ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ VIRUS REPORT ³ ³ Ghost Virus (boot version) ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Synonyms: Ghostballs Date of Origin: September, 1989. Place of Origin: Iceland. Host Machine: PC compatibles. Host Files: hard disk and floppy disk boot sectors. Increase in Size of Infected Files: n/a. Nature of Damage: Corrupts or overwrites boot sector. Detected by: Scanv46+, F-Prot. Removed by: CleanUp, MDisk, F-Prot, or use the DOS SYS command. This virus was discovered in September, 1989 by Fridrik Skulason at Icelandic University. The virus infects the boot sectors of hard disks and floppies. The virus replaces the boot sector of infected systems with a boot virus similar to Ping Pong. Random file corruption by this virus has been reported. The Ghost Boot virus is usually discovered along with the Ghost COM virus. If you disinfect the boot sector to get rid of the Boot virus, unless you also remove the COM virus, your boot sectors will again have the Ghost Boot virus. It appears that the two viruses assist in the propagation of each other. ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» º This document was adapted from the book "Computer Viruses", º º which is copyright and distributed by the National Computer º º Security Association. It contains information compiled from º º many sources. To the best of our knowledge, all information º º presented here is accurate. º º º º Please send any updates or corrections to the NCSA, Suite 309, º º 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS º º and upload the information: (202) 364-1304. Or call us voice at º º (202) 364-8252. This version was produced May 22, 1990. º º º º The NCSA is a non-profit organization dedicated to improving º º computer security. Membership in the association is just $45 per º º year. Copies of the book "Computer Viruses", which provides º º detailed information on over 145 viruses, can be obtained from º º the NCSA. Member price: $44; non-member price: $55. º º º º The document is copyright (c) 1990 NCSA. º º º º This document may be distributed in any format, providing º º this message is not removed or altered. º ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ  Downloaded From P-80 International Information Systems 304-744-2253