SlideShare a Scribd company logo
IBM Christmas Card
Gauri Pulekar
CS 528
Spring 2015
Season Of Joy And Gifts
History
of the
Christmas Card
Malware
Christmas 1999
 WM97/Melissa-AG virus infected Microsoft word
documents, spreading via email
 Subject line: “Message from <username>”
 Message: “This document is very Important and you've
GOT to read this !!!”.
 Payload trigger on December 25th
• Attempt to format the C: drive on the next reboot.
• Insert randomly colored blocks in the current Word document
Christmas 2000
 W32/Navidad virus spread via email, masquerading as an electronic
Christmas card.
 Mysterious blue eye icons in the Windows system tray
 Mouse over the eyes
Christmas 2000
 W32/Music email-aware worm
 Message: "Hi, just testing email using Merry Christmas music
file, you'll like it.”
 Worm attached as a file called music.com, music.exe or
music.zip.
 Plays the first few bars of the song
 "We wish you a Merry Christmas”
 Displays a cartoon of Santa Claus with the caption
 "Music is playing, turn on your speaker if you have one"
 or "There is error in your sound system, music can't be heard."
Christmas 2001
 Maldal virus spread via email using a seasonal electronic
greeting card called Christmas.exe.
 Picture: Santa Claus on skis accompanied by a prancing
reindeer
 Message: "From the heart,
Happy new year!".
IBM
Christmas
Card
The
Beginning
Of the
Story
IBM Christmas Card: Facts
 When: 09th December 1987
 Name: Christmas Tree Exec
 Place of Origin: Germany
 Significance: Worms were first noticed as a potential
computer security threat
 Effect: It brought down both the world-wide IBM
network and BITNET
 Source Language: REXX
Behavior
 E-mail Christmas card
 Subject line "Let this exec run and enjoy yourself!”.
 Included executable code.
 Claimed to draw a Christmas tree on the display.
 The user had to execute the program by typing christma
or christmas.
• Displayed an ASCII Christmas tree.
 A comment inside the source code:
browsing this file is no fun at all just type
CHRISTMAS from cms
 Sent a copy to everyone on the user's address lists.
Working
 Read the files:
 NAMES: Collection of information about other users with
whom you communicate
 NETLOG: File transfer log
 Mailed itself to every email address
 Approximate number exceeded 1,000
 People trusted it, because it was coming from a regular
correspondent
The Name: CHRISTMA EXEC
 IBM VM systems originally required file names to be formatted
as
8 characters + space + 8 characters
 IBM required REXX script files to have a file type of "EXEC”
Source of the Christmas card
 A student at the University of Clausthal in West
Germany
 REXX scripting language: a shell script-like language for
IBM’s VM/CMS system
 Found by December 21
 Barred from using his/her system.
 “The damage was unintentional and that the program
was written to send Christmas greetings to my friends.”
Damage Done
 Worm itself wasn’t malicious
 Exponential growth patterns
 Clogged servers, communication paths, spool directories
 Unintentional denial of service attack
Damage Done
 EARNet:
 The European Research and Education Networking
Association (TERENA)
 BITNET:
 BITNET was an university computer network founded in
1981s at the City University of New York (CUNY) and Yale
University
 Destroyed by December 14th
Damage Done
 IBM's VNet electronic mail network
 International computer networking system deployed in the
mid-1970s.
 Developed inside IBM
 Provided the main email and file-transfer backbone for the
company
 December 15th
 Paralyzed on 17th December
 Brought to a standstill two days later, only getting rid of the
worm by shutting down the network.
 In 1990, Christmas Tree resurfaced after being posted to
Usenet. IBM was forced to shut down its 350,000-terminal
network
Countermeasures Taken
 Programmer at Cornell University had written a simple
program
 Examined the network queues every five minutes and delete any
files called Christma Exec;
 Purged about 300 copies in four and a half hours.
 Other operators did the same, writing and passing around ad-
hoc program to eliminate copies of the worm.
Countermeasures Taken
 Such simple tools could only sample the queues every few
seconds and purge what they found
 Worm could still sneak through to a limited degree.
 In Israel, one programmer wrote a program “anti-Christma
Christma,”
 Examined users’ netlog to determine whether they had been
victimized
 If yes, the new Christma would retrieve any copies of the
original that had not yet been read by the addressee and then
send itself onward to the same set of targets used by the
original Christma.
Debate: Trojan or Worm
 Trojan:
 Appear to be useful, but will do damage once installed
 Required the user to download and run the attachment to
make it replicate
 Worm:
 Virus Encyclopedia refers to it as a worm.
 Worms move from one computer to another regardless of any
human action
References
 Burger, Ralf (1988). Computer viruses - a high tech disease. Abacus/Data Becker
GmbH. p. 276. ISBN 1-55755-043-3.
 Capek, P.G.; Chess, D.M.; White, S.R.; Fedeli, A. (2003). "Merry Christma: An Early
Network Worm". Security & Privacy 1 (5): 26–
34. doi:10.1109/MSECP.2003.1236232.
 Martin, Will (March 4, 1988). "Re: BITNET Security". Security Digest (Mailing
list). Archived from the original on September 25, 2006. Retrieved October
30, 2008.
 Patterson, Ross (December 21, 1987). "Re: IBM Christmas Virus". RISKS
Digest (Mailing list). Retrieved October 30, 2008.
 "Viruses for the "Exotic" Platforms". VX Heaven. Archived from the original on
August 6, 2013. Retrieved October 30, 2008.
 Otto Stolz. VIRUS-L Digest, Volume 5, Issue 178, "Re: CHRISTMA: The "Card"!
(CVP)". 1992.11.12
Time to Discuss!
Trojan ?
? Worm
Thank
You

More Related Content

Similar to IBM Christmas card attach: CS571

Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
VijayPatidar71
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
NORTHCUSTOMS
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
PrinceYdvz
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
Priyanka Aggarwal
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
AsimRaza464161
 
Viruses
VirusesViruses
Viruses
AlyssaFerrer7
 
New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Documentshoib_245
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
Ammy Vijay
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
kamrannasiriiui
 
Viruses
VirusesViruses
Viruses
yuvan80
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
sonykhan3
 
Virus
Virus  Virus
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
Leonor Costa
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious emailAndrew Wong
 
Spreading virus
Spreading virusSpreading virus
Spreading virus
dixitas
 

Similar to IBM Christmas card attach: CS571 (20)

Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses
VirusesViruses
Viruses
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Document
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Sircam Worm
Sircam WormSircam Worm
Sircam Worm
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
A tour of the worm
A tour of the wormA tour of the worm
A tour of the worm
 
Viruses
VirusesViruses
Viruses
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
 
Computer virus
Computer virusComputer virus
Computer virus
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
Virus
Virus  Virus
Virus
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
 
Spreading virus
Spreading virusSpreading virus
Spreading virus
 

More from Gauri Pulekar

Socialoscope PEDS talk
Socialoscope PEDS talkSocialoscope PEDS talk
Socialoscope PEDS talk
Gauri Pulekar
 
Pathlet routing CS513
Pathlet routing CS513Pathlet routing CS513
Pathlet routing CS513
Gauri Pulekar
 
Techniquest Rules
Techniquest RulesTechniquest Rules
Techniquest Rules
Gauri Pulekar
 
HCI Project: Master Mind
HCI Project: Master MindHCI Project: Master Mind
HCI Project: Master Mind
Gauri Pulekar
 
Skill Set Assessment System
Skill Set Assessment SystemSkill Set Assessment System
Skill Set Assessment System
Gauri Pulekar
 
Socialoscope
Socialoscope Socialoscope
Socialoscope
Gauri Pulekar
 
Automatically Characterizing Places with Opportunistic CrowdSensing using Sma...
Automatically Characterizing Places with Opportunistic CrowdSensing using Sma...Automatically Characterizing Places with Opportunistic CrowdSensing using Sma...
Automatically Characterizing Places with Opportunistic CrowdSensing using Sma...
Gauri Pulekar
 

More from Gauri Pulekar (7)

Socialoscope PEDS talk
Socialoscope PEDS talkSocialoscope PEDS talk
Socialoscope PEDS talk
 
Pathlet routing CS513
Pathlet routing CS513Pathlet routing CS513
Pathlet routing CS513
 
Techniquest Rules
Techniquest RulesTechniquest Rules
Techniquest Rules
 
HCI Project: Master Mind
HCI Project: Master MindHCI Project: Master Mind
HCI Project: Master Mind
 
Skill Set Assessment System
Skill Set Assessment SystemSkill Set Assessment System
Skill Set Assessment System
 
Socialoscope
Socialoscope Socialoscope
Socialoscope
 
Automatically Characterizing Places with Opportunistic CrowdSensing using Sma...
Automatically Characterizing Places with Opportunistic CrowdSensing using Sma...Automatically Characterizing Places with Opportunistic CrowdSensing using Sma...
Automatically Characterizing Places with Opportunistic CrowdSensing using Sma...
 

Recently uploaded

First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 

Recently uploaded (20)

First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 

IBM Christmas card attach: CS571

  • 1. IBM Christmas Card Gauri Pulekar CS 528 Spring 2015
  • 2. Season Of Joy And Gifts
  • 4. Christmas 1999  WM97/Melissa-AG virus infected Microsoft word documents, spreading via email  Subject line: “Message from <username>”  Message: “This document is very Important and you've GOT to read this !!!”.  Payload trigger on December 25th
  • 5. • Attempt to format the C: drive on the next reboot. • Insert randomly colored blocks in the current Word document
  • 6. Christmas 2000  W32/Navidad virus spread via email, masquerading as an electronic Christmas card.  Mysterious blue eye icons in the Windows system tray  Mouse over the eyes
  • 7. Christmas 2000  W32/Music email-aware worm  Message: "Hi, just testing email using Merry Christmas music file, you'll like it.”  Worm attached as a file called music.com, music.exe or music.zip.
  • 8.  Plays the first few bars of the song  "We wish you a Merry Christmas”  Displays a cartoon of Santa Claus with the caption  "Music is playing, turn on your speaker if you have one"  or "There is error in your sound system, music can't be heard."
  • 9. Christmas 2001  Maldal virus spread via email using a seasonal electronic greeting card called Christmas.exe.  Picture: Santa Claus on skis accompanied by a prancing reindeer  Message: "From the heart, Happy new year!".
  • 11. IBM Christmas Card: Facts  When: 09th December 1987  Name: Christmas Tree Exec  Place of Origin: Germany  Significance: Worms were first noticed as a potential computer security threat  Effect: It brought down both the world-wide IBM network and BITNET  Source Language: REXX
  • 12. Behavior  E-mail Christmas card  Subject line "Let this exec run and enjoy yourself!”.  Included executable code.  Claimed to draw a Christmas tree on the display.  The user had to execute the program by typing christma or christmas.
  • 13. • Displayed an ASCII Christmas tree.
  • 14.  A comment inside the source code: browsing this file is no fun at all just type CHRISTMAS from cms  Sent a copy to everyone on the user's address lists.
  • 15. Working  Read the files:  NAMES: Collection of information about other users with whom you communicate  NETLOG: File transfer log  Mailed itself to every email address  Approximate number exceeded 1,000  People trusted it, because it was coming from a regular correspondent
  • 16. The Name: CHRISTMA EXEC  IBM VM systems originally required file names to be formatted as 8 characters + space + 8 characters  IBM required REXX script files to have a file type of "EXEC”
  • 17. Source of the Christmas card  A student at the University of Clausthal in West Germany  REXX scripting language: a shell script-like language for IBM’s VM/CMS system  Found by December 21  Barred from using his/her system.  “The damage was unintentional and that the program was written to send Christmas greetings to my friends.”
  • 18. Damage Done  Worm itself wasn’t malicious  Exponential growth patterns  Clogged servers, communication paths, spool directories  Unintentional denial of service attack
  • 19. Damage Done  EARNet:  The European Research and Education Networking Association (TERENA)  BITNET:  BITNET was an university computer network founded in 1981s at the City University of New York (CUNY) and Yale University  Destroyed by December 14th
  • 20. Damage Done  IBM's VNet electronic mail network  International computer networking system deployed in the mid-1970s.  Developed inside IBM  Provided the main email and file-transfer backbone for the company  December 15th  Paralyzed on 17th December  Brought to a standstill two days later, only getting rid of the worm by shutting down the network.  In 1990, Christmas Tree resurfaced after being posted to Usenet. IBM was forced to shut down its 350,000-terminal network
  • 21. Countermeasures Taken  Programmer at Cornell University had written a simple program  Examined the network queues every five minutes and delete any files called Christma Exec;  Purged about 300 copies in four and a half hours.  Other operators did the same, writing and passing around ad- hoc program to eliminate copies of the worm.
  • 22. Countermeasures Taken  Such simple tools could only sample the queues every few seconds and purge what they found  Worm could still sneak through to a limited degree.  In Israel, one programmer wrote a program “anti-Christma Christma,”  Examined users’ netlog to determine whether they had been victimized  If yes, the new Christma would retrieve any copies of the original that had not yet been read by the addressee and then send itself onward to the same set of targets used by the original Christma.
  • 23. Debate: Trojan or Worm  Trojan:  Appear to be useful, but will do damage once installed  Required the user to download and run the attachment to make it replicate  Worm:  Virus Encyclopedia refers to it as a worm.  Worms move from one computer to another regardless of any human action
  • 24. References  Burger, Ralf (1988). Computer viruses - a high tech disease. Abacus/Data Becker GmbH. p. 276. ISBN 1-55755-043-3.  Capek, P.G.; Chess, D.M.; White, S.R.; Fedeli, A. (2003). "Merry Christma: An Early Network Worm". Security & Privacy 1 (5): 26– 34. doi:10.1109/MSECP.2003.1236232.  Martin, Will (March 4, 1988). "Re: BITNET Security". Security Digest (Mailing list). Archived from the original on September 25, 2006. Retrieved October 30, 2008.  Patterson, Ross (December 21, 1987). "Re: IBM Christmas Virus". RISKS Digest (Mailing list). Retrieved October 30, 2008.  "Viruses for the "Exotic" Platforms". VX Heaven. Archived from the original on August 6, 2013. Retrieved October 30, 2008.  Otto Stolz. VIRUS-L Digest, Volume 5, Issue 178, "Re: CHRISTMA: The "Card"! (CVP)". 1992.11.12