Date: 21 August 1996
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
AL-96.05 AUSCERT Alert
Euthanasia/Hare/Krshna Virus Alert
21 August 1996
- -----------------------------------------------------------------------------
AUSCERT has received the following bulletin concerning a new virus that
is expected to cause damage to data on August 22 or September 22 of any
year.
The information contained has been reproduced with permission from
Leprechaun Software Pty. Ltd.
- -----------------------------------------------------------------------------
Virus Name: HDEuthanasia version 2 & 3
How to tell if you have it:
Very difficult. The virus is highly stealth (it even bypasses the BIOS
hard disk virus protection). If you have a large network you might
notice a few PCs that fail to boot from the hard drive. (This is due
to a bug in the virus infection code that destroys the occasional boot
record). You might notice files have grown by 8K using some disk
utilities or if you boot clean & do a DIR. You might notice a slight
slowing of the diskette on 95 machines.
It has been reported that the virus has been distributed in free
software available on the Internet.
What it does:
The virus is large and highly developed. The most relevant point is
that the virus will activate on the 22nd of August and the 22nd of
September any year. The virus activates when an infected program is
run or an infected PC is booted. When the virus activates it displays
a message on the screen "HDEuthanasia by Demon Emperor: Hare Krsna,
hare, hare..." and then proceeds to write random data to every sector
of the drive, starting at the end and working to the start. This
effectively destroys the entire disk contents. There is no recovery.
Note that this virus alternates between version 2 & 3 (there are NOT
2 different versions as reported elsewhere, it is the one version that
mutates itself.) Only one of the versions is destructive so only half
the machines infected (on average) will be destroyed.
Which systems are affected:
Any Intel based machine. Since the virus infects .COM files, .EXE
files, and the Master Boot Record, it is possible that DOS, Windows,
and Windows 95 systems are vulnerable, as well as Unix systems if they
were booted from an infected floppy disk.
It is unclear if OS/2 systems are vulnerable, but it is likely.
It is believed that Novell Servers are not vulnerable.
How to prevent it:
Simple fix
On or before the 21st of the month set the system date to the 23rd of
the month. On the 24th of the month set the system date to the 24th.
Better fix
Download the latest version of VCHECK from Leprechaun (at the time of
writing, this was VCHECK9.EXE).
Boot with a clean floppy, run VCHECK & follow instructions.
VCHECK is available from:
http://www.leprechaun.com.au/
under the "Utilities and Free Software" link.
Long term fix
Protect your systems with a quality anti-virus security system.
- -----------------------------------------------------------------------------
AUSCERT thanks Jack Kenyon from Leprechaun Software Pty. Ltd. and Adam
Radford from UNSW for their assistance.
- -----------------------------------------------------------------------------
The AUSCERT team have made every effort to ensure that the information
contained in this document is accurate. However, the decision to use the
information described is the responsibility of each user or organisation.
The appropriateness of this document for an organisation or individual
system should be considered before application in conjunction with local
policies and procedures. AUSCERT takes no responsibility for the
consequences of applying the contents of this document.
If you believe that your system has been compromised, contact AUSCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).
AUSCERT is located at The University of Queensland within the Prentice
Centre. AUSCERT is a full member of the Forum of Incident Response and
Security Teams (FIRST).
AUSCERT maintains an anonymous FTP service which is found on:
ftp://ftp.auscert.org.au/pub/. This archive contains past SERT and AUSCERT
Advisories, and other computer security information.
AUSCERT also maintains a World Wide Web service which is found on:
http://www.auscert.org.au/.
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 4477
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AUSCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for emergencies.
Postal:
Australian Computer Emergency Response Team
c/- Prentice Centre
The University of Queensland
Brisbane
Qld. 4072.
AUSTRALIA
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2i
Comment: Finger pgp@ftp.auscert.org.au to retrieve AUSCERT's public key
iQCVAwUBMhxnISh9+71yA2DNAQEowwQAi4dxPUQFIsu1fwPbCxIbzeXtQ9nC4pir
waf7G/WLJ+MMyURSbB+xGEyfwU4TTzLYmPQk/0jeQuxjwUlqrFCVugASKJmtgXw/
EQjUx+kwUdJLhPS3wZS/Ptqba+hFRnkQEDZzmCrYYZb8BTk+/m/XLOLfwLjNioJ4
SYy4/osPqGM=
=T29D
-----END PGP SIGNATURE-----
|