| T.R | Title | User | Personal Name
 | Date | Lines | 
|---|
| 4695.1 | Security | BBRDGE::LOVELL | � l'eau; c'est l'heure | Thu Jul 04 1996 09:13 | 9 | 
|  |     Greg,
    
    	Standard procedure for *ANY* security related incident is to
    contact the security response team.  Given that most of the US 
    are out for the next 2 days, I'd recommend that you contact
    European Security straight away.  E-Mail to SEC_OPS@VBO
    
    /Chris.
    
 | 
| 4695.2 |  | BBRDGE::LOVELL | � l'eau; c'est l'heure | Thu Jul 04 1996 09:19 | 5 | 
|  | 	I've confirmed the virus is present in that file and as I
    couldn't contact Greg by 'phone, I've passed the details
    to Security Operations.   
    
    /Chris.
 | 
| 4695.3 | Please ! Use the right channels | VARDAF::BERBIGIER | No known policy forbids common sense | Thu Jul 04 1996 11:19 | 9 | 
|  | I would stress Chris' answer.
It is a very good intention to try and inform users of a security
incident, but we've lost a few hours due to the fact the
incident escallation procedure has not been followed.
How many customers have been infected during this delay ?
Pierre
 | 
| 4695.4 |  | WOTVAX::HILTON | http://blyth.lzo.dec.com | Thu Jul 04 1996 11:22 | 9 | 
|  |     Pierre,
    
    >> It is a very good intention to try and inform users of a security
    >> incident, but we've lost a few hours due to the fact the
    >> incident escallation procedure has not been followed.
    
    I had no idea what the escallation procedure was, hence this note.
    Without the notes conf, and Chris' answer, I'd still be asking around
    as to what to do.
 | 
| 4695.5 | Document no longer available | TROOA::RITCHE | From the desk of Allen Ritche... | Thu Jul 04 1996 13:27 | 17 | 
|  |     Indeed that document contains the Winword/Concept macro virus.
    
    Realizing today is July 4, I just called the emergency hotline in the
    U.S. as noted in our security web page http://www-security.mko.dec.com 
    
    They advised me that the issue has already been reported and is being
    worked by Corporate Security (Phil Bancroft and Bob Lyons).
    
    I trust this is now in good hands.  In fact, Bob Lyons just advised me
    at 1:25pm that the document has now marked hidden.
    
    Regards,
    Allen
    CCS IT Security Operations
    
    
    
 | 
| 4695.6 | file unavailable | POWDML::LYONS |  | Thu Jul 04 1996 13:31 | 6 | 
|  |     Effective 13:30 hours the Word, pdf, and Postscript version of
    AlphaStation Options V96.1.3 is unavailable. Thus if you point to them
    you will get a "Not Found" message.
     
    Bob
    
 | 
| 4695.7 | Are there any PostScript Viruses? | ZUR01::SUTTER | Who are you ??? - I'm BATMAN !!! | Thu Jul 04 1996 15:47 | 13 | 
|  |     > Effective 13:30 hours the Word, pdf, and Postscript version of
    > AlphaStation Options V96.1.3 is unavailable.
    
    Could this virus, any virus for that matter, survive .doc -> .ps 
    translations? -- I doubt it. 
    
    What about .doc -> .pdf format translation? 
    
    Just wondering ... 
    
    Regards, 
    
    Arnold
 | 
| 4695.8 |  | VANGA::KERRELL | salva res est | Fri Jul 05 1996 03:08 | 5 | 
|  | re.1:
First I've heard of it, but then I've only been here 12 years.
Dave.
 | 
| 4695.9 | Incident Reporting Procedure (pointers) | ULYSSE::RAMBEAU | Jean-Paul Rambeau @VBO | Fri Jul 05 1996 04:11 | 9 | 
|  |     The Incident Reporting Procedure is available from VTX SECURITY and on the 
    web at http://www-security.mko.dec.com/
    
    Please directly communicate with the contact people listed in the
    Incident Reporting Procedure for any incident such as this one.
    
    Jean-Paul
    CCS IT Security Operations.
    
 | 
| 4695.10 | Guessing doesn't always work | EEMELI::SIREN |  | Fri Jul 05 1996 04:31 | 15 | 
|  |     
    
    
    
    I bet, that nowadays many places don't have anybody to tell people
    about VTX SECURITY (not difficult to guess, but people don't us VTX
    that much any more) or even less about the security web address.
    
    We should improve our naming practices for important information and/or
    in TCP/IP world move all important info under the same subdomain
    (das.dec.com seems to be a good candidate) and/or arrange a single
    effective search engine with garanteed visibility to important info
    (altavista.pa.dec.com? (should it be altavista.das.dec.com)).
    
    --Ritva
 | 
| 4695.11 | Quality Improvement Opportunity | BBPBV1::WALLACE | Unix is digital. Use Digital UNIX. | Fri Jul 05 1996 06:03 | 14 | 
|  |     Hiding the PS and PDF versions is probably overkill. This virus applies
    only to the .DOC version, as it uses Word's facility of running a
    "program" (a macro) when a document is read in. So far as I know,
    there's no real damage a .PS can do, and probably no real damage a .PDF
    can do. (But I'm not claiming to represent Corporate Security).
    
    There have been incidents of this nature (WinWord/Concept) with
    documents in the Integrated Repository before. If we really were
    integrated, the Web folks would use the IR as source, and the IR folks
    would virus-scan anything PC-related before allowing it in, and we
    wouldn't have any problems like this.
    
    regards
    john
 | 
| 4695.12 | Some Ideas | GIDDAY::lap8eth.stl.dec.com::THOMPSONS | Welcome to the Jungle | Fri Jul 05 1996 06:20 | 7 | 
|  | Why not create a mail account
[email protected]
and security.dec.com or www-security.dec.com
Cheerz
 | 
| 4695.13 | postscript nots safe | EVTISA::ES_COLAS | waiting for openMAC axp ;-) | Fri Jul 05 1996 07:14 | 5 | 
|  |     Re.11 ) A .ps file is a postscript program that may damage (need hardware
    intervention) printer. So It's may arrive...
    
    rgds
    Yann  
 | 
| 4695.14 |  | COMICS::CORNEJ | What's an Architect? | Fri Jul 05 1996 12:49 | 6 | 
|  |     re .11,
    
    Sounds like most .PS files I print :-)
    
    Jc
    
 | 
| 4695.15 | Handled | MINOTR::BANCROFT |  | Mon Jul 08 1996 14:43 | 14 | 
|  |     The 226-7974 DTN phone always has the on-call security consultant 
    beeper schedule.  The number is in many places, like VTX Secutity
    and the  Security Web pages.
    
    One of us is always ready and set up to handle such problems 7 days
    a week, 24 hours a day. Please let us know of problems like this as 
    quickly as you can.  In some cases, (like the spread of a virus) 
    speed is important.
    Phil Bancroft
    
    PS: - quite right - this virus spreads through the source language 
    (.DOC or .DOT) files only.  The print files (.PS or .EPS) do not
    carry the macros.  There IS a printer virus, but this in not it.
    Naturally this virus can be mailed, net copied, or sneaker-netted.
 | 
| 4695.16 | marketing wizardry? | DELNI::MURPHY |  | Mon Jul 08 1996 17:12 | 3 | 
|  |     Just what is the "concept" virus anyway? Does it slow down your PC to a
    screeching halt and then pop up a little window that says that you
    should buy an Alpha? What a great idea... =)
 | 
| 4695.17 |  | CUSTOM::ALLBERY | Jim | Mon Jul 08 1996 17:27 | 6 | 
|  |     The "concept" virus (I have no idea how it got that name) is a set of
    macros that keep you from doing a "save as" option by forcing your
    document to be a document template.  It's annoying but relatively
    harmless.  Once you get a document with it, it infects your normal
    document template so that any document you create afterwards is also
    infected.
 | 
| 4695.18 |  | BUSY::SLABOUNTY | Being weird isn't enough | Mon Jul 08 1996 17:47 | 5 | 
|  |     
    	That's a clever concept for a virus.
    
    	Hmmm, maybe that's how it got its name.
    
 | 
| 4695.19 | I'm waiting until the bean counters decide to shutdown DAS | STEVMS::PETTENGILL | mulp | Mon Jul 08 1996 19:15 | 11 | 
|  | Policy prohibits a www.dec.com because we might want to setup an office in
Wala Wala, Washington and assigning www to a node address would prevent being
able to send mail to someone at site www using person@www or [email protected].
The idea of using generic or meaningful names based on common conventions or
names would run counter to policies defined based on simplifying operations.
Operational considerations are far more important than human factors.
It makes far more sense for SEG to refer to Bemerton, Washington than to
the Semiconductor Engineering Group.  Heaven forbid the possibility that
an organization would usurp the _obvious_ site code "SEG" for Bemerton.
 | 
| 4695.20 | Walla Walla and Bremerton | LOWELL::MIDDLETON | John | Tue Jul 09 1996 01:57 | 4 | 
|  |     FWIW, the two cities are Walla Walla and Bremerton.  I'm originally
    from Bremerton.
    
    							John
 | 
| 4695.21 |  | WOTVAX::HILTON | http://blyth.lzo.dec.com | Tue Jul 09 1996 05:31 | 5 | 
|  |     Could someone please re-assue me that me do virus check all documents
    before we publish them in the IR or externally on the web, and that
    this was an isolated incident, that got through the net?
    
    Greg
 | 
| 4695.22 |  | HELIX::SONTAKKE |  | Tue Jul 09 1996 09:11 | 6 | 
|  |     RE: .19
    
    You seem to have lot confidence with Digital to think that we might be
    *opening* a new office in future.
    
    - Vikas
 | 
| 4695.23 |  | USCTR1::SIGEL | Flock of Sigels | Tue Jul 09 1996 09:54 | 5 | 
|  |     I got affected by the virus, it altered my Microsoft Internet Assistant
    and my clip art gallery in Power Point. I had to re-install both
    applications.
    
    Lynne S.
 | 
| 4695.24 | ex | PULMAN::CROSBY |  | Tue Jul 09 1996 10:14 | 8 | 
|  |     Re:.17
    I beg to differ.  This virus is anything BUT harmless.  I caught it
    over the Holidays (Christmas, that is), and it crashed my C drive. 
    MacAfee will find and eradicate it, and the network ops people have a fix.
    
    If you have it, get rid of it as soon as possible!
    
    gc
 | 
| 4695.25 |  | SMURF::PBECK | Paul Beck | Tue Jul 09 1996 10:15 | 2 | 
|  |     There is more than one variant of the Concept virus. The original
    was fairly innocuous; the later version(s) less so.
 | 
| 4695.26 |  | USCTR1::SIGEL | Flock of Sigels | Tue Jul 09 1996 11:10 | 5 | 
|  |     Best bet is whenever information is downloaded off the internet scan it 
    with F-PROT for virus.
    
    
    Lynne S 
 | 
| 4695.27 |  | QUARK::LIONEL | Free advice is worth every cent | Tue Jul 09 1996 11:49 | 4 | 
|  | Until recently, F-Prot couldn't find Word macro viruses.  Make sure whatever
virus protection you use is up to date.
				Steve
 | 
| 4695.28 | known about for at least 10 months | FIREBL::LEEDS | From VAXinated to Alphaholic | Tue Jul 09 1996 12:03 | 239 | 
|  | Here's what the Sales Workbench folks got about the CONCEPT Virus last year. 
Arlan
                  I N T E R O F F I C E   M E M O R A N D U M
                                        Date:     05-Sep-1995 02:56pm PDT
                                        From:     Corporate Information Security
                                                  SECURITY@A1@SALES@AKO
                                        Dept:      
                                        Tel No:    
TO: See Below
 
Subject: Microsoft Word Macro Virus                                             
From:	Steve Dancause @MSO, DTN 223-8717
                          DIGITAL INTERNAL USE ONLY
    
    
    ***********************   CORPORATE SECURITY   *************************
    *                                                                      *
    *                 CORPORATE INFORMATION SECURITY GROUP                 *
    *                           September 5, 1995                          *
    *                     [DO NOT DELETE THIS BANNER]                      *
    *                                                                      *
    *********************   SECURITY ADVISORY #95-02  **********************
    
    
    This security advisory is directed to all Personal Computer users, 
    internal support personnel and any other appropriate internal 
    organizations within Digital Equipment Corporation.
    
    Distribution is via Reader's Choice to all employees.  Managers are 
    responsible for dissemination to other Digital workers not covered 
    by employee-wide Reader's Choice mailings (e.g. contractors).
    
     
    SUBJECT:  Microsoft Word Macro Virus
    	
    	A virus which affects Microsoft WORD documents has been reported 
	recently and confirmed to exist. This virus replicates on all 
	platforms which use Microsoft WORD 6, i.e. MS-DOS, Windows, 
	Windows 95, Windows NT and Macintosh.  
    
    	As with many viruses this one has been given many different names,
	in this instance: "Word Macro Virus", "WinWord.Concept", "WW6", 
	"WW6macro" and "Prank Macro Virus".  The virus uses 'macros' 
	(embedded executable instructions) to replicate and infect WORD 6 
	files.
    
	Although this is a cause for concern, it is NOT cause for panic.
    	This particular exploitation of macro capability is simple to 
	identify, and easy to eradicate.
     	
        As with all Personal Computer viruses, it is imperative that 
        infections are contained and eliminated.  For example, any person 
	using WORD 6 must take precautions to assure that these files are 
	not infected, especially if files are to be transferred outside of 
	Digital.  
	To eliminate this virus, the following procedure must be implemented.
    
    
    REQUIRED ACTIONS
        
    	1. TO IDENTIFY THIS PARTICULAR VIRUS INFECTION: When an infected 
	   WORD file is loaded, a dialogue box titled  "Microsoft Word" 
	   appears, containing only a "1" and an OK button. If you have NOT 
	   seen this when opening a WORD document, your system may be OK 
	   for now, but be aware that any strange behavior should be 
	   reported.  See contact information below.
    
    	2. IF YOU HAVE AN INFECTED FILE, or to be certain that the WORD
	   environment is virus free, copy the Microsoft-provided file 
	   SCAN831.DOC (August 31st 1995 version) to a working directory 
	   from:
    
    	   	MINOTR::USER6:[VIRUS.WORD]
    	   	       or 
    	   	VARDAF::EUROPUB:[VIRUS_SCANNER]
    	
    	   Open SCAN831.DOC (or the latest version) in the same way as 
	   opening any other WORD document to invoke a scanner/cleaner 
	   for .DOC files. Easy to follow instructions are included in 
	   SCAN831.DOC. This tool will establish if normal.dot 
	   (template file for normal documents) is infected, and then 
	   take action accordingly. SCAN831.DOC also displays informative 
	   progress messages.
    
    	3. Users can also copy file WD1215.DOC to obtain a good description 
	   and graphic illustration of the virus symptoms and solution.  
	   The WD1215 file (4-pages) will be especially helpful for support 
           organizations advising internal and external customers.
    	   
    	4. It is recommended that all WORD users disable the ability for 
	   WORD to update normal.dot, without prompting for approval. 
	   To do this: click on "Tools", then "Options", then "Save" and 
	   finally check the "Prompt to Save Normal.dot" box.
       	5. Future versions of Corporate licensed virus protection software 
           (e.g. F-PROT and SWEEP) will include detection capability for 
           "Word Prank". 
    
    	6. Per Corporate Security Standard 211-04, all virus infections 
	   must be reported according to established procedures. See contact 
	   information below.
    
        
    AWARENESS NEEDED:
    
    	1. It is important to understand that Personal Computer viruses can
	   be a serious risk to Digital.
    
    	   To reduce the risks, do not use diskettes or files from an 
           unknown/uncontrolled environment. Beware when downloading any 
           files which may contain programs or executable instructions.   
           Frequently run the latest version of the Digital approved 
           anti-virus software (F-PROT and/or SWEEP).  Always have backup 
	   and a contingency plan in place to recover personal computer data.
    
    	2. Users and support personnel should be aware that the possibility 
           of undesirable or damaging effects can exist in an environment or 
           application that provides uncontrolled automatic execution of 
           computer instructions in the form of macros, command scripts, 
           learned keystrokes and the like, especially when such embedded and 
           possibly hidden code is provided by another party.
    
    	3. Microsoft is investigating ways to build some type of protection 
           into the MS WORD product itself.  When available, these protection 
           features should be enabled.
    
    
    
    Microsoft Word SCAN831.DOC Tool and Information Pointers
    ========================================================
    
	DECnet:  MINOTR::USER6:[VIRUS.WORD]SCAN831.DOC  (doc virus scan/clean)
                 MINOTR::USER6:[VIRUS.WORD]WD1215.DOC   (more information)
    
    	         VARDAF::EUROPUB:[VIRUS_SCANNER]SCAN831.DOC
    	         VARDAF::EUROPUB:[VIRUS_SCANNER]WD1215.DOC
    
    	Latest support information on WORD and the scanner is available from    
    	Microsoft via the Web:
    
    	   http://www.microsoft.com/msoffice/prank.htm
    
                                       or
    
           http://www.microsoft.com/kb/softlib/Office/q_word.htm
    (Look for the "Prank Macros" Application Note - Windows or MAC as needed)
    
    The information as of this date applies to Microsoft Word versions 6.x 
    for Windows, Microsoft Word versions 6.0 and 6.0.1 for the Macintosh, 
    Microsoft Word version 6.0 for Windows NT, and Microsoft Word version 7.0 
    for Windows 95.
        
                          DIGITAL INTERNAL USE ONLY
                     CORPORATE INFORMATION SECURITY GROUP
                          SECURITY ADVISORY #95-02
    
                                      ****
    
    
    CONTACT INFORMATION:
    
    ASIA/PACIFIC
    	Your Regional security contact or as per VTX SECURITY_AP
    
    EUROPE
    	Your regional/country security contact as per VTX SECURITY_EUROPE or 
    	EISOG (European Information Security Operations Group) Contact  -  
    	EUROSEC @VBE / EISOG Hotline, DTN 828-6328
    
    AMERICAS
    	Your regional security contact or as per VTX SECURITY
         
    CORPORATE
    	CISG (Corporate Information Security Group) as per VTX SECURITY or 
    	contact  -  CISG @MSO  /  CISG Hotline, DTN 223-8900
    
    INTERNAL WWW SERVER
    	Digital Information Security Entry Point
    	   http://www.security.mro1.dec.com/
    
    VIDEOTEX SERVERS
    	VTX SECURITY  (VTX SECINFO)
    	VTX SECURITY_AP
    	VTX SECURITY_EUROPE
    
    NOTESFILES
    	MINOTR::SECURITY_ADVISORY (CISG Security Advisories and Bulletins)
        POWDML::PC_SECURITY  (Personal Computer Security)
    
    
    
    
                          DIGITAL INTERNAL USE ONLY
                     CORPORATE INFORMATION SECURITY GROUP
                          SECURITY ADVISORY #95-02
    
                                      *****
    
    
    NOTE:
    
    The only authorized source of computer/network security related 
    advisories and bulletins for Digital is the Corporate Information 
    Security Group.  CISG security advisories and bulletins are distributed 
    through the geography, country and business security contacts within 
    Digital Equipment Corporation.
    
    Please advise your system managers and users of Digital's computers and 
    networks that any security warnings, alerts, advisories, and bulletins, 
    especially those requiring responsive action on their part, are the 
    explicit responsibility of the Corporate Information Security Group.
    
    If an internal or external advisory or bulletin is received from other 
    sources and no information on the topic has been received from CISG, 
    please contact our group at DTN 223-8900. This allows a single focus for 
    all security advisory and bulletin information for our Company.  All 
    security advisories and bulletins can be found in VTX SECURITY or VTX 
    SECURITY_EUROPE.
    
                        DIGITAL INTERNAL USE ONLY
 | 
| 4695.29 | Which virus scanner(s) ???? | CHEFS::HARVEY | Baldly going into the unknown... | Tue Jul 09 1996 12:24 | 11 | 
|  |    Rather beggars the question which virus detecting system must we use ?
 
   From what I see there are several offerings available - F-Prot, Norton, Dr 
   Solomon (?), Microsoft etc. Do they all see all the known viruses ? I doubt 
   they're all in synch with all active viruses....
 
   From the end user side of life which scanners should we be running ?
 
   Visions of spending all day scanning files with a whole range of tools !!!!
 
   Rog
 | 
| 4695.30 |  | QUARK::LIONEL | Free advice is worth every cent | Tue Jul 09 1996 12:32 | 9 | 
|  | For personal use, I find Norton to be the best, based on several comparison
reviews I have seen.  The better scanners do provide monthly updates (most
for free by Internet, CompuServe, etc.) and these often include added
capabilities to detect and remove new kinds of viruses.
Microsoft Antivirus (gone as of Windows 95) is worthless.  On W95, McAffee
ViruScan has some serious holes which would lead me to recommend against it.
				Steve
 | 
| 4695.31 |  | USCTR1::SIGEL | Flock of Sigels | Wed Jul 10 1996 11:36 | 4 | 
|  |     F Prot is pretty good, it located the files and I deleted them real
    fast.
    
    Lynne S.
 | 
| 4695.32 | safe viewing | NETCAD::ROLKE | Interrupt driven Herefords | Thu Jul 11 1996 10:15 | 7 | 
|  | In the August edition of Windows Magazine the cover story is about
Safety on the Net.  David Methvin suggests (page 176 sidebar) a 
method for Safe Viewing of Word documents: install the Word and Excel
viewers and use them as your default viewers.
The viewers open the documents in half the time and they don't execute
the macros so you don't get any Word viruses.
 |