COMPUTER SECURITY 2
FRAUD/THEFT
By far
the biggest problem is fraud or theft. Some examples of this are:
CHAOS - 1987 - Hamburg -> NASA data bank info sold to USSR
Foreign
exchange
} famous because of big $
Electronic Funds Transfer } amounts,
and because of the
Insider
Trading
} publicity they've received
Most common: Cookie jar technique - e.g., interest, income tax
(aka 'Salami' technique - take a little and no one
will notice)
Specific
examples I've caught were in Payroll (no crash on < or =),
Accounts
Payable (dummy companies), Purchasing (failed reasonableness
test),
and Accounts Receivable (failed balance routine). These were all
thefts of
money.
Another
example of theft which is very interesting is the 28-year-old
Canadian
who was arrested at UNISYS in Pittsburgh on Dec. 13/89 - what he
is
alleged to have stolen was NCR's trade secrets - to the tune of
US$68M,
which comes under a different Canadian law from monetary theft.
MALICIOUS
DAMAGE / VANDALISM
The next
major type of computer security breach is the disgruntled
employee
syndrome. Their favourite is the logic bomb or time bomb: on a
certain
date or condition after they leave the company, something's going
to
happen, such as at the health centre in LA where all prescriptions
suddenly
multiplied by 2. That's really serious, even compared to the
logic
bomb that superzaps all your files off the face of the earth,
because
someone could die. At least with a superzap, you can recover if
you've
been backing up and have a disaster recovery plan in effect. Pure
physical
vandalism occurs more often at educational institutions, but is
still a
serious threat. I wouldn't let me near your machine if I was
angry
with you - my vandalism would be difficult to detect (and expensive
to
repair). A simple application of a magnetized screwdriver ......
LACK OF
SECURITY PLANNING IN SYSTEM DESIGN STAGE
One of
the biggest logic bombs that's going to occur is on January 1/2000.
Do you
know how many computer systems use a 2 digit number for the year?
Do you
know how much work it's going to be to adapt systems to recognize
00 as
being greater than 99? My grandmother was born in 1886, and most
systems
show her birth year as 99. If she lives to the year 1999, I
wonder if
they'll start sending her the baby bonus. This time bomb is not
malicious
damage, it's pure lack of planning at the system design stage.
(Lack of
Security Planning - continued)
Things
like balance checks and reasonableness tests are not built into the
system
from the beginning, and it's not easy to put them in later. Users
must
participate at the system design stage, because only they know what's
reasonable
and what can be balanced. Don't expect a computer technician
to know
everything there is to know about your job.
DISTORTED
SENSE OF HUMOUR
Then
there's the practical joker - the one who thinks it's funny to break
into the
system to see what he can change, or create some dumb message to
appear on
your screen. That's what happened at IBM when the infamous
Christmas
tree appeared 2 years ago (1987). The joke was three-fold -
first it
analyzed your electronic mail distribution lists and reproduced
itself to
send to everyone you normally send messages to - this clogged
the
system up with people reading more messages than normal. The second
part was
a little more technical - everyone who read the message caused a
separate
load of the offending program to take up space in memory, unlike
most
systems where two or more people who are doing the same thing are
sharing
one load of the software. This clogged memory up so that nothing
else
could run. There was one more part to this: there were delay timers
built
into the program so it deliberately ran very slowly. The result was
that the
largest computer network in the world was shut down for 4 hours.
Someone
must have had a great need for a power trip.
MISTAKE
Next,
there's fumble fingers: you know, the one who keys the formula in
as 600
grams instead of 60 grams, or the estimated production time of 2
hours
instead of 2 days. Or the one who almost took me into court when
he blamed
"the computer" for a mistake. Without going into details about
that
incident, I can say that going through the grilling by several
lawyers
in a preliminary investigation was not the high point of my
career.
What saved the situation (for me and the organization) was audit
trailing:
every time a transaction was entered, the system recorded the
terminal
i.d., the user i.d., the date and the time. It also saved a copy
of the
record as it existed prior to the transaction taking place. A more
common
mistake, though, is to unlatch a diskette door before the light
goes
out. Few people realize that the FAT (file attributes table) is the
last
thing written on a disk, and you can corrupt the FAT by removing the
disk too
early.
"EVERYONE
DOES IT" SYNDROME
Then
there's everyone's favourite: copying software. Believe it or not,
in
Canada, that falls under the Copyright law, not under theft, but it
has been
successfully prosecuted. Even if you reverse engineer it and
make some
minor changes, it will come under the "look and feel" test of
the
Copyright law - if it looks and feels the same as the original, you
can be
prosecuted. Copying software is illegal, and your company as the
registered
owner could be held liable if it is detected.
ILLEGAL
ACCESS
Many
major computer crimes are perpetrated by illegal access: the 14-
year old
who broke into NASA from his basement computer room is just one
example.
There is password software on all larger machines, and it's not
difficult
to put it on PCs. On the larger machines, one of the major
problems
is not changing the standard passwords that are set when the
machine
is delivered: the standard user-level password may be USER, the
standard
operator password may be OPERATOR, and the standard field repair
person's
password may be REPAIR, and so on. Guess how I've cracked
security
a couple of times. In a 1988 article by Dr. Cliff Stoll in
"Computers
and Security,", he reported that in 10 months of systematic
testing
on computers attached to the US Defense Data Network (Milnet),
access
was gained in 13% of the attempts simply by guessing at passwords!
There
should be some rules applied to passwords: not less than 7 or 8
characters,
must be changed at least every 60 days, don't use common
things
like names (another way I've broken security), don't share it
under any
circumstances and, for heaven's sake, don't post it on the
front of
your machine or leave it where someone can find it. It's your
personal
PIN - just like the money machine - and the information you're
dealing
with is worth money. Some of the most difficult passwords to
break
(take it from me) are "two words reversed" (e.g., boardwall,
hornshoe,
cuptea), or foreign language words (e.g., coupdegrace,
millegrazie,
caliente). Nonsense is good, too: geebleurql is nice.
If you're
installing password security on a PC, consider whether you
should
have it so tight that there is no recourse to the DOS level or no
ability
to boot from the A: drive. You'd need really good password
software
(or a good technician on staff) if you have both of these
facilities
- otherwise you can lock yourself out - but it's my preference
(especially
for the guy who's wiped his root directory twice).
PHYSICAL
SECURITY
Finally,
another area that affects computer security or your ability to
carry on
computer operations, and one that is often overlooked, is simple
physical
security: keys, thermal shock, vibration, dirt, water, fire,
visibility
of information, steady power supply, discharge of static
electricity,
magnetic fields, are all relevant to security. We have one
man in
our network who should have (a) cabling bolted to his computer and
the
floor, (b) a key to his unit, and (c) dust protectors (as well as
password
access only without recourse to the DOS level).
When it
comes to thermal shock, if you work in an area where the heat is
reduced
on winter weekends, I strongly recommend you leave your unit
running
over the weekend - just lock the keyboard. If the air
conditioning
is shut down, turn your unit off, and don't turn it on until
the
temperature is 23C or less. And please don't leave your machine
sitting
in the sun, or in front of an open window to attract dust. The
internal
temperature raises within 20 mins. or so to >30C, and the effects
of
thermal shock are such that it can, first, rock memory chips out of
their
sockets, and, worse, misalign the read heads on your disk drive so
that
nothing can be read
(Physical
Security - continued)
Vibration,
too, is a source of problems, especially for drives. The read
heads
actually float over the surface of drives, not on them the way a
record
player needle does, and the space tolerance between is measured in
Angstroms
(metric version of microinches). Vibration can cause the head
to hit
the drive, and you can say goodbye to whatever was written there.
If you're
in a particularly sensitive field, and your information is what
might be
called top secret to your company, you might also want to look
at two
protection devices: one is encryption, and the other is Tempest
hardware
or shielding. Encryption involves translating your data using
algorithms
to something unreadable, and de-coding it when you need it. It
uses a
"key" to choose the algorithm - dont' lose the key! It comes in
a
few
forms: software controlled encryption, hardware based encryption, or
a
combination of the two. Most encryptors work with standard algorithms,
but
defense departments and other high-security installations prefer
random
algorithms. Tempest hardware, or shielding, protects against
sniffing
of signals. ( Signal emanation surveillance is called
"sniffing.")
I don't have a computer here to demonstrate this, but if
you take
an old battery-operated transistor radio and set the dial to the
bottom of
the AM band around 520, try passing it within a foot of your
computer.
Your ear might not pick up the individual signals, but I assure
you
there's equipment that does. That's why the US Army was blasting rock
music
around the Vatican Embassy when Noriega was there - to mask signals.
More
important to the average user, though, is avoidance of electro-
magnetic
fields (such as ringing phones near a disk or disk drive), and
having an
automatic disk head 'parker' that moves the heads to a safe zone
every few
seconds. That way, something like a brief power failure is less
likely to
cause a "head crash" on the disk.
Simple
visibility of information is a risk. Recently I went to a bank
with a
court order in hand to give me access to an account. The clerk
simply
turned the terminal toward me and, if I'd wanted to bother, I could
have had
the account numbers of two other people with identical names.
There is
screen saving software that will blank your screen after an
inactivity
duration you choose, and personnel should be made conscious
that
unauthorized viewing of information is a security risk. And watch
what your
staff throw out on paper, too.
When it
comes to fire and water, there are two basic rules that everyone
can
follow: first, don't smoke around the PC, and second, don't feed the
PC coffee
and donuts. You might be able to save a keyboard or some parts
with a
bath in distilled water, possibly followed by drying with a warm
hair
dryer, but there's no guarantee. I prefer pure isopropyl alcohol -
without
the hairdryer so I don't get fried in the process. Don't blast a
computer
with a fire extinguisher if you can avoid it. If you do have a
fire or a
flood, though, you'd better have a tested disaster recovery
plan, and
your backups stored off-site.
All of
these issues are reasonably within your control: fraud, theft,
disgruntled
employees, practical jokers, fumble fingers, software copying
and
physical security, at least as much as the infamous viruses that are
around,
but let's take a look at why you're at risk
4.
REASONS FOR EXPOSURE
Concentration
of data in one place
Instantaneous
adjustment
Alteration
without a trace
Lack of
visible records
Complexity
of the system
Networking
Technical
persons can befuddle
General
ignorance by non-techie and management
Detection
problems
Lack of
training
Security
checks in programs not specified
Systems
not documented
Limited
staff resource for programming/management
No
separation of duties
Possibility
of enormous losses remaining undetected
Reluctance
to report - Embarrassment
Lack of sufficient evidence to prosecute
Cost to prosecute outweighs recovery
Company policy ("Press would have a field day")
5.
GENERAL SECURITY RULES (All Systems, big and small)
Disaster
Recovery } Backup
Backup Backup
Plan
} Restore (test it to make sure it works)
Store
your backup off-site (not in your car!)
Physical
security
Password
for access control (don't stick your password on
the front of your machine!)
Access to
menu only - not to system control level
Reasonableness
tests
Balance
checks (rounding: up, down, (out?); cross-calculations
Audit
trails - all records (terminal i.d., user i.d., date and
time stamping, history record retention)
Fall-through
coding (if it doesn't meet a condition, does it go to limbo)
Payroll/Accounts
payable: don't pay the same # twice
Fault
tolerance level supported (user friendly/hostile -
balance between fault tolerance & productivity)
Call back
or no answer on dial-up systems
UPS
(Uninterrupted Power Supply, or allowance for graceful
degradation) - or at least an automatic head parker
Logical
view rights (your user 'privileges' allows access only to the
data you need to see, e.g., accounting clerks don't need to see
production formulae)
Multi-user
environment: protection against deadly embrace
Automatic
logoff on inactivity timer / Screen saver
Policy
statement re purchasing/use/theft/illegal
software, etc.
Encryption
(?) - don't lose the key!
Shielding
("Tempest" hardware for secure systems)
Educate
users
6.
VIRUSES
As in
medicine, a virus needs an 'organism' to which it may attach itself,
and a
virus is 'contagious'.
In the
case of computers, a virus is usually a destructive piece of code
which
attaches to a working program, such as your word processor,
spreadsheet
or CAD/CAM software. Viruses are usually written to detect
any load
of a computer file that has an extension of .EXE, .COM, .OVL,
.BIN -
such extensions representing executable programs. Often, the
virus
loads itself into memory, then loads the program you just called, so
the virus
is sitting at the front. Then when you exit the program, the
virus
code calls for the re-writing of the program back onto the disk -
with the
virus still sitting at the front. Other viruses simply go
straight
into your boot sector, so they get loaded every time you turn on
your
machine. Some do both.
However
they 'hide', and whatever they attach to, they got to your machine
on an
infected diskette. If you are infected and then copy your software
to use on
another machine, guess what happens? Right! That's where the
'contagious'
element comes in.
In 1989,
more viruses were discovered than in all previous years. There
were over
110 at the end of the year, and 7 were discovered in December
alone.
Sources have been from as far away as Pakistan and Bulgaria.
Only
.004% have reported infections, but most are not reported. Consider
this:
if only 1% were infected, that would be 1/2 million units in the
U.S.
alone. At a cost ranging from $300 to $3,000 per unit to recover,
the
problem starts to impact the economy as well as the productivity of
staff at
your organization. It cost one Texas company US$10M to shut
down
their 3,000-unit network for 4 days to find 35 infected units.
One of
the major problems with viruses is that 90% of the users who
recover
are re-infected within 30 days. One person at my organization
was
re-infected 7 times in 2 months! Most reinfections occur for one of
two
reasons (not necessarily in this order): your back-up was infected,
or it was
a virus that hid in the boot sector on track 0, and track 0 is
not
re-written by the standard "FORMAT" command (only a low-level format
will get
rid of a track 0 virus). Be careful of some new software as
well:
there has been more than one instance of shrink-wrapped software
being
infected (software companies have disgruntled employees, too, it
seems).
6.1
HISTORY
1959 -
Scientific American article about 'worms'
1963 -
caught my first two frauds (Payroll & Accounts Payable)
1970 -
Palo Alto lab - worm which directed activities
1982 -
Anonymous Apple II worm
1984 -
Scientific American CoreWare Series: held contest to
find the most clever/difficult to detect 'bug'
1987 -
Apparent change from intellectual exercise to
dangerous activity.
6.2
EFFECT
Massive
destruction: Reformatting
Programs erased
Data file(s) modified/erased
Partial/Selective
destruction: Modification of data/disk space
File allocation tables altered
Bad sectors created
If match with event, alter or delete
Random
havoc:
Altering keystroke values
Directories wiped out
Disk assignments modified
Data written to wrong disk
Annoyance:
Message
Execution of RAM resident programs
suppressed
System suspension
6.3
WHY DO PEOPLE DO IT?
Financial
gain
Publicity
Intellectual
exercise
Terrorism/Fanaticism/Vandalism
Revenge
Just
plain wierd
6.4
SYMPTOMS
Change in
file size (Usually on .COM, .EXE
.OVL, .BIN, .SYS or .BAT files)
Change in
update time or date
Common
update time or date
Decrease
in available disk or memory space
Unexpected
disk access
Printing
and access problems
Unexpected
system crashes
6.5
CONCERNS
Variety:
Virus vs Bug vs Worm vs Trojan Horse vs Superzapper
vs Trap Doors vs Piggybacking vs Impersonation
vs Wiretapping vs Emulation
Strains /
Complexity / Growing Sophistication
Bulletin
board use and free software
Largest
threats from taking computer work home
Kids
using same machine at home
Networked
mainframe systems
Travel/airline
computers (AA wiped out early 1989)
Work
message systems (E-Mail)
POS
terminals
Banking /
Credit Cards / Money Machines
Income
Tax records
Health
records
**************************************************************
* Global disaster may be on the
way
*
* No specific laws to deal with malicious
programming *
* No single national centre to gather data on
infections *
**************************************************************
6.6
KNOWN VIRUS SOFTWARE
12
viruses (and their strains) account for 90% of all PC infections:
_
|_| Pakistani Brain
|_| Jerusalem
|_| Alameda
|_| Cascade (1701/1704)
|_| Ping Pong
|_| Stoned
|_| Lehigh
|_| Den Zuk
|_| Datacrime (1280/1168)
|_| Fu Manchu
|_| Vienna (DOS 62)
|_| April First
6.7
QUICK GUIDE TO VIRUS NAMES (Cross referenced)
Name
Synonym-1 Synonym-2
Synonym-3 Synonym-4
1168
Datacrime-B
1184
Datacrime II
1280
Datacrime Columbus Day October
12th Friday 13th
1536
Zero Bug
1701/1704
Cascade Falling Letters Falling Tears
Autumn Leaves
1704
Cascade
1704
Cascade-B
1704
Cascade-C
1704
Cascade-D
1704
Format 1704
Blackjack Falling Letters
1704
Blackjack 1704 Format Falling
Letters
1808
Jerusalem Black Box/Hole Israeli
PLO 1808/1813
1813
Jerusalem Black Box/Hole Israeli
PLO 1808/1813
2086
Fu Manchu
2930
3066
Traceback
3551
Syslock
3555
123nhalf
405
500
Virus Golden Gate
512
Virus Friday 13th COM virus
648
Vienna DOS
62 DOS
68 Austrian
AIDS
VGA2CGA Taunt
AIDS Info
Disk
Alabama
Alameda
Virus Yale
Merritt
Peking Seoul
Alameda-B
Sacramento Yale C
Alameda-C
Amstrad
Anti
Apple II
GS LodeRunner
April
1st SURIV01
SURIV02
April
1st-B
Ashar
Austrian
648
Vienna DOS
62 DOS 68
Australian
Stoned New
Zealand Marijuana
Autumn
Leaves Cascade
1701/1704 Falling Letters Falling Tears
Basit
virus
Brain Pakistani
Brain Lehore
Black
Box Jerusalem
Israeli Black
Hole 1808/1803 PLO
Black
Hole Jerusalem Black
Box
Israeli 1808/1813 PLO
Black
Hole Russian
Blackjack
1704 1704
Format Falling Letters
Bouncing
Ball Vera Cruz Ping
Pong Bouncing Dot Italian virus
Bouncing
Dot Italian virus Bouncing Ball Vera
Cruz Ping Pong
Brain-B
Brain-HD Harddisk Brain Houston virus
Brain-C
Brain-HD
Harddisk Brain Houston virus Brain-B
Brain
Pakistani Brain Basit virus Lehore
Cascade
1701/1704 Falling Letters Falling Tears Autumn
Leaves
Cascade(-B-C-D)
1704
Century
Oregon Jan.1, 2000
Century-B
Chroma
Clone
Clone-B
Columbus
Day 1280/Datacrime October 12th Friday 13th
COM
virus 512 virus
Friday 13th
COM-B
Friday 13th-B
COM-C
Friday 13th-C
Cookie
virus Sesame Street
Dark
Avenger
Datacrime
1280
Datacrime-B
1168
Datacrime-II
1184
dBASE
virus
Den
Zuk
Search Venezuelan
Disk
Killer Ogre
Do-Nothing
(don't believe it!)
DOS-62
Vienna DOS-68
648 Austrian
DOS-68
Vienna
DOS-62
648 Austrian
DOS-62
UNESCO
DOS-62-B
Falling
Tears Cascade
1701/1704 Falling Letters Autumn Leaves
Falling
Letters 1704 Blackjack
1704 Format
Falling
Letters Cascade
1701/1704 Falling Tears Autumn Leaves
Falling
Letters-Boot Ping Pong B
Fat
12
Swap Israeli Boot
FluShot4
(a corrupted version of a virus detector - use FluShot4+)
Friday
13th 1280/Datacrime Columbus Day October
12th COM
Friday
13th-B
COM-B 512
Friday
13th-C COM-C
Fumble
Type
Fu
Manchu 2086
Ghost-Boot
Ghost-COM
Golden
Gate 500 Virus
Golden
Gate -B
Golden
Gate-C Mazatlan
Golden
Gate-D
Harddisk
Brain Brain-B
Brain-HD Houston virus
Holland
Girl Sylvia
Houston
virus Brain-B
Brain-HD Harddisk Brain
Icelandic
Disk-Crunching-virus
Saratoga 2
Icelandic
1 Saratoga 1
Icelandic
2 System virus
INIT29
IRQ v. 41
Israeli
Friday13
Jerusalem Black Box/Hole 1808/1813 PLO
Israeli
Boot
Swap Fat 12
Italian
virus Bouncing Ball Vera Cruz Ping
Pong Bouncing Dot
Jan.1,
2000 Century Oregon
Jerusalem
Israeli Black Box/Hole
1808/1813 PLO Friday 13th
Jerusalem-B
New Jerusalem
Jerusalem-C
Jerusalem-D
Jerusalem-E
Jork
Key
Lehigh
Lehigh-2
Lehore
Brain Pakistani Brain
Basit
Lisbon
LodeRunner
Apple II GS
MacMag
Peace virus
Madonna
(while the nice music plays, your hard disk is being destroyed)
Mailson
Marijuana
New Zealand Stoned
Mazatlan
Golden Gate-C
Merritt
Alameda virus
Yale
Peking Seoul
Mix1
Music
virus Oropax virus
New
Jerusalem Jerusalem-C
New
Zealand
Stoned
Marijuana Australian
New
Zealand-B Stoned-B
New Zealand-C
Stoned-C
nVIR
October
12th 1280/Datacrime Columbus Day Friday 13th
Ohio
Ogre
Disk Killer
Oregon
Century
Oropax
virus Music virus
Pakistani
Brain Lehore
Basit Brain
Palette
Zero Bug
Payday
Peace
Virus MacMag
Pearson
Peking
Alameda virus
Yale
Merritt Seoul
Pentagon
Ping
Pong Bouncing Dot Italian virus
Bouncing Ball Vera Cruz
Ping
Pong-B Falling Letters-Boot
PLO
Jerusalem Friday 13th
1808/1813 Israeli
Russian
Black Hole
Sacramento
Alameda-B Yale C
Saratoga
1 Icelandic 1
Saratoga
2 Icelandic Disk-Crunching-virus
Scores
Search
Den Zuk Venezuelan
Seoul
Alameda virus
Yale
Merritt Peking
Sesame
Street Cookie virus
SF virus
Shoe
virus UIUC virus (see also
Terse Shoe)
Shoe
virus-B
Stoned
New Zealand Marijuana
Australian
Stoned-B
New Zealand-B
Stoned-C
New Zealand-C
SUMDOS
Sunday
SRI
(destroys anti-viral programs before it damages your system)
SURIV01
April 1st
SURIV02
April 1st
SURIV03
Swap
Israeli Boot Fat 12
Sylvia
Holland Girl
SYS
Syslock
3551
System
virus Icelandic 2
Taunt
AIDS VGA2CGA
Terse
Shoe (see also Shoe virus)
TP04VIR
Vacsina
TP25VIR
Yankee Doodle
TP33VIR
Yankee Doodle
TP34VIR
Yankee Doodle
TP38VIR
Yankee Doodle
TP42VIR
Yankee Doodle
TP44VIR
Yankee Doodle
TP46VIR
Yankee Doodle
Traceback
3066
Typo
(boot)
Typo
(COM) Fumble
UIUC
virus Shoe virus
UNESCO
DOS-62
Venezuelan
Den Zuk Search
Vera
Cruz Ping Pong
Bouncing Dot Italian Virus Bouncing Ball
Vacsina
TP04VIR
VGA2CGA
AIDS Taunt
Vienna
DOS-62
DOS-68 648
Austrian
Vienna-B
Yale
Alameda virus Merritt
Peking Seoul
Yale
C
Alameda-B Sacramento
Yankee
Doodle TP25VIR
Yankee
Doodle TP33VIR
Yankee
Doodle TP34VIR
Yankee
Doodle TP38VIR
Yankee Doodle
TP42VIR
Yankee
Doodle TP44VIR
Yankee
Doodle TP46VIR
Zero
Bug 1536
6.8
TABLE OF VIRUS EFFECTS (by virus name)
This
information is a reformatted version of that which was made
available
to the writer by the National Computer Security Association,
Suite
309, 4401-A Connecticut Ave. NW, Washington, D.C., 20008.
This list
is not as complete as the list of names preceding. Since
viruses
must be created and caught before they can be analyzed for the
type of
information that follows, this list will never be as complete as
the list
of names. In some instances, you may have been infected with a
variation
of the name. You might wish to check this list for all
possible
variations of a name you've found on the list of synonyms.
Explanation
of codes used under "What it does", and analysis of frequency
of
occurrence of each effect:
EFFECT
# OCCURRENCES %
------
- ----------- -
1.
Virus uses
self-encryption
13 12
2.
Virus remains
resident
83 74
3.
Infects
COMMAND.COM
8
7
4.
Infects .COM
files
62 55
5.
Infects .EXE
files
41 37
6.
Infects .OVL
files
15 13
7.
Infects floppy disk boot sector
36 32
8.
Infects hard disk boot
sector
14 13
9.
Infects partition
table
1
1
10.
Corrupts or overwrites boot sector
31 28
11.
Affects system run-time operation 53
47
12.
Corrupts program or overlay files
57 51
13.
Corrupts data
files
4
4
14.
Formats or erases all/part of the disk
17 15
15.
Corrupts file linkage
(FAT)
9
8
16.
Overwrites
program
4
4
17.
Mac virus (as opposed to PC virus)
2
2
Increase in Disinfector
VIRUS
NAME Prog'm size that
works What it does
----------
----------- ----------- ------------
1168/Datacrime
B 1168
SCAN/D 1, 4, 12, 14
1184/Datacrime
2
1184
1, 4, 5, 12, 14
123nhalf
3907
2, 5, 11, 13
1280/Datacrime
1280
SCAN/D 1, 4, 12, 14
1514/Datacrime
II 1514
SCAN/D 1, 4, 5, 12, 14
1536/Zero
Bug 1536
SCAN/D 2, 4, 11, 12
1701/Cascade
1701
M-1704 1, 2, 4, 11, 12
1704/Format
1704
M-1704 1, 2, 4, 11, 12, 14
1704/Cascade
1704
M-1704 1, 2, 4, 11, 12
1704/Cascade-B
1704
M-1704 1, 2, 4, 11, 12
1704/Cascade-C
1704
1, 2, 4, 11, 12
1704/Cascade-D
1704
1, 2, 4, 11, 12
2930
2930
SCAN/D 2, 4, 5, 12
3066/Traceback
3066
M-3066 2, 4, 5, 12
3551/Syslock
3551
SCAN/D 1, 4, 5, 12, 13
3555
3555
1, 3, 4
405
SCAN/D 4, 16
AIDS
SCAN/D 4, 16
AIDS Info
Disk
0
AIDSOUT 11
Alabama
1560
SCAN/D 2, 5, 11, 12, 15
Alameda-B
2, 7, 10
Alameda-C
2, 7, 10
Alameda/Yale
MDISK 2, 7, 10
Amstrad
847
SCAN/D 4, 12
April
1st
2, 4, 11
April
1st-B
2, 5, 11
Ashar
MDISK 2, 7, 10
Black
Hole
1808
2, 4, 5, 6, 11, 12, 15
Brain-B
2, 7, 8, 10
Brain-C
2, 7, 8, 10
Century
2, 4, 5, 6, 11, 12, 14, 15
Century-B
2, 4, 5, 6, 11, 12, 14, 15
Clone-B
2, 7, 10, 15
Clone
virus
2, 7, 8, 10
dBASE
1864
SCAN/D 2, 4, 11, 12, 13
DOS-62-B
3, 4, 11
DOS-62-UNESCO
650
3, 4, 11
Dark
Avenger
1800
M-DAV 2, 3, 4, 5, 6, 11,
12, 15
Datacrime
II-B 1917
SCAN/D 1, 3, 4, 5, 12, 14
Disk
Killer
MDISK 2, 7, 8, 10, 11,
12, 13, 14
Do-Nothing
608
SCAN/D 4, 12
Fri 13th
COM
512
SCAN/D 4, 12
Fri 13th
COM-B
512
4, 12
Fri 13th
COM-C
512
4, 12
Fu
Manchu
2086 SCAN/D
2, 4, 5, 6, 11, 12
Ghost-Boot
ver.
MDISK 2, 7, 8, 10, 11
Ghost-COM
ver. 2351
SCAN/D 4, 10, 12
Golden
Gate
2, 7, 10, 14
Golden
Gate-B
2, 7, 10, 14
Golden
Gate-C
2, 7, 10, 14
Golden
Gate-D
2, 7, 10, 14
IRQ v.
41
4, 5, 11
Icelandic
I
642
SCAN/D 2, 5, 11, 12
Icelandic
II
661
SCAN/D 2, 5, 11, 12
Italian/Ping
Pong
MDISK 2, 7, 10, 11
Italian-B
MDISK 2, 7, 8, 10, 11
Jerusalem
1808 SCAN/D/A
2, 4, 5, 6, 11, 12
Jerusalem-B
1808 M-JERUSLM 2,
4, 5, 6, 11, 12
Jerusalem-C
1808
2, 4, 5, 6, 11, 12
Jerusalem-D
1808
2, 4, 5, 6, 11, 12
Jerusalem-E
1808
2, 4, 5, 6, 11, 12, 15
Jork
2, 7, 10
Lehigh
SCAN/D 2, 3, 12, 14, 16
Lehigh-2
2, 3, 12, 14, 15, 16
Lisbon
648
SCAN/D 4, 12
MIX1
1618
SCAN/D 2, 5, 11, 12
New
Jerusalem
1808 M-JERUSLM 2,
4, 5, 6, 11, 12
New
Zealand
MD 7
New
Zealand-B
7, 8
New Zealand-C
7, 8
nVIR
11, 17
Ohio
MDISK 2, 7, 10
Oropax
2, 4
Pakistani
Brain
MDISK 2, 7, 10
Palette/Zero
Bug
1536
2, 3, 4,
Payday
1808 M-JERUSLM 2,
4, 5, 6, 12
Pentagon
MDISK 7, 10
SF
Virus
2, 7, 11, 14
SRI
1808
2, 4, 5, 6, 11, 12
SURIV01
897
SCAN/D 2, 4, 11, 12
SURIV02
1488
SCAN/D 2, 5, 11, 12
SURIV03
SCAN/D 2, 4, 5, 6, 11, 12
SYS
2, 7, 8, 11, 12
SYS-B
2, 7, 8, 11, 12
SYS-C
2, 7, 8, 11, 12
Saratoga
632
SCAN/D 2, 5, 11, 12
Saratoga-2
2, 5, 11, 12
Scores
11, 17
Search
HD
2, 7, 8, 10, 11
Search-B
2, 7, 10, 11
Search/Den
Zuk
MDISK 2, 7, 10, 11
Shoe
virus
2, 7, 8, 10
Shoe
virus-B
2, 7, 10
Stoned/Marijuana
MDISK/P 2, 7, 9, 10, 11, 15
SumDOS
1500
4, 5, 14
Sunday
1636
SCAN/D 2, 4, 5, 6, 11, 12
Swap/Israeli
Boot
MDISK 2, 7, 10
Sylvia/Holland
1332
SCAN/D 2, 4, 12
Terse
Shoe
virus
2, 7, 10
Typo (Boot)
MDISK 2, 7, 8, 10, 11
Typo/Fumble
(COM) 867
SCAN/D 2, 4, 11, 12
Vacsina/TP04VIR
2, 4, 5
Vienna-B
648
SCAN/D 2, 4, 5, 12
Vienna/648
648 M-VIENNA
4, 12
Yankee
Doodle 2855
SCAN/D 2, 4, 5, 11, 12
Yankee
Doodle/TP25VIR
2, 4, 5
Yankee
Doodle/TP33VIR
2, 4, 5
Yankee
Doodle/TP34VIR
2, 4, 5
Yankee
Doodle/TP38VIR
2, 4, 5
Yankee
Doodle/TP42VIR
2, 4, 5
Yankee
Doodle/TP44VIR
2, 4, 5
Yankee
Doodle/TP46VIR
2, 4, 5
6.9
VIRUS DETECTOR AND ANTIDOTE SOFTWARE
*** None offer complete protection ***
Some do
NOT test for boot sector viruses, modification of the command
interpreter,
branching into the BIOS, etc., unconventional things that
nasty viruses
are known to do. This is not a comprehensive list, but
you'll
have an idea of what's available, either commercially or through
public
domain. Look for a product that will detect as many of the
effects
identified in the previous section as possible. Warning: some
highly
publicized virus detectors only search for ONE (1) virus! Others
are more
sophisticated, and may even act as a disinfector as well as a
detector.
Old virus
symptoms vs file changes
Antidote
Antigen
Bombsqad
Canary
Cylene-4
C-4
Disk
Defender * recommended (add-on board - write-protects hard disk)
Disk
watcher
Dr. Panda
Utilities
IBM -
COMPare in DOS
Mace
vaccine
Magic
Bullets
Syringe
Sentry *
recommended for systems booted regularly
Vaccine
Viraid
Virus-Pro
* recommended for large corporate environments
Shareware:
Novirus
Flushot4+
Virusck
Viruscan
Plus
what's shown on preceding pages as a "Disinfector that works".
I
also have
a list of over 100 shareware products that do everything from
detect
and/or disinfect to write-protecting the hard drive and requiring
password
access .... but my fingers are getting tired from typing at this
point,
and there are more important things to cover - after all, if
you're
careful, you won't need a list of detectors/disinfectors.
6.10
TROJAN HORSES
While a
"virus" is something hidden within another program that is
waiting
to make your system really sick, and a "worm" may be something
that
lives on its own and usually transmits through networked computers,
a
"Trojan Horse" is a little of both, so I've included it with this
virus
section
if only to warn you of its existence. It lives on its own as a
program,
and will bring you down like Helen of Troy's soldiers. "I
wouldn't
copy something like that," you say. Well, like Helen's horse,
it comes
disguised. It will purport to do something really neat, like
compress
files (so you have more disk space available), sort your
directories
(so you can find things more easily), or play chess or
another
game with you. In actuality, it's really just waiting to do the
things
that viruses do - trash your files, scramble your boot sector, fry
your FAT,
or erase your hard disk. It doesn't usually do anything it
promises
to do.
The
following are just a few examples of the known Trojan Horses, most
of which
come from bulletin boards. Please don't misunderstand me, most
BB
operators are honest people who are trying to help the computer
industry
as a whole, but they can't be held responsible for the people
who might
dial into their BB and leave a disaster waiting until the next
caller(s).
SCRNSAVE.COM:
This is supposed to blank your screen after x seconds of
inactivity, thus preventing image burn-in or apparently
offering a sense of security; say goodbye to your files
while it erases your harddisk.
TSRMAP:
For the 'sophisticated' user who uses Terminate and Stay
Resident programs, it's sometimes handy to have a map of
where these programs are loaded in memory, and be able to
delete some if you're short of memory; hopefully this
same 'sophisticated' user has a copy of track 0, because
his was just sent to heaven ..... or elsewhere.
DOS-HELP:
Sounds great, doesn't it? This TSR program is supposed to
give on-line help on DOS commands. Your hard disk was
just formatted.
ULTIMATE.EXE:
This is supposed to be a DOS shell (if you've used
Directory Scanner or some other software that allows you
to move around directories and load programs easily, or
even a menu system, then you know what a DOS shell is).
While the "Loading..." message shows on your screen, the
FAT (file allocation table) of your hard disk went to the
trash bin.
BARDTALE.ZIP
This purports to be a commercial game from Electronic Arts
(BARDTALE I) Someone reverse engineered this program, and
wrote in a routine to format your hard disk upon
invocation.
COMPRESS.ARC
This is dated April 1 1987, is executed from a file named
RUN-ME.BAT, and is advertised as "shareware from Borland"
(Borland is a highly reputable company). It will not
compress your files, but it will very competently destroy
your FAT table.
DANCERS.BAS
You'll actually see some animated dancers in colour -
while your FAT is being tromped on.
DEFENDER.ARC
Think you're going to get a copy of Atari's DEFENDER for
nothing, huh? There's still no such thing as a free
lunch, and this one will be particularly expensive: it
not only formats your hard disk, but it writes itself to
your ROM BIOS - the chip that holds the Basic Input Output
System for your machine. Get your wallet out.
SIDEWAYS.COM
The good "SIDEWAYS.EXE" is about 30Kb, while this version
is about 3Kb. The really big difference, though, is what
happens to your hard drive - it's spun off into oblivion.
These are
only a few of the 70 or so Trojans I have listed at work, but
I'm sure
you've got the idea. These programs (a) stand alone, (b) often
claim to
do something useful, (c) may be hacked versions of good
software,
(d) may be named the same as good software, (e) may send you
back to
using a quill pen.
7.
PC RULES OF THUMB (Additional to Basic Rules of Thumb)
Run virus
check BEFORE backup
Boot
floppy systems from known, protected disks only
Never
work with masters - first make copies on a trusted machine
Store
data on floppy:
set path in autoexec.bat, but load from A: to
ensure data goes to floppy
Save your
data periodically while working
Use write
protect tabs
Use write
protect software on hard disk / backup track 0
Never
boot HD systems from floppies (unless known and
protected)
New/repaired
hard disk? - run a virus detector
Use
protection package (practice safe hex)
Avoid
shareware / BB demos
if you use a BB, set path to A: beforehand,
download only to A:, poweroff immediately after,
then powerup and do a virus scan on the floppy;
always scan shareware
Know the
source of your software
Don't use
illegal copies
If your
data is truly confidential, don't depend on
DELETE - you must use, e.g., Wipefile
Autopark
software
Hardcards
6.
A FEW EASY TRICKS FOR PC SECURITY
1.
Set Read only attributes on all files ending with .COM, .EXE, .SYS,
. OVL, .BIN, .BAT
e.g.: ATTRIB +R *.SYS
2.
Use an undocumented trick in DOS of naming your data files ending
with an ASCII blank or NUL character (ASCII 32 or 255): ***
e.g.: COPY A:OLDFILE.TXT
NEWFILECHR$(255).TXT
or REN A:MYFILE.DAT MYFILECHR$(32).DAT
*** Newer versions of DOS will give the ASCII blank or null by
holding the [Alt] key and striking the numeric keypad numbers;
e.g. COPY A:OLDFILE.TXT NEWFILE[Alt]255
3.
Prevent inadvertent formatting of the hard disk:
Rename FORMAT.EXE to (e.g.) DANGER.EXE
Write a 1-line batch file called FORMAT.BAT:
DANGER A: %1 %2 %3 %4 %5 %6
4.
Have a batch program as a shutdown routine, to run:
1. Virus Check
2. Copy Track 0
3. Back up your data files
4. Park the heads
9.
SO YOU'RE INFECTED
Terminate
all connections with other computers
Record
your last activities
Determine
the nature and extent of the damage
Notify
other users
Contact
the source of the carrier software
_ _ _ _ _
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
Back up
data files to new diskettes
Erase
infected disk (using high or low level format -
low level is preferred to re-write track 0)
Check
master disks with detection program(s)
Restore
system files
Restore
data files
Run
detection program(s) again
Be
careful in future - think like a thief!
10.
SUMMARY: WHAT CAN YOU DO?
There are
many aspects to computer security, none of which are totally
within
your control, but all of which are reasonably within your control.
One of
the major methods of getting control is to establish an
enforceable
security policy AND a disaster recovery plan. However, it's
almost
impossible to establish a plan unless you first know what the
risks
are.
WHEN YOU
GO BACK TO YOUR OFFICE
Try
putting some staff into two teams: "hackers" and "police"
(or call
them Blue
Jays and Cardinals if you find that offensive). The role of
the
hackers is to try to dream up all the things they could get from or
do to the
company (or to a department) by breaking computer security.
The role
of the police is to respond with defenses. Then switch roles.
List all
the ideas, no matter how "far out" they seem, then use this for
the basis
of risk analysis and disaster recovery planning. The only rule
to this
game is that no idea is initially rejected.
Now that
you have some idea of the value of your data and the risks it is
under,
you can begin to work on a "Computer Security Policy" and a
"Disaster
Recovery Plan." While many suggestions have been made on the
previous
pages, recognize that not all risks/solutions apply to all
organizations:
you have to make some judgement calls based on your
assessment
of the risk. The judgement is based on how much loss you can
comfortably
sustain, yet remain in business. The level of security
protection
you require may not always be the same. It may vary with the
value of
the hardware, software or data under consideration; the
security
level, therefore, might be stated as "minimal,"
"discretionary,"
"mandatory,"
or "verified." The point is, as long as it's been
considered,
you're closer to having a good security system than if you
have no
policy or a policy that's based on guesswork.
You may
find, after working on this for a while, that you may wish to
develop a
separate policy for the selection or development, change,
testing
and implementation of software. This might be stated as simply
as,
"No system shall be acquired, developed, changed or implemented
without
the prior approval of the Systems Steering Group." This might
also go
on to cover documentation; e.g., "Documentation must be complete
for all
systems prior to implementation, and must include sections on
files
used, access controls, security considerations and controls
(etc.)."
Some
further points for consideration are included in the next section.
11.
COMPUTER SECURITY POLICY: POINTS FOR CONSIDERATION
Any
policy on computer security must be based on the premise that
information
is a valuable asset of the company, just like its premises,
equipment,
raw materials, inventory and so on. More than one company has
gone
under because they lost their accounts receivable data in a fire,
flood, or
from a simple hard disk failure. The value of your data should
be
subjected to a risk analysis, and all identifiable risks assessed. It
is not
until you identify the risks that you can plan for a disaster
recovery.
Your
policy might include some of the many things addressed previously in
this
paper: e.g., storing data only on removable media (diskettes or
tapes),
limiting access to bulletin boards, establishing password
controls,
rules on physical security, use of immunization software, etc.
There
are, however, some other specific points not previously discussed:
RESPONSIBILITY
Recognize
that security is a management issue, not a technological
issue,
and that setting policy is the responsibility of senior
management.
They must be 'on board' and understand why a security policy
is needed
to make it sensible and effective, and they must give overt
support.
Someone
should be in charge of computer and network security. Without
someone
in charge, important security tasks may not get done. The duties
of the
security manager would include responsibility for limiting access
to the
network, securing the information that passes over it, overseeing
password
systems, and installing security packages that protect computers
from
illegal tampering once a user is on the network. Other duties might
include
analyzing the network for security weaknesses and helping users
understand
the security strengths and weaknesses of the network.
The
amount of time required of the system security specialist may depend
on the
size of the organization, and on the number and complexity of the
systems
in use or planned.
Having
one person in charge is probably the ideal security arrangement.
The
security specialist can become aware of all of the issues affecting
computer/network
security, can schedule and establish priority for
actions,
and can ensure that the actions are taken.
This
position in the organization requires some authority and autonomy.
For
instance, security is compromised if the boss shares his/her
password.
The security specialist needs to be able to change the boss's
password
if this happens, and gently but firmly discuss the problems
which
could result.
In many
organizations, putting two or more people in charge of something
diffuses
responsibility. Each can think that some security concern was
the
responsibility of the other. If two individuals are charged with
network
security, be certain that they work well together, communicate
well, and
will each put in their fair share of the analysis and work that
is
required for security.
In some
organizations, a "communications manager" is responsible for
limiting
access to the network (with dialback modems and encryption
devices),
while the network manager maintains password systems and
installs
security software.
If
someone is in charge of network security and you don't know about it,
then they
haven't been very obvious about it. They need not be. But if
it is
evident to you that security is lacking, then perhaps the issue of
responsibility
should be examined (or re-examined).
BACKUPS
Those who
are most zealous about backups are those who've been affected
in the
past by a loss of data. If backups are performed every day, your
computer
or network is probably in good shape when the hard disk or file
server
goes to heaven. You will want to verify that this is the case,
since
most organizations (and individuals) put this off... and off...
until
it's too late.
Backing a
system up once a week is not enough, unless the system is
rarely
used. If your last backup was a week ago, and your hard disk or
the hard
disk in the file server crashes, all users of the network have
lost one
week's work.
This cost
is enormous. If you have 10 users who have lost 30 hours of
work
each, if each user is paid $20/hour, and overhead is 100%, then you
have just
lost 10 x 30 x 20 x 2 = $12,000. If you assume that backup
takes one
$20 hour with a tape drive, you could back the system up 600
times for
$12,000. That's nearly three years, if backups are done five
times a
week. Many hard disks will not run continuously for three years.
Even if
you're a 'stand alone' computer user, your time is valuable. You
might
consider a policy that, if recovery covers a period of more than
'x' days,
it must be done on the employee's own time, and all deadlines
must be
met - tough, but it get's the point across!
Irregular
backups are a sign that backup is not taken as seriously as it
should
be. It is probably wisest to do the arithmetic, comparing the
costs of
backup with the costs of losing work for multiple users. The
cost
comparison in the commentary on the second answer doesn't even
consider
the possibility of losing irreplaceable files, such as those
containing
new accounts receivable entries or new prospects.
Since
file backup is a "private" activity, not knowing how often it
occurs
does not mean that it does not occur. But if you have a security
concern,
you should find out what the correct answer is. After all, if
you use
the network, and it is not backed up frequently, it is your work
that is
lost when the hard disk in the server crashes.
BEWARE:
backing up is NOT enough! You MUST periodically run your
recovery
procedure .... how else will you know it will work when you need
it most?
PURCHASING
The
policy should state the controls in place for purchase of both
hardware
and software, and it should be consistent and centralized.
Unless
you've seen what some software can do to destroy security, or how
difficult
it is to interconnect different equipment, this might seem to
destroy
some autonomous activities in your organization. Autonomy be
darned,
it's the company that's paying the bill.
MAINTENANCE
AGREEMENTS
All
warranty registrations must be mailed to the manufacturer, and
records
kept of purchase dates, expiry dates and repairs made under the
warranty.
Keeping accurate records has substantiated the complete
replacement
of more than one machine.
SOFTWARE
LOADING
The
checking, copying and loading of software should be the
responsibility
of one person or department. The 'penalty' for loading
illegal/unauthorized
software can range from a note in the personnel file
to
dismissal, depending on the organization. The opposite, copying the
organization's
software for loading in another location, should also be
covered
in the policy, because the company (as the registered owner)
could be
party to a lawsuit without the ability to plead ignorance.
EMPLOYMENT
TERMINATION
In
several organizations, when a person submits their resignation, their
access to
the computer system is immediately withdrawn. This, of course,
requires
a close liaison with the personnel department in large
organizations.
Many of these companies feel it's worth the salary cost
to have
the person leave the premises immediately (escorted), and simply
pay out
their notice period. If your company adopts such a policy, it
should be
made very clear that it is not an indication of trust in the
person,
but simply a means to reduce risk to the valuable resources of
hardware,
software and data. It must be administered consistently and
equitably
to avoid problems. There are problems with such a policy,
not the
least of which could be someone who gives a very lengthy notice
period
simply because they're aware of the policy - but you could
transfer
them to a clerical job for the interim (like the mail room) or
to
maintenance staff (washroom detail).
12.
TO RUN SCAN (Virus detection software included on this diskette)
SCAN
looks for 42 viruses in software files, but not in data files. I
know it
works on Jerusalem-B because I used SCAN to detect that virus on
a machine
at work. This is NOT the latest version of SCAN, but then
again,
you're not likely to have the latest viruses (I hope).
If you
want to print the documentation, type: COPY A:SCAN.DOC PRN
If you
want to run SCAN, just type: A:SCAN [drive identifier]
e.g., A:SCAN C:
An
article from the Washington Post, January 14, 1990, on Computer
Viruses
was added to the diskette after this paper was written.
To read this article, key TYPE A:ARTICLE|MORE
To print the article, key COPY A:ARTICLE PRN
- - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
If you
have found this presentation useful, either by attending or by
reading
or using the information on this diskette, then I am rewarded.
If you
found it useful, please feel free to copy this diskette or its
contents
and share it with others - I would ask that you don't change
anything,
though. (It was virus free at the time I made the original
diskette
- but if you trust that statement, you might just have made your
first
mistake.)
If you'd
like to make suggestions that would improve the information on
this
diskette, I would be very happy to hear from you. I'd also like to
hear from
you if you wish to discuss security issues, get a virus
infection
or hit by a Trojan Horse, or even just to comment on the
contents
of this paper. My address and phone number are on the first
page of
this document.
If you
would like to join the National Computer Security Association, a
'form'
for application is on the next page. They provide benefits such
as a
Virus Self-Defense Kit that's more sophisticated than the software
on this
diskette, newsletters, a virus-free bulletin board with hundreds
of
security-related programs, discounts on software, books and
conferences,
and advice if you run into trouble.
Happy (and safe) computing!