Jump to content

1260 (computer virus): Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Gaffi1 (talk | contribs)
m Reporting dead links.
revived one of the dead links
Line 13: Line 13:
| Author = [[Mark Washburn]]
| Author = [[Mark Washburn]]
}}
}}
'''1260''', or V2PX,<ref>[http://csrc.nist.gov/publications/nistir/threats/subsubsection3_3_1_1.html "Threat Assessment of Malicious Code and Human Threats,"] History of Viruses, National Institute of Standards and Technology, Computer Security Division, internal report.</ref><ref>[http://www.research.ibm.com/antivirus/timeline.htm IBM's PC "Virus Timeline," ]{{Dead link |date=February 2014}} IBM research report. </ref> was a [[computer virus]] written in 1989 by [[Mark Washburn]]<ref>[http://www.facebook.com/photo.php?fbid=460847600624870&l=185aa6f511 1982 | Facebook ]{{Dead link |date=February 2014}} Mark Washburn.</ref> that used a form of [[Polymorphic code|polymorphic encryption]]. Derived from Ralph Burger's publication of the [[Reverse engineering|disassembled]] Vienna virus [[source code]], the 1260 added a [[cipher]] and varied its [[Antivirus_software#Signature-based_detection|signature]] by [[Randomization|randomizing]] its [[decryption]] [[algorithm]]. Both the 1260 and Vienna infect [[.COM]] files in the current or [[PATH (variable)|PATH]] directories upon execution. Changing an authenticated executable file is detected by most modern computer [[operating system]]s.<ref>[http://www.mcafee.com/threat-intelligence/malware/default.aspx?id=98074 McAfee Labs Threat Center], Details and results of V2PX virus analysis.</ref><ref>[http://wiw.org/~meta/vsum/view.php?vir=1476 "Patricia Hoffman's VSUM Virus Information Summary List,"] V2P6 virus.</ref><ref>[http://www.articleworld.org/index.php?title=1260_(computer_virus)&printable=yes "1260 (computer virus),"] article.</ref>
'''1260''', or V2PX,<ref>[http://csrc.nist.gov/publications/nistir/threats/subsubsection3_3_1_1.html "Threat Assessment of Malicious Code and Human Threats,"] History of Viruses, National Institute of Standards and Technology, Computer Security Division, internal report.</ref><ref>{{cite web |url=http://www.research.ibm.com/antivirus/timeline.htm |title=IBM's PC "Virus Timeline," |publisher=research.ibm.com |archiveurl=https://web.archive.org/web/20121027045532/http://www.research.ibm.com/antivirus/timeline.htm |archivedate=27 October 2012}}IBM research report. </ref> was a [[computer virus]] written in 1989 by [[Mark Washburn]]<ref>[http://www.facebook.com/photo.php?fbid=460847600624870&l=185aa6f511 1982 | Facebook ]{{Dead link |date=February 2014}} Mark Washburn.</ref> that used a form of [[Polymorphic code|polymorphic encryption]]. Derived from Ralph Burger's publication of the [[Reverse engineering|disassembled]] Vienna virus [[source code]], the 1260 added a [[cipher]] and varied its [[Antivirus_software#Signature-based_detection|signature]] by [[Randomization|randomizing]] its [[decryption]] [[algorithm]]. Both the 1260 and Vienna infect [[.COM]] files in the current or [[PATH (variable)|PATH]] directories upon execution. Changing an authenticated executable file is detected by most modern computer [[operating system]]s.<ref>[http://www.mcafee.com/threat-intelligence/malware/default.aspx?id=98074 McAfee Labs Threat Center], Details and results of V2PX virus analysis.</ref><ref>[http://wiw.org/~meta/vsum/view.php?vir=1476 "Patricia Hoffman's VSUM Virus Information Summary List,"] V2P6 virus.</ref><ref>[http://www.articleworld.org/index.php?title=1260_(computer_virus)&printable=yes "1260 (computer virus),"] article.</ref>


==References==
==References==

Revision as of 02:57, 29 March 2014

1260
Technical name1260
AliasV2PX
TypeDOS
SubtypeResident .COM
ClassificationVirus
FamilyN/A
OriginUnknown
AuthorsMark Washburn

1260, or V2PX,[1][2] was a computer virus written in 1989 by Mark Washburn[3] that used a form of polymorphic encryption. Derived from Ralph Burger's publication of the disassembled Vienna virus source code, the 1260 added a cipher and varied its signature by randomizing its decryption algorithm. Both the 1260 and Vienna infect .COM files in the current or PATH directories upon execution. Changing an authenticated executable file is detected by most modern computer operating systems.[4][5][6]

References

  1. ^ "Threat Assessment of Malicious Code and Human Threats," History of Viruses, National Institute of Standards and Technology, Computer Security Division, internal report.
  2. ^ "IBM's PC "Virus Timeline,"". research.ibm.com. Archived from the original on 27 October 2012.IBM research report.
  3. ^ 1982 | Facebook [dead link] Mark Washburn.
  4. ^ McAfee Labs Threat Center, Details and results of V2PX virus analysis.
  5. ^ "Patricia Hoffman's VSUM Virus Information Summary List," V2P6 virus.
  6. ^ "1260 (computer virus)," article.