Good Times Virus Hoax
demetris.a.gaines at CESWA-IM-I.mail.usace.army.mil
demetris.a.gaines at CESWA-IM-I.mail.usace.army.mil
Wed Apr 26 23:03:54 EDT 1995
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Automated Systems Security Incident Support Team
_____
___ ___ _____ ___ _____ | /
/\ / \ / \ | / \ | | / Integritas
/ \ \___ \___ | \___ | | < et
/____\ \ \ | \ | | \ Celeritas
/ \ \___/ \___/ __|__ \___/ | |_____\
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Bulletin 95-15
Release date: 24 April, 1995, 3:30 PM EDT (GMT -4)
SUBJECT: E-mail virus is a hoax.
SUMMARY: ASSIST has received numerous requests for information
about a computer virus virus known as "Good Times" that is
traversing the Internet and infects systems through e-mail. THE
GOOD TIMES VIRUS MESSAGE IS A HOAX. DO NOT FORWARD THE MESSAGE
ON GOOD TIMES TO OTHER PERSONS AND PROPAGATE THE RUMOR FURTHER.
BACKGROUND: The Good Times hoax was initiated in late 1994 and
after investigation the origination of the message was traced to a
student at a university site and a user of America Online. There
have been several variations of the message with a basic theme of
"this electronic mail message with the subject line of "xxx-1"
will infect your computer". The spread of the hoax was accelerated
when many people saw a a message with "Good Times" in the header.
They deleted the message without reading it, thus believing that they
have saved themselves from being attacked. These first-hand reports
give a false sense of credibility to the alert message.
The initial Good Times incident ended in December 1994 and there
was virtually no traffic on the subject until early April 1995
when another round of hoax messages began circulating on the
network. The most common April 1995 version of the message
contained references to public statements from the Federal
Communications Commission and America Online as to Good Times
being verified as a legitamate virus. This second round of Good
Times messages is also a hoax and based on the same false reports
as the 1994 Good Times messages.
As of this time, there are no known viruses which can infect merely
through reading a mail message, for a virus to infect and spread
a file must be executed. Simply reading a text message does not
cause execution of any files. It would be possible for malicious
code to be transferred as an attachment or within the body (i.e
uuencoded) of a message, but then the file would have to be
decoded and separate action taken outside of a mailer to execute
the file. In addition, it would be extremely difficult for
malicious code to be written to infect an environment as diverse
as the Internet. There are so many different types and versions
of operating systems and mailers in use on the Internet that
writing a piece of code that would succesfully infect any
recipient of an e-mail message would be highly unlikely.
It has been suggested that, theoretically, e-mail could be used
to deliver and activate malicious code in mailers that would
have some type of embedded automated services. An example was
given of "invisible" escape sequences which affect screen
Ôto do some malicious action when
some key is "accidently" pressed. This could be done through a
file that remaps keys when displayed on a PC/MS-DOS machine with
the ANSI.SYS driver loaded. However, this only works on MS-DOS
machines with the text displayed on the screen in text mode. It
would not work in Windows or in most text editors or mailers. A
key could be remapped to produce any command sequence when pressed,
for example DEL or FORMAT. However, the command is not issued
until the remapped key is pressed and the command issued by the
remapped key would be visible on the screen. You could protect
yourself by removing ANSI.SYS from the CONFIG.SYS file, but many
DOS programs use the functionality of ANSI.SYS to control screen
functions and colors. Windows programs are not effected by
ANSI.SYS, though a DOS program running in Windows would be.
IMPACT: DoD personnel take unnecessary time and effort in
response to a problem that does not exist.
RECOMMENDED SOLUTIONS: Do not forward a notice about the Good Times
virus to any other persons. Normal policy should be to scan any
executable file received from any source for malicious code.
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
More information about the grass-user
mailing list