The Bulgarian and Soviet Virus Factories

Total Page:16

File Type:pdf, Size:1020Kb

The Bulgarian and Soviet Virus Factories The Bulgarian and Soviet Virus Factories Vesselin Bontchev Director Lab oratory of Computer Virology Bulgarian Academy of Sciences Soa Bulgaria It is now well known that Bulgaria is leader in computer virus pro duction and the USSR is following closely This pap er tries to answer the main questions Who makes viruses there What viruses are made and Why this is done It also underlines the impact of this pro cess on the West as well as on the national software industry How the story b egan Just three years ago there were no computer viruses in Bulgaria After all these were things that can happ en only in the capitalist countries They were rst mentioned in the April issue of the Bulgarian computer magazine Komputar za vas Computer for you KV in a pap er translated from the German magazine Chip Chip So on after that the same Bulgarian magazine published an article KV explaining why computer viruses cannot b e dangerous The arguments presented were in general correct but the author had completely missed the fact that the ma jority of PC users are not exp erienced programmers A few months later in the fall of the same year two men came in the editors oce of the magazine and claimed that they have found a computer virus Careful examination showed that it was the Vienna virus At that time the computer virus was a completely new idea for us To make a computer program whose p erformance resembles a live b eing is able to replicate and to move from computer to computer even against the will of the user seemed extremely exciting The fact that it can b e done and that even it had b een done spread in our country like wildre So on hackers obtained a copy of the virus and b egan to hack it It was noticed that the program contains no black magic and that it was even quite sloppily written So on new homemade and improved versions app eared Some of them were pro duced just by assembling the disassembly of the virus using a b etter optimizing assembler Some were optimized by hand As a result now there are several versions of this virus that were created in Bulgaria versions with infective lengths of and even bytes The virus has b een made almost two times shorter its original infective length is bytes without any loss of functionality This virus was the rst case So on after that we were visited by the Cascade and the Ping Pong viruses The later was the rst b o otsector virus and proved that this sp ecial area present on every diskette can b e used as a virus carrier to o All these three viruses were probably imp orted with illegal copies of pirated programs Who What Why The rst Bulgarian virus At that time b oth known viruses that infected les Vienna and Cascade infected only COM les This made me b elieve that the infection of EXE les was much more dicult Unfortunately I made the mistake by telling my opinion to a friend of mine Lets call him 1 VB for privacy reasons The challenge was taken immediately and so on after that I received a simple virus that was able to infect only EXE les It is now known to the world under the name of Old Yankee The reason for this is that when the virus infects a new le it plays the Yankee Do o dle melo dy The virus itself was quite trivial Its only feature was its ability to infect EXE les The author of this virus even distributed its source co de or more exactly the source co de of the program that releases it Nevertheless the virus did not spread very widely and even had not b een mo died a lot Only a few sites rep orted to b e infected by it Probably the reason for this was the fact that the virus was nonresident and that it infected les only on the current drive So the only p ossibility to get infected by it was to copy an infected le from one computer to another When the puzzle of creating a virus which is able to infect EXE les was solved VB lost his interest in this eld and didnt write any other viruses As far as I know he currently works in realtime signal pro cessing The TP case The second Bulgarian viruswriter TP caused much more trouble When he rst heard the idea ab out a selfreplicating program he was very interested decided to write his own virus and he succeeded Then he tried to implement a virus protection scheme and succeeded again The next move was to improve his virus to bypass his own virus protection then to improve the virus protection and so on That is why there are currently ab out dierent versions of his viruses Unfortunately several of them ab out a dozen were quite successful They spread worldwide There are rep orts ab out them from all countries of the former Eastern blo ck as well as from the USA and West Europ e Earlier versions of these TP viruses are known under the name VACSINA b ecause they contain such a string In fact this is the name of the virus authors virus protection program It is implemented as a device driver with this name The virus merely tries to op en a le with this name which means Hey its me let me pass The latest versions of the virus are b est known under the name Yankee Doodle b ecause they play this tune The conditions on which the tune is played are dierent with the dierent versions of the virus for instance when the user tries to reb o ot the system or when the system timer reaches pm 1 These are the initials of his true name It will b e the same with the other virus writers that I shall mention Please note that while I have the same initials and even his full name resembles mine we are two dierent p ersons All TP viruses are strictly nondestructive Their author payed particular attention not to destroy any data For instance the virus do es not infect EXE les for which the true le length and the length of the loadable part as it is present in the EXE header are not equal As far as I know no other virus that is able to infect EXE les works this way Also the virus do es not try to bypass the resident programs that have intercepted INT h therefore it takes the risk to b e detected by most virus activities monitoring software The author of the virus obviously could circumvent it for instance it uses a clever tech nique now known as interrupt tracing to bypass all programs that have ho oked INT h The only reason for not bypassing INT h as well is that this would also bypass all disk casheing programs thus it could cause damage Of course the fact that the virus is not intentionally destructive do es not mean that it do es not cause any damage There are several rep orts of incompatibilities with other software or of panicking users that have formatted their disks or at least damage caused by time loss denial of computer services or exp enses removing the virus It is well known that there aint no such thing as a good virus The TP viruses were not spread intentionally the cause could b e called criminal neg ligence The computer used by TP to develop e his viruses was also shared by several other p eople This is common practice in Bulgaria where not everyone can have a really p ersonal computer to work with TP warned the other users that he is writing viruses but at this time computer viruses were a completely new idea so nob o dy to ok the warn ing seriously Since TP didnt b other to clean up after himself these users got of course infected Unintentionally they spread the infection further When asked ab out the reason of writing viruses TP replied that he did this in order to try several new ideas to b etter learn the op erating system and several programming tricks He is not interested in this eld any more he has stopp ed writing viruses ab out two years ago The Dark Avenger In the spring of a new virus app eared in Bulgaria It was obviously homemade and just to remove any doubts ab out it there was a string in it saying This program was written in the city of Sofia C Dark Avenger The virus was incredibly infectious when it was in memory it was sucient to copy or just to op en a le to get it infected When the user felt that there is a virus in hisher system and without b o oting from a noninfected writeprotected system diskette ran an antivirus program which wasnt aware of this new virus he usually got all hisher executable les infected The idea of infecting a le when it is op ened was new and really successful Now such viruses are called fast infectors This strategy help ed the virus to spread world wide There are rep orts from all Europ ean countries from the USA the USSR even from Thailand and Mongolia On the top of this the virus was very dangerously destructive On each th run of an infected program it overwrote a sector on a random place of the disk thus p ossibly destroying the le or directory that contained this sector The contents of the overwritten sector was the rst bytes of the virus b o dy so even after the system has b een cleaned up there were les containing a string Eddie livessomewhere in time This was causing much more damage than if the virus was just formatting the hard disk since the destruction was very unnoticable and when the user eventually discovered it his backups probably already contained corrupted data So on after that other clever viruses b egan to app ear Almost all of them were very de structive Several contained completely new ideas Now this p erson we still cannot identify him exactly is b elieved to b e the author of the following viruses Dark Avenger V two variants V two variants Diamond two variants Nomenklatura six variants Proud Evil Phoenix Anthrax Leech Dark Avenger has several times attacked some antivirus researchers p ersonally The VV viruses claim to b e written by Vesselin Bontchev and
Recommended publications
  • Virus Bulletin, July 91
    July 1991 ISSN 0956-9979 THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Edward Wilding Technical Editor: Fridrik Skulason, University of Iceland Editorial Advisors: Jim Bates, Bates Associates, UK, Phil Crewe, Fingerprint, UK, David Ferbrache, ISIS Ltd., UK, Ray Glath, RG Software Inc., USA, Hans Gliss, Datenschutz Berater, West Germany, Ross M. Greenberg, Software Concepts Design, USA, Dr. Harold Joseph Highland, Compulit Microcomputer Security Evaluation Laboratory, USA, Dr. Jan Hruska, Sophos, UK, Dr. Keith Jackson, Walsham Contracts, UK, Owen Keane, Barrister, UK, John Laws, RSRE, UK, David T. Lindsay, Digital Equipment Corporation, UK, Yisrael Radai, Hebrew University of Jerusalem, Israel, Martin Samociuk, Network Security Management, UK, John Sherwood, Sherwood Associates, UK, Prof. Eugene Spafford, Purdue University, USA, Dr. Peter Tippett, Certus International Corporation, USA, Dr. Ken Wong, PA Consulting Group, UK, Ken van Wyk, CERT, USA. CONTENTS SCANNER UPDATE IBM Triumphs Amidst the ‘Vapourware’ 34 EDITORIAL 2 Results Table 35 TECHNICAL NOTES 3 TUTORIAL PRODUCT REVIEWS Fixed Disk Boot Sectors and 1. SafeWord Virus-Safe 36 Post-Attack Recovery 5 2. Knoxcard: Anti-Virus Hardware 38 Virus Bulletin Education, Training & Awareness Presentations 9 3. Trend Micro Devices’ PC-cillin 40 LETTERS SHAREWARE REVIEW VB Signatures With IBM’s Virscan 10 PC Virus Index 42 Vetting Procedure 10 KNOWN IBM PC VIRUSES 12 END-NOTES & NEWS 44 VIRUS BULLETIN ©1991 Virus Bulletin Ltd, 21 The Quadrant, Abingdon Science Park, Oxon, OX14 3YS, England. Tel (+44) 235 555139. /90/$0.00+2.50 This bulletin is available only to qualified subscribers. No part of this publication may be reproduced, stored in a retrieval system, or transmitted by any form or by any means, electronic, magnetic, optical or photocopying, without the prior written permission of the publishers.
    [Show full text]
  • Virus Bulletin, August 1993
    August 1993 ISSN 0956-9979 THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Richard Ford Technical Editor: Fridrik Skulason Consulting Editor: Edward Wilding, Network Security Management, UK Advisory Board: Jim Bates, Bates Associates, UK, David M. Chess, IBM Research, USA, Phil Crewe, Ziff-Davis, UK, David Ferbrache, Defence Research Agency, UK, Ray Glath, RG Software Inc., USA, Hans Gliss, Datenschutz Berater, West Germany, Igor Grebert, McAfee Associates, USA, Ross M. Greenberg, Software Concepts Design, USA, Dr. Harold Joseph Highland, Compulit Microcomputer Security Evaluation Laboratory, USA, Dr. Jan Hruska, Sophos, UK, Dr. Keith Jackson, Walsham Contracts, UK, Owen Keane, Barrister, UK, John Laws, Defence Research Agency, UK, Dr. Tony Pitt, Digital Equipment Corporation, UK, Yisrael Radai, Hebrew University of Jerusalem, Israel, Roger Riordan, Cybec Pty, Australia, Martin Samociuk, Network Security Management, UK, John Sherwood, Sherwood Associates, UK, Prof. Eugene Spafford, Purdue University, USA, Dr. Peter Tippett, Symantec Corporation, USA, Steve R. White, IBM Research, USA, Joseph Wells, Symantec Corporation, USA, Dr. Ken Wong, PA Consulting Group, UK, Ken van Wyk, CERT, USA. CONTENTS VIRUS ANALYSES 1. Daemaen: Multi-multipartism 9 EDITORIAL 2. 8888 - The Poor Man’s Commander Bomber 12 Crime and Punishment 2 ROGUES’ GALLERY VIRUS PREVALENCE TABLE 3 Keep It To Yourself 14 NEWS Storing Up Trouble 3 PRODUCT REVIEW 40Hex Print DAME Source code... 3 Better CPAV than CPAV? 16 Crown Wins Logic Bomb Case 3 COMPARATIVE REVIEW IBM PC VIRUSES (UPDATE) 4 OS/2 Virus Protection 20 INSIGHT Getting to the Point 7 END NOTES & NEWS 24 VIRUS BULLETIN ©1993 Virus Bulletin Ltd, 21 The Quadrant, Abingdon Science Park, Oxon, OX14 3YS, England.
    [Show full text]
  • The Ultimate Cybersecurity Guide for the It Professional
    THE ULTIMATE CYBERSECURITY GUIDE FOR THE IT PROFESSIONAL { 01101000 01110100 01110100 01110000 01110011 00111010 00101111 00101111 01110111 01110111 01110111 00101110 01100011 01100001 01110010 01100010 01101111 01101110 01100010 01101100 01100001 01100011 01101011 00101110 01100011 01101111 01101101 } THE ULTIMATE CYBERSECURITY GUIDE FOR THE IT PROFESSIONAL 2019 Welcome to our comprehensive guide on the basics of cybersecurity. Whether you've been in IT for a long time or are just starting out, there is an expectation that everyone in IT should have some degree of expo- sure to InfoSec. A good way to do that is to learn from and get connected in the community. Cybersecurity is a fascinating and rapidly evolving area of IT. And those that are involved are friendly people who care passionately about keeping us all safe. With information from over 150 sourced references, and personal input from The Howler Hub community of security experts, this guide contains the key information to help you: • Understand key concepts that drive the security professional. • Learn a common language to engage with cybersecurity professionals. • Connect with sources to stay up-to-date on this evolving field. • Engage with cybersecurity experts and the threat hunting community at large. CONTENTS 01 02 03 History of Attackers + Common Cybersecurity Their Motives Attacks <pg num="001" /> <pg num="005" /> <pg num="007" /> 04 05 06 Terms to Know Experts to Blogs to Read <pg num="009" /> Follow <pg num="014" /> <pg num="013" /> 07 08 09 Events to Books to Read Movies + Shows Attend <pg num="017" /> to Watch <pg num="015" /> <pg num="019" /> 10 11 12 Communities Become a References to Engage Threat Hunter <pg num="023" /> <pg num="021" /> <pg num="022" /> 13 Appendices <pg num="024" /> <pg num="001" /> SEC.
    [Show full text]
  • Twenty Years Before the Mouse
    Twenty years before the mouse. Aryeh Goretsky Distinguished Researcher Table of Contents Introduction 3 Fiat Lux 4 Brain Damage: Rootkits 1980s-Style 4 On-the-Job Training 5 Ransomware: Then and Now 5 War of the Parasites 6 Writing Viruses for Fun and Profit 9 Somebody Set Us Up the Bomb 11 Profits of Doom 12 This Way to the Egress 16 Acknowledgements 17 Sources 18 Title note: With apologies to author Charles Erskine’s “Twenty Years Before the Mast: With the more thrilling scenes and incidents while circumnavigating the globe under the command of the late Admiral Charles Wilkes 1838-1842.” Boston (privately printed), 1890. 2 Twenty years before the mouse Introduction For the past several years, I have been deep in the dark bowels of ESET, LLC’s Research Department—as the department’s Special Projects Manager, working on tasks that are vital at antivirus companies but generally go unnoticed by the public, testing things, making things, aggregating data from disparate sources, providing commentary and analysis and all the other myriad tasks one has to perform as a manager. One such regular responsibility is drafting new research topics alongside security expert Jeff Debrosse, the head of Research at ESET. Jeff is no stranger to visitors of ESET, LLC’s blog or readers of its white papers. He has written many of both and has been involved in the creation of others to varying extents. But as Senior Director, he is not just a frequent author or speaker but responsible for the operation of the department as well. And that means occasionally getting one of us to write a white paper.
    [Show full text]
  • 1972 Can Be Made with the Use of a Blue Box and a Plastic Toy Whistle That Comes in Cap’N Crunch Cereal Boxes
    History 329/SI 311/RCSSCI 360 Computers and the Internet: A global history The Dark Side: Hackers, Spam, and Black Markets Today } Revisions to the syllabus and end of the course } Hackers } Spam } Vandalism on Wikipedia } Black markets on “darknets” } Next time Proposed changes to syllabus } April 7: session on China } Guest lecturer Silvia Lindtner } Last class April 12 — NO CLASS April 14 } No final exam — 1250-1500 word essay instead } Why does history matter? How has learning the history of computers changed your view of the present? } Adjustment to percentages for final grade } Midterms 1 and 2 – each 30 pct of grade (was 20) } Final essay — 10 pct of grade Hackers Tweet this John Draper, A.K.A. “Captain Crunch,” discovers that free phone calls 1972 can be made with the use of a blue box and a plastic toy whistle that comes in Cap’n Crunch cereal boxes. The whistle duplicates a 2600-hertz tone to unlock AT&T’s phone network. 1979 The first computer “worm” is created at Xerox’s Palo Alto Research Center. The program is meant to make computers more efcient, but later hackers modify worms into computer viruses that destroy or alter data. source (all blue slides): Dell Computer Captain Crunch (John Draper) } “Phreaking” } Built “blue boxes” } Connected with Homebrew computer club } 2600 magazine (1984-) PC hackers (1975-present) } Structure: distributed computing } Individual PCs in homes, offices } PC hacker culture } Far larger, highly fragmented group } Time of day no longer important } Mainframe and mini hackers: usually nighttime, to
    [Show full text]
  • A Computer Virus Primer
    Purdue University Purdue e-Pubs Department of Computer Science Technical Reports Department of Computer Science 1989 A Computer Virus Primer Eugene H. Spafford Purdue University, [email protected] Kathleen A. Heaphy David J. Ferbrache Report Number: 89-935 Spafford, Eugene H.; Heaphy, Kathleen A.; and Ferbrache, David J., "A Computer Virus Primer" (1989). Department of Computer Science Technical Reports. Paper 795. https://docs.lib.purdue.edu/cstech/795 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. A COMPUTER VIRUS PRIMER Eugene H. Spafford Kathleen A. Heaphy David J. Ferbrache CSD TR-935 November 1989 A Computer Virus Primer1 Purdue University Technical Report CSD-TR-935 Eugene H. Spafford Kathleen A. Heaphy David J. Ferbrache 28 November 1989 1@ Copyright 1989 by ADAPSO, Inc. and Eugene H. SpaJford. All rights reserved. Abstract There has been considerable interest of late in computer viruses. Much of the information available is either of a highly theoretical nature, or describes a specific set of viruses. Neither is useful for providing an overview of how computer viruses work or how to protect against them. This report is a condensed explanation of viruses-their history, structure, and some information on how to deal with their threat. It should provide a general introduction to the topic without requiring the understanding of excessive detail. The interested reader is directed to the book from which this report is derived for further infor­ mation, including references to related works and sources, more technical detail, and information on some of the legal aspects ofcomputer viruses: Computer Viruses: Dealing with Electronic Vandalism and Programmed Threats, E.
    [Show full text]
  • The Computer Virus — from the First IBM-PC Virus Appeared in 1986
    pp1-20.qxd 11/30/00 11:02 AM Page 13 feature the M-commerce site using encryption highly valuable back-end systems. This, security, none are insurmountable. Co- and certificates, and it is probable that coupled with the fact that handsets are operation among certification authori- people will expect the repository more easily lost or stolen than PCs ties, mobile operators, systems provider to verify the trustworthiness of makes it doubly important that the integrators and device manufacturers is the M-commerce site on their behalf, by handset does not become the weak link needed to ensure that mobile security is checking the validity of certificates, in the PKI. Ideally the handset should implemented properly, and that different before releasing personal data. Fledgling verify the identity of the user using a bio- implementations will be able interact. examples of this kind of online service metric measure, such as a fingerprint Uniform standards need to be estab- are only now arising — such as scan, although this may be some years lished and adhered to. Governments Microsoft Passport — and they are cer- away. In the interim, passwords and PIN and regulators must create legislation, tain to play an increasingly important numbers must be used but are never guidelines and practices that allow role in M-commerce. transmitted across the network in a PKI M-commerce to flourish. based system. Handsets, by their very Security can unlock the potential of The future nature, have the potential to transform M-commerce and M-business. It is an to the Personal Trusted Devices of the enabling rather than restrictive force that While the role of the handset in a PKI future.
    [Show full text]
  • Guide to Malware Incident Prevention and Handling
    Archived NIST Technical Series Publication The attached publication has been archived (withdrawn), and is provided solely for historical purposes. It may have been superseded by another publication (indicated below). Archived Publication Series/Number: NIST Special Publication 800-83 Title: Guide to Malware Incident Prevention and Handling Publication Date(s): November 2005 Withdrawal Date: July 2013 Withdrawal Note: SP 800-83 is superseded in its entirety by the publication of SP 800-83 Revision 1 (July 2013). Superseding Publication(s) The attached publication has been superseded by the following publication(s): Series/Number: NIST Special Publication 800-83 Revision 1 Title: Guide to Malware Incident Prevention and Handling for Desktops and Laptops Author(s): Murugiah Souppaya, Karen Scarfone Publication Date(s): July 2013 URL/DOI: http://dx.doi.org/10.6028/NIST.SP.800-83r1 Additional Information (if applicable) Contact: Computer Security Division (Information Technology Lab) Latest revision of the SP 800-83 Rev. 1 (as of August 12, 2015) attached publication: Related information: http://csrc.nist.gov/ Withdrawal N/A announcement (link): Date updated: ƵŐƵƐƚϭϮ, 2015 Special Publication 800-83 Sponsored by the Department of Homeland Security Guide to Malware Incident Prevention and Handling Recommendations of the National Institute of Standards and Technology Peter Mell Karen Kent Joseph Nusbaum NIST Special Publication 800-83 Guide to Malware Incident Prevention and Handling Recommendations of the National Institute of Standards and Technology Peter Mell Karen Kent Joseph Nusbaum C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 November 2005 U.S.
    [Show full text]
  • The Future of Computer Viruses
    86-10-30 The Future of Computer Viruses Previous screen Richard Ford Payoff The new generation of object-oriented operating systems is expected to fuel the development of increasingly destructive viruses. This article discusses the exposures to viruses that these new environments present and the types of viruses for which today's IS manager should prepare. Introduction Computer viruses are a fact of life for the Information Systems (IS) manager. Since 1986, when the first virus was written for the IBM PC, the number of known viruses and variants has skyrocketed; the current total is over 8,000.This chapter describes the virus- related threats that users will face in future. The First Recorded Viruses Although computer viruses are often associated with the burgeoning computing environment of the late 1980s and 1990s, self-replicating code has been around for far longer. In the mainframe environment, codes existed that could fork processes and, replicating wildly, undermine performance. These were the forerunners of today's computer viruses. The Brain virus of 1986 is often identified erroneously as the first virus ever discovered. However, although Brain was the first PC virus, its discovery was preceded by that of a virus written for the Apple II in 1981 called Elk Cloner. Elk Cloner's payloads included inverting the screen and displaying a text message. In 1983, Dr. Fred Cohen developed self-replicating code in a series of VAX and UNIX experiments and, subsequently, Brain was discovered in 1986. Brain, like Elk Cloner, was a boot sector virus that spread from machine to machine through the boot sector of floppy disks.
    [Show full text]
  • Computer Virus and Worms
    Scholarly Journal of Mathematics and Computer Science Vol. 7(1), pp. 1-9, December 2018 Available online at http:// www.scholarly-journals.com/SJMCS ISSN 2276-8947 © 2018 Scholarly-Journals Full Length Research Paper A study on malware: Computer virus and worms Rabia Khan MCA, Punjab Technical University, India. Author email :[email protected] Accepted 16 December, 2018 Malware or malicious software is a type of security threat that brings harm to computer system. Most organizations are affecting by malware. Malware steal protected data, by pass access control, delete document or add documents not approved by user. Malware can be in the form of virus, worms Trojan horse, adware, spyware, rootkit, backdoor, and botnet. In this paper, we study the most significant malware: Virus and worms can have a devastating effect on business continuity and profitability. Also this paper describes the timeline of virus, worms and Trojan horse. Key words: Malware, malicious software, data, virus, worms Trojan horse INTRODUCTION Nowadays, a huge variety of cyber-attacks are available of these security threats try to violate confidentially, that can be affect not only big organization but also affect integrity and accessibility. Malicious software (malware in the personal computers such as brute force attack, social short) is software designed to cause harm to computer engineering/cyber fraud attacks, distributed denial of and user (Abhisheck Ranjan (www.geeksforgeeks.org), service attack, phishing attacks and malware attack. All Neil, 2012). Adware biggest threats to security systems. Botnet can be used Adware is one type of malware that automatically delivers for Distributed Denial of Service (DDoS) attacks, as advertisements.
    [Show full text]
  • Computer Viruses and Ethics
    Purdue University Purdue e-Pubs Department of Computer Science Technical Reports Department of Computer Science 1991 Computer Viruses and Ethics Eugene H. Spafford Purdue University, [email protected] Report Number: 91-061 Spafford, Eugene H., "Computer Viruses and Ethics" (1991). Department of Computer Science Technical Reports. Paper 901. https://docs.lib.purdue.edu/cstech/901 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. COMPUTER VIRUSES AND ETHICS Eugene H. Spalford CSD-TR-91-061 August 1991 Computer Viruses and Ethics Purdue Technical Report CSD-TR-91-061 Eugene H. Spafford Department of Computer Sciences Purdue University West Lafayette, IN 47907-1398 [email protected] August 20, 1991 Abstract There has been considerable interest in computer viruses since they first appeared in 1981, and especially in the past few years as they have reached epidemic numbers in many personal computer environments. Viruses have been written about as a security problem, as a social problem, and as a possible means of performing useful tasks in a distributed manner. Most users of computers view viruses as annoying or dangerous. Some people, however, claim that (at least some) viruses are beneficial. This paper begins with a description of how computer viruses operate, and the various ways simple viruses are structured. It then discusses the most common reasons put forth to explain the writing of viruses, and discusses whether those reasons justify the resultant damages. 1 Introduction There has been considerable interest oflate in computer viruses, and in the motives behind the writing of viruses.
    [Show full text]
  • Cyber Criminology
    Muhammad Tashfeen Shinwari Cyber Criminology The Mentality, Vision and Aim behind Cybercrime Helsinki Metropolia University of Applied Sciences Bachelor of Engineering Information Technology Thesis 12 December 2015 Abstract Author(s) Muhammad Tashfeen Shinwari Title Cyber Criminology The Mentality, Vision and Aim behind Cy- bercrime Number of Pages 51 pages Date 12 December 2015 Degree Bachelor of Engineering Degree Programme Information Technology Specialisation option Software Engineering and IT security Instructor(s) Kimmo Sauren, Senior Lecturer The goal of the project is to gain a good understanding of what kind of different cyber- attacks are carried out in modern times and how by being cautious, one can avoid becom- ing a victim. This study will also shed some light on what mentality lies behind these at- tacks and what the most common intensions are for these types of attacks. The economic effect of computer crime is often overlooked. Only by knowing some funda- mental principles, one can better prepare oneself against these crimes and also protect personal assets from these threats. The project is also aimed to give some useful guidelines which can be benefited from not only by users who are using computers for their daily lives but also by nontechnical people in general. Nowadays more and more tasks are dependent upon computers and keeping up with the security issues on the Internet cannot only save people from losing data on a personal level but also help companies protect their assets. Different printed and electronic media were used in order to gather the facts and figures about cybercrime. A few software were also used to mimic some of the attacks on my per- sonal network in order to gain in depth information.
    [Show full text]