AOH :: P29-11.TXT

Phrack World News XXIX/Part 2 of 3



				==Phrack Inc.==

		    Volume Three, Issue 29, File #11 of 12

	    PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
	    PWN 						PWN
	    PWN        P h r a c k   W o r l d	 N e w s	PWN
	    PWN        ~~~~~~~~~~~   ~~~~~~~~~	 ~~~~~~~	PWN
	    PWN 	       Issue XXIX/Part 2		PWN
	    PWN 						PWN
	    PWN 	       November 17, 1989		PWN
	    PWN 						PWN
	    PWN 	 Created, Written, and Edited		PWN
	    PWN 	      by Knight Lightning		PWN
	    PWN 						PWN
	    PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


Offensive Message Flashes At Busy City Corner		       October 25, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Linda Wheeler (Washington Post)

An offensive message that mystified the owners of an electronic information
board was flashed Monday, October 23 at Connecticut Avenue and L Street NW, one
of the city's (Washington DC) busiest intersections.

A Georgetown University law student, Craig Dean, said he saw the message;

	  "HELP STAMP OUT A.I.D.S. NOW:  KILL ALL QUEERS AND JUNKIES"

It flashed five times in 25 minutes.  Minutes after seeing the message, he
called the city Human Rights Office and the Washington Blade, a gay community
newspaper.

Doug Hinckle, a staff photographer for the Blade, saw the message flash once
and photographed it.

Judith Miller, president of Miller Companies, which own the building at 1101
Connecticut Avenue NW and the message board, said she did not know how the
statement got onto the board.  She refused to believe it had appeared until she
was shown of the photographs.

Her company has complete control of the board and does not accept any paid
messages or advertisements, Miller said.  "I would never do anything like
that," she said.  "There is no way I would allow such a statement to appear."

Yesterday, Keller, a five-year employee of the Miller Companies, said he did
not write the statement and does now know how it became part of the normal flow
of headline news.

Miller said she believes her computer system may have a "virus" and will have
experts search to find where the unauthorized statement originated.  "How
absolutely awful," she said of the message.
_______________________________________________________________________________

"WANK" Worm On SPAN Network                                    October 17, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~
From The Computer Emergency Response Team

On October 16, the CERT received word from SPAN network control that a worm was
attacking SPAN VAX/VMS systems.  This worm affects only DEC VMS systems and is
propagated via DECnet protocols, not TCP/IP protocols.	If a VMS system had
other network connections, the worm was not programmed to take advantage of
those connections.  The worm is very similar to last year's HI.COM (or Father
Christmas) worm.

This is NOT A PRANK.  Serious security holes are left open by this worm. The
worm takes advantage of poor password management, modifies .com files, creates
a new account, and spreads to other systems via DECnet.

It is also important to understand that someone in the future could launch this
worm on any DECnet based network.  Many copies of the virus have been mailed
around.  Anyone running a DECnet network should be warned.

R. Kevin Oberman from Lawrence Livermore National Labs reports:

     "This is a mean bug to kill and could have done a lot of damage.
     Since it notifies (by mail) someone of each successful penetration
     and leaves a trapdoor (the FIELD account), just killing the bug is
     not adequate.  You must go in an make sure all accounts have
     passwords and that the passwords are not the same as the account
     name."

The CERT/CC also suggests checking every .com file on the system.  The worm
appends code to .com files which will reopen a security hole everytime the
program is executed.

An analysis of the worm appears below and is provided by R. Kevin Oberman of
Lawrence Livermore National Laboratory.  Included with the analysis is a DCL
program that will block the current version of the worm.  At least two versions
of this worm exist and more may be created.  This program should give you
enough time to close up obvious security holes.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

			   Report on the W.COM worm.
			       R. Kevin Oberman
			    Engineering Department
		    Lawrence Livermore National Laboratory
			       October 16, 1989

The following describes the action of the W.COM worm (currently based on the
examination of the first two incarnations).  The replication technique causes
the code to be modified slightly which indicates the source of the attack and
learned information.

All analysis was done with more haste than I care for, but I believe I have all
of the basic facts correct.

Here is a description of the program:

1. The program assures that it is working in a directory to which the owner
   (itself) has full access (Read, Write,Execute, and Delete).

2. The program checks to see if another copy is still running.	It looks for a
   process with the first 5 characters of "NETW_".  If such is found, it
   deletes itself (the file) and stops its process.

   Note:  A quick check for infection is to look for a process name starting
	  with "NETW_".  This may be done with a SHOW PROCESS command.

3. The program then changes the default DECNET account password to a random
   string of at least 12 characters.

4. Information on the password used to access the system is mailed to the user
   GEMPAK on SPAN node 6.59.  Some versions may have a different address.

5. The process changes its name to "NETW_" followed by a random number.

6. It then checks to see if it has SYSNAM priv.  If so, it defines the system
   announcement message to be the banner in the program:

	 W O R M S    A G A I N S T    N U C L E A R	K I L L E R S
	_______________________________________________________________
	\__  ____________  _____    ________	____  ____   __  _____/
	 \ \ \	  /\	/ /    / /\ \	    | \ \  | |	  | | / /    /
	  \ \ \  /  \  / /    / /__\ \	    | |\ \ | |	  | |/ /    /
	   \ \ \/ /\ \/ /    / ______ \     | | \ \| |	  | |\ \   /
	    \_\  /__\  /____/ /______\ \____| |__\ | |____| |_\ \_/
	     \___________________________________________________/
	      \ 						/
	       \    Your System Has Been Officically WANKed    /
		\_____________________________________________/

	 You talk of times of peace for all, and then prepare for war.

7. If it has SYSPRV, it disables mail to the SYSTEM account.

8. If it has SYSPRV, it modifies the system login command procedure to
   APPEAR to delete all of a user's file.  (It really does nothing.)

9. The program then scans the accounts logical name table for command
   procedures and tries to modify the FIELD account to a known password with
   login form any source and all privs.  This is a primitive virus, but very
   effective IF it should get into a privileged account.

10. It proceeds to attempt to access other systems by picking node numbers at
    random.  It then used PHONE to get a list of active users on the remote
    system.  It proceeds to irritate them by using PHONE to ring them.

11. The program then tries to access the RIGHTSLIST file and attempts to access
    some remote system using the users found and a list of "standard" users
    included with the worm.  It looks for passwords which are the same as that
    of the account or are blank.  It records all such accounts.

12. It looks for an account that has access to SYSUAF.DAT.

13. If a priv. account is found, the program is copied to that account and
    started.  If no priv account was found, it is copied to other accounts
    found on the random system.

14. As soon as it finishes with a system, it picks another random system and
    repeats (forever).

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Computer Network At NASA Attacked By Rogue Program	       October 18, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by John Markoff (New York Times)

A rogue computer program attacked a worldwide network of the National
Aeronautics and Space Administration on Monday, October 16, inflicting no
damage but forcing officials to disconnect the network from sensitive military
and space systems.

Security experts speculated that the program was written by someone who opposed
Tuesday's (October 17) scheduled launching of the space shuttle Atlantis, which
was to carry a nuclear-powered satellite into orbit.  The launching was
postponed because of bad weather.

NASA officials said the rogue program attacked an academic and research
network, the Space Physics Analysis Network, which is not used for space
shuttle mission control.

But a NASA official said the agency felt compelled to disconnect several links
between the network and an operational space shuttle network as a precaution.

Computer security experts at several national laboratories said the Department
of Defense had also severed the connection between commercial and research
networks and nonclassified network that connects United States military
installations and contractors around the world.

The program was designed to copy itself secretly and send unwanted, sometimes
vulgar messages to users of the NASA network.  It also tricks users into
thinking that data have been destroyed, although no data are damaged.

Like similar programs that have been sent into computer networks by pranksters
and saboteurs, it exploited a flaw in the security system designed to protect
the computers on the network.

Computer security experts said Tuesday that they knew of about 60 computers
that had been affected by the program.	A NASA spokesman said the program was
still spreading.

While the network is widely available to academic researchers with personal
computers, the rogue program was designed to attack only 6,000 computers
manufactured by the Digital Equipment Corporation.

The flaw in the security of the Digital Equipment computers had been widely
publicized over a year ago even before a similar rogue program jammed a group
of interconnected international networks known as the Internet.  NASA officials
said the program was only able to attack computers in which the necessary steps
had not been taken to correct the flaw.

Among the messages the program displayed on all infected computers was one that
read:  "Worms Against Nuclear Killers.  You talk of times of peace for all, and
then prepare for war."

Computer scientists call this kind of program a worm, a reference to a program
first described in the novel "Shockwave Rider" by a science fiction writer,
John Brunner.
_______________________________________________________________________________

Virus Controversies Again					October 6, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~
by John Markoff (New York Times)

       "The issue has also sparked interest among computer scientists."

Harold Highland, editor of Computers & Security, a professional journal, said
he had received two research papers describing how to create such anti-virus
programs.

He has not decided whether to publish them.

"No one has raised the obvious ethical questions," he added.  "I would hate to
see a virus released to fight viruses.	Until it's tested you don't know
whether it's going to do more damage than the program it is designed to fight."

A number of these programs have already been written, computer researchers
said.

The one that destroyed the data on business and governmental personal computers
in the United States was reportedly designed by a Venezuelan programmer.  How
many computers were affected and where they were is unclear.

That program is called Den Zuk, or Search.  It was intended to attack a
destructive program known as the Brain Virus that was distributed in 1986 by
two brothers who owned a small computer store in Pakistan.

Errors in the design of the program illustrate the potential danger of such
viruses, critics say.  Fridrik Skulason, a microcomputer specialist at the
University of Iceland in Reykjavik, who has disassembled the program, said the
author of Den Zuk had failed to take into account the different capacities of
disks available for IBM and IBM-compatible machines.

Because of that simple error, when the program infects a higher-capacity disk
it destroys data.

"They probably wrote with good intention," he said.  "The only problem is that
the programmers were not able to do their job correctly."

At least two other anti-viral viruses have already been devised, said Russell
Brand, a computer security researcher at Lawrence Livermore.

He said programmers at one company, which he would not identify, had written
the programs to combat the Scores virus, a program that infected Macintosh
computers last year.

He added that even though the programs were designed so they could not go
beyond the company's own computers, there had been a heated debate over whether
to deploy the programs.  He said he did not know how it was decided.

Brand said a group of computer researchers he works with at Lawrence Livermore
had written several self-replicating programs after the appearance of the rogue
program that Morris of Cornell is accused of writing.  But he added that the
group had never given permission to release the programs.

The debate over vigilante viruses is part of a broader discussion now taking
place among some computer researchers and programmers over what is being termed
"forbidden knowledge."

"There are ethical questions any time you send something out there that may
find itself invited on to somebody else's computer," said Pamela Kane, author
of a book on computer virus protection.

In California this month a group of computer hackers plans to hold a forum on
"forbidden knowledge in a technological society."

While the role of the computer hacker has been viewed as mischievous in a
negative way, hackers have consistently played a role as innovators, said Lee
Felsenstein, a Berkeley, California, computer expert who designed several early
personal computers.

"Computer hacking was originally a response to the perception of a priesthood's
control over immensely powerful technological resources," he said.  "Informed
individuals were able to break the power of this priesthood through gaining and
spreading the body of forbidden knowledge."

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Dreaded Personal Computer Virus May Be Only A Cold		October 6, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Don Clark (New York Times)

It won't be much of a plague.  But the hysteria anticipating it has been
world-class.

Those observations come from computer-security experts as they await Datacrime,
a virus program set to attack IBM-compatible personal computers starting
Thursday, October 12, 1989.

Analyses of the program, also called the Columbus Day Virus, show that it is
indeed destructive.  It just hasn't spread very far.

"It's going to be the week of the non-event," predicted John McAfee, a Santa
Clara, California, consultant who serves as chairman of the Computer Virus
Industry Association.  "You have more chance of being hit by a meteor than
getting this virus."

McAfee Associates, which acts as a clearinghouse for virus information, has
received just seven confirmed reports of Datacrime in six months -- compared
with three to 50 reports per day about another virus that originated in Israel
in 1987.  He thinks only 50 copies of Datacrime exist, and 40 of those are in
the hands of researchers.

"It's gotten more publicity than it deserves," agreed Russell Brand, another
virus expert, who advises Lawrence Livermore National Laboratory.

Brand expects to find just 20 copies among the 75,000 computers he monitors at
1,000 sites.

Such projections are disputed by some.	They are based on how often Datacrime
has been detected by computer users using special software that scans their
systems for the virus.

The virus could have infected many users who have not bothered to scan their
systems, McAfee concedes.

Fears have been whipped up by the news media and computer managers at companies
and government agencies.  Companies promoting products to eradicate viruses
also have played a role -- understandably.

Staid IBM Corporation this week took the unusual step of offering a program
that checks systems for viruses.  The company hasn't detected the virus in its
own operations, but concedes that many customers are worried.  "They are asking
us how we protect our software-development operations from viruses," said Bill
Vance, who was appointed a year ago as IBM's director of secure systems.

Bank of America, a huge IBM customer with 15,000 PCs, recently put out a
company-wide notice advising users to make backup copies of their computer data
by Wednesday, the day before the virus is programmed to strike.

Three different government agencies have panicked and sent out multiple
versions of incorrect advice," Brand said.

Worried calls have deluged McAfee's office, which has just three lines for
computer communications and three for voice.

"We put the phone down and it's 30 seconds before it rings again," he said.

Computer sleuths detected Datacrime -- and have detected other viruses -- by
looking for changes in the size of data files and in the way programs operate.
The underlying code used to write the program, once disassembled by experts,
indicates when the program will activate itself.

The identity of Datacrime's author isn't known, although some reports have
linked the virus to an anonymous hacker in Austria.  It first began showing up
in March, McAfee said, and gained notoriety after it was discussed at the
midsummer Galactic Hackers Conference in Amsterdam.

It appears to be relatively prevalent in the Netherlands and other European
countries.  Dutch computer users have reportedly bought hundreds of programs
that are said to detect and destroy the program.

Like other viruses, Datacrime rides along with innocuous programs when they are
exchanged over a computer network or computer bulletin board or through
exchange of infected disks.  Unlike many viruses, it has been designed to later
insert itself in data files that users don't often examine.

If one of the programs is executed after the target date, Datacrime proceeds
with its dirty work -- destroying the directory used to keep track of files on
a computer's hard disk.  The crime is analogous to destroying a card file in
the library.

"By destroying this one table you can't find where any of your data is," said
Brand.

But no one should really be in a fix if he makes backup copies of data, experts
say.  The data, once safely stored on another disk drive or on magnetic tape,
can be restored by computer professionals even if the virus has infected the
backup files.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

"Vaccines" To Hunt Down Rogue Programs                          October 6, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by John Markoff (New York Times)

Ever since a rogue program created by a graduate student jammed a nationwide
computer network last year, the rapid spread of such disruptive software, often
known as viruses, has caused growing alarm among computer users.

Now, to fight fire with fire, some companies, individuals and even a government
research laboratory are crafting a new breed of what have been called
anti-viruses to hunt down intruders.

The trouble is, some computer security experts say, the problem of viruses may
be exaggerated -- and the new crime fighter may do even more damage than the
criminal.

Much like an infection, a well-intended but badly designed program to stop
viruses can run amok, knocking out thousands of computers or destroying vast
amounts of data.

Indeed, one of the anti-virus programs intended to defeat a known virus has
already destroyed data on business and governmental personal computers in the
United States.

The issue has touched off a heated debate over whether the creation of these
high-technology vigilantes is a responsible action.  "The risks are just
enormous," said Peter Neumann, a computer security expert at SRI International,
a technology research center in Menlo Park, California.  "It's an unbelievably
unsafe thing to do."

But Chris Traynor, a programmer at Divine Axis, a software development company
in Yonkers, New York, argues that anti-virus programs can be contained so that
they do not spread out of control, reaching and possibly damaging data in other
computers.  His company is now trying to design such a program.

Computer researchers at the Lawrence Livermore Laboratory, a federal weapons
center in Livermore, California, have designed similar programs that patrol
computer networks in search of breaches through which viruses could enter the
system.

Viruses, which got their name because they mimic in the computer world the
behavior of biological viruses, are programs, or sets of instructions, that can
secretly be spread among computers.

Viruses can travel either over a computer network or on an infected disk passed
by hand between computer users.

Once the infection has spread, the virus might do something as benign as
displaying a simple message on a computer screen or as destructive as erasing
the data on an entire disk.

Computer security experts have been concerned for several years by the
emergence of vandals and mischief makers who deliberately plant the destructive
programs.

But in recent weeks international alarm has reached new heights as rumors have
spread that a virus program will destroy data on thousands of computers this
month, on Friday the 13th.

Computer security researchers said the virus, known as Datacrime, was one of at
least three clandestine programs with internal clocks set to destroy data on
that date.

As is usually the case, no one knows who wrote the program, but U.S. military
officials have mentioned as possible suspects a European group linked to West
German terrorists and a Norwegian group displeased with the fame of Christopher
Columbus, who is honored next week.

Largely in response to customer concerns, IBM said on Monday that it was
offering programs for its personal computers that would scan for viruses.

But several computer security experts say public fears are largely exaggerated.

They note that there have been fewer than a dozen reported appearances of the
Datacrime virus in the United States, and contend that the whole issue is
overblown.

Still, in the personal computer world, where many users have little knowledge
of the technical workings of their machines, concern over computer viruses has
become widespread.

The issue got the most attention last November, when, it is charged, Robert
Morris, a graduate student at Cornell, unleashed a rogue program that because
of a small programming error, ran wildly out of control, copying itself
hundreds of times on thousands of computers, overloading a national network,

As a result of the mounting concern, a new industry has blossomed offering
users protective programs known as vaccines, or anti-viral software.

These programs either alert users that a virus is attempting to tamper with
their computer or scan a computer disk and erase any rogue program that is
detected.

These conventional programs do not automatically migrate from computer to
computer, but now some experts are exploring fashioning programs that graft the
powers of the vaccines onto viruses in order to pursue and stop them wherever
they go.

Designing and spreading such programs was proposed in August by several people
attending an international gathering of computer hobbyists, or "hackers," in
Amsterdam.

They suggested that it was a good way for members of the computer underground
to make a positive contribution.

But many researchers believe the idea is dangerously flawed because of the
possibility of accidentally doing great damage.

Some computer security researchers worry that writing an infectious program to
stop viruses may be taken as an intellectual challenge by hackers who are well
meaning but do not grasp what problems they could create.

"One of the questions that the hacker community is now addressing is what you
do about young hackers," said Stewart Brand, a writer in Sausalito, California,
who is working on a book on outlaw cultures and high technology.

"They don't have a sense of responsibility; they have a sense of curiosity.
These are deliciously debatable issues, and I don't see them going away."
_______________________________________________________________________________


AOH Site layout & design copyright © 2006 AOH