[comp.os.vms] trojan horse rumor

SHECTMAN%SETI@ICDC.LLNL.GOV (06/02/88)

From:	ICDC::IN%"hatfield@ati.tis.llnl.GOV"  1-JUN-1988 09:23
To:	oberman@icdc.llnl.gov, shectman@icdc.llnl.gov
Subj:	Fw: There is a program being passed around via ARPAnet...

Return-path: hatfield@ati.tis.llnl.GOV
Received: from ati.tis.llnl.gov by icdc.llnl.gov via TCP; Wed Jun  1 09:18 PDT
Received: by ati.tis.llnl.gov (5.51++/1.9/TIS) id AA25697; Wed, 1 Jun 88
 09:16:43 PDT
Date: Mon, 23 May 88 08:17:24 EDT
From: iberall%rana.usc.edu@oberon.usc.EDU
Subject: Fw: There is a program being passed around via ARPAnet...
Subject: Fw: There is a program being passed around via ARPAnet...
Subject: There is a program being passed around via ARPAnet...
To: sappho@bloom-beacon.mit.EDU
Resent-date: Wed Jun 1 09:16:34 1988
Resent-date: Fri May 27 16:26:57 1988
Resent-from: hatfield@ati.tis.llnl.GOV
Resent-from: rhodes@ati.tis.llnl.GOV
Resent-to: oberman@icdc.llnl.gov, shectman@icdc.llnl.gov
Resent-to: plseca!ruel, plseca!kelly, plseca!kinnard, dgrubb@ati.tis.llnl.gov,
 hatfield@ati.tis.llnl.gov, farrell@ati.tis.llnl.gov, garner@ati.tis.llnl.gov,
 lammers@lognet1.arpa, tittle@wpdis01.arpa, vosti@ati.tis.llnl.gov,
 frank@ati.tis.llnl.gov, plseca!rozanski, plseca!iffland,
 farrell@ati.tis.llnl.gov, abrahams@ati.tis.llnl.gov, pon@ati.tis.llnl.gov,
 grins@ati.tis.llnl.gov, donalds@ati.tis.llnl.gov, ckm@ati.tis.llnl.gov,
 carlson@ati.tis.llnl.gov, tmac@ati.tis.llnl.gov, plseca!bennett,
 agarcia@ati.tis.llnl.gov, ker@ati.tis.llnl.gov, daniel@ati.tis.llnl.gov,
 bae@ati.tis.llnl.gov, spengler@ati.tis.llnl.gov, kehres@ati.tis.llnl.gov,
 mcb@ati.tis.llnl.gov, lee@ati.tis.llnl.gov, jazz@ati.tis.llnl.gov
Resent-Message-Id: <8806011616.AA25697@ati.tis.llnl.gov>
Message-Id: <9301.8805261613@nap1.arpa>

(forwarding comment)
--------------------------
fyi -- Chip
--------------------------
(original message follows)

There  is a program being passed around via ARPAnet (and also some other
computer networks) called "turkey".

The instructions that are sent with the program say that when
compiled and run the program will draw a nice picture
of a turkey.  I have been informed that the program is a Trojan Horse.  It
does not draw a turkey, but it does erase all of the unprotected
files in your directory.  You might want to pass this information along to
people you know who use the networks.

aad@stpstn.UUCP (Anthony A. Datri) (06/12/88)

I don't know if it's related, but I've got a *file* here full of vt100
codes that draws a turkey running into an oven.
-- 
@disclaimer(Any concepts or opinions above are entirely mine, not those of my
	    employer, my GIGI, or my 11/34)
beak is								  beak is not
Anthony A. Datri,SysAdmin,StepstoneCorporation,stpstn!aad