MMD > Archives > April 1996 > 1996.04.02 > 06Prev  Next


PKZIP300 Virus Alert
By Mike Walter

Dear Jody,

I just received a virus alert this morning concerning a new trojan horse
virus with the name PKZIP300.ZIP which will affect hard disks and modems
at 14.4 and higher. "This is an extremely destructive virus and there is
not yet a way of cleaning up this one".

I don't know if it's appropriate for the group, but better to be safe than
sorry!!!   Best wishes. Mike Walter

 [ Editor's Note:   This is a little off the topic, but a number of our
 [ readers are just learning how to use the Internet, so a little "help"
 [ isn't necessarily a bad thing.  There have been a lot of virus "hoaxes"
 [ on the 'Net and I'm not certain what the story is on this one.  This is,
 [ however, quite old.  I did a "Web Search" on "PKZIP300" and got five
 [ hits.  The most interesting one is below, which documents several virus
 [ hoaxes and seems to indicate that the PKZIP300 one is _REAL_.  Ugh!
 [ Jody

CIAC Notes, #95-10, June 16, 1995

----------------------------------------------------------------------------

CIAC

CIAC, the Computer Incident Advisory Capability, is the computer security
incident response team for the U.S. Department of Energy. CIAC is located at
the Lawrence Livermore National Laboratory in Livermore, California. CIAC is
also a founding member of FIRST, the Forum of Incident Response and Security
Teams, a global organization established to foster cooperation and
coordination among computer security teams worldwide.

----------------------------------------------------------------------

-----BEGIN PGP SIGNED MESSAGE-----

•           ___  __ __    _     ___           __  __ __   __   __
          /       |     /_\   /       |\ |  /  \   |    |_   /_
          \___  __|__  /   \  \___    | \|  \__/   |    |__  __/

•Number 95-10                                               June 16, 1995

This edition of CIAC NOTES includes:

    1) PKZIP300 Trojan
    2) Logdaemon/FreeBSD vulnerability in S/Key
    3) EBOLA Virus Hoax
    4) Caibua Virus

Please send your comments and feedback to ciac@llnl.gov.

•  $-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$
  $ Reference to any specific commercial product does not necessarily   $
  $ constitute or imply its endorsement, recommendation or favoring by  $
  $ CIAC, the University of California, or the United States Government.$
  $-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$

•=========================================================¶
1) PKZIP Trojan¶
=========================================================

A Trojaned version of the popular, DOS file compression utility PKZIP
is circulating on the networks and on dial-up BBS systems. The
Trojaned files are PKZ300B.EXE and PKZ300B.ZIP. CIAC verified the
following warning from PKWARE:¶
- -------------------------------------------------------------------------
  Some joker out there is distributing a file called PKZ300B.EXE and
  PKZ300B.ZIP. This is NOT a version of PKZIP and will try to erase your
  harddrive if you use it.  The most recent version is 2.04G.  Please
  tell all your friends and favorite BBS stops about this hack.

  Thank You.

  Patrick Weeks Product Support PKWARE, Inc.¶
- -------------------------------------------------------------------------¶
PKZ300B.EXE appears to be a self extracting archive, but actually
attempts to format your hard drive. PKZ300B.ZIP is an archive, but the
extracted executable also attempts to format your hard drive. While
PKWARE indicated the Trojan is real, we have not talked to anyone who
has actually touched it. We have no reports of it being seen anywhere
in the DOE.

According to PKWARE, the only released versions of PKZIP are: 1.10,
1.93, 2.04c, 2.04e and 2.04g. All other versions currently circulating
on BBS's are hacks or fakes. The current version of PKZIP and PKUNZIP
is 2.04g.

The current version of PKZIP is available in the CIAC Archive, or
directly from PKWARE.

- From CIAC:   ftp://ciac.llnl.gov/pub/ciac/util/pc/pkz204g.exe
             BBS: 510-423-4753, 510-423-3331
- From PKWARE: ftp://pkware.com/pub/pkware/pkz204g.exe
             BBS: 414-354-8670

Note: Don't forget to pay your shareware fees.

==========================================================¶
2) Logdaemon/FreeBSD vulnerability in S/Key¶
==========================================================

The following was released by Wietse Venema through a vendor bulletin
VB-95:04.venema (ftp://cert.org:/pub/cert_bulletins/VB-95:04.venema).
Wietse Venema, who urges you to act on this information as soon as
possible.  Please contact Wietse Venema if you have any questions or
need further information.

>A vulnerability exists in my own S/Key software enhancements.  Since
>these enhancements are in wide-spread use, a public announcement is
>appropriate.  The vulnerability affects the following products:
>
>        FreeBSD version 1.1.5.1
>        FreeBSD version 2.0
>        logdaemon versions before 4.9
>
>I recommend that users of this software follow the instructions given
>below in section III.
>
>------------------------------------------------------------------------
>
>I.   Description
>
>     An obscure oversight was found in software that I derived from
>     the S/Key software from Bellcore (Bell Communications Research).
>     Analysis revealed that my oversight introduces a vulnerability.
>
>     Note: the vulnerability is not present in the original S/Key
>     software from Bellcore.
>
>II.  Impact
>
>     Unauthorized users can gain privileges of other users, possibly
>     including root.
>
>     The vulnerability can be exploited only by users with a valid
>     account. It cannot be exploited by arbitrary remote users.
>
>     The vulnerability can affect all FreeBSD 1.1.5.1 and FreeBSD 2.0
>     implementations and all Logdaemon versions before 4.9. The problem
>     exists only when S/Key logins are supported (which is the default
>     for FreeBSD). Sites with S/Key logins disabled are not vulnerable.
>
>III. Solution
>
>     Logdaemon users:
>     ================
>        Upgrade to version 4.9
>
>            URL ftp://ftp.win.tue.nl/pub/security/logdaemon-4.9.tar.gz.
>            MD5 checksum 3d01ecc63f621f962a0965f13fe57ca6
>
>        To plug the hole, build and install the ftpd, rexecd and login
>        programs. If you installed the keysu and skeysh commands, these
>        need to be replaced too.
>
>     FreeBSD 1.1.5.1 and FreeBSD 2.0 users:
>     ======================================
>        Retrieve the corrected files that match the system you are
>        running:
>
>            URL ftp://ftp.cdrom.com/pub/FreeBSD/CERT/libskey-1.1.5.1.tgz
>            MD5 checksum bf3a8e8e10d63da9de550b0332107302
>
>            URL ftp://ftp.cdrom.com/pub/FreeBSD/CERT/libskey-2.0.tgz
>            MD5 checksum d58a17f4216c3ee9b9831dbfcff93d29
>
>        Unpack the tar archive and follow the instructions in the
>        README file.
>
>     FreeBSD current users:
>     ======================
>        Update your /usr/src/lib/libskey sources and rebuild and
>        install libskey (both shared and non-shared versions).
>
>        The vulnerability has been fixed with FreeBSD 2.0.5.
>
>-------------------------------------------------------------------------
>
>S/KEY is a trademark of Bellcore (Bell Communications Research).
>
>Wietse Venema appreciates helpful assistance with the resolution of
>this vulnerability from CERT/CC; Rodney W.  Grimes, FreeBSD Core Team
>Member; Guido van Rooij, Philips Communication and Processing Services;
>Walter Belgers.

CIAC would like to thank Wietse Venema and CERT/CC for the information in
section 2 of this CIAC Notes article.

==========================================================¶
3) EBOLA Virus Hoax¶
==========================================================

The following note circulated around the networks last month warning
of a new and potentially deadly computer virus. However, after chasing
down the sources of the note, CIAC has found that this is another
hoax, similar to the Good Times Hoax.

- ---------------------------  Start of HOAX --------------------------------
 ** Imporant! VIRUS ALERT **
  A message has just been recieved from DataTech Development in
  Westhills, Texas.  It reads as follows:

        "A very *Dangerous* virus has just been released, Primarily Affecting
     Unix users who have FTP'd files from a Major server in the last few days.

         This virus patches itself onto the source code of FTP, and
     automatically piggybacks on files FTP'd to another site or user where it
     again patches iself onto FTP.

         When an infected User runs ELM or PINE, the virus secretly sends one
     of several pre-written disgusting letters to the user's SysAmin,
     addressed from the unlucky victim.  The letters contain graphic appeals
     for sexual favors of a deviant nature , or explicitly describe Diane
     Sawyer bondage fantasies.

         As a result of this,  many have had their access revoked, causing
     both users and sysadmins alike much grief, and creating an administrative
     backlog for the re-instation of accounts.

         As yet, we have not been able to properly trace the distribution of
     the EBOLA Virus, so you are best advised to Disinfect any files recently
     FTP'd from a Unix based-server.

         Standby for Updates,
         |>ataTech |>evelopment."

- ---------------------------  End of HOAX ----------------------------------

As of this date, we have not been able to locate a DataTech
Development of Westhills, Texas, in fact, we have not even been able
to locate a town of Westhills, Texas. Also, we have not been able to
locate the person who uploaded this message to several newsgroups, or
anyone who has actually seen it.

Pending any evidence to the contrary, we believe that this message is a hoax.

=============================================================¶
4) Caibua Virus¶
=============================================================

The initial warnings about the outrageous behavior of the Caibua virus
(alias: Butthead, BUA-2263) made us suspect that it was another hoax,
but this one is real.

The Caibua virus was originally distributed in the package
BESTSSVR.ZIP which contained the program COOLSAVR.COM. This is
supposed to be an interesting screen saver, and does contain some
interesting graphics. While you are watching the graphics, it is
infecting two of your .COM files with the Caibua virus.

The Caibua is a relatively unsophisticated virus, of a kind that
doesn't normally spread very well in the wild. It is a non-resident
infector of *.COM files in the current directory and on the PATH. Each
time an infected program is executed, two .COM files are infected with
the virus. Because of this, slow multiplication factor, the virus does
not spread very rapidly.

If the date is May 5, 1995 or after, and the time is between 3pm and
7pm, it displays a phallic symbol marching across the screen. The
damage routines are executed after the virus has been run about 20
times. Damage consists of creating directories named "Caibua", "FUCK
YOU", "EAT SHIT" and "BITE ME!", the erasing of the first file in the
current directory on the default drive, and overwriting the system and
boot areas of the C: drive, rendering it unreadable.

Most current anti-virus scanners do not detect the Caibua virus. A
free virus scanner is available from the makers of InVircible, in:
XCAIBUA.ZIP. XCAIBUA.ZIP is available on the CIAC archive, or directly
from InVircible. Note that XCAIBUA does not detect the infection in
the original file, COOLSAVR.COM.

- From CIAC:
      ftp://ciac.llnl.gov/pub/ciac/sectools/pcvirus/xcaibua.zip
      BBS: 510-423-4753, 510-423-3331
- From INVircible:
      ftp://InVircible.com/antivirus/av-software/invircible/xcaibua.exe¶
=============================================================

- ----------------------------------¶
Who is CIAC?

CIAC is the U.S. Department of Energy's Computer Incident Advisory
Capability. Established in 1989, shortly after the Internet Worm, CIAC
provides various computer security services free of charge to
employees and contractors of the DOE, such as:

    . Incident Handling Consulting
    . Computer Security Information
    . On-site Workshops
    . White-hat Audits

CIAC is located at Lawrence Livermore National Laboratory in
Livermore, California, and is a part of its Computer Security
Technology Center. Further information can be found at CIAC. CIAC is
also a founding member of FIRST, the Forum of Incident Response and
Security Teams, a global organization established to foster
cooperation and coordination among computer security teams
worldwide. See FIRST for more details (http://www.first.org/first/).

CIAC services are available for fee to other Federal civilian agencies.
Contact Nancy Adair in the DOE Oakland Operation Office 510-637-1741.¶
- ----------------------------------¶
CIAC, the Computer Incident Advisory Capability, is the computer security
incident response team for the U.S. Department of Energy. CIAC is located
at the Lawrence Livermore National Laboratory in Livermore, California.
CIAC is also a founding member of FIRST, the Forum of Incident Response
and Security Teams, a global organization established to foster cooperation
and coordination among computer security teams worldwide.

CIAC services are available to DOE and DOE contractors, and can be
contacted at:
    Voice:    510-422-8193
    FAX:      510-423-8002
    STU-III:  510-423-2604
    E-mail:   ciac@llnl.gov

For emergencies and off-hour assistance, DOE and DOE contractor sites may
contact CIAC 24-hours a day. During off hours (5PM - 8AM PST), call the
CIAC voice number 510-422-8193 and leave a message, or call 800-759-7243
(800-SKY-PAGE) to send a Sky Page. CIAC has two Sky Page PIN numbers, the
primary PIN number, 8550070, is for the CIAC duty person, and the secondary
PIN number, 8550074 is for the CIAC Project Leader.

Previous CIAC notices, anti-virus software, pgp public key, and other
information are available from the CIAC Computer Security Archive.

   World Wide Web:       http://ciac.llnl.gov/
   Anonymous FTP:               ciac.llnl.gov (128.115.19.53)
   Modem access:  (510) 423-4753 (14.4K baud)
                  (510) 423-3331 (9600 baud)

CIAC has several self-subscribing mailing lists for electronic publications:¶
1. CIAC-BULLETIN for Advisories, highest priority - time critical information
   and Bulletins, important computer security information;¶
2. CIAC-NOTES for Notes, a collection of computer security articles;¶
3. SPI-ANNOUNCE for official news about Security Profile Inspector (SPI)
   software updates, new features, distribution and availability;¶
4. SPI-NOTES, for discussion of problems and solutions regarding the use of
   SPI products.

Our mailing lists are managed by a public domain software package called
ListProcessor, which ignores E-mail header subject lines. To subscribe
(add yourself) to one of our mailing lists, send the following request as
the E-mail message body, substituting CIAC-BULLETIN, CIAC-NOTES, SPI-ANNOUNCE
or SPI-NOTES for list-name and valid information for LastName FirstName and
PhoneNumber when sending

E-mail to       ciac-listproc@llnl.gov:
        subscribe list-name LastName, FirstName PhoneNumber
  e.g., subscribe ciac-notes O'Hara, Scarlett W. 404-555-1212 x36

You will receive an acknowledgment containing address, initial PIN, and
information on how to change either of them, cancel your subscription, or
get help.

- ------------------------------------------------------------------¶
This document was prepared as an account of work sponsored by an
agency of the United States Government.  Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, express or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, apparatus, product, or process
disclosed, or represents that its use would not infringe privately
owned rights.  Reference herein to any specific commercial products,
process, or service by trade name, trademark, manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation or favoring by the United States Government or the
University of California.  The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government or the University of California, and shall not be used for
advertising or product endorsement purposes.¶
- -------------------------------------------------------------------

End of CIAC Notes Number 95-10 95_06_16

-----BEGIN PGP SIGNATURE-----¶
Version: 2.6.2

iQCVAwUBL+G9ALnzJzdsy3QZAQHDVAP9EL5fauODXnIiNJmUCd8ieeSppi+o6HOm
X2x87cPi1FIUCoklUMYTW/FnqfU8Z3BCAmraJdBv7DwX3LtqppSzM0dHg57CKX0N
0SK7ZlPn8xxppGctPAqkG+gOFqMdVaZB7kTJ0V3+R9rAazIvIlseb7Ohmuj7FXEu
Y1vAnwRzvFI=
=XyZq¶
-----END PGP SIGNATURE-----

(Message sent Tue, 2 Apr 1996 18:09:28 -0500 (EST) , from time zone -0500.)

Key Words in Subject:  Alert, PKZIP300, Virus