Aravinth.S. Powered by Blogger.
RSS

Form (computer virus) History


Form was a boot sector virus isolated in Switzerland in the summer of 1990 which became very common worldwide. The origin of Form is widely listed as Switzerland, but this may be an assumption based on its isolation locale.

The only notable characteristics of Form are that it infects the boot sector instead of the Master Boot Record (MBR) and the clicking noises associated with some infections. Infections under Form can result in severe data damage if operating system characteristics are not identical to those Form assumes.

It is notable for arguably being the most common virus in the world for a period during the early 1990s.


Category: Viruses and Spyware
Type:  DOS Boot Sector virus

Summary

This is a non-remarkable virus from Switzerland, but it is very common. 

Form is able to infect hard disks as well as floppies, and stores the rest of itself, as well as the original boot sector on the last track of the hard disk, or in clusters marked as "bad" on a diskette. It contains the following text: 

    The FORM-Virus sends greetings to everyone who's reading this text.
    FORM doesn't destroy data! Don't panic! Fuckings go to Corinne.

Unlike most other boot sector viruses, Form infects the DOS boot sector on hard drives instead of the Master Boot Record. 

Form is only able to infect a hard disk when you try to boot the machine from an infected diskette. At this time Form infects boot sector, and after that it will go resident to high DOS memory during every boot-up from the hard disk. Once Form gets resident to memory, it will infect practicly all non-writeprotected diskettes used in the machine. Form will create bad sectors on disks it infects. 

Form activates on the 18th of any month; on that day it will cause a 'click' from the PC speaker every time a key is pressed. On most machines this activation routine will not be heard, because the routine will fail if a keyboard driver (typically keyb.com) is loaded. 

Form is one of the most widespread viruses in existance. 

Note: 

If you have Form on a NTFS partition under NT, you need to repair the boot sector with a separate utility. A free program called BOOTPART can do this easily with this command: 

        BOOTPART WINNT BOOT:C:


BOOTPART can be downloaded from CLICK

VARIANT: Form.D FORM_D

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Cascade Virus History



The Cascade virus was a resident computer virus written in assembler, that was widespread in the 1980s and early 1990s. It infected COM files and had the effect of making text on the screen fall down and form a heap in the bottom of the screen. It was notable for using an encryption algorithm to avoid being detected. However one could see that infected files had their size increased with 1701 or 1704 bytes. In response, IBM developed its own anti-virus software.
It first appeared on the MS-DOS system in the late 1980s.


ALIAS: BlackJack, Falling Letters
SIZE: 1701 or 1704
TYPE: Resident COM-files
REPAIR: Yes


Type:                  File virus
Date Discovered: 1987.10.01
Place of Origin: Switzerland, Germany?
Source Language: Assembly
Platform:                  DOS
File Type(s):          .com
Infection Length: 1,701 bytes

Summary

The Cascade virus was one of the most common viruses during the early 1990s. Nowadays it is almost extinct.

Additional Details

Cascade is often not detected, because it produces no obvious effects. In the original version, the virus contained code that was set to "go off" between Oct. 1. and Dec. 31. 1988, shortly after an infected program is run. The effect is actually quite amusing - the characters on the screen fall down and end in a heap on the bottom.
There is a bug in some versions of the virus - it seems that the author intended the virus to infect all computers, except those from IBM. However, it did not work as planned - the virus would also infect "true" IBM machines.

VARIANT: Cascade-17Y4
This variant, which is reported to have originated in Yugoslavia is almost identical to the most common 1704 byte variant. One byte has been changed, probably due to a random "mutation". This, however, has resulted in a "bug" in the virus. Another mutated variant is also known - it infects the same file over and over.
VARIANT: YAP
Here two instructions in the decryption routine have been switched, which does not affect the operation of the virus, and seems to be done to prevent detection by some particular scanner.
VARIANT: Jo-Jo
This is basically a patched, non-encrypted variant of the Cascade virus. It is reported to have originated in Barcelona or Israel. It contains a check for the IBM copyright message at address F000:E008, just like Cascade. The virus contains two text strings:

                       Welcome to the JOJO virus.


                       Fuck the system (c) - 1990

VARIANT: Formiche
This variant is much longer than the others, over 6000 bytes. It has not yet been analyzed.
VARIANT: Cascade.1701.K
At the end of August, yet another new variant of the old Cascade virus was found in Oslo, Norway. This new variant was found in two different companies at almost the same time.
All in all, the Cascade family has approximately forty known members. The new virus infects COM files when they are executed. The virus is not markedly different from the original Cascade.

Although the new variant bears a close resemblance to the original virus, it is clearly different in one way: it never displays its activation routine, the dropping of letters to the bottom of the screen. It is, therefore, more difficult to notice. Other than that, the differences between the original virus and the new variant are minuscule - the creator of the new virus has probably used the original source code, but a different assembler compiler.



  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Stoned Boot Virus History








Virus:       Boot/Stoned
Name :     Virus:Boot/Stoned
Category:  Malware
Type:    Virus
Platform:    Boot
Created:      1987
Date Discovered 1988.02.01






Summary

A program that secretly and maliciously integrates itself into program or data files. It spreads by integrating itself into more files each time the host program is run.
Additional Details

Virus:Boot/Stoned is a simple virus that seems to have been designed to be harmless. Due to a mistake however, it did not quite work out that way. Stone is able to infect the boot sectors of floppy disks. The virus has spawned a large number of variants.

A computer infected with this virus will sometimes display the following message when it starts.

  Your computer is now stoned.

Stoned was one of the most widespread viruses in existence.


Infection

On an infected diskette, the original boot sector is stored on track 0, head 1, sector 3. This is the last sector of the root directory on a 360K diskette, so this will work unless the root directory contains more than 96 files, which is rather unlikely. Overwriting this sector on a 1.2M diskette is, however, much more likely to cause damage.


Variants

There are a large number of Stoned variants, many with no significant differences. The most notable are:

- This virus 
This variant is one of several politically motivated viruses and contains the message:

 "Bloody! Jun. 4, 1989".

- Swedish Disaster
This virus contains the string "The Swedish Disaster", which may indicate it was written in Sweden.

- Manitoba
Closely related to the original Stoned, Manitoba's main difference is that on floppies it doe not store the original boot sector anywhere, just overwrites it. Manitoba allocates two kilos of memory while in resident and corrupts 2.88MB EHD floppies while infecting them. Manitoba has no activation routine. It was probably written in the University of Manitoba.

- NoInt
NoInt was also known as Stoned III. It infects boot sectors on diskettes and Master Boot Records (MBRs) on hard disks. It infects a hard disk only if you try to boot from an infected diskette. The virus will be loaded into memory if the hard disk is infected and the machine is booted from it. Once the virus is in the memory, it will infect all diskettes that are used in the machine, unless the diskettes are write protected. It is sufficient to enter a command like DIR A: to get a diskette infected.

NoInt tries to prevent other programs from detecting it by causing read errors if partition table is tried to access. It does not do anything else visible and it does not contain any texts inside it. It is possible though that it causes damage to directories indirectly. The amount of base memory decreases by 2 kB.

- Flame
This virus is a standard boot sector infector that will infect the MBR or the boot sector of a floppy. If the computer is booted from an infected floppy, the virus immediately attempts to infect the MBR of the hard disk. 

Once Flame is active in memory, any operation on a non-infected floppy will result in infection. Virus reserves 1KB of DOS memory. The virus stores the original boot sector or MBR at cylinder 25, sector 1, head 1 regardless of what media is infected.

Flame saves the current month when it infects a system. When the month changes, it activates by displaying coloured flames on screen and overwriting the MBR.

- Angelina
This Stoned variant has stealth-mechanisms. It is probably made in Poland and contains the following texts:

  Greetings for ANGELINA!!!/by Garfield/Zielona Gora

Zielona Gora is a town in Poland. In October 1995, Angelina was found on new Seagate 5850 (850MB) IDE drives which were still factory sealed.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

The History and Description of Trojan Horse Virus



First of all it would be useful to state that a Trojan horse virus represents an infectious program able to cause serious damage to a computer. The Trojan horse can infect a user's machine without being noticed. As soon as it penetrates a computer, the Trojan horse scans it with the goal of stealing personal data.

One of the earliest Trojan horse viruses was detected in the 1980s, when several computers were affected. As it was earlier mentioned Trojan horse viruses are created in order to steal useful information such as passwords. They are developed by hackers, who, after stealing data, can use the information for various purposes, including blackmailing. Some of the first Trojan horse viruses were able to infect Windows32 files, but since then these programs evolved, and today they can cause even more harm.

The name of the Trojan horse comes from a story from Greek mythology about the siege of Troy. Greeks were unable to conquer the city until they built a huge wooden Trojan horse and hid a number of warriors in it. The wooden horse was supposed to be a present from the Greeks, informing that they sailed away and no longer wanted to conquer the city. When the Trojan horse was pulled into the city, the small army of Greeks inside it waited till dark and then invaded the Troy, destroying it, thus leading to the end of the war. In contrast to the wooden Trojan horse, the Trojan horse virus spread worldwide and is still popular today.

According to some online sources the first Trojan horse virus was dubbed the pest trap, also known as Spy Sheriff. This Trojan horse managed to infect about one million PCs worldwide. It did not damage any files on a computer, instead it led to the appearance of a large number of pop-ups, most of them looking like warnings that warned users about the necessity to installs some kind of software application. As soon as the Trojan horse computer virus was installed on the machine, it was quite difficult to get rid of it. In case the user tried to erase it, the Trojan horse would simply reinstall itself from hidden affected data files on the computer.

Often Trojan horse viruses come in packages that at first sight seem to be rather harmless. However, this is exactly what a Trojan horse should do until it affects a computer so hackers could remotely control the programs of the infected machine. There was a popular case that involved a professor who was accused of downloading about 1,000 child porn images, but who was released after it was discovered that the professor's computer was affected by a Trojan horse virus that downloaded the pictures. Despite the false accusations, the outcome of the situation had a serious impact on the professor's reputation.

During the 1980s there was an increase of the Bulletin Board System, which was computer system running software that permitted users to penetrate the system through a phone line. The BBS contributed to a fast spread of Trojan horse viruses, because after users logged in, they carried out such functions as uploading and downloading software and data sharing (some of which was infected). At that time computer viruses were created to aim popular software traders.

A dangerous Trojan horse virus was the Vundo, which used a lot of memory of the operating system at different intervals and generated a lot of pop-ups that informed the user about a number of software programs that need to be installed on the computer. The installed software included one or more computer viruses. Unlike the Spy Sheriff, it was rather easy to get rid of Vundo. There is one important thing to remember: a Trojan horse virus cannot be turned on unless a user doesn't activate the program that features the virus. It is important that you do not download unknown programs, especially if someone or something persuades you to do so.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Trojan Horse




TROJAN HORSE IN HISTORY

The term comes from the a Greek story of the Trojan War, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy..

TROJAN HORSES

Back to the "modern" Trojan Horses. They're pretty much the same: invisible to the naked eye; appear within harmless programs; require some form of user/operating system intervention to activate; and they do something unexpected by surprise. This article is just to convey a basic principle about the design of Trojan horse programs.

Trojans are designed to access permissions and exploit resources. The goal of password snatchers is to securely leak the login/password pairs to the Trojan author, and the goal in kleptographic attacks is to securely leak private keys to the attacker.

Nature of Trojan Horses

There is no "real" definition of a Trojan horse. It all depends on the perspective of the user that runs into it. From the perspective of a hacker (generally black-hat hackers), a reboot monitoring Trojan (useful in making sure no one used your machine) is not a Trojan to him/her since the hacker knows what it's about. From a law enforcement agent or people like that, it is a Trojan since the agent doesn't know it's there.

There are two examples of Trojans. One is a Trojan that is nothing more than a bug. Don't think that's a good thing. This bug could be bad enough that when planted properly, a Trojan author can break into the computer system. The second Trojan is a mathematical one. The statistical distribution of the output of a random number generator is affected so that it makes the generator very sensitive to the input entropy (I will not go into detail in this, please Google if you do not understand this [:)].


Trojan Horses in a text editor

An example of a text editor being used as a target for a Trojan horse:

If there was an installed text editor on a multiuser operating system which cannot be deleted or modified by the users themselves, then this program has certain unique privileges. For instance, It can access all the text files that users create or open. This would be the perfect target for a Trojan horse. When the Trojan is installed on this program, it will store data from users and makes the data accessible for the Trojan horse author.

Salami Slicing
There was once an article describing a Trojan horse attack that was intended to achieve money. This was carried out by an employee of a bank. He managed to get 70 000$ by taking a few cents from every account, and transferred it into his own account. It got the name of salami slicing because small amounts of money were taken from a lot of accounts. It's pretty useful to prevent anyone from noticing any drastic changes. The bank Trojan had access to money therefore the Trojan steals the money. Therefore, a text editor has access to documents so the Trojan steals the documents (pretty simple isn't it?).

Password Snatching
Every hacker would love to steal login/password pairs (referring to black-hat hackers). Password-snatching programs are installed when a system is infiltrated. These programs are also called rootkits. They were probably written in DOS terminate and stay resident programs (TSR). They record all keystrokes entered via the keyboard and patch the operating system hardware interrupt for key presses and log them to a file.

It is best if a password-snatching Trojan is hosted in a program that could access the passwords of users, like the UNIX "passwd" program. It verifies the identity of UNIX users by checking the login/password pairs. One could copy the Trojan to the end of the passwd program, or one could modify the source code for the password program, recompile it, and then install the compromised version (only if the root access is possible).

However, if the source code for the passwd program is updated and the administrator compiles a new version of it, then the attack would fail. So it would make sense to install a Trojan horse into the compiler which will increase the percentage of success of the attack. But if the compiler is recompiled, then the code that secretly inserts the Trojan into the passwd program would be gone.
______________________________________________________________________

There's not much left for me to explain. But one more thing for you to see :

Ken Thompson described an involved Trojan horse attack.

CODE :
compiler(char*s)
{
...
}


This is a figure of a normal compiler (ANSI C notation) (I did not create this)

The parameter s is a pointer to a string that contains the source code. The idea is to insert a source level Trojan horse into the source code of the compiler that checks for two patterns in the string s.

The first pattern is source code corresponding to the password verification program. When it is found, the password-snatching source code is added to the program before it is compiled. But the Trojan is not saved to the source file of the password program.

The second pattern is source code corresponding to the compiler. When it is found, the entire compiler Trojan is included in the compiler source code. It will contain all of the source code for the Trojan which is marked by the "if" statements in this following figure.

CODE :
compile(char*s)
{
if (match)s,pattern1) ==true)
{
compile(trojan1);
return;
}
if (match)s,pattern2) ==true)
{
compile(trojan2);
return;
}
...
}


Figure of a compiler with Trojan (ANSI C notation)(I did not create this either)

Whenever the compiler is compiled, the Trojan copies itself into the source file for the compiler. It can be added to the source for the compiler then the compiler could be recompiled, and the old compiler could be replaced. This would remove all traces of the source code for the Trojan attack. It would remain in binary form, integrated with the compiled instructions.

So Thompson's Trojan horse attack exploits the capabilities of its host. For example, it exploits the fact that compilers are used to create programs such as the passwd program and the compiler itself.
Also, it exploits the fact that the passwd program has access to login/password pairs and that the compiler has access to them as well by transitivity.

Yeah... I believe that this is okay to be an overview of Trojan horses.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

World First Pc Virus Is BRAIN



Brain is the oldest known virus on the PC platform and was first detected in 1986. Several variants of the virus are known and most of them are fairly harmless. It runs on IBM-PCs and compatibles running PC-DOS or IBM-DOS operating system.


Brain is a boot sector virus, infecting the first sector of floppies as they are inserted into an infected computer. Brain is only a few kilobytes in size and most of it is located in sectors that are marked as "bad" in the FAT. Also the original boot sector is stored in these sectors.






One of the most interesting details regarding the Brain virus is the following text, which appears inside it:





Welcome to the Dungeon
(c) 1986 Basit & Amjad (pvt) Ltd.
BRAIN COMPUTER SERVICES
730 NIZAB BLOCK ALLAMA IQBAL TOWN
LAHORE-PAKISTAN PHONE :430791,443248,280530.
Beware of this VIRUS....
Contact us for vaccination............ $#@%$@!!


There are many variants of the virus with different texts. Here is another version:


Welcome to the Dungeon
(c) 1986 Brain & Amjads (pvt) Ltd.
VIRUS_SHOE RECORD v9.0
Dedicated to the dynamic memories
of millions of virus who are no longer with us today -
Thanks GOODNESS!! BEWARE OF THE er..VIRUS :This program is catching
program follows after these messeges..... $#@%$@!!


This Two Guys was Written Brain Virus.


  • Amjad Farooq Alvi
  • Basit Farooq Alvi
Infection
Before Brain infects diskettes, it looks for a “signature”. This makes it possible to “inoculate” against it by putting the signature in the correct place of the boot sector of a clean floppy. Such floppies would not get infected even if they are insterted into an infected computer.


Stealth
The Brain virus tries to hide from detection by hooking interrupt 13 which is used to read the hard drive. When an attempt is made to read an infected boot sector, Brain will show you the original boot sector instead. This means that if you look at the boot sector using DEBUG or any similar program, everything will look normal, if the virus is active in memory. This means that Brain was not only the first PC virus, it was also the first rootkit.





Activity
The major effect of this fairly harmless virus is a change of the disk label (the "name" of the disk). The volume label is changed to read: "©Brain"



Name: Brain Virus.

Also known as: Ashar, (C)Brain, Clone, Nipper, Pakistani, PakistaniBrain.

Type:  Memory resident stealth boot sector infector.

Affects: PCs

Discovered: January 1986

Description:

The Brain virus is a memory resident stealth boot sector infector that changes the infected disk's volume label to "(c) brain" or "(c) ashar" depending on variant.
While no longer in-the-wild, Brain achieved notoriety for being the first known PC virus. It infected boot sectors, hooking into INT13. If the virus were resident in memory, the boot sector would look normal.

Mikko Hypponen : Interview About Brain Virus



  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS