CIH (computer virus)
CIH (computer virus)
Common name | CIH virus |
---|---|
Aliases | Chernobyl, Spacefiller |
Classification | Virus |
Type | Windows 9x |
Point of origin | Taiwan |
Author(s) | Chen Ing-hau (CIH) |
CIH, also known as Chernobyl or Spacefiller, is a Microsoft Windows 9x computer virus which first emerged in 1998. Its payload is highly destructive to vulnerable systems, overwriting critical information on infected system drives, and in some cases destroying the system BIOS. The virus was created by Chen Ing-hau (陳盈豪, pinyin: Chén Yíngháo) who was a student at Tatung University in Taiwan.[1] Sixty million computers were believed to be infected by the virus internationally, resulting in an estimated US$1 billion in commercial damages.[1]
Chen claimed to have written the virus as a challenge against bold claims of antiviral efficiency by antivirus software developers.[2] Chen stated that after the virus was spread across Tatung University by classmates, he apologized to the school and made an antivirus program available for public download; the antivirus program was co-authored with Weng Shi-hao (翁世豪), a student at Tamkang University.[2] Prosecutors in Taiwan could not charge Chen at the time because no victims came forward with a lawsuit.[3] These events led to new computer crime legislation in Taiwan.[2]
The name "Chernobyl Virus" was coined some time after the virus was already well known as CIH, and refers to the complete coincidence of the payload trigger date in some variants of the virus (actually the virus creation date in 1998, to trigger exactly a year later) and the Chernobyl disaster, which happened in the Soviet Union on April 26, 1986.
The name "Spacefiller" was introduced because most viruses write their code to the end of the infected file, with infected files being detectable because their file size increases. In contrast to this, CIH looks for gaps in the existing program code, where it then writes its own code. This does not increase the file size and in that way helps the virus avoid detection.
History[edit]
The virus first emerged in 1998. In March 1999, several thousand IBM Aptivas shipped with the CIH virus,[4] just one month before the virus would trigger. On July 1999, copies of remote administration tool Back Orifice 2000 given out for DEF CON 7 attendees were discovered by the organizers to have been infected with CIH.[5] On December 31, 1999, Yamaha shipped a software update to their CD-R400 drives that was infected with the virus. In July 1998, a demo version of the first-person shooter game SiN was infected by one of its mirror sites.[6]
CIH's dual payload was delivered for the first time on April 26, 1999, with most of the damage occurring in Asia. CIH filled the first 1024 KB of the host's boot drive with zeros and then attacked certain types of BIOS. Both of these payloads served to render the host computer inoperable, and for most ordinary users the virus essentially destroyed the PC. Technically, however, it was possible to replace the BIOS chip, and methods for recovering hard disk data emerged later.
Today, CIH is not as widespread as it once was, due to awareness of the threat and the fact it only affects older Windows 9x (95, 98, ME) operating systems.
The virus made another comeback in 2001 when a variant of the LoveLetter Worm in a VBS file that contained a dropper routine for the CIH virus was circulated around the internet, under the guise of a nude picture of Jennifer Lopez.
A modified version of the virus called CIH.1106 was discovered in December 2002, but it is not considered a serious threat.[citation needed]
Virus specifics[edit]
CIH spreads under the Portable Executable file format under the Windows 9x-based operating systems, Windows 95, 98, and ME. CIH does not spread under Windows NT-based operating systems nor Win16-based operating systems such as Windows 3.x or below.
CIH infects Portable Executable files by splitting the bulk of its code into small slivers inserted into the inter-section gaps commonly seen in PE files, and writing a small re-assembly routine and table of its own code segments' locations into unused space in the tail of the PE header. This earned CIH another name, "Spacefiller". The size of the virus is around 1 kilobyte, but due to its novel multiple-cavity infection method, infected files do not grow at all. It uses methods of jumping from processor ring 3 to 0 to hook system calls.
The payload, which is considered extremely dangerous, first involves the virus overwriting the first megabyte (1024KB) of the hard drive with zeroes, beginning at sector 0. This deletes the contents of the partition table, and may cause the machine to hang or cue the blue screen of death.
The second payload tries to write to the Flash BIOS. BIOSes that can be successfully written to by the virus have critical boot-time code replaced with junk. This routine only works on some machines. Much emphasis has been put on machines with motherboards based on the Intel 430TX chipset, but by far the most important variable in CIH's success in writing to a machine's BIOS is the type of Flash ROM chip in the machine. Different Flash ROM chips (or chip families) have different write-enable routines specific to those chips. CIH makes no attempt to test for the Flash ROM type in its victim machines, and has only one write-enable sequence.
For the first payload, any information that the virus has overwritten with zeros is lost. If the first partition is FAT32, and over about one gigabyte, all that will get overwritten is the MBR, the partition table, the boot sector of the first partition and the first copy of the FAT of the first partition. The MBR and boot sector can simply be replaced with copies of the standard versions, the partition table can be rebuilt by scanning over the entire drive and the first copy of the FAT can be restored from the second copy. This means a complete recovery with no loss of user data can be performed automatically by a tool like Fix CIH.
If the first partition is not FAT32 or is smaller than 1 GB, the bulk of user data on that partition will still be intact but without the root directory and FAT it will be difficult to find it, especially if there is significant fragmentation.
If the second payload executes successfully, the computer will not start at all. Reprogramming or replacement of the Flash BIOS chip is then required, as most systems that CIH can affect predate BIOS restoration features.
Variants[edit]
Moniker | Description |
---|---|
CIH v1.2/CIH.1003 | This variant is the most common one and activates on April 26. It contains the string: CIH v1.2 TTIT |
CIH v1.3/CIH.1010.A and CIH1010.B | This variant also activates on April 26. It contains the string: CIH v1.3 TTIT |
CIH v1.4/CIH.1019 | This variant activates on the 26th of any month. It is still in the wild, although it is not that common. It contains the string CIH v1.4 TATUNG. |
CIH.1049 | This variant activates on August 2 instead of April 26. |
See also[edit]
References[edit]
- ^ a b ithome.com.tw. 從CIH「重裝駭客」變身「除錯超人」 Archived 2013-04-17 at the Wayback Machine. 2006-08-25.
- ^ a b c parenting.com.tw. 從駭電腦到愛旅行─昔日網路小子陳盈豪
- ^ cyy.moj.gov.tw. 打擊駭客,不再無法可施
- ^ Weil, Nancy. "Some Aptivas shipped with CIH virus." CNN. April 8, 1998. Retrieved on March 28, 1998.
- ^ ZDNet news "Back Orifice CDs infected with CIH virus", dated 14 July 1999, accessed 8 August 2006
- ^ US Report: Gamers believe Activision's 'SiN' carries CIH virus - ZDNet.co.uk
External links[edit]
- F-Secure CIH Database
- F-Secure CIH Technical Page
- Symantec CIH Technical Page
- News article about the Jennifer Lopez e-mail
- FIX-CIH - Site by Steve Gibson on how to repair most of the damage from CIH
- CIH 1.4 source code
Comments
Post a Comment