EGABTR

Last updated

EGABTR (EGA for enhanced graphics adapter), [1] sometimes pronounced "Eggbeater", was a Trojan horse program [2] that achieved some level of notoriety in the late 1980s and early 1990s. [3] [4] [5] [6] [7] Allegedly a graphics utility that would improve the quality of an EGA display, it actually was malware that deleted the file allocation tables on the hard drive. [8] [9] [3] This deletion was accompanied by a text message reading "Arf! Arf! Got you!". [10] [6] [11] Coverage about this virus has translated in languages such as German, Chinese and Indonesian. [12] Various sources disagree as to the exact wording.

In the 1980s, Richard Streeter, a CBS executive, [13] once downloaded the Trojan virus, learned about EGABTR after visiting electronic Bulletin boards, hoping to find something to improve his operating system and unknowingly downloaded the virus. [14]

Related Research Articles

Adware Software with, often unwanted, adverts

Adware, often called advertising-supported software by its developers, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process. The software may generate two types of revenue: one is for the display of the advertisement and another on a "pay-per-click" basis, if the user clicks on the advertisement. Some advertisements also act as spyware, collecting and reporting data about the user, to be sold or used for targeted advertising or user profiling. The software may implement advertisements in a variety of ways, including a static box display, a banner display, full screen, a video, pop-up ad or in some other form. All forms of advertising carry health, ethical, privacy and security risks for users.

Computer worm Standalone malware computer program that replicates itself in order to spread to other computers

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behavior will continue. Computer worms use recursive methods to copy themselves without host programs and distribute themselves based on the law of exponential growth, thus controlling and infecting more and more computers in a short time. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Malware Portmanteau for malicious software

Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive users access to information or which unknowingly interferes with the user's computer security and privacy. By contrast, software that causes harm due to some deficiency is typically described as a software bug. Malware poses serious problems to individuals and businesses. According to Symantec’s 2018 Internet Security Threat Report (ISTR), malware variants number has got up to 669,947,865 in 2017, which is twice as many malware variants in 2016.

Trojan horse (computing) Type of malware

In computing, a Trojan horse is any malware that misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.

Timeline of computer viruses and worms computer malware timeline

This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.

Antivirus software Computer software to defend against malicious computer viruses

Antivirus software, or antivirus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

Linux malware includes viruses, Trojans, worms and other types of malware that affect the Linux family of operating systems. Linux, Unix and other Unix-like computer operating systems are generally regarded as very well-protected against, but not immune to, computer viruses.

Scareware Malware designed to elicit fear, shock, or anxiety

Scareware is a form of malware which uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users into buying unwanted software. Scareware is part of a class of malicious software that includes rogue security software, ransomware and other scam software that tricks users into believing their computer is infected with a virus, then suggests that they download and pay for fake antivirus software to remove it. Usually the virus is fictional and the software is non-functional or malware itself. According to the Anti-Phishing Working Group, the number of scareware packages in circulation rose from 2,850 to 9,287 in the second half of 2008. In the first half of 2009, the APWG identified a 585% increase in scareware programs.

Ransomware Malicious software used in ransom demands

Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system so that it is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion. It encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as paysafecard or Bitcoin and other cryptocurrencies that are used for the ransoms, making tracing and prosecuting the perpetrators difficult.

Mobile malware is malicious software that targets Kg or wireless-enabled Lff (PDA), by causing the collapse of the system and loss or leakage of confidential information. As wireless phones and PDA networks have become more and more common and have grown in complexity, it has become increasingly difficult to ensure their safety and security against electronic attacks in the form of viruses or other malware.

The Zlob Trojan, identified by some antiviruses as Trojan.Zlob, is a Trojan horse which masquerades as a required video codec in the form of ActiveX. It was first detected in late 2005, but only started gaining attention in mid-2006.

VirusHeat is malware that disguises itself as a legitimate anti-virus program. VirusHeat tricks users into buying the full version of the program through repeated false alerts and popups, purporting to alert the user that there is a system error or they are infected, and must buy the full version to remove. It was launched on February 8, 2008.

Computer virus Computer program that modifies other programs to replicate itself and spread

A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.

Koobface is a network worm that attacks Microsoft Windows, Mac OS X, and Linux platforms. This worm originally targeted users of networking websites like Facebook, Skype, Yahoo Messenger, and email websites such as GMail, Yahoo Mail, and AOL Mail. It also targets other networking websites, such as MySpace, Twitter, and it can infect other devices on the same local network. Technical support scammers also fraudulently claim to their intended victims that they have a Koobface infection on their computer by using fake popups and using built-in Windows programs.

Alureon is a trojan and bootkit created to steal data by intercepting a system's network traffic and searching for: banking usernames and passwords, credit card data, PayPal information, social security numbers, and other sensitive user data. Following a series of customer complaints, Microsoft determined that Alureon caused a wave of BSoDs on some 32-bit Microsoft Windows systems. The update, MS10-015, triggered these crashes by breaking assumptions made by the malware author(s).

Eddy Willems is a Belgian computer security expert and author of security blogs and books, active in international computer security organizations and as a speaker at information security-related events.

Shedun is a family of malware software targeting the Android operating system first identified in late 2015 by mobile security company Lookout, affecting roughly 20,000 popular Android applications. Lookout claimed the HummingBad malware was also a part of the Shedun family, however, these claims were refuted.

IObit Malware Fighter

IObit Malware Fighter is an anti-malware and anti-virus program for the Microsoft Windows operating system. It is designed to remove and protect against malware, including, but not limited to: Trojans, rootkits, and ransomware.

MEMZ Computer trojan horse

The MEMZ trojan is a malware in the form of a trojan horse made for Microsoft Windows.

FBI MoneyPak Ransomware

The FBI MoneyPak Ransomware, also known as Reveton Ransomware, is a type of ransomware malware. It starts by purporting to be from a national police agency and that they have locked the computer or smart phone due to "illegal activities" and demands a ransom payment via GreenDot MoneyPak cards in order to release the device.

References

  1. Computer Language, Volume 4. 1987. Retrieved September 25, 2015.
  2. Kershner, Helene G. (1992). Computer Literacy. D. C. Heath. p. 240. ISBN   978-0669279986 . Retrieved September 24, 2015.
  3. 1 2 Poundstone, William (1989). Bigger Secrets: More Than 125 Things They Prayed You'd Never Find Out. Houghton Mifflin Harcourt. p. 166. ISBN   978-0395530085 . Retrieved September 25, 2015.
  4. Emmerson, Andrew (January 28, 1988). "Phantoms of the operating system". New Scientist . Vol. 117 no. 1597. p. 69. Retrieved 23 September 2015.
  5. Omni, Volume 8. Omni Publications International. 1986. p. 35. Retrieved September 25, 2015.
  6. 1 2 Introduction to Computer Literacy . D. C. Heath Publishing Company. 1990. p.  399. ISBN   978-0669095609 . Retrieved September 25, 2015.
  7. Kane, Pamela; Hopkins, Andy (1993). The data recovery bible: preventing and surviving computer crashes. Brady Publishing. ISBN   978-1566860802 . Retrieved September 25, 2015.
  8. "Lots of warnings about EGABTR.EXE". www.matarese.com. Archived from the original on 27 September 2007.
  9. Malware History from BitDefender
  10. "VIRS0387". Archived from the original on 2006-08-26. Retrieved 2006-01-21.
  11. "Warning!". PC Magazine . Vol. 4 no. 15. July 23, 1985. p. 34. Retrieved 23 September 2015.
  12. Google Books results
  13. "Nation and World News". Chicago Tribune . August 16, 1985. Retrieved September 25, 2015.
  14. Berke, Joseph H. (1988). The tyranny of malice: exploring the dark side of character and culture . Summit Books. p.  238. ISBN   978-0671497538 . Retrieved September 25, 2015.