Jump to content

AGI-Plan: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
No edit summary
m top: clean up, typo(s) fixed: 4-6 → 4–6
 
(10 intermediate revisions by 7 users not shown)
Line 1: Line 1:
{{Short description|DOS-platform based malware}}
{{inline}}
{{More footnotes|date=March 2010}}
{{Computer virus
{{Infobox computer virus
| Fullname = AGI-Plan
| Fullname = AGI-Plan
| Common name = AGI-Plan
| Common name = AGI-Plan
Line 10: Line 11:
| Subtype = [[COM file|COM]] file, destructive
| Subtype = [[COM file|COM]] file, destructive
| IsolationDate = Unknown
| IsolationDate = Unknown
| Isolation = [[Mühlheim an der Ruhr]], [[Germany]]
| Isolation = [[Mülheim an der Ruhr]], [[Germany]]
| Origin = Unknown
| Origin = Unknown
| Author = Unknown
| Author = Unknown
}}
}}


'''AGI-Plan''' was a [[memory resident]] [[DOS]] [[file infector]] first isolated at the [[Agiplan (company)|Agiplan]] software company in [[Germany]]. Because of [[Computer Antivirus Research Organization|CARO]] standards that dictate that viruses should not be named after companies, AGI-Plan's technical name is Month 4–6. This name also violates CARO standards, but a more minor rule involving syntax. AGI-Plan is related to the [[Zero Bug (virus)|Zero Bug]] virus, as both it and AGI-Plan prepend 1,536 [[byte]]s to files they infect.
''For information on the African consulting company, see [[Agiplan (company)]].''


AGI-Plan is not initially damaging until several months after the initial infection, hence its name. After activation, AGI-Plan will begin to corrupt write operations, which results in slow, difficult-to-notice damage over time.<ref>{{cite web|title=Agiplan|url=http://www.pandasecurity.com/homeusers/security-info/14/Agiplan/|publisher=Panda Security|accessdate=12 February 2013}}</ref>
'''AGI-Plan''' was a [[memory resident]] [[DOS]] [[file infector]] first isolated at the [[Agiplan (company)|Agiplan]] software company in [[Germany]]. Because of [[Computer Antivirus Research Organization|CARO]] standards that dictate that viruses should not be named after companies, AGI-Plan's technical name is Month 4-6. This name also violates CARO standards, but a more minor rule involving syntax. AGI-Plan is related to the [[Zero Bug (virus)|Zero Bug]] virus, as both it and AGI-Plan prepend 1,536 [[byte]]s to files they infect.

AGI-Plan is not initially damaging until several months after the initial infection, hence its name. After activation, AGI-Plan will begin to corrupt write operations, which results in slow, difficult-to-notice damage overtime.


AGI-Plan is notable for reappearing in [[South Africa]] in what appeared to be an intentional re-release several years after. AGI-Plan never succeeded in spreading significantly beyond the isolated incidents in Germany and South Africa.
AGI-Plan is notable for reappearing in [[South Africa]] in what appeared to be an intentional re-release several years after. AGI-Plan never succeeded in spreading significantly beyond the isolated incidents in Germany and South Africa.

==References==
{{reflist}}


== External links ==
== External links ==

Latest revision as of 03:50, 9 March 2022

AGI-Plan
Technical nameMonth 2-4
AliasMonth 2-4, Agiplan
TypeDOS
SubtypeCOM file, destructive
ClassificationVirus
FamilyZero Bug
OriginUnknown
AuthorsUnknown

AGI-Plan was a memory resident DOS file infector first isolated at the Agiplan software company in Germany. Because of CARO standards that dictate that viruses should not be named after companies, AGI-Plan's technical name is Month 4–6. This name also violates CARO standards, but a more minor rule involving syntax. AGI-Plan is related to the Zero Bug virus, as both it and AGI-Plan prepend 1,536 bytes to files they infect.

AGI-Plan is not initially damaging until several months after the initial infection, hence its name. After activation, AGI-Plan will begin to corrupt write operations, which results in slow, difficult-to-notice damage over time.[1]

AGI-Plan is notable for reappearing in South Africa in what appeared to be an intentional re-release several years after. AGI-Plan never succeeded in spreading significantly beyond the isolated incidents in Germany and South Africa.

References

[edit]
  1. ^ "Agiplan". Panda Security. Retrieved 12 February 2013.
[edit]