💾 Archived View for spam.works › mirrors › textfiles › hacking › virus captured on 2023-11-14 at 09:59:59.

View Raw

More Information

⬅️ Previous capture (2023-06-14)

-=-=-=-=-=-=-


      ???????????????????????
???????   COLOSSUS TIMES    ??????????????????????????????????????????????????
?     ??????????????????????? REPORTER-> EDITOR                    PAGE  33  ?
??????????????????????????????????????????????????????????????????????????????

   Security experts are afraid that sabateurs could
  infect computers with a "virus" that would remain
  latent for months or even years, and then cause
  chaos.


                   Attack of the Computer Virus
                 --------------------------------

                                      By Lee Dembart

  Germ warfare-the deliberate release of deadly bacteria or viruses-is a
practice so abhorrent that it has long been outlawed by international treaty.
Yet computer scientists are confronting the possibility that something akin to
germ warfare could be used to disable their largest machines. In a
civilization ever more dependent on computers, the results could be disastrous
-the sudden shutdown of air traffic control systems, financial networks, or
factories, for example, or the wholesale destruction of government or business
records.

  The warning has been raised by a University of Souther California reasercher
who first described the problem in September, before two conferences on
computer security. Research by graduate student Fred Cohen, 28, shows that it
is possible to write a type of computer program, whimsically called a virus,
that can infiltrate and attack a computer system in much the same way a real
virus infects a human being. Slipped into a computer by some clever sabateur,
the virus would spread throughout the system while remaining hidden from it's
operators. Then, at some time months or years later, the virus would emerge
without warning to cripple or shut down any infected machine.

  The possibility has computer security experts alarmed because, as Cohen
warns, the programming necessary to create the simplest forms of computer
virus is not particularly difficult. "Viral attacks appear to be easy to
develop in a short time," he told a conference co-sponsored by the National
Bureau of Standards and the Department of Defense. "[They] can be designed to
leave few if any traces in most current systems, are effective against modern
security policies, and require only minimal expertise to implement."

  Computer viruses are aptly named; they share several insidious features with
biological viruses. Real viruses burrow into living cells and take over their
hosts' machinery to make multiple copies of themselves. These copies escape to
infect other cells. Usually infected cells die. A computer virus is a tiny
computer program that "infects" other programs in much the same way. The virus
only occupies a few humdred bytes of memory; a typical mainframe program, by
contrast, takes up hunreds of thousands. Thus, when the virus is inserted into
an ordinary program, its presence goes unnoticed by computer operators or
technicians.

  Then, each time the "host" program runs, the computer automatically ececutes
the instructions of the virus-just as if they were part of the main program. A
typical virus might contain the following instructions: "First, suspend
execution of the host program temporarily.  Next, search the computer's memory
for other likely host programs that have not been already infected. If one is
found, insert a copy of these instructions into it.  Finally, return control 
of the computer to the host program." 

  The entire sequence of steps takes a half a second or less to complete, fast 
enough so that no on will be aware that it has run. And each newly infected 
host program helps spread the contagion each time it runs, so that eventually 
every program in the machine is contaminated.  

  The virus continues to spread indefinately, even infecting other computers 
whenever a contaminated program in transmitted to them. Then, on a particular 
date or when certain pre-set conditions are met, the virus and all it's clones
go on the attack. After that, each time an infected program is run, the virus 
disrupts the computer's operations by deleting files, scrambling the memory, 
turning off the power, or making other mischief.  

  The sabateur need not be around to give the signal to attack. A disgruntled 
employye who was afaid of getting fired, for example, might plot his revenge 
in advance by adding an insruction to his virus that caused it to remain 
dormant only so long as his personal password was listed in the system. Then, 
says Cohen, "as soon as he was fired and the password was removed, nothing 
would work any more." 

  The fact that the virus remains hidden at first is what makes it so 
dangerous. "Suppose your virus attacked by deleting files in the system," 
Cohen says. "If it started doing that right away, then as soon as your files 
got infected they would start to disappear and you'd say 'Hey, something's 
wrong here.' You'd probably be able to identify whoever did it." To avoid 
early detection of the virus, a clever sabateur might add instructions to the 
virus program that would cause it to check the date each time it ran, and 
attack only if the date was identical -or later than- some date months or 
years in the future. "Then," says Cohen, "one day, everything would stop. Even 
if they tried to replace the infected programs with programs that had been 
stored on back-up tapes, the back-up copies wouldn't work either - provided
the copies were made after the system was infected.  

  The idea of viruslike programs has been around since at least 1975, when the 
science fiction writer John Brunner included one in his novel `The Shockwave 
Rider'. Brunner's "tapeworm" program ran loose through the computer network, 
gobbling up computer memory in order to duplicate itself. "It can't be 
killed," one charachter in the book exclaims in desperation. "It's 
indefinately self-perpetuating as long as the network exists." 

  In 1980, John Shoch at the Xerox Palo Alto research center devised a 
real-life program that did somewhat the same thing. Shoch's creation, called a
worm, wriggled through a large computer system looking for machines that were 
not being used and harnessing them to help solve a large problem. It could 
take over an entire system. More recently, computer scientists have amused 
themselves with a gladitorial combat, called Core War, that resembles a 
controlled viral attack. Scientists put two programs in the same computer, 
each designed to chase the other around the memory, trying to infect and kill 
the rival.  

  Inspired by earlier efforts like these, Cohen took a security course last 
year, and then set out to test whether viruses could actually do harm to a 
computer system. He got permission to try his virus at USC on a VAX computer
with a Unix operating system, a combination used by many universities and 
companies. (An operating system is the most basic level of programming in a 
computer; all other programs use the operating system to accomplish basic 
tasks like retrieving information from memory, or sending it to a screen.) 

  In five trial runs, the virus never took more than an hour to penetrate the 
entire system. The shortest time to full infection was five minutes, the 
average half an hour. In fact, the trial was so successful that university 
officials refused to allow Cohen to perform further experiments. Cohen 
understands their caution, but considers it shortsighted. "They'd rather be 
paranoid than progressive," he says. "They believe in security through
obscurity."

  Cohen next got a chance to try out his viruses on a privately owned Univac
1108. (The operators have asked that the company not be identified.) This
computer system had an operating system designed for military security; it was
supposed to allow people with low-level security clearance to share a computer
with people with high-level clearance without leakage of data. But the
restrictions against data flow did not prevent Cohen's virus from spreading
throughout the system - even though he only infected a single low-security
level security user. He proved that military computers, too, may be
vulnerable, despite their safeguards.

  The problem of viral spread is compounded by the fact that computer users
often swap programs with each other, either by shipping them on tape or disk
or sending them over a telephone line or through a computer network. Thus, an
infection that originates in one computer could easily spread to others over
time - a hazard that may be particulary severe for the banking industry, where
information is constantly being exchanged by wire. Says Cohen, "The danger is
that somebody will write viruses that are bad enough to get around the
financial institutions and stop their computers from working."

  Many security professionals also find this prospect frightening. Says Jerry
Lobel, manager of computer security at Honeywell Information Systems in
Phoenix, "Fred came up with one of the more devious kinds of problems against
which we have very few defenses at present." Lobel, who organized a recent
security conference sponsored by the International Federation for Information
Processing -at which Cohen also delivered a paper- cites other potential
targets for attack: "If it were an air traffic control system or a patient
monitoring system in a hospital, it would be a disaster."

  Marvin Schaefer, chief scientist at the Pentagon's computer security center,
says the military has been concerned anout penetration by viruslike programs
for years. Defense planners have protected some top-secret computers by
isolating them, just as a doctor might isolate a patient to keep him from
catching cold. The military's most secret computers are often kept in
electronically shielded rooms and connected to each other, when necessary, by
wires that run through pipes containing gas under pressure. Should anyone try
to penetrate the pipes in order to tap into the wires, the drop in gas
pressure would immediately give him away. But, Schaefer admits, "in systems
that don't have good acces controls, there really is no way to contain a
virus. It's quite possible for an attack to take over a machine."

  Honeywell's Lobel strongly believes that neither Cohen nor any other
responsible expert should even open a public discussion of computer viruses.
"It only takes a halfway decent programmer about half a day of thinking to
figure out how to do it," Lobel says. "If you tell enough people about it,
there's going to be one crazy enough out there who's going to try."

  Cohen disagrees, insisting that it is more dangerous `not' to discuss and
studt computer viruses. "The point of these expiriments," he says, "is that if
I can figure out how to do it, somebody else can too. It's better to have
somebody friendly do the expiriment, tell you how bad it is, show you how it
works and help you counteract it, than to have somebody vicious come along and
do it." If you wait for the bad guys to create a virus first, Cohen says, then
by the time you find out about it, it will be too late.