Computer viruses are the terrorist threat of the digital age. The inside story of who creates them and why >>>>>> Kim Neely
This article originally appeared in the Sept 16th, 1999 issue of Rolling Stone magazine. It has been transcribed into text file format, for widespread distribution. This article is contained below in it’s entirety, with pictures. Nothing was added, changed, or removed. This article is transcribed and released for distribution without permission or knowledge of Rolling Stone magazine with regard to this article.
It’s three in the morning on the internet relay chat channel #codebreakers, and Opic is waiting. It has taken a week of cryptic e-mail missives, bounced around the world and back again via a chain of anonymous remailers, to arrange this meeting, but the enigmatic twenty one-year old is here when he said he would be. “Sorry about all the confusion,” he types. His welcome appears on the screen after a slight lag, a symptom of the proxy servers he’s routing himself through to cloak the address of his internet service provider.
Opic is a “coder”, part of a ten man internet virus-exchange (VX) group known as CodeBreakers. He writes computer viruses. In and of itself, this isn’t a pursuit that would require anyone to go into hiding. Writing viruses is perfectly legal in the United States.
Intentionally spreading a virus to unwitting computer users, though — that’s a prosecutable offense. Especially if that virus turns out to be the fastest spreading piece of self-replicating code in history. You wouldn’t want to be linked to someone even suspected of pulling a stunt like that. This is why Opic and other members of CodeBreakers have been so skittish lately.
Computer viruses are small, parasitic programs that attach themselves to other programs and reproduce. They’ve been around since the mid-Eighties, but the general public didn’t become aware of them until 1992, When the data gobbling Michaelangelo became the first “celebrity” virus. Ten years ago, there were only about thirty known computer viruses. Today, according to Symantec and Network Associates, the top antivirus software companies in the United States, there are some 40,000 viruses in existence.
Anything that a virus does besides replicate is called it’s payload. Some viruses contain no payload at all and can reside on a PC for years without being detected. Others display jokey screen messages, print text or play music. Some viruses cause gradual, insidious corruption of data files; others like dormant throughout the year and then destroy files or reformat hard drives when a certain date rolls around.
Viruses that permanently wipe out files or erase hard drives are the least common type. Still, virus researchers contend that there is no such thing as a benign virus. Even some “non-malicious” viruses are so sloppily programmed that they result in software malfunctions, crashes and file corruptions not intended by their authors. Theoretically, if a virus was buggy enough to disrupt the day-to-day operations of a crucial machine or network- say that of a hospital or an air-traffic-control system – and happened to hit on a day when that organization’s backup system was down, even the most harmless virus would have the potential to be life-threatening.
This spring Microsoft users everywhere met Melissa, a technically harmless – it contained no data destroying payload – but alarmingly prolific Word 97 macro virus. Among the viruses known to be actively spreading today, macro viruses are the most common. They are written in the Visual Basic for Applications programming language included in the popular software package Microsoft Office – the user-friendliness of which makes viruses fairly easy for even non-programmers to create – and travel via infected Microsoft Word or Excel Documents.
Melissa upped the ante for virus spreading. Instead of relying on users themselves to transfer the infected documents from machine to machine via disk or email, the virus operated like a chain letter from hell, corrupting Word documents and, if Microsoft Outlook e-mail software was installed on an infected machine, peeking into the user’s address book and sending e-mails – each with an infected document attached – to the first fifty addresses found.
Melissa clogged email gateways, panicked PC users and sparked an FBI manhunt that at least initially pointed to a retired member of the CodeBreakers known as VicodinES. Vic, as he’s known in the clannish virus underground, was first linked to Melissa when simularities were discovered between Melissa, and an earlier virus PSD2000, that he had created and that was available for download on his Website. The FBI began sniffing around the CodeBreakers a few days after Melissa surfaced, shutting down two Web sites containing viruses written by VicodinES: CodeBreakers.org, the groups own site, and SourceOfKaos.com, a domain that hosted Vic’s personal site.
Working from logs provided by America Online, investigators later traced the usenet post that triggered Melissa’s joy ride to a thirty year old Aberdeen, New Jersey programmer named David L. Smith. Smith now faces charges that could carry a maximum penalty of forty years in prison and $480,000 in fines.