Throwback Thursday: Virus Writer and Distributors 'Attributable Viruses' (July 1990)

2015-09-17

Dr Jan Hruska

Editor: Martijn Grooten

Abstract

While it is not easy to establish the origins of a computer virus, and it is rare that positive indicators as to authorship can be found by examining virus code, there are a number of notable exceptions to this. Dr. Jan Hruska takes us through some 'attributable viruses'.


(This article was first published in Virus Bulletin in July 1990.)

It is not easy to establish the origins of a computer virus and it is rare that positive indicators as to authorship can be found by examining virus code. There are, of course, notable exceptions to this.

The Brain virus, for instance, includes the authors’ names, address and telephone numbers embedded in the boot sector. The virus code was written by two computer software retailers and was reportedly developed as a means of copy-protection - a measure to punish ‘bootleggers' (see Figure 1.).

The Brain virus was first reported after infecting floppy disks at the University of Delaware, USA, in October 1987. It has the distinction as being the first virus to strike world wide outside of a laboratory. It is rare that it is in ‘attributable virus’ - its boot sector contains the Names of its originators along with their address in Pakistan. Today’s virus writers generally choose anonymity.

Figure 1. The Brain virus was first reported after infecting floppy disks at the University of Delaware, USA, in October 1987. It has the distinction as being the first virus to strike world wide outside of a laboratory. It is rare that it is in ‘attributable virus’ - its boot sector contains the Names of its originators along with their address in Pakistan. Today’s virus writers generally choose anonymity.

Toulme

Patrick A Toulme of the United States is a high profile virus writer. Earlier this year he uploaded his ‘Virus-90’ to a number of Bulletin Boards in the United States and requested a fee of $19.95 (see VB, March 1990). His latest release is ‘Virus-101’, an 'improved' version of his earlier creation. Virus-101 is a memory resident self-modifying and encrypting virus which makes the extraction of reliable hexadecimal pattern virtually impossible. Fridrik Skulason reports that patterns to search for the virus may be possible with the use of ‘wild card’ characters in the hexadecimal pattern although the virus is still under examination. Virus-101 will probably necessitate the use of a ‘virus identity’ to identify infected files (see ‘1260 Revisited’, VB, April 1990).

Toulme claims that these viruses are “designed to give both experienced programmers and novice computer enthusiasts experience in dealing with computer viruses”. There seems little legal redress against such activities, although an infection caused by Virus-90 or - 1`01 on US federal interest computers might expose him to prosecution under the US Computer Fraud and Abuse Act 1986. It is probable that both viruses (and variants of them) will appear in the wild.

Virus-B

The development of ‘Virus-B’ by John McAfee’s InterPath corporation, USA is another example of an ‘attributable virus’.

Virus-B is not, in fact an entirely new specimen, but a modified version of the South African virus (which InterPath call X-12). Virus-B only infects .COM files and displays a clear infection message upon execution of infected programs. According to the documentation the virus will:

…increase the size of the infected program by about 500 bytes. An infected program will cause no damage but it will be a nuisance if a large number of system’s programs become infected.

The documentation also acknowledges certain dangers including the possibility that “Hackers could re-activate Virus-B to return to destructive mode”. It goes on to say that “Such a person could just as easily write a virus from scratch if they were so inclined, but the potential for reactivation exists.

Reference is made to ‘built in protection mechanisms’ which explains that the code segment for the destructive mechanism has been left intact (“so that it may be analysed”) but that the branch instructions to these segments have been removed. A dire warning follows: “DO NOT ATTEMPT TO DISASSEMBLE THIS VIRUS AND RECONNECT THE BRANCH INSTRUCTIONS”.

Virus-B was made available by InterPath as a ‘restricted’ access file’ and was “developed to be used in a research environment for studying virus replication activities and as a safe tool for testing anti virus measures”.

Problems abound with ‘demonstration and ‘test’ viruses and one can only hope that InterPath Corporation exercised proper judgement in the people to whom it distributed Virus-B.

Burger and Morris

The case of Ralf Burger his ‘VIRDEM’ demonstration virus is discussed by Jim Bates on page 6 of this month’s VB. It would appear that Burger distributed a number of different virus demonstration disks, some of which have now appeared in the wild. Burger’s primary motivation appears to be financial gain from the virus phenomenon.

VB has, over the months, also covered the case of Robert Morris and the Internet worm program. Morris is the first man convicted under the aforementioned US Computer Fraud & Abuse Act. Intellectual challenge seemed to have been the motivating force behind the development and release of the program. This is not surprising from a computer science graduate at one of the principal US universities - Cornell.

The Bulgarians

Lubomir Mateev Mateev and Iani Lubomirov Brankov wrote and distributed the Murphy virus in Bulgaria - they included their telephone numbers and addresses in the source code which they circulated. No prosecution will result within Bulgaria which, like so many countries, has no applicable legislative power.

Sofia is home to a dedicated group of virus writers including ‘T.P.’ and Dark Avenger’. The writers of the Bulgarian viruses are almost certainly students from a research institute attached to the Bulgarian Academy of Sciences or from a faculty at Sofia University or the ‘Lenin-V.I.’ Higher Institute of Mechanical and Electrical Engineering.

Apart from these rare examples, computer virus writers generally choose anonymity, although careful study of text strings and programming style can reveal details about the programmer’s age, nationality and personality.

Other Possible Sources

Various motivations lie behind the development of the attributable computer viruses mentioned above. It is quite useful to speculate on other possible groups or individuals involved in virus writing and distribution.

A number of groups are readily identifiable as potential (high likelihood) originators of computer viruses.

Hackers and ‘Technopaths’

In the book Out of the Inner Circle, the author Bill Landreth describes the various motivations behind computer hacking. He describes five hacker sub-classes - novice, student, tourist, crasher and thief. Of these subgroups he identifies two categories as liable to inflict damage to computer systems. The ‘novice’ often causes damage unintentionally due to inexperience and carelessness but is also prone to vandalism. However, Landreth singles out the ‘crasher’ as:

a troublemaker motivated by the same elusive goals as a vandal. If it weren’t for computers, her could just as easily be spray painting his name on the side of a building, or perhaps, even setting the building on fire”.

The author asserts that genuine hackers aspire to either ‘student’ or ‘tourist’ class and hate ‘crashers’ because the give hackers a bad name, they close accounts which hackers have spent time and effort to obtain and they crash bulletin board systems on which hackers communicate. The behaviour as described would be clinically defined as psychopathic. The computer world has adopted the term ‘technopath’ to describe this type of personality disorder.

The willingness to inflict damage to computer systems makes the ‘crasher’ a potential computer virus writer.

Students

Most universities offer free, often uncontrolled, computer facilities to students ( and often ex-students and even non-students). The conditions for both virus propagation and development are ideal. Illegal software copying is widespread, and virus attacks are continuously occurring at academic institutions.

The appearance of a virus at Lehigh University in 1987 (the Lehigh virus) which never infected any other sites indicates that the virus was developed on campus. There is also strong evidence to suggest that the Jerusalem virus was developed by a student or students at the Hebrew University of Jerusalem. The Italian virus is believed to have originated at the Polytechnic of Turin. The technical ability to write a virus is within the reach of first-year computer science student and, as in the case of Morris at Cornell, the primary motivation will be intellectual challenge.

This group are also a potential source of mini and mainframe viruses and worms. Whereas most members of the public can afford a cheap PC, they cannot easily gain access to an IBM 370 or a DEV VAX. The Internet worm is not the only example of this; the CHRISTMA EXEC ‘Christmas tree’ worm (VB, April 1990) originated at the University of Clausthal Zellerfield, West Germany.

Disgruntled Employees and Ex-Employees

Most organisations are acutely aware of the threat posed by this group. Although a computer literate employee might program a ‘site-specific’ virus, it is more likely that he/she would implant an existing destructive virus or add a destructive segment to a ‘benign’ (or demonstration) virus. Readiness to cause damage by programming has already been shown in cases of logic bombs being planted in computer systems by disgruntled employees.

Computer viruses, or the threat of unleashing such programs, could also be used during an industrial dispute as part of ‘electronic picketing’ or ‘negotiation’.

Computer Clubs

In 1989 the Chaos Computer Club in Hamburg, Germany, devoted an entire private congress to the subject of computer viruses. Chaos have also released a ‘Virus Construction Set’ for the Atari ST and a diskette containing ‘nightmare software’. A Chaos spokesman when asked what motivated the virus writer answered “You feel something wonderful has happened. You have created something which lives. You don’t know where it will go what it will do, and how it will live on”.

Other clubs have a history of creating viruses. The Swiss Crackers Association (SCA) released a virus for the Amiga which displays:

Something Wonderful has happened. Your Amiga is alive...

Terrorist, Criminals and Politically Motivated Groups

There is no evidence, so far, that terrorist organisations have been involved in writing or disseminating computer viruses. However, the Italian Red Brigade’s manifesto specifically includes destruction of computer systems as an objective, which should be done by means other than explosive or arson. In France, there is even an underground organisation dedicated to destroying information systems - CLODO - ‘the committee to liquidate or neutralise computers’.

The Jerusalem virus was reported in the New York Times as being written “as a weapon of political protest”, but several researchers (including Yisrael Radai of the Hebrew University who is the recognised authority on the Israeli Viruses) dispute this. The evidence to support this theory was that the original trigger date of the virus - May 13th 1988 - was the fortieth anniversary of the last day the Palestine had existed under British mandate. This virus is still referred to as the ‘PLO’ virus.

Computer viruses developed by terrorists and organised crime syndicates will probably make an appearance once their destructive capacity is realised and, significantly, once their potential as tools to commit fraud becomes more obvious. Computer viruses are an ideal way to cause disruption in order to conceal computer fraud. Rumours persist that the original Datacrime virus had been developed and circulated for criminal or terrorist purposes. It certainly caused a national panic among Dutch computer users in October of last year.

Future extortion bids, probably more targeted than that attempted by the ‘PC Cyborg Corporation’ with their AIDS Information Diskette (VB, January 1990), will increasingly use destructive computer programs.

An underlying political motivation can be discerned in the on-screen messages of certain viruses - notably the Dukakis and Peace viruses on the Macintosh, and the Fu Manchu and New Zealand viruses on the PC.

More significantly, last year’s threats involving the unleashing of computer viruses at poll tax offices in Scotland demonstrate an increasing awareness of the potential of these programs as political weapons.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.