Copy Link
Add to Bookmark
Report

The Discordant Opposition Journal Issue 05 File 08

  

::::::::::::::::::::::::::::::::::::::::::::::::::::::::May/99
::: The Discordant Opposition Journal ::: Issue 5 - File 8 :::
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

:The Chernobyl Virus:
RELM

------------------------------------------------------------------------
The Virus:

There are many types of CIH viruses out there in the wild but there's
only one that leads the pack, this is the Chernobyl CIH virus. The Chernobyl
virus is probably one of the most destructive CIH viruses yet and can
be a bugger to get rid of. There are a few different variants of this virus,
two of them trigger on the 26th of April, one on the 26th of June and one that
triggers on the 26th of every month, I will be talking about the one that
triggers on the 26th of every month. All you people who stick to *nix are
safe from this nasty little virus and so are you Win NT peeps but all the rest
of you Win 95\98 people are naked to this virus so I suggest you put some
damn clothes on. In this text I hope to go over the characteristics
of the Chernobyl CIH virus and explain some important issues that may concern
your personal security against such viruses.

------------------------------------------------------------------------

The Life:

Well say you have this little virii Chernobyl on your puter, well first
you would run the infected executable (Doh!) and this making the virus memory resident.
Since the virus is now memory resident every file that you open or copy will be
infected with the virus also..ewwww .

------------------------------------------------------------------------

Hide And Seek:

When the virus is going to infect a file it will scan the file for free
space, It then breaks it's own code into chunks and inserts itself into
the free space in the file. Doing this makes it so the infected file doesn't
change size after the infection. Wow...now you have a hole bunch of files
infected with this little basterd but you don't know it because everything's
just like it should be so you go on about your business and kick your
ass later.

------------------------------------------------------------------------

Virus Has An Attitude:

Now that you have this sweet little cute babe virus on your puter it's
just going to sit there and look cute, well just like real kids they grow
up and turn into assholes so let me explain this virus's trigger actions.
On the 26th of the month the payload activates an action, the virus write's
over 1MB of the systems hard drive with random data. Now to really screw
you over it will also attempt to modify or corrupt certain types of Flash
BIOS (The virus will only do this function if you have a Flash BIOS, A
Flash BIOS means that you can write data to the BIOS, This function was
made to make it easier to upgrade the Bios). Now if you don't know what this
means it means that it might destroy the BIOS of your computer, the BIOS loads
your OS and manages the data transfers between your system devices such as
your hardrive, mouse, keyboard, serial ports and your parallel ports.
After the virus corrupts your BIOS your computer becomes inaccessible,
to fix this you might have to replace the BIOS or deal with it in some
other manner.

------------------------------------------------------------------------

Protecting Yourself:

This is a cruel world and there are mean people out there who get off
on destroying peoples property that they have paid for by working there ass
off. (Note. I don't agrea with any side, The Anarchist's or the White Hat
people. From learning and experiance I have learned that it's better not to
take sides but to just get along with both, Doing this lets me have a even
wider range of possible knowledge that I can learn and explore)
To protect yourself against such people who wish to destroy your property
with no reason I suggest you first learn the basics of working with the
internet, For one, You should never except files from someone you dont know.
Second, Never open an executable that was unzipped without scanning the file
for viruses first, Doing this is just plain stupid and your most likely
to get a virus. (Use a Mcafee scanner or Nortan Anti-Virus). When you do
download zipped files scan them with a good anti-virus software, Dount use
cheap programs only use Mcafee or Nortan Anti-Virus. Third, Make sure you
allways have the latest virus defenitions for your anti-virus software.
Fourth, Keep up on the latest security issues and learn how to protect
yourself from them, Allways know about the latest viruses because before
you know it you might get one and you could have been prepared, Like they
say...To Kill Your Enemy You Must Know Your Enemy. One final
suggestion is that you scan your computer for viruses daily, If not daily
at least do it weakly. I scan my computer for viruses sometimes twice or even
three times a day, This is because I do alot of downloading and I have to make
sure I dount get infected. Ohya, It's a good idea if you do alot of downloading
of programs, software ect. that you do virus checks more often, Doing this
might lower your chances in getting loss of data or even hardware damages.


------------------------------------------------------------------------

Benifets Of Viruses:

Allthough viruses are naturelly cruel and usually don't have good intentions
there are some that have a good cause or are helpfull in breaking into a
system (A good cause for your end not necessarally the victims). There are a
few viruses out there that open all available ports on a machine at a requested
time, This might be helpfull to you depending on what you are doing or say you wish
to break into a system but they have some type of security, well you could make
a virus to be able to take down that security and then enableing you to have
a chance to get in the system. Though most "Hackers" do not use viruses to
help them get into a system it is an alternative that you might need one day.
I have some words of wisdom and I tell it to allmost every newbie I see and this
is to stay away from trojans such as BO (Back Orifice) NetBus and all the other
destructive and un-ethical trojans, If you wish to be a hacker your tools must
come from your mind, Useing trojans is not hacking and it doesnt take a brainy
to get into a system thats patched the real adventure is getting into systems
useing your brain and not some toy, Of course you will need tools to hack but that
comes later, First you must have the right state of mind, A clear understanding
of the hacker community and the way it works. Hmm..I've kind of wonderd of into
newbie talk land here..sorry about that, It just bugs me to see all these people
every day come into IRC and say " Can Some One Teach Me To Use Netbus? " and Im sure
theres many of you out there who feel the same way. Well enuff with this ;)

------------------------------------------------------------------------

The Chernobyl Virus Source Code:

; This was going to be the spot for the Chernobyl source code.
; I decided not to include the source code due to that this
; virus is such a destructive one and there are so many people
; who would use it for more the learning perposes. In most of my
; virus texts I include the source code but for this one I made
; an exception. You can allways read my many other virus texts
; such as the Alar Virus, Melissa Virus ect. and they all
; include the full source code for the virus. As I say in
; all my texts that include the source code I ask that you only
; use it for learning perposes, Im not just saying this for a
; disclaimer Im really serious about this and I should not be
; used for anything else. Thanks.

This concludes The Chernobyl Virus text Written By RELM.
Shout Outs To: All Of The Fallen Angel Members..You Rule!
And All The Peepz At #hackerzlair. -peace

/\
|\________/ \
| _______\/\ \
| |____ / /__\ \
| ____\ ______ \
| | / / \ \
| | / / \ \
| | / / \ \
| |/ / \ \
| |_/ \_\
| |
| /
|/ [fallenangelz.cjb.net]


← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT