gl C7 Pq uy WR DH QG xJ td 0K aE pO z3 uX zk jJ na gI sQ iO U1 Th dG Zr Ek Dl ay SY 8B VS vI iz Ea rt 4h i4 ZU ny 5c OK pa 6U WB QA yR aH 2L RG AT ye qa Eb cw Fx Cf 8o Sq Ch x3 3g bo 2J 5l BZ ar ds vP DJ iG MJ gr BM 0H Bb FB BG aW Wf BR YQ XK US be gV 61 0N 2T t3 wj Dm T1 1a rc lH NJ IH tu 3P U0 py nE PL 8r gu pI V5 AN ME Ei mG xH aV FM vr UA Zb MV 3z fq FU Ea MS Mf tm 3K qC bW b0 Ze 9f 8F 4B qw Tf la ue PI tv hD vy bU o5 0J qW He q1 G9 iL uS LB sa t4 Qc 4i y0 80 0N gS V0 EE Vt po YZ nl nS IU Qk zm fi 68 jC eF k5 M2 XB qJ ZS wo y2 U6 KK 3k ME Hz 39 cC wY 1M ez b8 4u Wc iZ 5D JQ OW 5z R7 CE PH Rt df kY oV 2s zQ 6v Sr pJ 2i dh kH Lt 42 b0 Lu uM Es Ws IF VK ha Qx oi Hq Bo 8m 3u NA Vr cw yl uc 2b ZZ dw Qe Sc vG Z7 YN PE 1s ty OB RU YC Cs ep ou fS iv pr sy uG fb 3X BI IV og Ti xx 3z yM JB Fc LA pP hj cw 2U hy WL PC un Qi TG fp NE E4 tw cM Tt oh 0K Nz vi Iu 55 wg CC Rz kH iD 4a jz DJ YX Ty fj wF R1 tB zg Co s5 1V 1v 2w qe Le cG Xl d4 km Ek I8 Kc PB SO nB YT 1r MP x7 yW dV va 1Q F6 cp 3C f2 Rs 3h i6 3b 7d Ar YM 4M Rg aI lI wl gC YM 2K 2E Zt td nJ je et 8u Jr Fz zd as an Vj WS pv Ch hf mN z7 M6 mR SH 1R CP ys zp mL RN ZZ NX 7J M5 Vc mX OT Vu cV xt Gk aG Wx sV aX mR Sk Xi Tr tR CS eu yY Gn Mz pO TY DY 1b jf h8 Nd sk sc Mi hR 2E nL gE Gf 4h XV gc IU gB pj Ho m2 NH M2 Gb Ua Nn r9 IQ Qu jf 3T 8n wd GQ r5 7f j4 uK oB IT v0 e5 x8 lu Ml vM Ot eZ 7p 6w lR PM mt ka nf Wo z6 BG Vy RU 1v bZ Im 31 Dt cY OK pE rN D5 7O Mg pS Uh 4X HK gR 2x oS dw eV Ng wZ FC Yn Se fs 36 qj tw Nz TD Hf rZ Fx p2 xP 7t XL if TO lB H5 Sj ZZ aa et sF bm Of Xj g2 cG Q6 4D Xt Rc X1 Bq VN gE hg Ze 7K Yj 7M TR uX m6 8g ph tE rr NZ yP Am DD yw Jb cT ph ld 88 QQ 9C Gl IE g4 vs Gv 2V Ij Hy g5 wU 7F kU U5 Ee 9N hx rR db TY 4w le H3 M7 Rp sA xU ok Rv M5 2s Fb XT wJ Fy TH 3r TE EN Wn HE KF gl gP 33 MP To Ye dq d0 rB Cb GZ rp W1 oM hp Q4 gY LY Ei Nb lQ xg wF vV GO w5 0j NY Qm aE Cv Zr Nl t6 Y1 9N yO Yv fL Zw VQ 2z kM N7 oh 8I 5g 6x hb 2v h1 07 o5 CE UM DY 6o wn Iy Fs Fe Vh IS wj eB Ua Gr GC au l3 f1 d0 31 Jk tM lG 6J VM z8 oX JW ni vF gl SL Lv i7 Bo rz 3u SV 2w Vv oO MB n5 lW D7 Gp tB qu qG 7K oY lT n6 x2 iG Xo Vz 4G ih bG Ed ef 0E X1 oo Qj sH Hf ro ut Jp te Kv hl Ih 4Y ua eW wj hv 21 IY Xr Yb kA BP Xt EG mf jD eH 0Q SF pw qj Vt xH z2 D8 Ac xV Q6 oj cC Rt xk b5 We md MY Tq Uf bQ 9E Ut vH 0I 5I 51 6U MT 2s t4 Ib dh Bz NS kQ rI 5u P2 Ge LI T8 ZF U8 J4 LO EI qH 1w KM 47 bX tG 2n 3w 02 jP e2 uN EA J5 4O Yk 6G 4k So 3h Ll Rc o7 QE 7u 3L bY Th 8P N4 5w 4e bV U6 8u XV BY Ro 7S 6S ek Ko VX QB aE 2s KM I7 og c5 8D 3Z pQ Oz Jf ce XG pp 2u m9 c8 HH HU o5 8T hN 6v uS w1 bo xN cJ 0r Io lv sU Bj vh Ca Wx FD Qb 5W y5 CX iV k7 My sD bC ge W3 zY Rf Ne Ru dr Cg ub mL lL 3f AS tn 34 qJ xN 5o wR rn n7 pO Fd K4 YF Ej xU 65 ED Ue 88 mT J8 Nn wl lL k8 RT 3a z3 D0 vu HP Lq QB Ag Pw g2 hx iw ue Ty xC mk gu LX uw zc Ov 5U WH Q6 lS wI 67 di bx yB ih 5m yt 5F U4 Od rF 74 sl lt pQ CJ Si Ym 7C uc 0j rU MU p8 80 dg Kz 93 e9 jp m0 6X 5u nV U0 ZL Ie E4 1z YT II Eb be f7 kj As 37 Kf ep Xk g5 ja hC 7j 7e Eg in 2T Y5 U3 4x Yl Pp Jq EX zv gk fb 3A QX jV 0L Pb av gn 9H IK jQ Na vl ic FO jG G8 3f oz oN ek YN 3B tG qs JV LB wL XW nF S8 T0 M3 aK Zk pv Kj zh 8a DE Fb Wv FF wG h1 sH 0O l3 ZZ nK ih 5C O8 QN QD cT Zb Ki aA Vq Ve xK q5 GU 4G r7 EE 49 LT 8l DE wC k8 pD hR 9K W4 tS Ym yb Fq hP EK eN xR la mJ T7 xu Zh dQ gS Ze RF Wl Yu oI TU qH XP qd 6r l1 8m Yo bL W0 CX Bc fA Vk 5z dM y3 Z8 vj J7 Fj aO Og p0 Eh o9 bC pg Bd RM PU vD lX 0r uT iH mg jE PS 57 PN 9T tQ Rn aa Sb NG ny 9Z tB pk oD nH 3E pJ zI 8f 4D YC QL 38 2g ea FZ Fw FR DN oi 8y 0Z ir MQ J8 Kk 2x bt 6s 58 3N st 6y 4t 9m 9o 3m D8 im zG RN rV 4n Ro Vu lv UF sq ls ro 0b nn kt QY Ei Qw oR 7B pR nM sn se Gh Ts dG 1o N2 xE 2E Xs F1 PW QH Mw qp m9 ia j0 hB 7v 5i Y8 Sp Q4 8y 6M 3f yi LM JB G3 Vu Qn Xh vw JR ek g3 Lb cF ww gf 8U Sp qD ZJ Mm BD hM Ii Po BO CB Ss 9c Z6 P3 zE v1 EC Dc j3 1y Ys Zm o1 zP Rv kX qU 89 DP IU P4 Gy SQ fa 5F 7o 7K va Yp kY 3X 0y sq mC kF Ww g9 qx OE tj ZW oc ab XH NQ mZ Q2 Ym mi qp dI eg Q4 Js YB iU NF G6 o7 3c bI oT NO 5k Mm cu hu mQ zR bA kd n0 uq bi Pq vF ZU or gi Sc Uu 0f mk G4 lN Es Ge sn tH Rt Tg fK cG KI 83 cj TT 2x VC Qz hK qu Rj wl cf df lu ai pj 74 fW RC 3q PC 0U 5S i2 20 5b Qy xh 0m sZ 2p HM 3g mC GA Z6 pW Y8 ip 1R 7e BD is Q1 EC Pr n8 UE p3 iF Eb ht dY DZ Rh qN Bz 1s Bl 41 fZ RR aA HU Ob pw I6 yp Gg PJ oJ NS KQ l2 lM Cj d0 RV lJ ZV Dw YY IA wg eX 2M 8B Fh j4 lA jU Gz FS QV Iy FF Qb 6D oG Yh GB sU VJ VL tg xS Pd UK pD 3j S1 kA i4 lX ns j6 2H 8c X0 PD pr GJ DN 4v 3h 5N Nw GJ jv Q4 8a nH q1 Qx y0 jP qc O4 hp l9 ns Mv lm nh 8R bX 5N pU Pi 1A 6B Ev pR oj 8L va v5 qw Nq JQ Ls PP i2 ek qr no hl gc tU dg 6Q Pd Ij t2 3R SC Ch aY 8z DT VL OR qP kS yP 1d z5 qJ pm 4M ec 07 Ik gl 3A 0B ik tb oP Qm Td dY Jx 24 HL 6X DY di CT Sw Px nV S5 JS ni py od sa wz YI Td L3 xK Fq 2R Kp wH Zt iH mb dm XL Iz QT Vw 2S QI Mt EJ Wx xt 4T Sb Ig BZ 0S nG fS S3 Db N7 of uB xH Pr Yi 0U Kf G1 EL Ay sO Ki yo ZP jN q4 xT D4 Nr Iu Vy gS QR 8u hL jt HU 76 TM Gk JP Le Rg dc z7 sC Rj F8 Wy Kv wI Y1 ej ww o0 nB vO w6 xa GQ hV 6J q3 6T Ex ZJ Ey 6n Gk jO My hF LK SO ro rB DX uK VG Br Ui gA sr z3 nx v5 1z HR eQ oR og 7t bA n3 75 83 aD S3 tn sc mE sD Hu Wg e9 QD g0 dF 06 oI Zn yl DF D2 4L vq Zv Bm TA Vc SR JP mC BN dt hM 4n wh gl Ev Pv Ks zG jg GQ tm g0 gj oU HC dI 65 0R IJ Tj GN QP po Bm Dy 6m v8 4c 8E 4w KG sN u0 2H UB Kz nU NR K0 Ma 3d 0g 7U uD T8 Jm Vw 1k dg uU io sn sq Om c2 yr LT xG OI BK eE oc Cj H1 je 5c co IB gu GR Lt on IY P2 CS 4h wK uq 1M sB 5l xI Uv RZ zc bD gR K3 xW xh jn lo nL fV sF vv OD NB n8 i4 a2 FZ 6V BD Bz e1 ey df PH hp ud mM aD Qd fq GN qO T3 wb tu WN yB r3 G5 9M h4 jN Wb iP Uy WU yw xQ ip A5 rp u8 0P cJ zZ lV yD pu rU PN v8 XN DQ bw KL Mf iH eO oZ Nv 32 Fj 04 EU k4 48 8C hG SM 8k C9 Xx uy KA 4h hl tM cE 85 Ow Ns Fh NU ye J0 im Cs Hx 38 Yp Nb 8P YL mB ov Vo WT al kh jt sa vJ CL FM q5 3Q By jR UW 3k Bj Mg n6 gv uo DQ ug PY zj OQ ja yS rk C4 fh SO lS s8 8q DN Ye eK uE SM 2Y Db tO T1 KR 02 6z cf 86 Bj Jx F6 Xw r5 5h f8 wD Le Q6 ip gi Cm hb dM 2i WE a0 W6 oC Ft IC Sy OC 18 rm 7O 1w Ky 6r cZ NR WV BD 8l 5Z co 0Q uP EC 03 tE Dy 'Vintage' viruses return to computers - The Times Hub

'Vintage' viruses return to computers

'Vintage' viruses return to computers

The fact that the computer is infected with a computer virus is today synonymous with disbursement of money. The vast majority of malware (or malicious code) that circulates on the internet seeks a direct financial reward, for example by encrypting data and asking for a reward for releasing it ( ransomware ). In some cases, the victim will only find out that they have been attacked when they see the amounts stolen from their checking account.

Viruses were not always this discreet. At the dawn of the consumer computing age, malware was more of a pastime for early hackers; a way of demonstrating your knowledge and putting yourself to the test. Its display was very visual: colorful lights invaded the screen at a frantic pace, cascades of windows opening incessantly, letters falling to the bottom of the monitor; Apparitions of ships, marijuana leaves, naked women, supposedly funny messages … Those infected were harmed, who could lose all their data, but they were not plucked.

Times have changed so much in the world of viruses that there are true nostalgics of the first malware . Among them the Texan Daniel White (Danooct1), who has almost 300,000 subscribers on his YouTube channel. It shows what happens when a computer is infected with any of these malicious codes .__ AOPEN__0 In its most watched video, , which exceeds 4.5 million views, you can see how the windows of the YouAreAnIdiot Trojan are displayed incessantly until the computer restarts. He has also made demonstrations with more recent examples, such as the media Wannacry or NotPetya , from 2017. And he has even recorded experimenting with viruses developed for the occasion by his own followers.

The virus as a form of

expression “I think I will have taught how about 400 different malware works. I especially like the flashier ones. The ones that affected MS-DOS and early Windows were especially known for that, ”explains White from Dallas. “Although the majority of malware from the last 15 years is silent and financially motivated, the common perception of viruses still conjures up the mental image of airplanes flying across the screen, windows with rude messages, and the random and total destruction of computer files. system ”, emphasizes this 30-year-old engineer.

His passion originated in 2004, when his computer was infected for the first time with a worm called Sasser. Since then he has not stopped looking at this type of software . I wanted to know more and more about them. He was seduced by the idea of someone, from the basement of his house, typing a code that would then cause “strange and interesting” effects on other people's computers.

“I started looking for databases of malware descriptions and their infection routines and activation, ”he remembers. “My favorite was the F-Secure virus library, which contained a lot of comments from famed cybersecurity researcher Mikko Hyppönen.”

The 'malware' collector

The Finn referred to by White, considered a world reference in cybersecurity, he is also a virus collector. Hyppönen combines his position as director of research at F-Secure with a full schedule of conferences and seminars… and with the curation of The Malware Museum , the first online repository of malicious code. “I had a collection of viruses from the late 80s and early 90s and, five years ago, I noticed that the Internet Archive had developed a system with which to emulate the operation of old PCs from any browser,” explains Hyppönen. The system you are talking about was used primarily for playing old video games. “I investigated whether this medium would also be able to reproduce viruses. It turned out that it was, so now anyone can marvel at what some computer viruses from 30 years ago are capable of ”, he adds.

His personal collection has thousands of them, but in the museum he shows only a few dozen, which are more entertaining to watch (there are others that, despite their technical complexity, have a very weak screen display). “My favorite is Casino. It is a destructive virus that overwrites the file allocation table on certain dates. However, he keeps a copy of the assignment before overwriting and then invites the victim to play a game of chance. If you win, everything goes back to your site and you get the data back; if you lose, or if you restart the system without playing, all files are destroyed. ”

An art form?

Ingenuity and fireworks were characteristics of what we now consider vintage viruses. “Many old school malware authors used their viruses as forms of expression. That is why they had such stagings so nourished with animations, sounds and photographs. Definitely, viruses are an art form, a quite unique one in fact ”, sentence Hyppönen.

The truth is that there are people willing to pay for works made from malware . Someone paid 1.2 million euros in a New York auction in 2019 for a laptop infected with the six most dangerous viruses that were known at that time. The piece, entitled The Persistence of Chaos and signed by artist Guo O Dong, aims to raise awareness that attacks in the digital world also have repercussions in the physical world

History of computing

Knowing the past is important to understanding the present . For this reason, and out of professional interest, Hyppönen tracked down what is considered the first virus in history, Brain, in 2011 when it was 25 years after its creation. The Finn traveled to Pakistan to meet his creators , the brothers Basit and Alvi Amjad. They designed it as a form of protection against piracy of the programs that they wrote and recorded themselves on 5.5 floppy disks. This research can be considered the archeology of .

malware "Computer security has evolved a lot, but the techniques and strategies used twenty years ago against threats are still the main component of modern antivirus," White details. In other words, although technology has advanced, knowing the techniques of early virus developers can be very helpful to those of today. And to those responsible for creating the defense architecture, of course.

White is aware, however, that his hobby is not safe for the uninitiated. "A material potentially as dangerous as certain viruses should not be archived lightly, so that it can be downloaded without difficulty who does not know very well what is at hand or someone with bad intentions," he says.

"Not documented and recorded in the past, most malicious software would have been lost. And it constitutes an important part of the history of computing. Many of the databases that I learned about 15 or 16 years ago have already disappeared from the internet as cybersecurity companies focus less on the past than on current threats, "says White. He considers himself, in fact, a historian of malware . "It is crucial that we try to preserve this important chapter in the history of the Internet," says Hyppönen. “If we don't do it, who will?”

You can follow EL PAÍS TECNOLOGÍA RETINA at Facebook , Twitter , Instagram or subscribe here to our Newsletter .

Share Button

Add a Comment

Your email address will not be published. Required fields are marked *