Chris Pile (programmer)

Last updated

Christopher Pile
Born1968or1969(age 54–55)
OccupationProgrammer
Known forCreated the computer viruses 'Pathogen' and 'Queeg'

Christopher Pile (born 1968or1969, also known as "the Black Baron") is a programmer who was sentenced to 18 months in jail in 1995 for creating and spreading two computer viruses called Pathogen and Queeg. [1] While Pile was not the first person convicted for creating and spreading computer viruses, his case was the first "widely covered and published computer crime case that ended in a jail sentence" [2] as well as the first such case to be prosecuted in England and Wales. [3]

In addition to the two viruses, he also created Smeg (short for "Simulated Metamorphic Encryption enGine" [4] ), a software tool that he used to hide Pathogen and Queeg from the antivirus software of the time. Smeg was written in a way that allowed it to be also used by others to hide and spread their own viruses. [2]

Related Research Articles

<span class="mw-page-title-main">Computer worm</span> Self-replicating malware program

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behaviour will continue. Computer worms use recursive methods to copy themselves without host programs and distribute themselves based on exploiting the advantages of exponential growth, thus controlling and infecting more and more computers in a short time. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security, cyber security, digital security or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types.

In computing terminology, a macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application. Some applications, such as Microsoft Office, Excel, PowerPoint allow macro programs to be embedded in documents such that the macros are run automatically when the document is opened, and this provides a distinct mechanism by which malicious computer instructions can spread. This is one reason it can be dangerous to open unexpected attachments in e-mails. Many antivirus programs can detect macro viruses; however, the macro virus' behavior can still be difficult to detect.

In computing, a Trojan horse is any malware that misleads users of its true intent by disguising itself as a standard program. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. A keystroke recorder or keylogger can be either software or hardware.

<span class="mw-page-title-main">Timeline of computer viruses and worms</span> Computer malware timeline

This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.

In computing, polymorphic code is code that uses a polymorphic engine to mutate while keeping the original algorithm intact - that is, the code changes itself every time it runs, but the function of the code will not change at all. For example, the simple math expressions 3+1 and 6-2 both achieve the same result, yet run with different machine code in a CPU. This technique is sometimes used by computer viruses, shellcodes and computer worms to hide their presence.

A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software. The term rootkit is a compound of "root" and the word "kit". The term "rootkit" has negative connotations through its association with malware.

<span class="mw-page-title-main">Antivirus software</span> Computer software to defend against malicious computer viruses

Antivirus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device, or its embodiment. Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptosystems. From there it may be used to gain access to privileged information like passwords, corrupt or delete data on hard drives, or transfer information within autoschediastic networks.

A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files, should they ever be terminated from the company.

The Smeg Virus Construction Kit is a polymorphic engine written by virus writer Chris Pile, known as The Black Baron. SMEG is an acronym for Simulated Metamorphic Encryption Generator. Messages within the two viruses Pile created with it, SMEG.Pathogen and SMEG.Queeg, suggest that it is also an allusion to the word smeg, used as a profanity by characters in the British TV series Red Dwarf. The engine is designed to be used to add polymorphism to viruses.

A pile is a slender element cast in the ground or driven into it. Since pile construction as well as the final product are mostly invisible, engineers have often questioned their integrity, i.e. their compliance with project drawings and specifications. In fact, experience has shown that in piles, of all kinds flaws may occur. The purpose of integrity testing is to discover such flaws before they can cause any damage.

A zero-day is a vulnerability or security hole in a computer system unknown to its owners, developers or anyone capable of mitigating it. Until the vulnerability is remedied, threat actors can exploit it in a zero-day exploit, or zero-day attack.

<span class="mw-page-title-main">Computer virus</span> Computer program that modifies other programs to replicate itself and spread

A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.

Cross-species transmission (CST), also called interspecies transmission, host jump, or spillover, is the transmission of an infectious pathogen, such as a virus, between hosts belonging to different species. Once introduced into an individual of a new host species, the pathogen may cause disease for the new host and/or acquire the ability to infect other individuals of the same species, allowing it to spread through the new host population. The phenomenon is most commonly studied in virology, but cross-species transmission may also occur with bacterial pathogens or other types of microorganisms.

Daniel Andrew Janies is an American scientist who has made significant contributions in the field of evolutionary biology and on the development of tools for the study of evolution and the spread of pathogens. He is involved with research for the United States Department of Defense and has advised multiple instances of the government on methods for disease surveillance.

A possibly ongoing outbreak of Langya henipavirus (LayV) was reported in China in August 2022, with 35 identified cases spanning from 2018 to August 2022. The index case was a 53-year-old female farmer who had been in contact with shrews and presented with a fever, headache, cough and nausea in Qingdao city. The virus was named "Langya" after the hometown of the index patient in Shandong.

References

  1. Victor, Peter (16 November 1995). "'Mad boffin' jailed over computer virus havoc". The Independent. Archived from the original on 26 June 2011. Retrieved 3 February 2011.
  2. 1 2 Kizza, Joseph Migga (2005). "Security Threats to Computer Networks". Computer Network Security. Springer. pp. 77–107. doi:10.1007/0-387-25228-2_3. ISBN   978-0-387-25228-5.
  3. Fafinski, Stefan (2006). "Access Denied: Computer Misuse in an Era of Technological Change". The Journal of Criminal Law. 70 (5): 424–442. doi:10.1350/jcla.2006.70.5.424. ISSN   0022-0183.
  4. Chen, Thomas M.; Robert, Jean-Marc (2004). "The Evolution of Viruses and Worms". In Chen, William W.S. (ed.). Statistical Methods in Computer Security. doi:10.1201/9781420030884. ISBN   978-0-429-13161-5.