02/06/90 - these guys, i believe, also had an anti-virus program BEFORE most people believed there were viruses --------------------------------------------------------- Copyright (c) 1988,90 Rob Rosenberger & Ross M. Greenberg Page 1 of 7 Computer Virus Myths by Rob Rosenberger with Ross M. Greenberg A number of myths have popped up recently about the threat of computer "viruses". There are myths about how widespread they are, how dangerous they are, and even myths about what a computer virus really is. We'd like the facts to be known. The first thing to learn is that a virus is a malicious programming technique that falls in the realm of "Trojan horses." All viruses are Trojan horses, but few Trojan horses can be called a virus. That having been said, it's time to go over the terminology we use when we lecture: BBS Bulletin Board System. If you have a modem, you can call a BBS and leave messages, transfer computer files back & forth, and learn a lot about computers. (What you're reading right now, for example, most likely came to you from a BBS.) Bug an accidental flaw in the logic of a program that makes it do things it shouldn't really be doing. Programmers don't mean to put bugs in their program, but they always creep in. Programmers tend to spend more time debugging their programs than they do writing them in the first place. Inadvertent bugs have caused more data loss than all the viruses combined. Hacker someone who really loves computers and who wants to push them to the limit. Hackers have a healthy sense of curiosity: they try doorknobs just to see if they're locked, and they tinker with a piece of equipment until it's "just right." The computer revolu- tion itself is a result of hackers. Shareware a distribution method for quality software available on a "try before you buy" basis. You pay for the program only if you find it useful. Shareware programs can be downloaded from BBSs and you are encouraged to give evaluation copies to friends. Many shareware applications can rival the power of off-the-shelf counterparts, at just a fraction of the price. (You must pay for the shareware you continue to use -- otherwise you're stealing software.) Trojan horse a generic term describing a set of computer instructions purposely hidden inside a program. Trojan horses tell a program to do things you don't expect it to do. The term comes from a historic battle in which the ancient city of Troy was offered the "gift" of a large wooden horse that secretly held soldiers in its belly. The Trojans rolled it into their fortified city.... Computer Virus Myths Page 2 of 7 Virus a term for a very specialized Trojan horse that can spread to other computers by secretly "infecting" programs with a copy of itself. A virus is the only type of Trojan horse which is contagious, like the common cold. If it doesn't meet this definition, then it isn't a virus. Worm a term similar to a Trojan horse, but there is no "gift" involved. If the Trojans had left that wooden horse outside the city, they wouldn't have been attacked. Worms, on the other hand, can bypass your defenses without having to deceive you into dropping your guard. An example is a program designed to spread itself by exploiting bugs in a network software package. Worms are usually released by someone who has normal access to a computer or network. Wormers the name given to the people who unleash destructive Trojan horses. Let's face it, these people aren't angels. What they do hurts us. They deserve our disrespect. Viruses, like all Trojan horses, are purposely designed to make a program do things you don't expect it to do. Some viruses are just an annoyance, perhaps only displaying a "Peace on earth" greeting. The viruses we're worried about are designed to destroy your data (the most valuable asset of your computer!) and waste your valuable time in recovering from an attack. Now you know the difference between a virus and a Trojan horse and a bug. Let's get into some of the myths: "All purposely destructive code comes as a virus." Wrong. Remember, "Trojan horse" is the general term for purposely destructive code. Very few Trojan horses are actually viruses. "Viruses and Trojan horses are a recent phenomenon." Trojan horses have been around since the first days of the computer. Hackers toyed with viruses in the early 1960s as a form of amusement. Many different Trojan horse techniques were developed over the years to embezzle money, destroy data, etc. The general public wasn't aware of this problem until the IBM PC revolution brought it out into the spotlight. Banks were still covering up computerized embezzlements six years ago because they believed they'd lose customers if word got out. "Viruses are written by hackers." Yes, hackers have written viruses. So has a computer magazine pub- lisher. Trojan horses were written for decades by middle-aged men wearing business suits. We call people "wormers" when they abuse their knowledge of computers. You shouldn't be afraid of hackers just because they know how to write viruses. This is an ethics issue, not a technology issue. Hackers know a lot about computers; wormers abuse that knowledge. Hackers (as a whole) got a bum rap when the mass media corrupted the term. "Computer viruses are reaching epidemic proportions." Wrong again. Viruses may be spread all over the planet but they won't take over the world. There are only about sixty or so known "strains" at this time and some of them have been completely eliminated. Your chances Computer Virus Myths Page 3 of 7 of being infected are slim if you take the proper precautions. Yes, it's still safe to turn on your computer! "Viruses could destroy all the files on my disks." Yes, and a spilled cup of coffee will do the same thing. If you have adequate backup copies of your data, you can recover from any virus/coffee attack. Backups mean the difference between a nuisance and a disaster. It is safe to presume there has been more accidental loss of data than loss by viruses and Trojan horses. "Viruses have been documented on over 400,000 computers." This statistic comes from John McAfee, a self-styled virus fighter who seems to come up with all the quotes the media love to hear. If you assume it takes five minutes to adequately document a viral infection, you have to wonder where Mr. McAfee got almost four man-years to document a problem which is less than four years old. We further assume his statistics include every floppy disk that was infected with a virus, as well as all of the computers participating in the Christmas & InterNet worm attacks. (Worms cannot be included in virus infection statistics.) The press doesn't really understand computer crimes, so they tend to call almost any- thing a virus. "Viruses can be hidden inside a data file." Data files can't wreak havoc on your computer -- only an executable program file can do that. If a virus were to infect a data file, it would be a wasted effort. But let's be realistic: what you think is 'data' may actually be an executable program file. For example, batch files are text files, yet MS-DOS treats them like a program. "Most BBSs are infected with viruses." Here's another scary myth drummed up in the big virus panic. Very few BBSs are really infected. It's possible a dangerous file may be available on a BBS, but that doesn't mean the BBS itself is infected. If a BBS were knowingly infected with a virus, it wouldn't stay open too long after word got out, would it? "BBSs and shareware programs spread viruses." "The truth," says PC Magazine publisher Bill Machrone, "is that all major viruses to date were transmitted by [retail] packages and private mail systems, often in universities." (PC Magazine, October 11, 1988.) The Peace virus, for example, made its way into a retail product sold to thousands of customers. Machrone goes on to say that "bulletin boards and shareware authors work extraordinarily hard at policing themselves to keep viruses out." Reputable sysops check every file for Trojan horses; nation- wide sysop networks help spread the word about dangerous files. You should be wary of the software you get from BBSs, that's true -- but you should also be wary of the software you get from store shelves. (By the way, some stores now have return policies for software. Do you know for sure you were the first person to use those master disks?) "My computer could be infected if I call an infected BBS." BBSs can't write information on your disks -- that's handled by the communications software you use. You can only transfer a dangerous file if you let your software do it. (This might be different if your computer is Computer Virus Myths Page 4 of 7 hooked up to a network, but it requires special hardware & software.) And there is no "300bps subcarrier" that lets a virus slip through a high speed modem. That rumor was started by a joker named Mike RoChenle (IBM's "micro channel" PS/2 architecture, get it?) who left a techy-joke message on a public BBS. Unfortunately, a few highly respected journalists were taken in by this joke. "My files are damaged, so it must have been a virus attack." It also could have been caused by a power flux, or static electricity, or a fingerprint on a floppy disk, or a bug in your software, or perhaps a simple error on your part. Power failures and spilled cups of coffee have destroyed more data than all the viruses combined. "Donald Burleson was convicted of releasing a virus." A recent Texas computer crime trial was hailed all over the country as a "virus" trial. Donald Burleson was in a position to release a complex, destructive worm on his employer's mainframe computer. This particular worm couldn't spread to other computers, so it couldn't possibly have been a virus. Davis McCown, the prosecuting attorney, claims he "never brought up the word virus" in the trial. So why did the media call it one? 1. David Kinney, an expert witness testifying for the defense (oddly enough), claimed he believed Burleson unleashed a virus. The prosecuting attorney didn't argue the point and we don't blame him -- Kinney's bizarre claim probably helped sway the jury to convict Burleson, and it was the defense's fault for letting him testify. 2. McCown gives reporters the facts behind the case and lets them come up with their own definitions. The Associated Press and USA Today, among others, used such vague definitions that any program could be called a virus. If we applied their definitions to the medical world, we could safely claim penicillin is a biological virus (which is, of course, absurd). 3. McCown claims many quotes attributed to him "are misleading or fab- ricated" and identified one in particular which "is total fiction." Reporters sometimes print a quote out of context, and McCown apparently fell victim to it. (It's possible a few bizarre quotes from David Kinney or John McAfee were accidentally attributed to McCown.) "Robert Morris Jr. released a benign virus on a defense network." It may have been benign, but it wasn't a virus. Morris, the son of a chief computer scientist at the National Security Agency, allegedly became bored and took advantage of a bug in the Defense Department's networking software. That tiny bug let him send a worm through the network. Among other things, Morris's "InterNet" worm was able to send copies of itself to other computers in the network. Due to some bugs in the worm module itself, the network became clogged in a matter of hours. The press originally called it a "virus," like it called the Christmas worm a virus, because it spread to other computers. Yet it didn't infect any computers. A few notes: 1. Reporters finally started calling it a worm (a year after the fact), but only because lawyers in the case were constantly referring to it that way. The difference between a worm and a virus is subtle, but profound. Computer Virus Myths Page 5 of 7 2. This worm worked only on Sun-3 & Vax computers which run a UNIX operating system and were specifically linked into the InterNet network at the time. 3. The 6,200 affected computers cannot be counted in any virus infection statistics (they weren't infected). 4. It cost way less than $96 million to clean up the attack. An official Cornell University report claims the group behind that wild estimate "was probably serving itself" in an effort to drum up business. People familiar with the case estimated the final figure to be under $1 million. 5. Yes, Morris could easily have added some infection code to make it a worm/virus if he'd had the urge. 6. The network bug exploited in the attack has since been fixed. 7. Morris went to trial for launching the InterNet worm and was recently handed a federal conviction. "Viruses can spread to all sorts of computers." All Trojan horses are limited to a family of computers, and this is especially true for viruses. A virus designed to spread on IBM PCs cannot infect an IBM 4300-series mainframe, nor can it infect a Commodore C64, nor can it infect an Apple MacIntosh. "My backups will be worthless if I back up a virus." No, they won't. Let's suppose a virus does get backed up with your files. You can restore important documents and databases without restoring an infected program. You just reinstall programs from master disks. "Anti-virus software will protect me from viruses." There is no such thing as a foolproof anti-virus program: Trojan horses and viruses can be designed to bypass them. Anti-virus products can also be tricky to use at times. You could make a crucial mistake in deciding whether to let a "flagged" event occur. Your first line of defense should always be a good set of backups. Anti-virus software is a good second line of defense. "Read-only files are safe from virus infections." This is a common myth among IBM PC users, and it has even been published (erroneously) in some computer magazines. Supposedly, you can protect yourself by using the DOS ATTRIB command to set the read-only attribute on all your program files. Unfortunately, ATTRIB is a piece of software -- and what it can do, a virus can undo. The ATTRIB command seldom halts the spread of viruses. We hope this dispels the many computer virus myths. Viruses DO exist, many of them will destroy files, and all of them can spread to other computers. But you can defend yourself with a cool head and a good set of backups. The following guidelines can shield you from Trojan horses and viruses. They will lower your chances of being infected and raise your chances of recovering from an attack. Computer Virus Myths Page 6 of 7 1. Set up a procedure to regularly back up your files, and follow it religiously. Consider purchasing a user-friendly program to take the drudgery out of this task. (There are plenty to choose from.) 2. Rotate between at least two sets of backups for better security (use set #1, then set #2, then set #1...). The more sets you use, the better protected you are. Many people take a "master" backup of their entire hard disk, then take "incremental" backups of those files which changed since the last time they backed up. Incremental backups might only require five minutes of your time each day. 3. Download files only from reputable BBSs where the sysop checks every program for Trojan horses. If you're still afraid, consider getting programs from a BBS or "disk vendor" company which gets them direct from the authors. 4. Let newly uploaded files "mature" on a BBS for one or two weeks before you download it (others will put it through its paces). 5. Consider using a program that creates a unique "signature" of all the programs on your computer. Run this program once in awhile to see if any of your applications have been modified -- either by a virus or by a stray gamma ray. 6. DON'T PANIC if your computer starts acting weird. It may be a virus, but then again maybe not. Immediately turn off all power to your computer and disconnect it from any local area networks. Reboot from a write-protected copy of your master DOS disk. Do NOT run any programs on a "regular" disk (you might activate a Trojan horse). If you don't have adequate backups, try to bring them up to date. Yes, you might back up a virus as well, but it can't hurt you if you don't use your normal programs. Set your backups off to the side. Only then can you safely hunt for problems. 7. If you can't figure out what's wrong and you aren't sure what to do next, turn off your computer and call for help. Consider calling a local computer group before you call for an expert. If you need a professional, consider a regular computer consultant first. Some "virus removal experts" sell their services for a price that far exceeds their actual value. 8. [This should only be considered as a last resort.] If you can't figure out what's wrong and you are sure of yourself, execute both a low-level and a high-level format on all your regular disks. Next, carefully re- install all software from the master disks (not from the backups). Then, carefully restore only the data files (not the program files) from your backup disks. We'd appreciate it if you would mail us a copy of any Trojan horse or virus you discover. (Be careful that you don't damage the data on your hard disk while trying to do this!) Include as much information as you can and put a label on the disk saying it contains a malicious program. Send it to Ross M. Greenberg, 594 Third Avenue, New York, NY 10016. Thank you. Computer Virus Myths Page 7 of 7 Ross M. Greenberg is the author of both shareware and retail virus detection programs. Rob Rosenberger is the author of various phone bill analysis applications. (Products are not mentioned by name because this isn't the place for advertisements.) They each write for national computer magazines. These men communicated entirely by modem while writing this treatise. Copyright (c) 1988,90 Rob Rosenberger & Ross M. Greenberg Rosenberger can be reached electronically on CompuServe as [74017,1344], on GEnie as R.ROSENBERGE, and through various national bulletin board linkups. Greenberg can be reached on MCI and BIX as `greenber', on UseNet as `greenber@utoday.uu.net', and on CompuServe as [72461,3212]. You may give copies of this to anyone if you pass it along in its entirety. Publications may reprint this for free if they obtain prior written per- mission. Write to Rob Rosenberger, P.O. Box 643, O'Fallon, IL 62269.