CIH (computer virus)
|Common name||CIH virus|
|Point of origin||Taiwan|
|Author(s)||Chen Ing-hau (CIH)|
CIH, also known as Chernobyl or Spacefiller, is a Microsoft Windows 9x computer virus that first emerged in 1998. Its payload is highly destructive to vulnerable systems, overwriting critical information on infected system drives and, in some cases, destroying the system BIOS. Chen Ing-hau (陳盈豪, pinyin: Chén Yíngháo), a student at Tatung University in Taiwan, created the virus. It was believed to have infected sixty million computers internationally, resulting in an estimated US$1 billion in commercial damages.
Chen claimed to have written the virus as a challenge against bold claims of antiviral efficiency by antivirus software developers. Chen stated that after classmates at Tatung University spread the virus, he apologized to the school and made an antivirus program available for public download. Weng Shi-hao (翁世豪), a student at Tamkang University, co-authored with the antivirus program. Prosecutors in Taiwan could not charge Chen at the time because no victims came forward with a lawsuit. Nevertheless, these events led to new computer crime legislation in Taiwan.
The name "Chernobyl Virus" was coined sometime after the virus was already well known as CIH and refers to the complete coincidence of the payload trigger date in some variants of the virus (actually the virus creation date in 1998, to trigger exactly a year later) and the Chernobyl disaster, which happened in the Soviet Union on April 26, 1986.
The name "Spacefiller" was introduced because most viruses write their code to the end of the infected file, with infected files being detectable because their file size increases. In contrast, CIH looks for gaps in the existing program code, where it then writes its code, preventing an increase in file size; in that way, the virus avoids detection.
The virus first emerged in 1998. In March 1999, several thousand IBM Aptivas shipped with the CIH virus, just one month before the virus would trigger. In July 1999, copies of remote administration tool Back Orifice 2000 given out for DEF CON 7 attendees were discovered by the organizers to have been infected with CIH. On December 31, 1999, Yamaha shipped a software update to their CD-R400 drives that was infected with the virus. In July 1998, a demo version of the first-person shooter game SiN was infected by one of its mirror sites.
CIH's dual payload was delivered for the first time on April 26, 1999, with most of the damage occurring in Asia. CIH filled the first 1024 KB of the host's boot drive with zeros and then attacked certain types of BIOS. Both of these payloads served to render the host computer inoperable, and for most ordinary users the virus essentially destroyed the PC. Technically, however, it was possible to replace the BIOS chip, and methods for recovering hard disk data emerged later.
The virus made another comeback in 2001 when a variant of the LoveLetter Worm in a VBS file that contained a dropper routine for the CIH virus was circulated around the internet, under the guise of a nude picture of Jennifer Lopez.
A modified version of the virus called CIH.1106 was discovered in December 2002, but it is not widespread, and only affects Windows 95 and Windows 98-based systems.
CIH spreads under the Portable Executable file format under the Windows 9x-based operating systems, Windows 95, 98, and ME. CIH does not spread under Windows NT-based operating systems nor Win16-based operating systems such as Windows 3.x or below.
CIH infects Portable Executable files by splitting the bulk of its code into small slivers inserted into the inter-section gaps commonly seen in PE files, and writing a small re-assembly routine and table of its own code segments' locations into unused space in the tail of the PE header. This earned CIH another name, "Spacefiller". The size of the virus is around 1 kilobyte, but due to its novel multiple-cavity infection method, infected files do not grow at all. It uses methods of jumping from processor ring 3 to 0 to hook system calls.
The payload, which is considered extremely dangerous, first involves the virus overwriting the first megabyte (1024KB) of the hard drive with zeroes, beginning at sector 0. This deletes the contents of the partition table, and may cause the machine to hang or cue the blue screen of death.
The second payload tries to write to the Flash BIOS. BIOSes that can be successfully written to by the virus have critical boot-time code replaced with junk. This routine only works on some machines. Much emphasis has been put on machines with motherboards based on the Intel 430TX chipset, but by far the most important variable in CIH's success in writing to a machine's BIOS is the type of Flash ROM chip in the machine. Different Flash ROM chips (or chip families) have different write-enable routines specific to those chips. CIH makes no attempt to test for the Flash ROM type in its victim machines, and has only one write-enable sequence.
For the first payload, any information that the virus has overwritten with zeros is lost. If the first partition is FAT32, and over about one gigabyte, all that will get overwritten is the MBR, the partition table, the boot sector of the first partition and the first copy of the FAT of the first partition. The MBR and boot sector can simply be replaced with copies of the standard versions, the partition table can be rebuilt by scanning over the entire drive and the first copy of the FAT can be restored from the second copy. This means a complete recovery with no loss of user data can be performed automatically by a tool like Fix CIH.
If the first partition is not FAT32 or is smaller than 1 GB, the bulk of user data on that partition will still be intact but without the root directory and FAT it will be difficult to find it, especially if there is significant fragmentation.
If the second payload executes successfully, the computer will not start at all. Reprogramming or replacement of the Flash BIOS chip is then required, as most systems that CIH can affect predate BIOS restoration features.
|CIH v1.2/CIH.1003||This variant is the most common one and activates on April 26. It contains the string: CIH v1.2 TTIT|
|CIH v1.3/CIH.1010.A and CIH1010.B||This variant also activates on April 26. It contains the string: CIH v1.3 TTIT|
|CIH v1.4/CIH.1019||This variant activates on the 26th of any month. It is still in the wild, although it is not that common. It contains the string CIH v1.4 TATUNG.|
|CIH.1049||This variant activates on August 2 instead of April 26.|
- ithome.com.tw. 從CIH「重裝駭客」變身「除錯超人」 Archived 2013-04-17 at the Wayback Machine. 2006-08-25.
- parenting.com.tw. 從駭電腦到愛旅行─昔日網路小子陳盈豪 Archived 2013-06-07 at the Wayback Machine
- cyy.moj.gov.tw. 打擊駭客，不再無法可施 Archived 2013-10-29 at the Wayback Machine
- Weil, Nancy. "Some Aptivas shipped with CIH virus Archived 2007-01-04 at the Wayback Machine." CNN. April 8, 1998. Retrieved on March 28, 1998.
- ZDNet news "Back Orifice CDs infected with CIH virus" Archived 2007-03-11 at the Wayback Machine, dated 14 July 1999, accessed 8 August 2006
- US Report: Gamers believe Activision's 'SiN' carries CIH virus - ZDNet.co.uk
- "Virus:DOS/CIH". F-Secure Labs. Archived from the original on 2001-01-28. Retrieved 2021-12-07.