[comp.sys.apple] CyberAIDs

PGOETZ@LOYVAX.BITNET (07/30/88)

    Well, I'm sorry I didn't post anything sooner.  Fact is, the author
of CyberAIDS (an unsavory fellow who calls himself The Plague) gave a
complete description of it in the Summer 1988 issue of 2600.  (Not, of course,
that I am in any way associated with 2600.)
    First he spends two pages explaining why he writes viruses. Essentially, for
 fun
for fun. First he says that inventing a virus is nothing to be proud of,
and then he goes on to say that most people don't appreciate how difficult they
are to write (they're not; I've disassembled one; he should try writing an
operating system!) and rejoices that viruses have such wide audiences.
He also claims that people who do not protect themselves deserve what they get.
Here's a quote: "I was asked whether I had any moral feelings about viruses,
or whether I thought that they were wrong, or evil, or whatever. My feelings
are the following: I don't care one way or the other. If people's data are
destroyed, then so be it. If people are stupid enough to accept pirated
software [I'm sure he would NEVER do that!], then they deserve to be
punished." (Also for downloading those evil public domain programs.)

So here's what Cyber AIDS does when it runs:

A. INITIALIZE
1. Find current location in memory.
2. Relocate to predefined area.
3. Make sure DOS is ready to accept system calls.
4. Move original application header (6 bytes) back to original memory.
  (CyberAIDS installs a hook at the beginning of the application to call
  itself.)
B. SEARCH
  1. Choose random disk volume.
     a. Make sure it's not write-protected.
     b. Make sure it's on-line.
  2. Increment disk counter (ambiguous about which disk) & destroy disk
     if it's time.
  3. Check for enough space on disk.
  4. Choose candidate file: Must be system or applicatiobn file,
    must not be infected, & must be small enough so both file & virus fit
    in memory at the same time.
C. INFECT
I'm not going into the details; important I
is that it puts a hook in the 1st 6 bytes of the file.
D. DESTROY
1. Lock out keyboard & reset.
2. Destroy: Find all disk devices. Wipe out the directory block of each
  disk. Wipe out each key block for each file in each directory block.
3. Present boneheaded message saying how KOOL you, the virus-writer, are.
4. Jump back to application start as if nothing had happened (note virus is
STILL RESIDENT after striking.)

Note that a file infected is divided like this:
Jump Code ! Application ! Original header ! Viral code
then End of File.

I've provvided this information because I think knowledge is the best
defense. If anyone uses this information to write a virus, they had damn well
better hope I don't find out about it!

gwyn@brl-smoke.ARPA (Doug Gwyn ) (08/01/88)

In article <8807302311.aa12460@SMOKE.BRL.ARPA> PGOETZ@LOYVAX.BITNET writes:
[description of CyberAIDS structure and operation]

Thanks for the info.  I think the greatest service this does is to show
how utterly trivial a virus is.  Anyone who derives intellectual
satisfaction from creating one is a sad case, indeed.