COMPUTER VIRUSES: the Technology and Evolution of an Artificial Life Form
Total Page:16
File Type:pdf, Size:1020Kb
COMPUTER VIRUSES: The Technology and Evolution of an Artificial Life Form Written by: Karsten Johansson, 1994 NOTE: This document was written before the advent of Internet worms and trojans. It probably contains more information about the pre-commercial internet virus scene than any other singular source, and thus I have opted to make it available to the Internet as a historical reference. There are a couple of unfinished sections, but maybe if there is enough interest, I may be convinced to finish this and update it to reflect the current state of the malware industry, and update the Artificial Life stuff since so much has happened there since 1994. Permission is granted to use this information in any legitimate manner as long as (1) my copyright is maintained, (2) you give me credit for all material used, and (3) you send an email to [email protected] so I know where and how my research and writing is being used. There is no copy restriction on this document for reading or distribution, but (4) under no circumstances is sale or profit directly from my work permitted without my implicit authorization. (5) If distributed, this document must remain in its entirety, and shall not be altered from the original PDF file distributed at http://www.penetrationtest.com. Publishers interested in this manuscript or any of my other works may contact me at the same email address. Table of Contents COMPUTER VIRUSES: The Technology and Evolution of an Artificial Life Form............................................................................... 1 Table of Contents ........................................................................... 1 COMPUTER VIRUSES: The Technology and Evolution of an Artificial Life Form............................................................................... 7 Introduction......................................................................................... 8 What is a Computer Virus? .............................................................. 15 The Birds and the Bees ................................................................ 18 Trojan Horses ............................................................................... 20 Worms .......................................................................................... 21 Comparative Study: Biological vs. Computer Viruses ...................... 24 Viruses Do Not Autogenerate ....................................................... 25 Viruses Are Choosy ...................................................................... 26 Viruses Modify Their Hosts, and "Borrow" Resources.................. 27 Most Viruses Do Not Re-Infect ..................................................... 28 Viruses Can Delay Their Symptoms............................................. 29 Viruses Can Mutate ...................................................................... 30 Ignorance Is Bliss ......................................................................... 31 Look Before You Leap .................................................................. 32 A Historical Look at the Computer Virus, Artificial Life, and Synthetic Psychology ....................................................................................... 33 The Virus in the Media ..................................................................... 39 The Michelangelo Virus ................................................................ 41 Just the Fax, Please... .................................................................. 44 Man: The Gullible Monkey ............................................................ 51 The Virus in the Underground .......................................................... 57 RABID........................................................................................... 57 The Bulgarian Virus Factory ......................................................... 60 Anarkick Systems ......................................................................... 61 Soltan Griss .................................................................................. 63 Phalcon/SKISM............................................................................. 63 Keeping Your Computer Clean......................................................... 64 Safe Hex ....................................................................................... 64 Use a Virus Detection Program................................................. 65 Create an Emergency Boot Diskette......................................... 65 Back Up Your System ............................................................... 67 Test New Software for Viruses or Damaging Code................... 68 Never Boot From Someone Else's Floppy Diskette .................. 70 Write Protect ALL Boot Diskettes.............................................. 71 Cleaning an Infected System ........................................................... 72 Executable Files ........................................................................... 73 Boot Sector/Master Boot Record .................................................. 74 Anti-Virus Software........................................................................... 78 Scan Strings.............................................................................. 78 Filters ........................................................................................ 80 Change Checkers ..................................................................... 82 Heuristic Scanning .................................................................... 84 Virus Cleaning Strategies................................................................. 87 Simple Erasure.......................................................................... 87 Database Cleaning.................................................................... 88 Integrity Checker Cleaning........................................................ 89 Virus Simulation Cleaning ......................................................... 90 Forgotten Functions: The System and DOS Programmers............. 94 The Master Boot Record............................................................... 97 PC Scavenger Source Code....................................................... 101 Anti-Virus Product Comparison ...................................................... 106 Science Says.................................................................................. 107 Artificial Life .................................................................................... 108 How "Alive" is a Computer Virus?............................................... 119 Life is a pattern in space and time rather than a specific material object....................................................................................... 119 Self-reproduction, in itself or in a related organism................. 119 Information storage of a self-representation. .......................... 120 A metabolism that converts matter/energy.............................. 120 Functional interactions with the environment. ......................... 120 Interdependence of Parts........................................................ 121 Stability under perturbations of the environment..................... 121 The ability to evolve ................................................................ 122 Growth or expansion ............................................................... 122 Other Behavior ........................................................................ 123 Synthetic Psychology ..................................................................... 125 The Basic Vehicle ................................................................... 126 Giving the Vehicle a Sense of Direction.................................. 126 Endowment of Several Senses ............................................... 128 Variable Sensitivity.................................................................. 129 Adding Thresholds .................................................................. 132 Adding Advanced Life-like Properties ..................................... 133 Artificial Life vs. Synthetic Psychology: A Comparison .......... 134 ...But is it Life?................................................................................ 136 Computer Virus Programming........................................................ 139 Reproduction .............................................................................. 140 Overwriting Viruses ................................................................. 140 Companion Viruses................................................................. 144 Appending Viruses .................................................................. 148 Appending .COM Viruses........................................................ 148 Appending .EXE Viruses......................................................... 150 Prepending .COM Viruses....................................................... 153 Boot Sector/MBR Viruses........................................................ 155 File Allocation Viruses............................................................. 157 Simbiotic Relationships............................................................... 157 Advanced Coding Techniques ....................................................... 158 Encryption ............................................................................... 158 Stealth Techniques: Advanced Hide-and-go-Seek ................ 159 Anti-Hack Routines ................................................................