| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Virus Strategies |
hello.
though i am concerned to talk about strategies that wiruses could use, i
write this mail because some of you, even the ones with a lot of technical
understanding of os/2 and experience in programming, seem to have quite
wrong ideas of how a virus would have to work under os/2 in order to do
damage.
of course we (may (as i don't know and don't mind)) have this problem with
direct writing to disk, which is (not) possible as some of you say. well:
why should one go that way? i would leave it aside.
amiga users will certainly remember the virus (forgot it's name) that only
looked up the name of the first program executed in startup-sequence
(startup.cmd in os/2) and simply copied the original program into a system
subdirectory, giving it a name that could not be seen by a "dir". then it
replaced the original file with itself and was started at boot time. i
don't quite remember how it managed to start the original program
afterwards though.
it renamed the original file to this "invisible" name because the amiga
operating system was that straight forward and small that after a few
months of close work with it a normal person could tell which is an
original os file and which is not and thus the virus would have been
detected much more easily. under os/2 though one would not have to mind
too much about this as the os consists (on my machine) of about 1300 files
and directories (!) which take up about 39mb (!) thus that the chance of
being visually detected is rather low.
imagine a guy like me: testing and having a look at ca. 2 programs per day
(os/2 shareware, freeware, pd, etc. which arrives via mailbox and file-
net). how about one of this files being a trojan horse which does a rather
dummy task (which must be appealing to others as well, maybe a little
tetris game...) but which copies a special device driver into one of os/2s
directories and entering it into config.sys as well, maybe using a good
sounding name like "KBDBASE2.SYS" and thus installing at next bootup the
viral device driver.
this could be done for device driver and programs. a "good" point
would be
to look up config.sys and startup.cmd for programs being started but not
running at the moment. i have a program that changes the mouse tracking of
os/2 (because via notebook no acceptable setting could be achieved) which
could be infected or replaced easily because it is run only to set certain
values and then leaves memory so that its original file is not locked.
additionally the trojan horse could look up the startup drawer.
thus you could have the virus being installed and sitting there for months
and after a certain time it could trash the system via valid system
commands like del etc. it could even overwrite files before it deletes
them (why even delete them at all, simply fill them with zeroes) so that
the files original contents cannot be restored (except from a backup).
although the above is not a virus which is a stand-alone program that
infects other programs in order to infect other computers it could still
be rather succesful, depending on its dummy/trojan horse part.
you see, it does not need deep level programming skills or whatever,
simply use what is there and what is common.
of course the above would be wiped off very easily, once detected, but
until that time many other computers could already have been infected.
thus damage can be achieved, though with the above strategy only rather
limited, but it can be done.
the user is the weakest point of a computer system, right? and os/2 users
being rather used to shareware, freeware and pd could be a good target for
such a strategy.
bye bye
ps: some of the amiga viruses did very amazing things, quite interesting
if i think about it now...but most of them not being possible under os/2
(hooking into the system and instead of showing the boot sector (via anti
virus program), showing a sector which is clean and neat...overwriting the
boot sector went the same: the "dummy" sector was overwritten only (which
of course can be rather treacherous if the written bootsector contained a
little bootup program which wouldn't be loaded at boot time...))
## anhuth{at}elbe.clipper.de ##
--- CrossPoint v3.0 R
* Origin: Warp: Schau es dir wenigstens einmal an. (2:240/5033.11)SEEN-BY: 12/2442 620/243 624/50 632/348 640/820 690/660 711/409 410 413 430 SEEN-BY: 711/807 808 809 934 942 949 712/353 515 713/888 800/1 @PATH: 240/5033 5002 5500 396/1 3615/50 229/2 12/2442 711/409 808 809 934 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.