[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference 7.286::digital

Title:The Digital way of working
Moderator:QUARK::LIONELON
Created:Fri Feb 14 1986
Last Modified:Fri Jun 06 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:5321
Total number of notes:139771

4695.0. "Virus on our Web page!" by WOTVAX::HILTON (http://blyth.lzo.dec.com) Thu Jul 04 1996 10:47

    A customer has just informed me that Digital is distributing the
    concept virus, via a Word document that is available on our Web site.
    
    The pointer is http://www.digital.com:80/.i/info/soc/, and the file
    link is, AlphaStation Options V96.1.3 ( PostScript ,Pdf ,Word) 08 May
    1996, 22 Pages.
    
    
    He has sent a mail to the webmaster, but is there anyone I can contact
    to get this checked out and resolved if necessary?
    
    I have no intention of downloading it, just to check!
    
    Thanks,
    
    Greg
T.RTitleUserPersonal
Name
DateLines
4695.1SecurityBBRDGE::LOVELLThu Jul 04 1996 13:139
    Greg,
    
    	Standard procedure for *ANY* security related incident is to
    contact the security response team.  Given that most of the US 
    are out for the next 2 days, I'd recommend that you contact
    European Security straight away.  E-Mail to SEC_OPS@VBO
    
    /Chris.
    
4695.2BBRDGE::LOVELLThu Jul 04 1996 13:195
	I've confirmed the virus is present in that file and as I
    couldn't contact Greg by 'phone, I've passed the details
    to Security Operations.   
    
    /Chris.
4695.3Please ! Use the right channelsVARDAF::BERBIGIERNo known policy forbids common senseThu Jul 04 1996 15:199
I would stress Chris' answer.

It is a very good intention to try and inform users of a security
incident, but we've lost a few hours due to the fact the
incident escallation procedure has not been followed.

How many customers have been infected during this delay ?

Pierre
4695.4WOTVAX::HILTONhttp://blyth.lzo.dec.comThu Jul 04 1996 15:229
    Pierre,
    
    >> It is a very good intention to try and inform users of a security
    >> incident, but we've lost a few hours due to the fact the
    >> incident escallation procedure has not been followed.
    
    I had no idea what the escallation procedure was, hence this note.
    Without the notes conf, and Chris' answer, I'd still be asking around
    as to what to do.
4695.5Document no longer availableTROOA::RITCHEFrom the desk of Allen Ritche...Thu Jul 04 1996 17:2717
    Indeed that document contains the Winword/Concept macro virus.
    
    Realizing today is July 4, I just called the emergency hotline in the
    U.S. as noted in our security web page http://www-security.mko.dec.com 
    
    They advised me that the issue has already been reported and is being
    worked by Corporate Security (Phil Bancroft and Bob Lyons).
    
    I trust this is now in good hands.  In fact, Bob Lyons just advised me
    at 1:25pm that the document has now marked hidden.
    
    Regards,
    Allen
    CCS IT Security Operations
    
    
    
4695.6file unavailablePOWDML::LYONSThu Jul 04 1996 17:316
    Effective 13:30 hours the Word, pdf, and Postscript version of
    AlphaStation Options V96.1.3 is unavailable. Thus if you point to them
    you will get a "Not Found" message.
     
    Bob
    
4695.7Are there any PostScript Viruses? ZUR01::SUTTERWho are you ??? - I'm BATMAN !!!Thu Jul 04 1996 19:4713
    > Effective 13:30 hours the Word, pdf, and Postscript version of
    > AlphaStation Options V96.1.3 is unavailable.
    
    Could this virus, any virus for that matter, survive .doc -> .ps 
    translations? -- I doubt it. 
    
    What about .doc -> .pdf format translation? 
    
    Just wondering ... 
    
    Regards, 
    
    Arnold
4695.8VANGA::KERRELLsalva res estFri Jul 05 1996 07:085
re.1:

First I've heard of it, but then I've only been here 12 years.

Dave.
4695.9Incident Reporting Procedure (pointers)ULYSSE::RAMBEAUJean-Paul Rambeau @VBOFri Jul 05 1996 08:119
    The Incident Reporting Procedure is available from VTX SECURITY and on the 
    web at http://www-security.mko.dec.com/
    
    Please directly communicate with the contact people listed in the
    Incident Reporting Procedure for any incident such as this one.
    
    Jean-Paul
    CCS IT Security Operations.
    
4695.10Guessing doesn't always workEEMELI::SIRENFri Jul 05 1996 08:3115
    
    
    
    
    I bet, that nowadays many places don't have anybody to tell people
    about VTX SECURITY (not difficult to guess, but people don't us VTX
    that much any more) or even less about the security web address.
    
    We should improve our naming practices for important information and/or
    in TCP/IP world move all important info under the same subdomain
    (das.dec.com seems to be a good candidate) and/or arrange a single
    effective search engine with garanteed visibility to important info
    (altavista.pa.dec.com? (should it be altavista.das.dec.com)).
    
    --Ritva
4695.11Quality Improvement OpportunityBBPBV1::WALLACEUnix is digital. Use Digital UNIX.Fri Jul 05 1996 10:0314
    Hiding the PS and PDF versions is probably overkill. This virus applies
    only to the .DOC version, as it uses Word's facility of running a
    "program" (a macro) when a document is read in. So far as I know,
    there's no real damage a .PS can do, and probably no real damage a .PDF
    can do. (But I'm not claiming to represent Corporate Security).
    
    There have been incidents of this nature (WinWord/Concept) with
    documents in the Integrated Repository before. If we really were
    integrated, the Web folks would use the IR as source, and the IR folks
    would virus-scan anything PC-related before allowing it in, and we
    wouldn't have any problems like this.
    
    regards
    john
4695.12Some IdeasGIDDAY::lap8eth.stl.dec.com::THOMPSONSWelcome to the JungleFri Jul 05 1996 10:207
Why not create a mail account

security@dec.com

and security.dec.com or www-security.dec.com

Cheerz
4695.13postscript nots safeEVTISA::ES_COLASwaiting for openMAC axp ;-)Fri Jul 05 1996 11:145
    Re.11 ) A .ps file is a postscript program that may damage (need hardware
    intervention) printer. So It's may arrive...
    
    rgds
    Yann  
4695.14COMICS::CORNEJWhat's an Architect?Fri Jul 05 1996 16:496
    re .11,
    
    Sounds like most .PS files I print :-)
    
    Jc
    
4695.15HandledMINOTR::BANCROFTMon Jul 08 1996 18:4314
    The 226-7974 DTN phone always has the on-call security consultant 
    beeper schedule.  The number is in many places, like VTX Secutity
    and the  Security Web pages.
    
    One of us is always ready and set up to handle such problems 7 days
    a week, 24 hours a day. Please let us know of problems like this as 
    quickly as you can.  In some cases, (like the spread of a virus) 
    speed is important.
    Phil Bancroft
    
    PS: - quite right - this virus spreads through the source language 
    (.DOC or .DOT) files only.  The print files (.PS or .EPS) do not
    carry the macros.  There IS a printer virus, but this in not it.
    Naturally this virus can be mailed, net copied, or sneaker-netted.
4695.16marketing wizardry?DELNI::MURPHYMon Jul 08 1996 21:123
    Just what is the "concept" virus anyway? Does it slow down your PC to a
    screeching halt and then pop up a little window that says that you
    should buy an Alpha? What a great idea... =)
4695.17CUSTOM::ALLBERYJimMon Jul 08 1996 21:276
    The "concept" virus (I have no idea how it got that name) is a set of
    macros that keep you from doing a "save as" option by forcing your
    document to be a document template.  It's annoying but relatively
    harmless.  Once you get a document with it, it infects your normal
    document template so that any document you create afterwards is also
    infected.
4695.18BUSY::SLABOUNTYBeing weird isn't enoughMon Jul 08 1996 21:475
    
    	That's a clever concept for a virus.
    
    	Hmmm, maybe that's how it got its name.
    
4695.19I'm waiting until the bean counters decide to shutdown DASSTEVMS::PETTENGILLmulpMon Jul 08 1996 23:1511
Policy prohibits a www.dec.com because we might want to setup an office in
Wala Wala, Washington and assigning www to a node address would prevent being
able to send mail to someone at site www using person@www or person@www.dec.com.

The idea of using generic or meaningful names based on common conventions or
names would run counter to policies defined based on simplifying operations.
Operational considerations are far more important than human factors.

It makes far more sense for SEG to refer to Bemerton, Washington than to
the Semiconductor Engineering Group.  Heaven forbid the possibility that
an organization would usurp the _obvious_ site code "SEG" for Bemerton.
4695.20Walla Walla and BremertonLOWELL::MIDDLETONJohnTue Jul 09 1996 05:574
    FWIW, the two cities are Walla Walla and Bremerton.  I'm originally
    from Bremerton.
    
    							John
4695.21WOTVAX::HILTONhttp://blyth.lzo.dec.comTue Jul 09 1996 09:315
    Could someone please re-assue me that me do virus check all documents
    before we publish them in the IR or externally on the web, and that
    this was an isolated incident, that got through the net?
    
    Greg
4695.22HELIX::SONTAKKETue Jul 09 1996 13:116
    RE: .19
    
    You seem to have lot confidence with Digital to think that we might be
    *opening* a new office in future.
    
    - Vikas
4695.23USCTR1::SIGELFlock of SigelsTue Jul 09 1996 13:545
    I got affected by the virus, it altered my Microsoft Internet Assistant
    and my clip art gallery in Power Point. I had to re-install both
    applications.
    
    Lynne S.
4695.24exPULMAN::CROSBYTue Jul 09 1996 14:148
    Re:.17
    I beg to differ.  This virus is anything BUT harmless.  I caught it
    over the Holidays (Christmas, that is), and it crashed my C drive. 
    MacAfee will find and eradicate it, and the network ops people have a fix.
    
    If you have it, get rid of it as soon as possible!
    
    gc
4695.25SMURF::PBECKPaul BeckTue Jul 09 1996 14:152
    There is more than one variant of the Concept virus. The original
    was fairly innocuous; the later version(s) less so.
4695.26USCTR1::SIGELFlock of SigelsTue Jul 09 1996 15:105
    Best bet is whenever information is downloaded off the internet scan it 
    with F-PROT for virus.
    
    
    Lynne S 
4695.27QUARK::LIONELFree advice is worth every centTue Jul 09 1996 15:494
Until recently, F-Prot couldn't find Word macro viruses.  Make sure whatever
virus protection you use is up to date.

				Steve
4695.28known about for at least 10 monthsFIREBL::LEEDSFrom VAXinated to AlphaholicTue Jul 09 1996 16:03239
Here's what the Sales Workbench folks got about the CONCEPT Virus last year. 

Arlan



                  I N T E R O F F I C E   M E M O R A N D U M

                                        Date:     05-Sep-1995 02:56pm PDT
                                        From:     Corporate Information Security
                                                  SECURITY@A1@SALES@AKO
                                        Dept:      
                                        Tel No:    

TO: See Below
 
Subject: Microsoft Word Macro Virus                                             


From:	Steve Dancause @MSO, DTN 223-8717


                          DIGITAL INTERNAL USE ONLY
    
    
    ***********************   CORPORATE SECURITY   *************************
    *                                                                      *
    *                 CORPORATE INFORMATION SECURITY GROUP                 *
    *                           September 5, 1995                          *
    *                     [DO NOT DELETE THIS BANNER]                      *
    *                                                                      *
    *********************   SECURITY ADVISORY #95-02  **********************
    
    
    This security advisory is directed to all Personal Computer users, 
    internal support personnel and any other appropriate internal 
    organizations within Digital Equipment Corporation.
    
    Distribution is via Reader's Choice to all employees.  Managers are 
    responsible for dissemination to other Digital workers not covered 
    by employee-wide Reader's Choice mailings (e.g. contractors).
    
     
    SUBJECT:  Microsoft Word Macro Virus
    	
    	A virus which affects Microsoft WORD documents has been reported 
	recently and confirmed to exist. This virus replicates on all 
	platforms which use Microsoft WORD 6, i.e. MS-DOS, Windows, 
	Windows 95, Windows NT and Macintosh.  
    
    	As with many viruses this one has been given many different names,
	in this instance: "Word Macro Virus", "WinWord.Concept", "WW6", 
	"WW6macro" and "Prank Macro Virus".  The virus uses 'macros' 
	(embedded executable instructions) to replicate and infect WORD 6 
	files.
    
	Although this is a cause for concern, it is NOT cause for panic.
    	This particular exploitation of macro capability is simple to 
	identify, and easy to eradicate.
     	
        As with all Personal Computer viruses, it is imperative that 
        infections are contained and eliminated.  For example, any person 
	using WORD 6 must take precautions to assure that these files are 
	not infected, especially if files are to be transferred outside of 
	Digital.  

	To eliminate this virus, the following procedure must be implemented.
    

    

    REQUIRED ACTIONS
        
    	1. TO IDENTIFY THIS PARTICULAR VIRUS INFECTION: When an infected 
	   WORD file is loaded, a dialogue box titled  "Microsoft Word" 
	   appears, containing only a "1" and an OK button. If you have NOT 
	   seen this when opening a WORD document, your system may be OK 
	   for now, but be aware that any strange behavior should be 
	   reported.  See contact information below.
    
    	2. IF YOU HAVE AN INFECTED FILE, or to be certain that the WORD
	   environment is virus free, copy the Microsoft-provided file 
	   SCAN831.DOC (August 31st 1995 version) to a working directory 
	   from:
    
    	   	MINOTR::USER6:[VIRUS.WORD]
    	   	       or 
    	   	VARDAF::EUROPUB:[VIRUS_SCANNER]
    	
    	   Open SCAN831.DOC (or the latest version) in the same way as 
	   opening any other WORD document to invoke a scanner/cleaner 
	   for .DOC files. Easy to follow instructions are included in 
	   SCAN831.DOC. This tool will establish if normal.dot 
	   (template file for normal documents) is infected, and then 
	   take action accordingly. SCAN831.DOC also displays informative 
	   progress messages.
    
    	3. Users can also copy file WD1215.DOC to obtain a good description 
	   and graphic illustration of the virus symptoms and solution.  
	   The WD1215 file (4-pages) will be especially helpful for support 
           organizations advising internal and external customers.
    	   
    	4. It is recommended that all WORD users disable the ability for 
	   WORD to update normal.dot, without prompting for approval. 
	   To do this: click on "Tools", then "Options", then "Save" and 
	   finally check the "Prompt to Save Normal.dot" box.

       	5. Future versions of Corporate licensed virus protection software 
           (e.g. F-PROT and SWEEP) will include detection capability for 
           "Word Prank". 
    
    	6. Per Corporate Security Standard 211-04, all virus infections 
	   must be reported according to established procedures. See contact 
	   information below.
    


        
    AWARENESS NEEDED:
    
    	1. It is important to understand that Personal Computer viruses can
	   be a serious risk to Digital.
    
    	   To reduce the risks, do not use diskettes or files from an 
           unknown/uncontrolled environment. Beware when downloading any 
           files which may contain programs or executable instructions.   
           Frequently run the latest version of the Digital approved 
           anti-virus software (F-PROT and/or SWEEP).  Always have backup 
	   and a contingency plan in place to recover personal computer data.
    
    	2. Users and support personnel should be aware that the possibility 
           of undesirable or damaging effects can exist in an environment or 
           application that provides uncontrolled automatic execution of 
           computer instructions in the form of macros, command scripts, 
           learned keystrokes and the like, especially when such embedded and 
           possibly hidden code is provided by another party.
    
    	3. Microsoft is investigating ways to build some type of protection 
           into the MS WORD product itself.  When available, these protection 
           features should be enabled.
    
    
    
    Microsoft Word SCAN831.DOC Tool and Information Pointers
    ========================================================
    
	DECnet:  MINOTR::USER6:[VIRUS.WORD]SCAN831.DOC  (doc virus scan/clean)
                 MINOTR::USER6:[VIRUS.WORD]WD1215.DOC   (more information)
    
    	         VARDAF::EUROPUB:[VIRUS_SCANNER]SCAN831.DOC
    	         VARDAF::EUROPUB:[VIRUS_SCANNER]WD1215.DOC
    
    	Latest support information on WORD and the scanner is available from    
    	Microsoft via the Web:
    
    	   http://www.microsoft.com/msoffice/prank.htm
    
                                       or
    
           http://www.microsoft.com/kb/softlib/Office/q_word.htm
    (Look for the "Prank Macros" Application Note - Windows or MAC as needed)
    
    The information as of this date applies to Microsoft Word versions 6.x 
    for Windows, Microsoft Word versions 6.0 and 6.0.1 for the Macintosh, 
    Microsoft Word version 6.0 for Windows NT, and Microsoft Word version 7.0 
    for Windows 95.
        
                          DIGITAL INTERNAL USE ONLY


                     CORPORATE INFORMATION SECURITY GROUP
                          SECURITY ADVISORY #95-02
    
                                      ****
    
    
    CONTACT INFORMATION:
    
    ASIA/PACIFIC
    	Your Regional security contact or as per VTX SECURITY_AP
    
    EUROPE
    	Your regional/country security contact as per VTX SECURITY_EUROPE or 
    	EISOG (European Information Security Operations Group) Contact  -  
    	EUROSEC @VBE / EISOG Hotline, DTN 828-6328
    
    AMERICAS
    	Your regional security contact or as per VTX SECURITY
         
    CORPORATE
    	CISG (Corporate Information Security Group) as per VTX SECURITY or 
    	contact  -  CISG @MSO  /  CISG Hotline, DTN 223-8900
    
    INTERNAL WWW SERVER
    	Digital Information Security Entry Point
    	   http://www.security.mro1.dec.com/
    
    VIDEOTEX SERVERS
    	VTX SECURITY  (VTX SECINFO)
    	VTX SECURITY_AP
    	VTX SECURITY_EUROPE
    
    NOTESFILES
    	MINOTR::SECURITY_ADVISORY (CISG Security Advisories and Bulletins)
        POWDML::PC_SECURITY  (Personal Computer Security)
    
    
    
    
                          DIGITAL INTERNAL USE ONLY


                     CORPORATE INFORMATION SECURITY GROUP
                          SECURITY ADVISORY #95-02
    
                                      *****
    
    
    NOTE:
    
    The only authorized source of computer/network security related 
    advisories and bulletins for Digital is the Corporate Information 
    Security Group.  CISG security advisories and bulletins are distributed 
    through the geography, country and business security contacts within 
    Digital Equipment Corporation.
    
    Please advise your system managers and users of Digital's computers and 
    networks that any security warnings, alerts, advisories, and bulletins, 
    especially those requiring responsive action on their part, are the 
    explicit responsibility of the Corporate Information Security Group.
    
    If an internal or external advisory or bulletin is received from other 
    sources and no information on the topic has been received from CISG, 
    please contact our group at DTN 223-8900. This allows a single focus for 
    all security advisory and bulletin information for our Company.  All 
    security advisories and bulletins can be found in VTX SECURITY or VTX 
    SECURITY_EUROPE.
    
                        DIGITAL INTERNAL USE ONLY
4695.29Which virus scanner(s) ????CHEFS::HARVEYBaldly going into the unknown...Tue Jul 09 1996 16:2411
   Rather beggars the question which virus detecting system must we use ?
 
   From what I see there are several offerings available - F-Prot, Norton, Dr 
   Solomon (?), Microsoft etc. Do they all see all the known viruses ? I doubt 
   they're all in synch with all active viruses....
 
   From the end user side of life which scanners should we be running ?
 
   Visions of spending all day scanning files with a whole range of tools !!!!
 
   Rog
4695.30QUARK::LIONELFree advice is worth every centTue Jul 09 1996 16:329
For personal use, I find Norton to be the best, based on several comparison
reviews I have seen.  The better scanners do provide monthly updates (most
for free by Internet, CompuServe, etc.) and these often include added
capabilities to detect and remove new kinds of viruses.

Microsoft Antivirus (gone as of Windows 95) is worthless.  On W95, McAffee
ViruScan has some serious holes which would lead me to recommend against it.

				Steve
4695.31USCTR1::SIGELFlock of SigelsWed Jul 10 1996 15:364
    F Prot is pretty good, it located the files and I deleted them real
    fast.
    
    Lynne S.
4695.32safe viewingNETCAD::ROLKEInterrupt driven HerefordsThu Jul 11 1996 14:157
In the August edition of Windows Magazine the cover story is about
Safety on the Net.  David Methvin suggests (page 176 sidebar) a 
method for Safe Viewing of Word documents: install the Word and Excel
viewers and use them as your default viewers.

The viewers open the documents in half the time and they don't execute
the macros so you don't get any Word viruses.