AIDS (trojan horse)

AIDS (trojan horse)
AIDS Trojan
Common name PC Cyborg Trojan
Technical name Aids Info Disk/PC Cyborg Trojan
Aliases AIDS!Trojan, Aidsinfo. A trojan, Aidsinfo. B trojan, Cyborg, Trj/AidsInfo. A, Trojan. AidsInfo.a, Trj/AidsInfo. B, Trojan. AidsInfo.b, Trojaids!Trojan, Love virus
Family AIDS Trojan
Classification Trojan
Type DOS
Subtype DOS scrambler.
Isolation 1989
Point of isolation Europe
Point of Origin United States
Author(s) Dr. Joseph Popp

AIDS, also known as Aids Info Disk or PC Cyborg Trojan, is a trojan horse that replaces the AUTOEXEC.BAT file, which would then be used by AIDS to count the number of times the computer has booted. Once this boot count reaches 90, AIDS hides directories and encrypts the names of all files on drive C: (rendering the system unusable), at which time the user is asked to 'renew the license' and contact PC Cyborg Corporation for payment (which would involve sending 189 US$ to a post office box in Panama). There exists more than one version of AIDS, and at least one version does not wait to munge drive C:, but will hide directories and encrypt file names upon the first boot after AIDS is installed. The AIDS software also presented to the user an end user license agreement, some of which read:

If you install [this] on a microcomputer...
then under terms of this license you agree to pay PC Cyborg Corporation in full for the cost of leasing these programs...
In the case of your breach of this license agreement, PC Cyborg reserves the right to take legal action necessary to recover any outstanding debts payable to PC Cyborg Corporation and to use program mechanisms to ensure termination of your use...
These program mechanisms will adversely affect other program applications...
You are hereby advised of the most serious consequences of your failure to abide by the terms of this license agreement; your conscience may haunt you for the rest of your life...
and your [PC] will stop functioning normally...
You are strictly prohibited from sharing [this product] with others...

Contents

History

AIDS was introduced into systems through a disk called the "AIDS Information Introductory Diskette", which had been mailed to a mailing list of which the AIDS author, Dr. Joseph Popp, subscribed.

Popp was eventually identified by the British anti-virus industry, named on a New Scotland Yard arrest warrant. He was detained in Brixton Prison. Though charged with eleven counts of blackmail and clearly tied to the AIDS trojan, Popp defended himself by saying money going to the PC Cyborg Corporation was to go to AIDS research. A Harvard-trained anthropologist, Popp was actually a collaborator of the Flying Doctors, a branch of the African Medical Research Foundation (AMREF), and a consultant for the WHO in Kenya, where he had organized a conference in the new Global AIDS Program that very year [MG92]. Popp had been behaving erratically since the day of his arrest during a routine baggage inspection at Amsterdam Schiphol Airport. He was declared mentally unfit to stand trial and was returned to the United States[Ta99].

Jim Bates analyzed the AIDS Trojan in detail and published his findings in the Virus Bulletin [Ba90a,Ba90b]. He wrote that the AIDS Trojan did not alter the contents of any of the user's files, just their file names. He explained that once the extension and filename encryption tables are known, restoration is possible. AIDSOUT was a reliable removal program for the Trojan and the CLEARAID program recovered encrypted plaintext after the Trojan triggered. CLEARAID automatically reversed the encryption without having to contact the extortionist.

The AIDS Trojan was analyzed even further a few years later. Young and Yung pointed out the fatal weakness in malware such as the AIDS Trojan, namely, the reliance on symmetric cryptography. They showed how to use public key cryptography to implement a secure information extortion attack. They published this discovery (and expanded upon it) in a 1996 IEEE Security and Privacy paper [YY96]. A cryptovirus, cryptotrojan, or cryptoworm hybrid encrypts the victim's files using the public key of the author and the victim must pay (with money, information, etc.) to obtain the needed session key. This is one of many attacks, both overt and covert, in the field known as Cryptovirology.[1]

References and further reading

Books

  1. [Ba90a] J. Bates, "Trojan Horse: AIDS Information Introductory Diskette Version 2.0," In: Wilding E, Skulason F (eds) Virus Bulletin. Virus Bulletin Ltd., Oxon, England, Jan., pages 3-6, 1990.
  2. [Ba90b] J. Bates, "High Level-Programs & the AIDS Trojan," In: Wilding E, Skulason F (eds) Virus Bulletin. Virus Bulletin Ltd., Oxon, England, Feb., pages 8-10, 1990.
  3. [MG92]P. Mungo & B. Glough, Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, and Keyboard Criminals. New York, NY, Random House, 1992.
  4. [Ta99]P. A. Taylor, Hackers: Crime in the Digital Sublime, London, Routledge, 1999.
  5. [YY96] A. Young, M. Yung, "Cryptovirology: Extortion-Based Security Threats and Countermeasures," In: McHugh J, Dinolt G (eds) Symposium on Security & Privacy. IEEE Computer Society Press, Washington DC, pages 129-141, 1996.

Notes

External links

  1. An early analysis of the trojan
  2. THE COMPUTER INCIDENT ADVISORY CAPABILITY, by CIAC, on AIDS infection and distribution
  3. The Original Anti-Piracy Hack, by George Smith, on the interesting AIDS EULA
  4. Computer Viruses (A), by Probert Encyclopedia
  5. AIDS Information Trojan, by CA
  6. Aids Trojan, by CA

Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Intelligent design — This article is about intelligent design as promulgated by the Discovery Institute. For other uses, see Intelligent design (disambiguation). For the philosophical argument from design , see Teleological argument …   Wikipedia

  • Jonathan Wells (intelligent design advocate) — This article is about the author and intelligent design advocate. For other people named Jonathan Wells, see Jonathan Wells (disambiguation). Jonathan Wells Born John Corrigan Wells 1942 (1942) USA Alma mater University of California,… …   Wikipedia

  • Intelligent design movement — Part of a series of articles on Intelligent design …   Wikipedia

  • Waco siege — The Mount Carmel Center in flames during the assault on April 19, 1993 Date …   Wikipedia

  • List of characters in the Age of Mythology series — The following is a list of characters found in the campaigns of Age of Mythology (Fall of the Trident) and Age of Mythology: The Titans (The New Atlantis): Contents 1 Characters from both campaigns 1.1 Arkantos 1.2 Ajax …   Wikipedia

  • North American Union — Map showing the theoretical union located in the world map. The North American Union (NAU) is a theoretical economic union, in some instances also a political union, of Canada, Mexico, and the United States. The concept is loosely based on the… …   Wikipedia

  • Treatment Action Campaign — to begin making antiretroviral drugs available to South Africans. [http://www.fingaz.co.zw/story.aspx?stid=823 Mbeki: Self sabotage led to downfall ] Mavis Makuni, Financial Gazette, 27 September 2008. Accessed 30 September 2008.] FoundingThe… …   Wikipedia

  • Phillip E. Johnson — Infobox Person name = Phillip E. Johnson caption = birth date = 1940 birth place = Aurora, Illinois death date = death place = other names = known for = advocating Intelligent design occupation = Law professorPhillip E. Johnson (born 1940) is a… …   Wikipedia

  • Cuba — Cuban, adj., n. /kyooh beuh/; Sp. /kooh vah/, n. a republic in the Caribbean, S of Florida: largest island in the West Indies. 10,999,041; 44,218 sq. mi. (114,525 sq. km). Cap.: Havana. /kooh bah/, n. Cubba. * * * Cuba Introduction Cuba… …   Universalium

  • Tuberculosis — Classification and external resources Chest X ray of a person with advanced tuberculosis ICD 10 A …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”