[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Virus attacks on PGP
On Fri, 24 Nov 1995, Norman Hardy wrote:
> At 2:46 PM 11/24/95, Thomas E Zerucha wrote:
> ....
>
> >It takes quite an effort to create a complex virus to do this. It
> >reminds me of the Glomar Challenger that was used to recover the remains
> >of a russian sub (my memory is somewhat faulty). Such a virus would
> >require a great investment in time and money. What target would be worth it?
> >Many otherwise feasible things aren't economically pracitcal.
>
> Yes, but if your particular habits became widespread, an intelligence
> agency could amortize the virus effort across many victims.
>
> Here is just one such complicated virus:
> Sit in the OS watching for PGP to be launched. Patch PGP on the way in. The
> patch writes to disk the location and password for the secure key ring.
> Concurrently the virus watches for there to be IP service and sends the
> disk information as a UDP.
The virus is starting to get large and noticeable. First, I alternate
between a.out and ELF (and DOS .EXE). It doesn't have to patch pgp, just
look for it to be loaded and teh secring file accessed. Then record
keystrokes. This would also work with a hardware implementation if the
secring passphrase is external (as opposed to an external keypad).
This is what can be done when PGP is used for communication. For other
info, I can isolate a computer (no modem, unroutable IP addresses, etc).
Of course our firewall is a socks server and doesn't forward UDP. Maybe
a socksified, SSL virus? My computer is attatched that way far more than
via modem. And maybe I should just nuke (or modularize) UDP? You can do
interesting things with kernel source.
> Alternatively the virus waits for idle time, (screen saver time) and dials
> an 800 number having turned off the modem speaker. But don't send the same
> data twice!
That woudl be interesting - even with the speaker "off" the power surge
causes clicking and other signs. Not to mention that the interrupt count
would start moving (of course the virus could replace the entire OS and
would only have to find 300K chunks to hide in).
Were they that interested, they could place a surveillence device over my
desk (I don't know if they can pick up the scan on LCDs like they can on
monitors - I am suprised they didn't put the kybosh to the FCC emission
rules). Maybe I can move my desk, or my pgp station inside our EMI
testing faraday cage :).
[email protected] -or- 2015509 on MCI Mail
finger [email protected] for PGP key