1996-09-03 - Re: Passive Trojan (was:Re: HAZ-MAT virus)

Header Data

From: Hans “Unicorn” Van de Looy <hvdl@sequent.com>
To: remailer@replay.com
Message Hash: d20e26457711562519cfd6643817c3c59457feb63bbd9a47bb0940b19684a2e0
Message ID: <9609030938.AA07849@amsqnt.nl.sequent.com>
Reply To: <Pine.3.89.9609021532.A29664-0100000@netcom>
UTC Datetime: 1996-09-03 13:08:34 UTC
Raw Date: Tue, 3 Sep 1996 21:08:34 +0800

Raw message

From: Hans "Unicorn" Van de Looy <hvdl@sequent.com>
Date: Tue, 3 Sep 1996 21:08:34 +0800
To: remailer@replay.com
Subject: Re: Passive Trojan (was:Re: HAZ-MAT virus)
In-Reply-To: <Pine.3.89.9609021532.A29664-0100000@netcom>
Message-ID: <9609030938.AA07849@amsqnt.nl.sequent.com>
MIME-Version: 1.0
Content-Type: text/plain


::
Request-Remailing-To: remailer@huge.cajones.com

##
Subject: Re: Passive Trojan (was:Re: HAZ-MAT virus)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

::
Request-Remailing-To: remailer@remailer.nl.com

##
Subject: Re: Passive Trojan (was:Re: HAZ-MAT virus)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

::
Request-Remailing-To: furballs@netcom.com (Paul S. Penrod)

##
Subject: Re: Passive Trojan (was:Re: HAZ-MAT virus)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

The one-and-only Paul S. Penrod once stated:
! 
! This has been done in the past using several vairants (but not in a image 
! program).
! 
! The key to the success is that the application in question has to be 
! compromised to respond to these codes, either by design or by hacking. 
! Either way the individual responsible must modify the execution 
! mechanism, not just the data itself.
! 
! Let's see -current examples of computing items with this kind of a 
! "feature"... magic cookies, macros, OLE, DDE, MS Objects, JAVA, and the 
! list keeps growing.

And not  to forget  the future  of virii.  Modification  of the  BIOS of
parts of the PC platform (motherboard, SCSI interfaces), or the firmware
of drives.  Since these building blocks  are more and more equipped with
flash-like PROMS which  can be reprogrammed, they become  a valid target
for these kinds of programs.

! On Mon, 2 Sep 1996, Jason Wong wrote:
! 
! > 
! > Actually , THINK about it, it does makes a interesting idea for a trojan
! > horse doesn't it ? I mean, just get a solid graphic program, insert codes
! > into it so that when certain conditions, i.e. a particular gif or jpg file
! > is view, print, etc, the trojan activates !! 
! > ___________________________________________________________________________
! > 
! > Jason Wong (CNE, MCP)                                     Jason@MCSB.COM.SG
! > Network Engineer
! > MCSB Systems Pte Ltd
! > ___________________________________________________________________________

Deep Throat.






Thread