[comp.virus] Trojan AIDS: the AIDS program

brunnstein@rz.informatik.uni-hamburg.dbp.de (Klaus Brunnstein) (12/20/89)

The AIDS diskette contains 2 programs,
              INSTALL.EXE   146.188 Bytes   9-28-89     4:28p
              AIDS.   EXE   172.562 Bytes   8-07-89    10:28p

the first of which is described by J.McAfee and others (INSTALL.EXE and it's
installed versions REM,SHARE) in VIRUS-L; this is the Trojan horse.

The AIDS-program itself contains a question/answering session with AIDS-
related question, where a `risk' (on 7 levels) is computed for the specific
answers. While most other groups are analysing the INSTALLed Trojan horse,
one group at Virus Test Center Hamburg actually analyses the AIDS program.

We have run several sessions, and we regard the program as *not very
intelligent* from the Informatics standpoint, and *not highly reliable*
from the medical standpoint (we will prove this with some medical experts; we
received 4 copies from specialists in immunology, and 3 more copies from
banks etc).

The AIDS program works rather linearly; the dialogue is done with simple
multiple choices, where the 1st option is alwys HELP-text. If you analyse the
HELP texts, they are not very specific (many of them may have been generated
from an ordinary lexikon). In section 1, BACKGROUND INFORMATION is gathered,
e.g. residence country, sex, age (in 9 clusters), ancestors origin continent,
sexual behaviour (heterosexual, no sexual experience, homosexual or bisexual),
and number of sex partners since 1980 (in 8 clusters from 0 to 100+)are asked.

In section 2, MEDICAL HISTORY is examined, e.g. how many blood transfusions
since 1980, active tuberculosis, drug injection, sexually transmitted
diseases, sexual habits (use of condom..). For some positive answers,
there may be additional details asked for. No mechanism is visible whcih
safeguards the extensive personal data; on the other side, no data are
gathered which may be used to authenticate a person and relate their name
with the data gathered.

After an evaluation procedure (less than 1 minute on an AT), `you' are
assigned to one of seven Levels of AIDS Risk (`no risk, very low risk,
low risk, medium risk, high risk, very high risk, extremely high risk).
Depending on the list of answers, a PERSONAL ADVICE is given, e.g. stating
`Your risk of exposure to the AIDS virus is low but presently increasing..',
suggesting to use condoms, etc. Finally, you are asked to input YOUR
COMMENTS (`Use the computer like a typewriter. Type anything that comes to
your mind ... The computer will then analyze your remarks and respond to you
with further comments..'). The answers are rather unspecific.

Based on some experiments (with more systematic testing to be done
after having reverse-engineered the code), my best estimation is, that
the question-answering is done in typical BASIC style, and that the
risk evaluation function is only very rudimentary (we received a 'low
risk' for a young female drug addict). The personal advice seems to be
programmed from a few types of answers, and the analysis of Your
Comments fails with even simple, AIDS-related questions.

The 'loose' relation between INSTALL/REM/SHARE and AIDS (probably influencing
the catastrophic counter, evidently initialised at 90 and decremented during
bootup) will very probably allow to use the INSTALL process also *in connection
with other 'interesting programs'*. With so may diskettes distributed, we may
face similar (and maybe more serious) threats. I therefore appreciate
J.McAfee's remark that he has included his ANTI-Trojan in his ANTIVIRUS tool.
Though mixing up an Antivirus Tool with Anti-Trojan functions may produce
new problems (e.g. misunderstanding the respective threats and the limitations
of such tools), I suggest that also other antivirus tools should contain a
diagnostic featrue for Trojan AIDS.

Evaluating the given situation, I conclude that the business procedure (the
e.g. distribution of diskettes) was professional, and that the Trojan horses
mechanisms were rather intelligent, though some parts of the INSTALL/REM/SHARE
are primitively linear programmed, e.g. the `encryption' part. The AIDS
program is of neither good programming nor medical standard.

Klaus Brunnstein
- -----------------------------------------------------------------------
PostAdress:      Prof.Dr. Klaus Brunnstein
            Faculty for Informatics, Univ.Hamburg
                    Schlueterstr.70
                   D 2000 Hamburg 13
           Tel: (40) 4123-4158 / -4162 Secr.
ElMailAdr:   Brunnstein@RZ.Informatik.Uni-Hamburg.dbp.de
FromINTERNET:Brunnstein%RZ.Informatik.Uni-Hamburg.dbp.de@Relay.CS.Net
FromBITNET:  Brunnstein%RZ.Informatik.Uni-Hamburg.dbp.de@DFNGate.Bitnet
FromUUCP:    brunnstein%rz.informatik.uni-hamburg.dbp.de@unido.uucp
- -----------------------------------------------------------------------