfiles › hacking › hack9302.rpt captured on 2023-11-04 at 13:20:29.
⬅️ Previous capture (2023-06-14)
-=-=-=-=-=-=-
========================================================================= || From the files of The Hack Squad: || by Lee Jackson, Co-Moderator, || FidoNet International Echo SHAREWRE The Hack Report || Volume 2, Number 2 for February,1993 || Report Date: February 7, 1993 || ========================================================================= Welcome to the second 1993 issue of The Hack Report. This is a series of reports that aim to help all users of files found on BBSs avoid fraudulent programs, and is presented as a free public service by the FidoNet International Shareware Echo and the author of the report, Lee Jackson (FidoNet 1:382/95). This month, your Hack Squad receives input on a long-standing question from an unexpected source: IBM. Also, the Trojan writers seem to have put in some serious overtime. Thanks to everyone who has helped put this report together, and to those that have sent in comments and suggestions. NOTE TO SYSOPS: The Hack Report may be freely posted as a bulletin on your BBS, subject to these conditions: 1) the latest version is used, 2) it is posted in its entirety, and 3) it is not altered in any way. NOTE TO OTHER READERS: The Hack Report (file version) may be freely uploaded to any BBS, subject to the above conditions, and only if you do not change the filename. You may convert the archive type as you wish, but please leave the filename in its original HACK????.* format. The Hack Report may also be cross-posted in other networks (with the permission of the other network) as long as it meets the above conditions and you give appropriate credit to the FidoNet International Shareware Echo (and the author <g>). The idea is to make this information available freely. However, please don't cut out the disclaimers and other information if you use it, or confuse the issue by spreading the file under different names. Thanks! DISCLAIMER: The listings of Official Versions are not a guarantee of the files' safety or fitness for use. Someone out there might just be sick-minded enough to upload a Trojan with an "official" file name, so >scan everything you download<!!! The author of this report will not be responsible for any damage to any system caused by the programs listed as Official Versions, or by anything using the name of an Official Version. ************************************************************************* Hacked Programs Here are the latest versions of some programs known to have hacked copies floating around. Archive names are listed when known, along with the person who reported the fraud (thanks from us all!). Program Hack(s) Latest Official Version ======= ======= ======================= BNU FOSSIL Driver BNU202 BNU170 Reported By: Amauty Lambrecht (2:291/712) (not counting betas) BNU188B Reported By: David Nugent (3:632/348), Author of BNU | F-Prot Virus Scanner FP-205B FP-206A* Reported By: Bill Lambdin (1:343/45) | LhA Amiga Archiver LHA148E LHA138E (Shareware) | Reported By: Michael Arends (1:343/54) LHA v1.50r (Regist.) | LHA151 | Reported By: Lawrence Chen (1:134/3002) PKLite PKLTE201 PKL115 Reported By: Wen-Chung Wu (1:102/342) | PKZip PKZ301 PKZ204E Reported By: Mark Dudley (1:3612/601) Jon Grimes (1:104/332) | Shez SHEZ72A SHEZ86 SHEZ73 Reported By: Bill Lambdin (1:343/45) Telix Telix v3.20 TLX320-1 (Prior to Dec. 1992) TLX320-2 Telix v3.25 TLX320-3 Reported By: Brian C. Blad (1:114/107) TLX320-4 Peter Kirn (WildNet, via Ken Whiton) Telix v4.00 Telix v4.15 Reported By: Barry Bryan (1:370/70) Telix v4.25 Reported By: Daniel Zuck (2:247/30, via Chris Lueders (2:241/5306.1) MegaTelix Verified By Jeff Woods, deltaComm, Inc. Please Note - the 3.20 release dated either December 10th or December 14th, 1992, is legitimate: any earlier file calling itself v3.20 and carrying an Exis, Inc. trademark is not legitimate. Please thoroughly check your version prior to sending questions to this reporter! <g> Telix Pro Reported By: Jason Engebretson (1:114/36), in the FidoNet TELIX echo | Wolfenstein-3D WOLF2-1 #1WOLF14 | WOLF2-2 | Reported By: Wen-Chung Wu (1:102/342) | * - According to the author of F-Prot, Fridrik Skulasson, version 2.06A | is the latest version released to BBS distribution by him. However, | he has written "personalized" versions, numbered 2.06B, 2.06C, and | 2.06D, for individual clients. These versions were not intended for | general release, but may have entered distribution. ========================================================================= Hoax Alert: | In response to my question about version 2.0 of Scorched Earth, Brian | Dhatt (1:3648/2.5) responded that he has seen a file called SCORCHV2 | which was described as being v2.0 of this program. However, when he | downloaded it and ran it, it turned out that he had apparently received | the program and doc files for v1.2. The program even identified itself | as v1.2, leading Brian and myself to believe that someone simply renamed | the archive and uploaded it in an attempt to help out their file ratio. | A simple hoax, but awfully irritating if you happen to be on the | receiving end (and you only have a 2400bps modem). Other previously reported hoaxes: Filename Claimed use/Actual activity/Reporter(s) ============ ========================================================== PKZ305 Hacked "new version" of PKZip. However, a message in wide circulation claimed this was infected with a virus called PROTO-T. This message is the actual hoax: there may be one or more PROTO-T viruses around now, but none do what was claimed in the hoax message. This hack, PKZ305, was not infected with any virus, nor did it contain Trojan code, per testing by Bill Logan (1:300/22), Jeff White (1:300/23), and Bill Lambdin (1:343/45). RAOPT "Optimizes" your RemoteAccess BBS files and claims to be from Continental Software. Actually does nothing but read your USERS.BBS file and report the number of users. The program is _not_ from Continental Software, according to Andrew Milner. Reported by Kai Sundren (2:201/150), via HW Mikael Winterkvist. ========================================================================= The Trojan Wars Readers of The Hack Updates, published as a series of messages in several networks and echos, will remember that I managed to place a rather large foot into my mouth by publishing a typo concerning the first release of the new PKZip. I had inadvertently listed it as v2.03c, while the real release was in fact v2.04c. Before you decide to send NetMail to correct what you have just read, please be aware that your Hack Squad is aware that the current latest version of PKZip/PKUnzip is v2.04E, being circulated under the filename PKZ204E.EXE. Why is this being explained in this section of The Hack Report? Well, it would seem that during the time period between the release of 2.04c and 2.04e, someone else managed to stick their foot in their own mouth by releasing a possible Trojan that claimed to "fix" some of the bugs in version 2.04c. For all the dirty details, read on. | In the time period mentioned above, three files appeared that claimed to | correct problems with the -$ (store disk volume) option of PKZip v2.04c. | Your Hack Squad found one copy of this file, PKZIPFIX, Chad Wagner | found another, named PKZFX24C, and Scott Jibben (1:282/115) found both | PKZFX24C and PKZFX24D. | | I sent my copy to Jeff White and Bill Logan, veterans of several previous | tests for The Hack Report. Here is their report: | | ====== Begin Report ====== | | Results of test on: PKZIPFIX.ZIP | | File description: Fix for volume bug in PKZIP v2.04c | | Synopsis: | | When the latest release of PKZ from PKWare came out, there was a bug | with the volume label being added to the archive. This program was | designed (?) to fix that bug. | | It does indeed fix the bug, but remains a hacked copy of a copyrighted | piece of software and therefore is suspicious. | | First of all, the author managed to crack PKWare's Commercial PKLite | compression, which shouldn't be able to be expanded. When the author | hacked PKZ204C, he re-PKLited the fix, but with the standard version of | PKLite, which allows it to be expanded. | | Also, there is questionable code contained in this "fix". Most notably, | the words "Erasing contents of drive, completed" appear towards the end | of the program. Every command line switch I could think of that might | prompt this response did not bring these words up. It is possible it | is waiting for some time or criteria to activate, or it could be | associated with an option I am not familiar with. PKZ 193 and 204c are | non-expandable, and therefore couldn't be checked for this text, but | PKZ 110 was checked and it did NOT contain this text. | | Integrity Master was used to ensure that nothing on the drive was | changed that shouldn't have been. McAfee's ViruScan was used to ensure | that PKZIPFIX was not a dropper for an existing virus. | ====================================================================== | File information: | | File Name: pkzipfix.zip | Size: 40,912 | Date: 12-28-1992 | File Authentication: | Check Method 1 - 082F | Check Method 2 - 059C | ====================================================================== | File contents: | | Length Method Size Ratio Date Time CRC-32 Attr Name | ====== ====== ===== ===== ==== ==== ======== ==== ==== | 41935 DeflatX 40796 3% 12-28-92 02:04 7dc49363 --w- PKZIP.EXE | ====== ====== === ======= | 41935 40796 3% 1 | ====================================================================== | PKZIP.EXE check: | | CHK4LITE (tm) Check for files compressed by PKLITE Version 1.15 | 7-30-92 Copyright 1990-1992 by PKWARE Inc. All Rights Reserved. | | PKZIP.EXE Compressed with PKLITE (tm) Ver. 1.15 | ====================================================================== | Validation check on PKZIP.EXE **after** unPKLITEing | | File Name: pkzip.exe | Size: 55,370 | Date: 12-28-1992 | File Authentication: | Check Method 1 - E8B1 | Check Method 2 - 1224 | ====================================================================== | ViruScan of PKZIP.EXE **after** unPKLITEing | | Scanning memory for critical viruses. | | Scanning Volume: DRIVE I | Scanning C:PKZIP.EXE | | No viruses found. | ====================================================================== | Use: | | The PKZIP released in PKZ204C.EXE would not properly add a volume label | when the -$ option was specified. | | The version of PKZIP.EXE release in PKZIPFIX.ZIP does indeed fix this | bug. Example follows. | | Attempt to use the -$ option with PKZIP 2.04c: | | PKZIP (R) FAST! Create/Update Utility Version 2.04c 12-28-92 | Copr. 1989-1992 PKWARE Inc. All Rights Reserved. Shareware Version | PKZIP Reg. U.S. Pat. and Tm. Off. Patent No. 5,051,745 | | * XMS version 3.00 detected. | * Using Normal Compression. | | Creating ZIP: PKZTEST2.ZIP | Adding: PKZIP.EXE Deflating % (30%), done. | | = = = | | Attempt to use the -$ option with PKZIP.EXE from PKZIPFIX.ZIP | | PKZIP (R) FAST! Create/Update Utility Version 2.04c 12-28-92 | Copr. 1989-1992 PKWARE Inc. All Rights Reserved. Shareware Version | PKZIP Reg. U.S. Pat. and Tm. Off. Patent No. 5,051,745 | | * XMS version 3.00 detected. | * Using Normal Compression. | | Creating ZIP: PKTEST1.ZIP | Adding: PKZIP.EXE Deflating % (30%), done. | Adding: DRIVE I Storing ( 0%), done. | ====================================================================== | Integrity Master v1.41a was reinitialized for drive C: before testing. | Comparing drive C:'s data (after multiple executions of PKZIP.EXE) to | the backup information showed no changes or virus activity. McAfee's | ViruScan confirmed no known virus activity. | ====================================================================== | Suspicious code: | | PKZIP.EXE contains several questionable pieces of code. Although we | were unable to get PKZIP.EXE to do anything damaging, it is possible | that, under the right circumstances, PKZIP.EXE could prove to be a | trojan. | | The suspicious code is as follows: | | Address: 0000d0e0-0000d110 | Code: x:/ x: *.* / Erasing contents of drive, completed. | | The above could be a reference to a temporary drive (although I used a | temporary drive using the -B command line switch and got no such | response) or in conjunction with a switch (unbeknownst to myself) that | might possibly delete files as they are archived. It should be noted | that PKZIP.EXE as included in PKZ110.EXE contains none of this code. | Later releases of PKZIP.EXE cannot be checked since they are compressed | with PKLite and are non-expandable. | ====== End Report ====== | | As always, our thanks go out to Bill and Jeff for their invaluable help. | HW Nemrod Kedem forwards a report from Dviry Segal (2:401/4.1) about a | program called OPTIBBS. This claims to optimize your RemoteAccess BBS | system, but in fact is yet another program that is aimed at the RA | USERS.BBS file. Dviry says it creates a file (on his tests, the filename | created was PKZ193A.ZIP) which contains the names, phone numbers, | security levels, and passwords stored in the USERS.BBS list. | William Gordon (1:369/104) reports BEV105, a file that claims to be a | "Beverly Hills 90210 Adventure Game." This file contains 8 files, but | two seem to be the real culprits: DORINFO.DIR and INSTALL.COM. The | installation renames the DORINFO.DIR file to IDCKILL.EXE and invokes it. | This program asks for some sort of wildcard according to William, then | proceeds to delete everything on your drive that matches that wildcard. | However, it doesn't stop there: it continues on and deletes all .bat, | .fon, .com, .zip, .sys, .ice, .ans, .arj, and .exe files. William also | says the file "comes with the following virii: Bootkill and Genesis." A | copy of this file has been sent to Bill Logan and Jeff White for | analysis. | Andreas Reinicke (2:284/402) posted a warning in the FidoNet VIRUS echo | about an archive called GRAFIX. This file contains a program called | WAIT.COM, which Andreas says is a modified version of the program | DELDIR.COM. He states this program managed to erase one of his users' | hard drive info. | Bill Lambdin forwards a report posted in the Virtual Net Anti-Virus | conference by a user identified as "Khamsin #1 @9168*1". This message | was also seen by HW Ken Whiton and HW Bill Dennison, forwarded by Ken | Green of the CentraLink BBS. This report concerned a file called | DBSOUND, which claims to be an updated version of the Drum Blaster .MOD | file player. The reporter states this incident of the program deletes | the current directory and all directories beneath it. Especially | dangerous if you happen to invoke it from your root directory, I'd say. | Larry Dingethal (1:273/231) found a message on a local BBS from a user | named Richard Meyers. This message concerned a file called CHROME, | described as "the Chrome Lady .fli" animation file. Here's the file | info: | | GO.BAT 137 09-18-92 04:58p | PLAY.EXE 19832 07-10-89 10:08a | AAPLAY.EXE 81904 08-15-89 10:03a | INVOKE.FLI 675108 12-06-90 07:42p | FGDS.COM 812 04-27-92 01:56a | | The GO.BAT file apparently has a bug, since it tries to invoke a file | named FDGS.COM (instead of the FGDS.COM in the archive). This results in | a "Bad command or file name" error, which is just as well - Richard says | that a look inside the FGDS.COM file with PC Tools' "VIEW FILE" option | shows the following text, beginning at address 0096 (and edited for | television): | | "Skism Rythem Stack Virus-808. Smart kids into sick methods. | Don't alter this code into your own strain, f*****. hr/sss | NYCity, this is the fifth of many, many more...you sissys." | | Richard said that McAfee's ViruScan did not detect an infection, and that | the latest issue of VSUM by Patricia Hoffman did not list such a virus. | Todd Clayton (1:259/210) reports a Trojan dubbed the "Malhavoc Trojan." | The file involved, called AANSI100, claims to be an Auto-ANSI detector | for Telegard v2.5q+. When invoked, the program displays a verse of a | song by a Toronto band called Malhavoc (hence the name), and then does an | absolute disk write on drives C: through F:. Finally, it displays the | message, "Ha! You've been hit!". | | George Goode (1:229/15) has also seen a file called AANSI100, which may | or may not be the same Trojan. He says the documentation says the | program adds ANSI auto detection to a Telegard 2.7 BBS, and should be | inserted in your mailer batch file. | | This version has similar symptoms, notably what George calls "some cruddy | poetry." He says the only real symptom, though, is seen when FrontDoor | v2.01 is loaded by your AUTOEXEC.BAT file. He says your system will go | into a continuous reboot cycle, which can be stopped only by breaking out | of your batch file before FrontDoor loads. When he replaced the FrontDoor | overlay file with a fresh copy of the original, the problem stopped. | | From this information, it is hard to tell if one or two Trojans are | involved here. In either case, you might want to avoid anything called | AANSI100. | Gary Marden (2:258/27) reports a file, QOUTES (yes, that's how it is | spelled), that claims to be a Christmas quotation generator. The file, | which Gary says is a "crude trojan written in one of the Borland compiled | languages," contains quite a few text messages, beginning with "unpacking | christmas qoutes" (sic) and ending with "Ho, Ho, Ho! Merry Christmas! | Hope you get a new HD in your stocking!". A C> prompt displays, and when | you press a key, you get a message that says, "See you next Noel, Fool!", | as well as a cold boot. | | By the time you see this, the damage has been done. The program | overwrites the first 128 cylinders of your first physical HD, trashing | the MBR/boot sector, partition tables, FAT, and root directory. FDISK | will skip these 128 cylinders if you try to repartition the drive, as | will FORMAT. A low level format is required for complete recovery. Gary | surmises that if an IDE drive is hit by this, it may need to be sent back | to the manufacturer for a low level format. | | Here is the archive information: | | Archive date : 1992-12-21 18:23:30 | Pathname/Comment | Rev Host OS Original Compressed Ratio DateTime modified CRC-32 | ------------ -------- ---------- ----- ----------------- -------- | QOUTES.EXE | 4 MS-DOS 4512 4512 1.000 92-12-21 18:01:08 26AADA9D | QOUTES.DAT | 4 MS-DOS 14492 14492 1.000 92-12-21 18:22:28 21FAA40B | READ.ME | 4 MS-DOS 534 534 1.000 92-12-21 18:17:08 702CCA29 | ------------ -------- ---------- ----- | 3 files 19538 19538 1.000 | | This is definitely a file to avoid. | Bill Lambdin (1:343/45) forwards a report from James Powell in the | Intelec PC-Security conference about an archive named BATMAN. It | contains a single file called BATMAN.EXE, about 30k, which will search | your DOS PATH and "delete the executable file that loads WildCat BBSs." | Another report from Bill Lambdin comes from a user on 1:343/45, Reinhardt | Mueller, concerning a dropper/Trojan called AVENGER. When the file is | uploaded with a description, it usually claims to be an "amazing game | that supports all kinds of sound cards, and has everything you can | imagine in a game." | | Reinhardt states that most upload checker/scanners will miss the embedded | viruses, since they are contained in two internal passworded .ZIP format | archives named AVENGER2.DAT and AVENGER3.DAT. He says that these can be | unzipped using the following command line after you open the main | archive: | | pkunzip -sGotcha! AVENGER?.DAT | | This will unzip two files, RUNTIME1.COM and RUNTIME2.COM. The first file | contains the N1 virus, while the second contains the Anthrax virus. | Mark Histed (1:268/332) has located a file called XYPHR2 that, at first | look, appears to have an instance of our old friend, the Power Pump | virus. Mark posted the filenames and data in the FidoNet VIRUS_INFO | echo: | | Searching ZIP: XYPHR2.ZIP | | Length Method Size Ratio Date Time CRC-32 Name | ====== ====== ===== ===== ==== ==== ======== ==== | 28126 Implode 8757 69% 02-24-92 14:06 f664a51f LEVEL1.DAT | 31795 Implode 11429 65% 02-24-92 14:08 806c0efc LEVEL2.DAT | 45036 Implode 15204 67% 02-24-92 01:03 d6d9547a MAIN.DAT | 6990 Implode 2454 65% 02-24-92 14:07 f774d292 REG.DAT | 13109 Implode 1714 87% 02-24-92 14:06 e2c7a0b9 TITLE.DAT | 22534 Stored 22534 0% 02-24-92 23:22 b367e528 XYPHR2.EXE | 1181 Implode 471 61% 02-24-92 17:53 f81be401 AUTOEXEC.CMT | 17354 Implode 14682 16% 02-24-92 21:04 02eac55c POWER.EXE | 1199 Implode 1109 8% 02-24-92 21:00 f61885bd XYPHR2.COM | 848 Implode 443 48% 02-24-92 21:41 43d9bfd0 REGISTER.DOC | 6027 Implode 3125 49% 02-24-92 21:22 3d42937f XYPHR2.DOC | ====== ====== === ======= | 174199 81922 53% 11 | | Mark says that XYPHR2.COM is a compiled batch file that spawns the | POWER.EXE file. He says that this results in a "NUL POINTER ASSIGNMENT" | error message, and passing of control back to command.com. | | Bill Lambdin received a copy of this file and confirmed that it does | contain the Power Pump virus. For first time readers, Power Pump is a | "companion" infector, in that it seeks out .EXE files and creates hidden | .COM files with the same base filename. If you try to run an affected | program by just typing the filename (no extension), the .COM file will | run before the .EXE, due to the way DOS processes the command line. | Fortunately, Bill reports that the virus is a very poor replicator - he | only managed to produce 2 infections out of 14 tries. | Art Mason (1:229/15) reports that a file called QSCAN20, posing as a | small virus scanner, is actually a Trojan that "identifies itself as | being a stealth bomber and proceeds to destroy your FAT." He posts the | following file information: | | Q.chk 281 bytes | qscan.com 777 bytes | qscan.txt 3287 bytes | qx.cld 118 bytes | Dates on the files are 10-22-92 | | All of the text messages displayed by the program are visible by viewing | the QSCAN.COM file. | Zack Jones (1:387/641) reports a file called GAGS which was seen in the | San Antonio area. The file, described as "Some Christmas practical | jokes," was analyzed by Bill Dirks (1:385/17) and confirmed as a Trojan. | The program grabs control of several interrupt vectors, including the | critical error handler. The only way to stop it once it starts is to hit | the reset button or power down. | | When invoked, it displays a countdown from 8 to 0, which corresponds to | drives H through A, in that order. For each found drive, it overwrites | the first 255 sectors with random data from a block of memory. To add | insult to injury, if drives B and A are empty, you are prompted to insert | disks (so that they can be trashed as well). | | After this, the Trojan displays the message, including something like, | "the disk was trashed but it's only a joke and they are only kidding." | It then prompts you to reboot, which is rather hard to do unless you have | a bootable "panic disk" floppy on hand - you certainly won't be able to | boot from your HD. | | Bill says that if your HD is smaller than 60 megs, you're better off | trying to recover your disk from scratch. Between 60-120 megs, you have | a better chance of recovery via disk utilities: over 120 megs, you | should be able to accomplish a complete recovery if you're careful and | you know what you're doing. | | Bill posted the following scan string that can be used to detect this | Trojan - if your scanner can use external strings, be sure to read the | instructions carefully before trying to add this: | | 9A46027205B003B9FF00BA0000CD26 | | If your scanner requires a name for the string, Bill suggests using | "AlamoXmasTrojan." | John Miezitis (Internet, John.Miezitis@cc.utas.edu.au) reported in the | Internet comp.virus newsgroup that a file named YPCBR101, found on | Simtel-20 and the oak mirror on archie.au, contained the 1800 variant of | the Dark Avenger virus in the executable file YAPCBR.EXE. F-Prot v2.06a | was able to remove the infection. | | I since received information from John that the original program, which | he says will be re-released as a clean archive, is a "cheap alternative | to hardware bridges." He says it works with two ethernet cards (any card | supported by the crynwr packet drivers) and a 286 or better machine to | "turn it into a bridge." | | John did not know what the archive name of the re-release will be. So, | if you need this file, go ahead and grab a copy, but check it out with an | anti-viral utility first to make sure your copy is clean. | Peter Janssens (2:512/1) reports yet another pair of Trojans aimed at | RemoteAccess BBS systems. These do no physical damage, but they are | dangerous enough in what they do. | | The Trojans, named RAMANAGE and RA111TO2, claim to be different from each | other: the first claims to be a USERS.BBS file manager, while the second | claims to upgrade RemoteAccess v1.11 to v2.0 (which doesn't exist, FYI). | Both have the same effect, though - they pack your USERS.BBS file into an | archive, named either MIX1.ARJ or WISE.ARJ, and move the archive into a | download directory. | | Peter Hoek (2:281/506.15) reports that he has found a similar situation - | his USERS.BBS file was placed in his GAMES directory under the name | RUNNING.ARJ. He did not say what program (or if any program) created | this archive. | | This could cause a serious security problem for RA SysOps, as you can | guess. If you run a RemoteAccess system, it would be a good idea to | check your download directories for files that you don't recognize, then | take a good look at them. Even if you've never seen one of these Trojans | before - just in case. | Clayton Mattatall (1:247/400) reports in the FidoNet VIRUS_INFO echo that | a file named SBBSFIX is a Trojan that attempts to format drive C:. He | says it contains two files, SBBSFIX.EXE and COM_P.OVL, and was written in | C++. It also asks for a $10 fee. At first glance, I wouldn't send it. | This Trojan report comes from an article in MacWeek magazine, Volume 7, | Number 2, issued January 11, 1993. The article, posted in the FidoNet | VIRUS_INFO echo by Robert Cummings, states that a program called CPro | 1.41.sea, claiming to be a new version of Compact Pro (a Macintosh | shareware compression utility), will reformat any floppy in drive 1 and | tries to reformat the user's start-up hard drive when launched. | | The file can be identified by a 312K sound resource file called "log | jingle," which is digitized sound from the Ren and Stimpy cartoons. | Mike Wenthold (1:271/47) found a program under the filename GS2000 which | contained the VCL 3 [Con] Virus. I am attempting to get further details | on what this file is, but until then, here is the archive data that Mike | sent: | | Length Method Size CF Date Time CRC Filename | ======== ======== ======== ==== ========= ====== ======== ============ | 1984 1304 34% 22-Dec-91 01:40p 3527B16B GS2000.COM | 543 363 33% 22-Dec-91 01:58p DB83A2C0 GSUNP.DOC | ======== ======== ======== ==== ========= ====== ======== ============ | 2527 1667 34% 2 files. | | The compression method (on this ZIP archive) was not included in his | data. Frans Hagelaars (2:512/2) posted a message in several echos last month concerning a Trojan version of the Blue Wave Offline Mail Reader that had been circulating in his area. According to the warning, the "hacked" version attacks your hard drive boot sector and partition table, and will then "play tricks" with RemoteAccess userlists and phone numbers. The filename of this version was not given in the report, nor was it made clear whether the BBS door or the Reader was involved. If you have any questions about the security of your copy, remember that you can always obtain a safe copy from the BBS of the author, George Hatchew, at FidoNet address 1:2240/176, phone number 1-313-743-8464, or from any of the official distribution sites (which I believe are listed in the documentation for the program). Filename Claimed use/Actual activity/Reporter(s) ========= ============================================================== ANSISCR VGA BBS ad - contains a self-extracting archive of the Yankee Doodle and AntiChrist viruses. Can trash hard drives as well through Trojan behaviour. Reported by Bill Dirks (1:385/17), and under the filename RUNME by Stephen Furness (1:163/273). LOGIM613 Possible isolated incident - one internal file, MOUSE.COM, reports as being infected with the VCL virus when checked with McAfee's ViruScan v95. Reported by Mike Wenthold (1:271/47). MUVBACK Claimed keyboard utility - actual ANSI bomb that remaps the D key of your keyboard to invoke DEBUG and create a couple of Trojans from script files. Reported by Bill Dirks. RAFIX "Fixes little bugs" in RemoteAccess - program contains the string "COMMAND /C FORMAT C:" internally. Reported by Sylvain Simard (1:242/158). REAPER ANSI bomb - remaps the keyboard to force file deletion and hard disk formatting - also generates insults. Reported by Victor Padron (1:3609/14), via Rich Veraa (1:135/907). REDFOX Batch file which deletes all DOS and system files. Reported by Mike Wenthold. ROLEX Possible isolated incident of an infection by the Keypress [Key] virus. Reported by David Gibbs, via Michael Toth (1:115/220). SPEED Claims to "check your PC speed" - actually deletes all files on drive C:, including directories. Reported by HW Nemrod Kedem. ========================================================================= Pirated Commercial Software Program Archive Name(s) Reported By ======= =============== =========== | 3-D Pool 3DPOOL Michael Gibbs (via Bill | Lambdin) | Atomix (game) ATOMIX_ HW Matt Kracht Battle Chess CHESS Ron Mahan (1:123/61) | Check-It PC CHECKIT HW Bert Bredewoud | Diagnostic Software CHKIT20 Bill Lambdin (1:343/45) Commander Keen _1KEEN5 Scott Wunsch (1:140/23.1701) (part 5) Darkside (game) DARKSIDE Ralph Busch (1:153/9) | Energizer Bunny Screen ENERGIZR Kurt Jacobson, PC Dynamics, | Saver for Windows Inc., via HW Bill Dennison F-Prot Professional FP206SF Mikko Hypponen (mikko.hypponen@compart.fi) | Killing Cloud (game) CLOUD Mike Wenthold | MegaMan (game) MEGAMAN Emanuel Levy (1:266/63) Over the Net OTNINC1 Tim Sitzler (1:206/2708) (volleyball game) | PKZip v2.04c PK204REG Scott Raymond (1:278/624) | (Registered) | PKZip v2.04c PKZCFG Mark Mistretta (1:102/1314) | Configuration Editor | PKZip v2.04e PK204ERG Scott Raymond | (Registered) | PrintShop PSHOP Michael Gibbs, Intelec, via | Bill Lambdin (1:343/45) Psion Chess 3D-CHESS Matt Farrenkopf (1:105/376) | QModem v6.0 QM60IST1 Francois Thunus (2:270/25) | QM60IST2 | QModem Pro QMPRO-1 Mark Mistretta | QMPRO-2 Rack 'Em (game) RACKEM Ruth Lee (1:106/5352) | Shadow Warriors (game) SHADOWG Mark Mistretta | Sharky's 3D Pool POOL Jason Robertson (1:250/801) | Shez (Registered) SHEZ85R Scott Raymond SimCity (by Maxis) SIMCTYSW Scott Wunsch | Streets on a Disk STREETS Harvey Woien (1:102/752) | Teledisk (files TDISK214 Mark Mistretta | dated after Apr. 1991) | Vegas Casino 2 (game) VEGAS2 The Hack Squad | WinWay Resume for | Windows WINRES Erez Carmel (CompuServe, | 70523,2574) ========================================================================= ?????Questionable Programs????? First, a quick note - this section, along with the Information, Please section, are the only ones that have any information carried over from the 1992 report. This is because many of the listings in these sections were not completely resolved when the last 1992 issue was published. As usual, if anyone has any additional information on anything listed in these sections, _please_ help! | Long time readers of this report will remember a question concerning the | status of a screen saver called TUNNEL. Ove Lorentzon (2:203/403.6) and | Bill Roark (RIME address BOREALIS, Shareware conference, via HW Richard | Steiner) both stated that the program was an internal IBM test program | and was not intended for outside distribution. | | Your Hack Squad has received word from the author of the program, Dan | Butterfield (Internet, danielb@vnet.ibm.com), that as far as he is aware, | the program has never been released to the general public. According to | Dan, "it is still owned by IBM, and as such has been given the IBM | security classification 'IBM Internal Use Only' which means what it says: | the program is not for distribution to non-IBM employees." | | Dan also says that several other "Internal Use Only" programs have been | "leaked" to the outside world, which implies that these files should not | be posted for download. One such program was originally called Dazzle | (NOT to be confused with the other popular DAZZLE screensaver), but has | entered BBS distribution under the filename O-MY-GOD. Another is a | program that is usually included inside other archives: the program name | is PLAYANI. Dan says this has been distributed "along with various | animations," and also falls under the same Internal classification. | | A prime example of this is an archive called BALLS (not what you think). | This is an animation of multiple chrome spheres rotating around each | other above a red and white checkerboard platform. In this case, both | the player (PLAYANI) _and_ the animation are the property of IBM and are | not intended for BBS distribution. | | Again, to quote Dan, "None of these programs are for external | distribution; all are owned by IBM and are only for use inside IBM by IBM | employees." Thanks to Dan for all of his help. | Donn Bly has cleared up the question on the status of the Sydex program | TeleDisk, first raised by Mark Draconis (1:120/324) and Kelvin Lawson. | Donn was kind enough to mail a copy of a letter sent to him by Sydex | explaining that Teledisk is no longer shareware. Here is an excerpt from | the letter: | | "Effective April 1991, TeleDisk is no longer a shareware | product. After long consideration, we decided to | discontinue our offering of the shareware edition of | TeleDisk, and license it only as a commercial product. | | "Commercial licenses of TeleDisk are available from Sydex at | $150 a copy. All shareware distributors and BBS sysops who | take time to check their sources are requested to remove | TeleDisk from shareware distribution." | | The letter is signed by Miriam St. Clair for Sydex. To summarize, Sydex | is no longer accepting shareware registrations for TeleDisk, and asks | that it be not be made available for download from BBS systems. | | Thanks to Donn for his help in this matter. HW Ken Whiton forwards messages from Harold Stein, Gary Rambo, and Gwen Barnes of Mustang Software, Inc., about a "patch" program aimed at OffLine Xpress (OLX) v1.0. The patch is supposed to allow OLX to read and reply to Blue Wave packets, along with a lot of other seemingly unbelievable feats. Gwen Barnes did not seem to know of the patch, but published the following advice in the WildNet SLMROLX conference to anyone considering trying it: 1. Make a complete backup of your system. 2. Make sure you've got all the latest SCAN stuff from McAfee 3. Try it, keeping in mind that it more than likely does nothing at all, or is a trojan that will hose your system. 4. Get ready to re-format and restore from backups if this is in fact the case. No filename was given for this patch. If anyone runs across a copy of it, please contact one of The HackWatchers or myself so that we can forward a copy to MSI for testing. Bill Lambdin (1:343/45) reports that someone has taken all of McAfee Associates' antiviral programs and combined them into one gigantic (over 700k) archive. He did not say whether the files had been tampered with, but he did send a copy to McAfee for them to dissect. The file was posted under the filename MCAFEE99. I would not suggest downloading this file: as a matter of fact, this reporter prefers to call McAfee's BBS directly when a new version of any of their utilities comes out. I highly recommend this method, since it insures that you will receive an official copy. HW Matt Kracht forwarded a message from Stu Turk in the DR_DEBUG echo about possible Trojans going around as PKZIP 2.21 and/or 2.22. Stu also says that there is a warning about these in circulation. If you have a copy of this warning, please send a copy to Hack Central Station (1:382/95). ========================================================================= Information, Please This the section of The Hack Report, where your Hack Squad asks for _your_ help. Several reports come in every week, and there aren't enough hours in the day (or fingers for the keyboards) to verify them all. Only with help from all of you can The Hack Report stay on top of all of the weirdness going on out there in BBSLand. So, if you have any leads on any of the files shown below, please send it in: operators are standing by. Onno Tesink (2:283/318) has sighted a file called LHA255B. This claims to be version 2.55b of the LHA archiver, with a file date in the executable of 12/08/92. He compared the file to the latest known official release, v2.13, and found two additional program options which were mentioned when the program was invoked with no command line (generating a help screen). The archive contained nothing but the executable file. Viral scans were negative. I have not heard of any further development going on by the author of LHA, H. Yoshi, but that wouldn't be a first. <g> If anyone knows of a new version of LHA, please contact your nearest HackWatcher and lend a hand. Travis Griggs (1:3807/4.25) forwarded a report from a local board called The Forum (phone number 1-318-528-2107) by a user named Susan Pilgreen. The message referred to a file called BOUNCE, which she said was infected with the Russian Mirror virus. The file, according to Travis, claimed to be a game. I would appreciate further confirmation of this sighting. An update on a warning from Mark Stansfield (1:115/404), concerning the files KILL and PROTECT. He claims that these delete the user's hard drive when run. Dan Onstott (1:100/470) reported in the FidoNet SHAREWRE echo that he has a small utility called PROTECT.COM (205 bytes, dated 12-10-86), which is a write-protect utility for your hard drive. He says he has never had a problem with it. So, Mark's report may be an isolated incident. If anyone else sees the files Mark mentioned, please advise. Bill Lambdin forwards a message from Mario Giordani in the ILink Virus Conference about two files. The archives, called PHOTON and NUKE, are possibly droppers, containing a file called NUKE.COM which "will trash your HD." Pat Finnerty (1:3627/107) sent a reply to the last report of this, stating that he has a copy of a PC Magazine utility called NUKE.COM, which is used to remove subdirectories which contain "nested subs, hidden, read-only (you name it)." He says that the command NUKE C:\ will effectively delete everything on a hard drive, with no chance of repair. This is merely the way the program is designed. I do not know if this is what happened in Mario's case, or if Mario actually found a copy (read: isolated incident) which was infected. Bill has asked Mario for further information, and I would like to echo his call for help. If you know of this, please lend a hand. Another one forwarded by Bill comes from Michael Santos in the Intelec Net Chat conference, concerning a screen saver named IM. This is only a "hearsay" report from one of Michael's friends, who says he downloaded it and wound up with a virus. There is no way to tell if the infection came from the file itself or if it was already present on his friend's system. Once again, if anyone can clear this up, please do so. Ned Allison (1:203/1102) forwarded a report into the FidoNet DIRTY_DOZEN echo from a user of The Mailbox BBS in Cleveland (216/671-7534) named Rich Bongiovanni. Rich reports that there is a file floating around called DEMON WARS (archive name DMNWAR52) that is "infected with a virus." If true, this may be an isolated incident. I would appreciate confirmation on this. Greg Walters (1:270/612) reports a possible isolated incident of a problem with #1KEEN7. When he ran the installation, he began seeing on his monitor "what looked like an X-rated GIF." The file apparently scanned clean. Any information on similar sightings would be appreciated. A report from Todd Clayton (1:259/210) concerns a program called ROBO.EXE, which he says claims to apparently "make RoboBoard run 300% faster." He says he has heard that the program fools around with your File Allocation Table. I have not heard any other reports of this, so I would appreciate some confirmation from someone else who has seen similar reports. Kelvin Lawson (2:258/71) posted a message in the SHAREWRE echo about a possible hack of FEBBS called F192HACK. I have not seen this file, nor has the author of FEBBS, Patrik Sjoberg (2:205/208). He forwards the file sizes in the archive, reported here: Name Length Mod Date Time CRC ============ ======== ========= ======== ======== FEBBS.EXE 220841 09 Mar 92 21:17:00 96D2E08D 014734.TXT 1403 26 Aug 92 01:59:18 3B9F717F ============ ======== ========= ======== ======== *total 2 222244 26 Aug 92 01:59:24 Kelvin says the .TXT file is just an advert for a BBS, so it is "not relevant!". As I said, the author of FEBBS has never seen this file, so I've asked Kelvin to forward a copy of it to him. Andrew Owens (3:690/333.11) forwarded a report of a "Maximus BBS Optimiser (sic)," going under the filenames MAX-XD and MAXXD20. Scott Dudley, the author of Maximus, says he did not write any programs that have these names, but he does not know whether they are or are not legitimate third party utilities. I have requested further information from Andrew on this topic, and would appreciate anyone else's information, if they have any. Yet another short warning comes from David Bell (1:280/315), posted in the FidoNet SHAREWRE echo, about a file called PCPLSTD2. All he says is that it is a Trojan, and that he got his information from another "billboard" and is merely passing it on. Again, please help if you know what is going on here. Bud Webster (1:264/165.7) reports an Apogee game being distributed under the filename BLOCK5.ZIP. He says that the game displayed a message that said, "This game is not in the public domain or shareware." There was only an .EXE file in the archive, and no documentation. I need to know what the real name of this game is so that I can include it in the pirated files section (if necessary). A message in the FidoNet ASIAN_LINK echo from Choon Hwee (1:3603/263) grabbed my attention the moment I saw it: in capital letters, it said, "DO NOT RUN this file called MODTEXT.EXE, cause it is a TROJAN!!!". He goes on to say that two BBSs have been destroyed by the file. However, that's about all that was reported. I really need more to go on before I can classify this as a Trojan and not just a false alarm (i.e., archive name, what it does, etc.). Please advise. Greg Mills (1:16/390) posted a question to Robert Jung in the ARJ Support Echo (FidoNet) about a version of ARJ called 2.33. It was unclear as to whether or not Mr. Mills had seen the file. Mr. Jung has repeated that the latest version of ARJ is v2.30 (however, there is a legitimate public beta version numbered 2.39b). It is possible that the references Greg saw about 2.33 were typos, but you never know. Please help your Hack Squad out on this one - if you see it, report it. ========================================================================= The Meier/Morlan List | Here are this month's updates on the status of the files contained in the | Meier/Morlan List. | Emanuel Levy (1:266/63) forwards some of his observations on these files. | Here is the text of his report: | | "Barkeep sounds like it may be a version of Tapper. If you send beer mugs | down the screen to patrons and then have to pick up the returning mugs | and they leave tips, then it is Tapper. Or it may be an OLD game | published in Compute Mag. If it is the one from Compute only those who | have the Compute issue with the game in it are allowed to have a copy. | | "Harrier is either Harrier Jiump Jet or Space Harrier from Sega wich came | out for the Commodore 64 in 89 so I would assume it came out for IBM | around then too. | | "Gremlins- There was an Gremlins Text Adventure and a Video Came for the | computer. The video game was put out by Atari | | "Megaman is sold in Stores and is out for Nintendo. It is a pirated | program. | | "Antix may be Artic Antix one lof the Spy vs Spy games | | "Win_Trek information follows | | "I got it at a convention from a dealer at a Star Trek COnvention. The guy | got it off of The Network BBS. It is located in Bal imore Maryland. The | number there is t(420)247-3797 | | Files in archive are | WINTREK1.DLL 242112 4-07-92 6:53p | WINTREK2.DLL 519163 4-07-92 6:53p | WINTREK .EXE 144144 4-07-92 7:03p | WINTREK .HLP 7109 3-29-92 2:55p | README .WRI 4224 4-07-92 7:12p | | "I hope I have been able to help." | | I'd say you have - thanks! The confirmed pirated file, Megaman, is now | listed in the Pirated Files section. On the other hand, WinTrek will be | removed, as Emanuel confirms that it is shareware. | Andrew McCullough (1:2614/409) has a copy of a game called ANTIX, | mentioned above. According to Andrew, "as far as I can tell it is | legit." He says it is a "'dinky' little program where you try to eat | away 75% of the screen without being hit by the 'bad guys'." If anyone | can confirm either report on this, please do so. | Finally, Bill Lambdin forwards a message from Michael Gibbs (RIME address | EXHIBITA, from the Intelec Shareware conference), about 3DPOOL. Michael | says this contains no docs, except for an ANSI file touting some pirate | group. This is usually clear evidence of a pirated commercial program, | so this file moves to the Pirated Files section. For those who have missed it before, here is what is left of the list of files forwarded by Joe Morlan (1:125/28), as compiled by Wes Meier, SysOp of the WCBBS (1-510-937-0156) and author of the AUNTIE BBS system. Joe says Wes keeps a bulletin of all rejected files uploaded to him and the reasons they were rejected. Joe also says he cannot confirm or deny the status of any of the files on the list. There are some that I am not familiar with or cannot confirm. These are listed below, along with the description from Wes Meier's list. Due to the unconfirmed nature of the files below, the filenames are not included in the columnar lists. I would appreciate any help that anyone can offer in verifying the status of these files. Until I receive some verification on them, I will not count them as either hacks or pirated files. Remember - innocent until proven guilty. My thanks go to Joe and Wes for their help. Filename Reason for Rejection ======== ============================================= BARKEEP Too old, no docs and copyrighted with no copy permission. HARRIER Copyrighted. No permission to copy granted. SLORGAME Copyrighted. No docs. No permission to copy granted. NOVELL Copyrighted material with no permission to BBS distribute DRUMS I have no idea if these are legit or not. No docs. SPACEGOO STARGOSE in disguise. Copyrighted. GREMLINS No documantation or permission to copy given. NAVM Copyrighted. No permission to copy granted. TESTCOM Copyrighted. No permission to copy granted. CLOUDKM A hacked commercial program. ANTIX Couldn't make this work. No docs. MENACE Copyrighted. No docs. No permission to copy granted. AIRBALL A hacked commercial program. SNOOPY Copyrighted. No docs. No permission to copy granted. SLORDAX Copyrighted. No docs. No permission to copy granted. ESCAPE Copyrighted. No docs. No permission to copy granted. AFOX A cracked commercial program. BANNER Copyrighted. No docs. No permission to copy granted. FIXDOS50 Copyrighted. No permission to copy granted. WINGIF14 The author's documentation specifically requests this file to not be distributed. INTELCOM Copyrighted. No docs. No permission to copy granted. 387DX Copyrighted. No docs or permission to copy granted. WINDRV Copyrighted. No permission to copy granted. ========================================================================= Help!!! | Would the person who sent the copy of Vegas Casino 2 (filename VEGAS2) to | The Hack Squad for testing/verification please re-identify themselves via | NetMail? Somehow, your message went to the great Bit Bucket in the sky. | Thanks in advance! ========================================================================= Clarification | I need to apologize once again - this time, to Brent Lynch (1:103/132), | concerning the file SF2BETA. In my attempt to consolidate all of the | information on several files of this name, I apparently misquoted Brent. | In an attempt to rectify the situation, here is the entire text of the | report from Brent, as forwarded by Harold Stein (1:107/236). | | This message was from BRENT LYNCH to ALL, | originally in conference Games | and was forwarded to you by HAROLD STEIN. | | ========================= | | Be careful of the game Sf2beta! Although there are no | trojans or viruses in it looks VERY suspicious and is prob. | pirated. If you really are curious I did play it before | deleting it as soon as I surmized it wasnt an authorized | copy. | | First of all the Game is in Vietamese (The setup program | isnt though strangly enough). The graphics are VERY good | infact other then being a little smaller (not much though) | almost identical to the arcade version. The music is also | excellent and a good reproduction of the arcade version. The | animation is great at 61 frames per second on a 486! No | digitized voice and you can only play as Guile or Ryu. Its | really a pity that Capcom hasnt made a Legal version for the | USA as this version shows that a great game of SF2 is | possible. | | Be careful and DONT SPREAD THIS FILE AROUND as the folks at | Capcom have worked very hard to make a great game. I REPEAT | DO NOT SPREAD it around. | | ========================= | | I apologize for any confusion that may have developed from this | situation. ************************************************************************* Conclusion If you see one of these on a board near you, it would be a very friendly gesture to let the SysOp know. Remember, they can get in just as much trouble as the fiend who uploads pirated files, so help them out if you can. ***HACK SQUAD POLICY*** The intent of this report is to help SysOps and Users to identify fraudulent files. To this extent, I give credit to the reporter of a confirmed hack. On this same note, I do _not_ intend to "go after" any BBS SysOps who have these programs posted for d/l. The Shareware World operates best when everyone works together, so it would be counter-productive to "rat" on anyone who has such a file on their board. Like I said, my intent is to help, not harm. SysOps are strongly encouraged to read this report and remove all files listed within from their boards. I can not and will not take any "enforcement action" on this, but you never know who else may be calling your board. Pirated commercial software posted for d/l can get you into _deeply_ serious trouble with certain authorities. Updates of programs listed in this report need verification. It is unfortunate that anyone who downloads a file must be paranoid about its legitimacy. Call me a crusader, but I'd really like to see the day that this is no longer true. Until then, if you _know_ of a new official version of a program listed here, please help me verify it. On the same token, hacks need to be verified, too. I won't be held responsible for falsely accusing the real thing of being a fraud. So, innocent until proven guilty, but unofficial until verified. Upcoming official releases will not be included or announced in this report. It is this Co-Moderator's personal opinion that the hype surrounding a pending release leads to hacks and Trojans, which is exactly the opposite of what I'm trying to accomplish here. If you know of any other programs that are hacks, bogus, jokes, hoaxes, etc., please let me know. Thanks for helping to keep shareware clean! Lee Jackson, Co-Moderator, FidoNet International Echo SHAREWRE (1:382/95)