ANTI (computer virus)

Common name ANTI
Aliases ANTI-0, ANTI-A, ANTI-ANGE, ANTI-B, Anti-Variant
Classification Virus
Type Macintosh
Subtype Application infector, copy protection
Isolation 1989-02 (ANTI-A), 1990-09 (ANTI-B)
Point of origin France
Author(s) Unknown
Operating system(s) affected System 6 and older running Finder
Filesize 1,352 bytes (ANTI-A), 1,152 bytes (ANTI-B)

ANTI is an obsolete computer virus affecting Apple Macintosh computers running classic Mac OS versions up to System 6. It is particularly notable for being the first Macintosh virus not to create additional resources within infected files; instead, it patches existing CODE resources.[1]

The virus carries no effective payload, and thus can exist and spread indefinitely without being noticed until an antivirus application is run.[2] Due to a bug in the virus, it cannot spread if MultiFinder is running, which prevents it from infecting System 7 and later versions of Mac OS as well as System 5 and 6 running MultiFinder.[1][3][4]

Mode of operation

ANTI only infects applications[5] (as opposed to system files), and therefore can only spread when an infected application is run.[6] When such an application calls the OpenResFile function,[7] the virus searches the computer for applications that fulfill all of the following criteria:

  1. They have CODE (application code segment[8]) resources with resource IDs 0 and 1
  2. CODE 1 begins with a JSR instruction (generally the Main resource in a given application)[9]
  3. The application is not already infected with ANTI
  4. The sum of the size of CODE 1 plus the size of the virus is less than or equal to 32,768 bytes[7]

All matching applications are then infected by appending the virus to the CODE 1 resource and adding a corresponding entry to the application's jump table.[7]

Variants

There are three strains of ANTI, with the following differences:

Payload

All strains carry a payload related to floppy disk access, but this has no effect in practice. When an infected application calls the MountVol function, the virus checks that the disk is actually a floppy disk,[7] and if so, reads the first sector (512 bytes[18]) of track 16. Then the virus compares the text at an offset 8 bytes into that sector against the string $16+"%%S".[7] If the text matches, the virus executes the code at offset 0 of the sector via a JSR. No disks containing a matching string are known to exist, so in practice this payload has no effect.

Based on this search for an expected string at a specific location on the disk, Danny Schwendener of ETH Zurich hypothesised that ANTI had been intended to form part of a copy protection scheme,[9] which would detect the reorganisation caused by a standard filesystem copy.

Side Effects

During infection, ANTI clears all resource attributes associated with CODE 1, which may cause the infected application to use more memory,[4][11] particularly on older Macintoshes with 64 KiB ROMs.[2]

Mitigation

Unlike preceding Macintosh viruses, ANTI can not be detected by specific resource names and IDs; a slower string comparison search is required in order to find signatures associated with the virus.[1]

The University of Hamburg's Virus Test Center recommends detection with an antivirus application such as Disinfectant (version 2.3 and later[19]), Interferon, Virus Detective, or Virus Rx,[20] while McAfee recommends Virex.[7] However, the loss of resource attributes means that removal of the virus does not restore the original application to its pristine state; only restoring from a virus-free backup is completely effective.[11]

References

  1. 1 2 3 4 Eugene H. Spafford, Kathleen A. Heaphy and David J. Ferbrache, "A Computer Virus Primer", 28 November 1989, p. 36. Computer Science Technical Reports Paper 795
  2. 1 2 3 4 Bruce Schneier, Protect Your Macintosh, Peachpit Press, 1994, pp. 124-125
  3. David Harley, Viruses and the Macintosh
  4. 1 2 Paul Baccas et al., OS X Exploits and Defense, Syngress Publishing, 2008, p. 83
  5. Gizzing H. Khanaka & William J. Orvis, Virus Information Update CIAC-2301, Department of Energy Computer Incident Advisory Capability, Lawrence Livermore National Laboratory, 21 May 1998, p. 59
  6. David Ferbrache, "Known Apple Macintosh Viruses", Virus Bulletin, July 1989, p. 5
  7. 1 2 3 4 5 6 7 McAfee, MacOS/ANTI
  8. Apple Computer, Inc., Inside Macintosh, Volume I, Addison Wesley, 1985, p. 107
  9. 1 2 List of known Macintosh viruses
  10. Virex, Anti-virus software for Macintosh computers User's Guide, p. 87
  11. 1 2 3 About.com Virus Encyclopedia, ANTI
  12. Virus-Test-Center, University of Hamburg, ANTI B Virus
  13. Edward Valauskas, Macintosh Workstations, Library Workstation Report, Vol. 7, Issue 9
  14. TidBITS, ANTI-B, 1 October 1990
  15. Alan Coopersmith, Virex 3.x Virus Definitions
  16. Virus-Test-Center, University of Hamburg, ANTI Variant Virus
  17. Sydney Morning Herald, Sunday, 31 March 1991, p. 45, Fighting the virus
  18. Apple Computer, Inc., Inside Macintosh, Volume II, Addison Wesley, 1985, p. 211
  19. TidBITS, 2.3 and Counting, 29 October 1990
  20. Virus-Test-Center, University of Hamburg, ANTI A Virus
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.