From: “Paul S. Penrod” <furballs@netcom.com>
To: cypherpunks@toad.com
Message Hash: 4deb5c33accc661a8262f30b98f062f84d72dbe4c988f411d5c61eb5b28b4bfc
Message ID: <Pine.3.89.9609021532.A29664-0100000@netcom>
Reply To: N/A
UTC Datetime: 1996-09-03 08:01:40 UTC
Raw Date: Tue, 3 Sep 1996 16:01:40 +0800
From: "Paul S. Penrod" <furballs@netcom.com>
Date: Tue, 3 Sep 1996 16:01:40 +0800
To: cypherpunks@toad.com
Subject: Passive Trojan (was:Re: HAZ-MAT virus)
Message-ID: <Pine.3.89.9609021532.A29664-0100000@netcom>
MIME-Version: 1.0
Content-Type: text/plain
This has been done in the past using several vairants (but not in a image
program).
The key to the success is that the application in question has to be
compromised to respond to these codes, either by design or by hacking.
Either way the individual responsible must modify the execution
mechanism, not just the data itself.
Let's see -current examples of computing items with this kind of a
"feature"... magic cookies, macros, OLE, DDE, MS Objects, JAVA, and the
list keeps growing.
On Mon, 2 Sep 1996, Jason Wong wrote:
>
> Actually , THINK about it, it does makes a interesting idea for a trojan
> horse doesn't it ? I mean, just get a solid graphic program, insert codes
> into it so that when certain conditions, i.e. a particular gif or jpg file
> is view, print, etc, the trojan activates !!
> ___________________________________________________________________________
>
> Jason Wong (CNE, MCP) Jason@MCSB.COM.SG
> Network Engineer
> MCSB Systems Pte Ltd
> ___________________________________________________________________________
>
>
Return to September 1996
Return to ““Paul S. Penrod” <furballs@netcom.com>”