Thursday, July 10, 2014

The History of Hacking and Viruses

The History of Hacking and
Viruses 


INTRODUCTION

 Imagine this scenario: you’ve just sat down at your computer. You boot it up, and as it 
finally loads up, you realize that a lot of your files are missing. Then, your computer crashes. 
You try and try again to restart it but nothing seems to be working. You bring your desktop in to 
a computer repair shop and learn that you’ve been the victim of a malicious attack. In this day 
and age, this exact situation isn’t all too uncommon. Like a normal virus, a computer virus can 
spread from computer to computer in the blink of an eye, preying on all of the files hidden or 
visible in the hard drive. As a PC user, I became more and more intrigued as to computer 
viruses and the hackers (or as the computer community calls them, “crackers”) that create them. 
In this report, I hope to explore the history of computer viruses, how and why they are made, as 
well as research hackers and what their malicious attacks have done. 

How does a computer virus work 

 So just how exactly does a computer virus work? Well, just like there are many 
different strands of viruses that can attack a human body, there are different kinds of computer viruses that can attack and potentially harm your computer. The four most common computer 
infections are viruses, e-mail viruses, Trojans, and worms. A virus is a small piece of code that 
is attached to a program, such as a popular game or word processor. When a user runs the 
program, the virus then loads itself onto the memory and searches for another program that it can 
attach itself to. Once it does, it modifies the code to add the virus’s code in, and then starts the 
original program. Every time the user runs any infected program, a new program is infected. 
Then if that program is sent to another user, their computer will become infected. This is how a 
virus will spread from one user to another. 
 While spreading a virus will inevitably cause damage, the part of the virus that actually 
harms a computer is its attack phase. Usually some kind of trigger will start the attack phase, 
and then the virus will execute its attack. This attack could be anything from a message on the 
screen to a destroyed hard drive. 

History of Hacking 

 According to the Washington Post, in 1979 engineers at Xerox Palo Alto Research 
Center discover the computer "worm," a short program that scours a network for idle processors. 
This worm just so happens to be the descendant of the modern day worm. As I read more of the 
article, I read about the “414s”, a group of computer hackers who hacked their way into many 
computer systems, including (according to the Detroit Free Press) the Los Alamos National 
Laboratory, Sloan-Kettering Cancer Center and Security Pacific Bank. One of the young men, 
17-year-old Neal Patrick, said that the only reason he did it was the challenge of getting into places he knew he shouldn’t be, and staying in there unseen. Unfortunately for him and his 
group, they were discovered by the FBI in 1983. Although many saw the 414s as harmless, they 
did cause $1,500 worth of damage at Sloan-Kettering by deleting files. All of this had happened 
prior to any known viruses were spread. It wasn’t until 1986 that the first “computer virus” was 
ever created. Invented in Pakistan by Basit and Amjad Farooq Alvi, the virus would slow down 
the floppy disk drive. The virus was originally created to protect the brothers’ medical software, 
but it had spread all over the world. 
 In 1988, a programmer named Robert Morris created a worm that disabled roughly 
6,000 computers on the ARPANET network by flooding their memory banks with copies of the 
worm. After confessing to creating to the worm, he was charged under the Computer Fraud and 
Abuse Act, and was sentenced to 3 years probation, 400 hours of community service, and a 
$10,000 fine. This man was the originator of the computer worm, and it all happened only 20 
years ago. After reading all of these interesting articles on the origin of the computer worm, I 
decided to look into other viruses and the damage that was caused by them. 

Computer Viruses 

 After researching computer viruses from the first one in 1988 till the present, I’ve come 
to notice that the bigger-named viruses didn’t really happen until the late 1990’s. In 1999, the 
“Melissa” virus spread causing roughly $80,000 worth of damage. The virus would send copies 
of itself to the first 50 names listed in the victim’s Outlook e-mail address book. It also infects 
Microsoft Word documents on the user's hard drive, and mails them out through Outlook to the same 50 addresses. Other known viruses include the “I Love You” virus in 2000, the “Anna 
Kournikova” virus and “Code Red” worm in 2001, the “Klez” worm in 2002, and the “Slammer” 
worm in 2003. 
 The “I Love You” virus took what made the Melissa virus spread and brought it to an 
entirely new level. Upon opening the attachment (Love-Letter-For-You.txt.vbs), the computer 
became infected, and the virus began its work. It would start by scanning the computer for any 
passwords which were sent back to a website, which was obviously made by the creator of the 
virus and since then has been shut down. Instead of just sending a copy of itself to the first 50 
names listed in an e-mail address book, this virus would send a copy of itself to a person’s entire 
address book. It also would overwrite files with the .vbs, .vbe, .js, .css, .wsh, .sct, .hta, .jpg, 
.jpeg, .mp2, or .mp3 extension, which was very damaging for companies that worked heavily 
with multimedia files. McAfee.com said that 60 to 80 percent of its Fortune 100 clients were 
infected by the virus. 
 In 2001, a new virus was spread out to more than 225,000 computer systems globally, 
shutting down many websites with the message “Hacked By Chinese”. The Code Red virus was 
the perpetrator, but also had a hidden agenda. The virus planned to shut down a web address that 
represents the White House website via a Denial of Service attack. However, the White House 
switched to another address to avoid the attack. 
 Of all the viruses I’ve studied, the most interesting one has to be the Klez virus. The 
reason I find it most interesting is by the way it sends itself to other machines. It spreads itself 
around just like the Melissa virus or the ILOVEYOU virus, except it finds both a new sender and a new victim from the infected machine. For example, Computer A gets infected with the Klez 
virus. It then finds two e-mail addresses (Computer B and Computer C) and sends out the virus. 
Computer C receives the e-mail from Computer B, making it very hard to trace. On top of all 
this, the virus will also destroy files within the infected machine. Later strands of the virus even 
corrupted the system beyond repair, forcing users to reformat their entire system and reinstall 
Windows. 
 The latest virus mentioned, the Slammer virus, was a shockwave that attacked 
vulnerability within the Microsoft SQL Server Desktop Engine, infecting roughly 22,000 victims 
globally. Sites that monitor the traffic of the Internet (such as the Internet Storm Center) 
reported global slowdowns. Yonhap news in South Korea reported that Internet services had 
been shut down on Saturday January 25 2003. 

Hackers- The “Black Hats” 

 But with all of these worms and viruses are the hackers that create them. Hacking has 
been around since the 1950’s, when young MIT students first got their hands on a computer. 
Hackers of this group included Peter Deutsch, Bill Gosper, Richard Greenblatt, Tom Knight, and 
Jerry Sussman. In the 1970’s, John Draper figured out that by using the toy whistle found in 
Captain Crunch cereal, he could make long distance phone call for free. This whistle generates a 
2600-hertz signal, the same high-pitched tone that accesses AT&T's long-distance switching 
system. Draper (aka: Cap’n Crunch) started creating “blue boxes”, and he and other “phreaks” 
(or phone hackers) were able to commit wire fraud.  One of the most noted phone phreaks was Ian Murphy, or as the hacking community 
referred to him, “Captain Zap”. Murphy was the first hacker to be tried and convicted as a felon. 
He broke into AT&T’s computers in 1981, and changed the internal clocks that measured the 
rates of calls. For his crimes, he was sentenced to 1000 hours community service and 2 ½ years 
of probation. 

Hacking – 1970-1989
  
As the years passed and technology became more advanced, so did the hacking 
community. Many of the phone phreaks of the 70’s had moved their skills into computer 
hacking in the 80’s, and with that came electronic bulletin board system, or BBS. With these 
BBS’s, hackers could trade tips, share information and stolen passwords, and talk about new and 
improved hacking techniques. It is notable to point out that this is during the same time that 
many hacking groups began to form, such as the previously mentioned 414 group, the Legion of 
Doom, and the Chaos Computer Club. While the first two are groups found in the United States, 
the CCC was a group that formed in Germany. These groups were the most influential hacking 
groups of their time. While most of their ambitions were for exploration, some hackers wanted 
nothing more than personal gain. They began hacking computers to steal passwords, credit card 
information, and remote access to unauthorized computers. Because of the high amount of 
criminal acts the US government decided to create the Computer Fraud and Abuse Act in 1986. 
This act was made to help reduce the criminal computer acts being committed during that time. 
In 1989, a group of hackers who were loosely affiliated with the CCC were arrested for selling United States operating system source code to the Soviet KGB. All were sentenced to probation 
and fined, but nothing serious was done because the information that was stolen wasn’t 
classified. 

Hacking- 1990-Present 

 It was during the 90’s that some of the most heinous hacking took place. To some, this 
decade produced the hacking “Hall of Fame”. That list of hackers included Kevin Poulsen, 
Vladimir Levin, Robert Morris, Ian Murphy, Kevin Mitnick, and Mark Abene. Each of them are 
brilliant with computers and each has their own story to put them in the Hall of Fame. Kevin 
Poulsen, or “Dark Dante” as he was known online, is known as one of America’s best-known 
cyber-criminal. In 1990, he took over all telephone lines going into Los Angeles area radio 
station KIIS-FM, assuring that he would be the 102nd caller, and become the winner of a Porsche 
944 S2. The FBI began to track Poulsen, and he was finally arrested in 1991. He pleaded to 
seven counts of mail, wire and computer fraud, money laundering, and obstruction of justice, and 
was sentenced to 51 months in prison and ordered to pay $56,000 in restitution. Since his 
release, he has become the senior editor for Wired News. 
 While Ian Murphy was breaking into phone lines and Robert Morris was making the 
Morris worm, the other mentioned hackers were breaking into the spotlight. Vladimir Levin 
made his claim to fame in 1994 when he accessed the accounts of several corporate customers of 
Citibank. He then transferred funds to accounts set up by different accomplices in Finland, the 
US, the Netherlands, Israel, and Germany. When his accomplices were arrested for trying to withdraw funds, all fingers pointed to Levin, and he was arrested March of 1995. It wasn’t until 
1998 that he was convicted and sentenced to three years in prison, and a fine of over $200,000. 
Since then, Citibank has begun using the Dynamic Encryption Card, a security system that no 
other financial institution in the world has. 
 Of all the hackers of this era, one man made himself a worldwide computer celebrity. 
Kevin Mitnick, or “Condor” online, was also nicknamed the “Lost Boy of Cyberspace” for his 
repeated offenses in computer crimes. His first attempt at any kind of hacking was when he was 
a young boy. He realized that by buying his own punch for his bus card, he could bypass the 
punch card system used in the LA buses and get free rides to anywhere within the greater area. 
However, it was his computer cracking that made him a fugitive of the law. He was wanted by 
the FBI for stealing over 20,000 credit-card numbers, and was finally taken down in February of 
1995. He was sentenced to four years in prison, and afterwards was not allowed to come in 
contact with a computer or phone line. Since his release, he now works in computer security 
consulting. 
 The last hacker on this list of fame is Mark Abene, or as he was known in cyberspace, 
“Phiber Optik”. Abene and a group of brilliant hackers had formed a group known as the Legion 
of Doom. After an argument with Chris Goggans (aka Erik Bloodaxe), he was removed from the 
group, and he then started his own group, the Masters of Deception. The feud between these 
groups ended up resulting in the Great Hacker War. The War started when an invite-only 
bulletin board called “Fifth Amendment” was closed down. The closing had been blamed by MOD member John Lee (aka “Corrupt”), who was apparently distributing information that was 
discussed on the board. After some prank phone calls and threats issued out by MOD, Goggans 
and his team began a campaign to expose MOD. The War only lasted a few days, but during 
that time it was clear that hacking was serious business. 

How to prevent a user from a virus 

 Since then, hacking has only gotten worse. Programs such as Back Orifice, which allow 
hackers unauthorized remote access into a computer running Windows 95 or 98, were being 
created all around the world. It was just before the new millennium that security software 
vendors began distributing anti-hacking software for home-computer use. While programs like 
Norton Anti-Virus and McAfee antivirus software can put a damper on most viruses, they can 
only do so much to help out a computer user. Computer users of today are not like the computer 
users of the 80’s: back then, people knew how to use a computer inside and out, and knew how 
to manipulate it to do whatever they wanted. Now, most homes have 2 or 3 computers, and 
users only know how to send an email, or open a web browser, or play the latest video game. It 
has become obvious that the common person needs to be more informed about hacking and 
viruses. 
 So how do you prevent yourself from becoming infected? For starters, using a more 
secure operating system such as UNIX can keep viruses and unwanted human visitors from 
accessing your hard drive. If a user is more comfortable using Windows, anti-virus protection is a must. A user should avoid all kinds of programs from unknown sources, and that includes the 
internet. A program posted up by a “credible source” can still contain a virus. The best way to 
install software to your computer is to install it via CD drive, and to make sure it was bought 
straight from the manufacturer. Finally, a user should never open an e-mail attachment that 
contains an executable file. Any kind of “.exe” “.vbs” or “.com” file could potentially contain a 
virus, and once you open it, you allow the virus to do whatever it wants on your machine. 
 The world of computers has vastly changed, and with it the world of hacking. What 
started out as simply an exploration turned into greed and self-profit. However, there are still 
those who take hacking as an exploration; a way of making technology better for the future. 
Hackers such as Steve Wozniak (co-founder of the Apple computer) and Linus Torvalds 
(initiated the development of the Linux kernel) are those hackers, known in the community as 
“White Hats”. In the end, the computer is simply a machine. What you do with it, however; is 
what makes this simple machine so powerful. 

 ,,,,,,,,,,,,,,###@@@@^**^((^%^%$^$%^$#%^%^^(^(^()%$%^#$.............................


No comments:

Post a Comment