Virus Bulletin, October 1990
Total Page:16
File Type:pdf, Size:1020Kb
October 1990 ISSN 0956-9979 THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Edward Wilding Technical Editor: Fridrik Skulason, University of Iceland Editorial Advisors: Jim Bates, Bates Associates, UK, Phil Crewe, Fingerprint, UK, Dr. Jon David, USA, David Ferbrache, Information Systems Integrity & Security Ltd., UK, Dr. Bertil Fortrie, Data Encryption Technologies, Holland, Ray Glath, RG Software Inc., USA, Hans Gliss, Datenschutz Berater, West Germany, Ross M. Greenberg, Software Concepts Design, USA, Dr. Harold Joseph Highland,Compulit Microcomputer Security Evaluation Laboratory, USA, Dr. Jan Hruska, Sophos, UK, Dr. Keith Jackson, Walsham Contracts, UK, Owen Keane, Barrister, UK, Yisrael Radai, Hebrew University, Israel, John Laws, RSRE, UK, David T. Lindsay, Digital Equipment Corporation, UK, Martin Samociuk, Network Security Management, UK, John Sherwood, Sherwood Associates, UK, Roger Usher, Coopers&Lybrand, UK, Dr. Ken Wong, BIS Applied Systems, UK. CONTENTS LETTERS 9 EDITORIAL COUNTERMEASURES Order Out of Chaos? 2 Cryptographic Checksums 10 European Certification OVERVIEW From Brain to Whale Mac Virus Writer Apprehended - The Story So Far 12 TECHNICAL NOTES 3 PRODUCT REVIEW 1 IBM PC VIRUSES (UPDATE) 5 V-ANALYST 15 KNOWN APPLE MACINTOSH PRODUCT REVIEW 2 VIRUSES 6 Virex-PC 18 FEATURE END-NOTES & NEWS 20 Defining the Jerusalem Variants 8 VIRUS BULLETIN ©1990 Virus Bulletin Ltd, 21 The Quadrant, Abingdon Science Park, Oxon, OX14 3YS, England. Tel (+44) 235 555139. /90/$0.00+2.50 This bulletin is available only to qualified subscribers. No part of this publication may be reproduced, stored in a retrieval system, or transmitted by any form or by any means, electronic, magnetic, optical or photocopying, without the prior written permission of the publishers. Page 2 VIRUS BULLETIN October 1990 PCBW’s parent company, IDG Communications, was subjected EDITORIAL to the commercially pernicious AIDS Information Diskette extortion bid which VB reported in December 1989. Order Out of Chaos? Hamilton selected 11 computer virus samples from his collection based on the criteria that each sample should be 1) “Giving you order out of chaos” - the slogan of Symantec, causing infections in the wild regardless of geographical the latest contender to enter the ‘virus industry’ war. region, 2) non-encrypting and 3) well known to the computer Symantec’s recent takeover of Peter Norton Computing, one of virus research community. With an independent witness the most respected names in personal computing, guaranteed a present, infected files were submitted for inspection by the media spotlight for the company’s new product, the Norton Norton Anti-Virus: all were passed as virus free. In fact, the Anti-Virus. product had failed to identify files infected by Eddie II, Vacsina (1), Yankee, MIX1, MIX1-2, Pixel 1 and 2, Amstrad, The announcement that Norton Anti-Virus would be launched and three variants of the Vienna virus. on 17th September gave rise to great expectations. Observers hoped that this product would prove as valuable in fighting The extravagant claims and idle boasts that have emanated viruses as the excellent Norton Utilities and Commander from Symantec about this product may now be of interest to the packages had proved to disk inspection and data recovery. Advertising Standards Authority. The failure of the product to Early announcements from Symantec’s UK chairman Mr. detect well known computer viruses certainly demonstrated Michael Skok claimed that Norton Anti-Virus was the “the that Symantec’s initial research and development in support of fastest and most complete virus protection utility on the this product was lamentable. Hexadecimal patterns for all of market” while press releases assured potential customers that these viruses, and many others which the Norton Anti-Virus the PC package, when combined with the company’s existing fails to detect have been available through the Virus Bulletin SAM anti-virus for Macintosh computers, would provide “the for months. In blunt terms, this product has been shown total data security strategy”. Skok was quoted in the computer conclusively not to be “the most complete virus protection press as saying that the Symantec product could scan a 40 utility on the market”. The developers of a number of newer Megabyte hard disk in 26 seconds, a figure which he pro- anti-virus products have failed to establish links with the ceeded to use to denigrate Dr. Solomon’s Anti-Virus Toolkit research community in order to sustain the necessary updates which appears to have been targeted as the major competitive to their software, and presumably this is the reason behind this product in the UK. product’s shortcomings. The marketing launch for the Norton Anti-Virus was unprece- With the realisation that computer viruses have become big dented for a computer security software product - 50,000 business, we can expect further ‘big names’ to muscle in, demonstration disks were distributed with What Micro?, develop a market and try to ‘milk’ it, regardless of the advertisements appeared in the Sunday Times and a tastefully complexities involved in developing anti-virus software. It is to designed booklet which purported to explain the computer be hoped that potential purchasers of this type of software will virus problem was carried as an insert in the Financial Times. ignore the marketing men and demand high standards of product development, reliability and end-user support. The launch campaign got off to an inauspicious start. Symantec had planned to distribute a discount voucher in the form of a European Certification Schemes fake £10 note with its NAV demonstration disk - these had to be withdrawn following the disapproval of the Bank of The need for independent assessment of computer security England. However, worse was to follow. Symantec’s atten- products, which will help computer users tread their way dance at the Business Computing ’90 exhibition at Earls Court, through the minefield of marketing hyperbole, has been London (25-28 September), was to be the forum for a public addressed, in part, by the establishment of government launch of the product. Exhibition attendees were invited to certification under the auspices of the UK’s Department of submit diskettes for inspection so that they could be guaran- Trade & Industry. The certification process is controlled by the teed “virus free” by Norton Anti-Virus and adverts to this Communications-Electronics Security Group at GCHQ, effect were run in the British national press. Cheltenham. Evaluation currently takes place at two CESG licensed evaluation facilities (CLEFs) run by Secure Informa- It was the technical editor of PC Business World, Mr. Mark tion Systems and Logica Space & Defence Systems. Hamilton, who ‘picked up the gauntlet’. His inspection of Norton Anti-Virus had revealed several shortcomings in the The purpose behind certification is to establish standards for product, which was found to be anything but “comprehen- security products used within government departments and to sive”. Journalists and editorial staff at PC Business World enable outside organisations to base their purchasing decisions have shown a laudable cynicism amid a deluge of virus hype on objective criteria. during the last year. This may be explained by the fact that VIRUS BULLETIN ©1990 Virus Bulletin Ltd, 21 The Quadrant, Abingdon Science Park, Oxon, OX14 3YS, England. Tel (+44) 235 555139. /90/$0.00+2.50 This bulletin is available only to qualified subscribers. No part of this publication may be reproduced, stored in a retrieval system, or transmitted by any form or by any means, electronic, magnetic, optical or photocopying, without the prior written permission of the publishers. October 1990 VIRUS BULLETIN Page 3 Moves to introduce a harmonised evaluation protocol for France, Germany, the United Kingdom and Holland under the TECHNICAL NOTES Information Technology Security Evaluation Criteria (ITSEC) are currently under way. Whale - The Armoured Virus Information on existing schemes and about ITSEC proposals is available from the following addresses: The Whale computer virus (aka Motherfish) is the most complex virus program so far encountered. Analysis suggests France that it is the work of a professional programmer or group of programmers, possibly sponsored by an agency. Approximately Service Central de la Securite des Systemes d’Information- 80 percent of its code (the virus is 9K in length) is dedicated to Division Information et Systemes confounding disassembly. Reports indicate that Whale is 18 Rue du Docteur Zamenhof related to the Fish6 virus and that the two viruses react F-92131 ISSY LES MOLINEAUX together when active on the same processor. Tests will be undertaken to ascertain whether this is the case. Programming Germany techniques seen in the 4K virus are also present in Whale, Zentralstelle fur Sicherheit der Informationstechnik suggesting that the writer(s) of Whale had access to the former Am Nippenkreuz 19 virus, or wrote it. Beneath three layers of encryption a single D-5300 BONN 2 text message has been located: THE WHALE IN SEARCH OF THE 8 FISH I AM ‘~knzyvo}’ Holland IN HAMBURG addr error D9EB,02 Netherlands National Comsec Agency There has been some speculation that Whale is an intentional Bezuidenhoutseweg 67 ploy (on the part of its creator(s)) to test the speed of response PO Box 20061 of the anti-virus community. It was hoped that a full report on NL-2500 EB THE HAGUE this virus would be available for publication in this edition but a technical report will now be delayed until November. The United Kingdom virus represents a new strategy combining ‘stealth’ tactics Head of UK CLEF Scheme Certification Body with concerted attempts to hinder disassembly and delay CESG Room 2/0805 attempts to update scanning software. (See pages 12-14). Fiddler’s Green Lane The term ‘armour’ is used to describe code which persistently CHELTENHAM, GLOS GL52 5AJ attempts to foil debugging software. Flip Macintosh Virus Writer Apprehended David Chess at the IBM Thomas R.