ЪДДДДДДДДДДДДДДДДДДДДДДДДДДДДДї
                    і        VIRUS REPORT         і
                    і     Typo (COM infector)     і
                    АДДДДДДДДДДДДДДДДДДДДДДДДДДДДДЩ

Synonyms: Fumble virus, 867 virus

Date of Origin: summer, 1989.

Place of Origin: Israel.

Host Machine: PC compatibles.

Host Files: Remains resident. Infects COM files.

Increase in Size of Infected Files: 867 bytes.

Nature of Damage: Affects system run-time operation; corrupts program or
overlay files.

Detected by: Scanv48+, F-Prot, IBM Scan, Pro-Scan.

Removed by: CleanUp, Scan/D, F-Prot, or delete infected files.

     First detected in Israel during the summer of 1989 (Some experts
attribute first detection to Joe Hirst of Brighton, U.K., in November,
1989.) It creates errors in printouts, by (sometimes) replacing some
characters or digits.  It is closely related to the Ping-Pong or Italian
virus, which is one of the most common viruses. In fact, the viruses are
so similar that some anti-virus programs even identify Typo as the
Italian virus. This is not so surprising, since the boot sectors are
almost identical. The differences between the boot sectors are:

*   Some local variables have been moved. For example, the word
    containing the location of the original boot sector is now located
    two bytes earlier than before.

*   The signature (two bytes that the virus uses to see if a diskette has
    already been infected) has been changed.

*   The activation times have been changed. Ping-Pong had an "activation
    window" (a second or so long) every half hour. Typo will become active
    112.5 seconds after power-on, and will stay active most of the time.

*   The major differences between the two viruses are in the other part
    of the virus code, which is not stored in the boot sector, but in the
    cluster the viruses mark as "bad" in the FAT.

     Of course, there are quite a few interesting things the viruses have
in common.  For instance, Typo contains the same "bug" as Ping-Pong does,
that prevents it from working on '286 and '386 machines.

     It is possible to remove Typo with some programs designed to remove
Ping-Pong.  Since the signature is stored in the same place on both
viruses, it is possible to inoculate diskettes against one of them, but
not both.

     Typo will only infect COM files on even-numbered days.


ЙНННННННННННННННННННННННННННННННННННННННННННННННННННННННННННННННННННН»
є  This document was adapted from the book "Computer Viruses",       є
є  which is copyright and distributed by the National Computer       є
є  Security Association. It contains information compiled from       є
є  many sources. To the best of our knowledge, all information       є
є  presented here is accurate.                                       є
є                                                                    є
є  Please send any updates or corrections to the NCSA, Suite 309,    є
є  4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS  є
є  and upload the information: (202) 364-1304. Or call us voice at   є
є  (202) 364-8252. This version was produced May 22, 1990.           є
є                                                                    є
є  The NCSA is a non-profit organization dedicated to improving      є
є  computer security. Membership in the association is just $45 per  є
є  year. Copies of the book "Computer Viruses", which provides       є
є  detailed information on over 145 viruses, can be obtained from    є
є  the NCSA. Member price: $44; non-member price: $55.               є
є                                                                    є
є            The document is copyright (c) 1990 NCSA.                є
є                                                                    є
є  This document may be distributed in any format, providing         є
є  this message is not removed or altered.                           є
ИННННННННННННННННННННННННННННННННННННННННННННННННННННННННННННННННННННј

Downloaded From P-80 International Information Systems 304-744-2253