Festering Hate (also known as ''hate'') and CyberAIDS are the names of the first two
Apple II
The Apple II (stylized as ) is an 8-bit home computer and one of the world's first highly successful mass-produced microcomputer products. It was designed primarily by Steve Wozniak; Jerry Manock developed the design of Apple II's foam-mold ...
ProDOS
ProDOS is the name of two similar operating systems for the Apple II series of personal computers. The original ProDOS, renamed ProDOS 8 in version 1.2, is the last official operating system usable by all 8-bit Apple II series computers, and w ...
viruses
A virus is a submicroscopic infectious agent that replicates only inside the living cells
Cell most often refers to:
* Cell (biology), the functional basic unit of life
Cell may also refer to:
Locations
* Monastic cell, a small room ...
. CyberAIDS appears to have been a series of viruses with minor changes in the code, culminating in the final version called Festering Hate, which appeared in 1988 (''The Festering Hate World Tour - Festering Hate in '88''). When the virus went off, the title page credited "Rancid Grapefruit" and "Cereal Killer" of the "Kool/Rad Alliance!"
The phone number embedded in the detonation page was apparently the home number of John Maxfield (also known as "Cable Pair") a well-known
FBI
The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, t ...
informant and private investigator of the era, whose specialty was
computer crime
A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing t ...
and
hackers
A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
.
Unlike the few Apple viruses that had come before, such as the
Elk Cloner
Elk Cloner is one of the first known microcomputer viruses that spread "in the wild", ''i.e.'', outside the computer system or laboratory in which it was written. It attached itself to the Apple II operating system and spread by floppy disk. It w ...
virus, that were essentially annoying but did no damage, the Festering Hate series of viruses was extremely destructive, spreading to all system files it could find on the host computer (hard drive, floppy and system memory) and then destroying everything when it could no longer find any uninfected files.
CyberAIDS
Although there are references and message threads about CyberAIDS appearing on
Usenet
Usenet () is a worldwide distributed discussion system available on computers. It was developed from the general-purpose Unix-to-Unix Copy (UUCP) dial-up network architecture. Tom Truscott and Jim Ellis conceived the idea in 1979, and it was ...
as early as 1985 and 1986, CyberAIDS seems to have attained critical mass in 1987 when it finally spread out of the
pirate underground, where the payload was originally attached to
cracked software
Software cracking (known as "breaking" mostly in the 1980s) is the modification of software to remove or disable features which are considered undesirable by the person cracking the software (software cracker), especially copy protection featur ...
, and hit the mainstream networks of the time and began affecting legitimate users.
Festering Hate
Festering Hate was the last
iteration
Iteration is the repetition of a process in order to generate a (possibly unbounded) sequence of outcomes. Each repetition of the process is a single iteration, and the outcome of each iteration is then the starting point of the next iteration. ...
of the CyberAIDS code-base and seems to have bridged the virus from
underground
Underground most commonly refers to:
* Subterranea (geography), the regions beneath the surface of the Earth
Underground may also refer to:
Places
* The Underground (Boston), a music club in the Allston neighborhood of Boston
* The Underground ( ...
pirate
Piracy is an act of robbery or criminal violence by ship or boat-borne attackers upon another ship or a coastal area, typically with the goal of stealing cargo and other valuable goods. Those who conduct acts of piracy are called pirates, v ...
BBS
BBS may refer to:
Ammunition
* BBs, BB gun metal bullets
* BBs, airsoft gun plastic pellets
Computing and gaming
* Bulletin board system, a computer server users dial into via dial-up or telnet; precursor to the Internet
* BIOS Boot Specificat ...
systems to the mainstream, by way of a
shareware
Shareware is a type of proprietary software that is initially shared by the owner for trial use at little or no cost. Often the software has limited functionality or incomplete documentation until the user sends payment to the software developer ...
telecommunications
Telecommunication is the transmission of information by various types of technologies over wire, radio, optical, or other electromagnetic systems. It has its origin in the desire of humans for communication over a distance greater than tha ...
application called
Zlink. In fact, the original impression was that Zlink itself was nothing but a
Trojan horse
The Trojan Horse was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer's ''Iliad'', with the poem ending before the war is concluded, ...
that delivered a viral payload.
During the spread of CyberAIDS, there were apparently a variety of Apple II programmers of the time who wrote
virus detection software and sold it to protect people from Apple ProDOS viruses. Since the only viruses that existed at the time (and the only viruses that such programs would detect) were CyberAIDS and Festering Hate, the "Kool/Rad Alliance" appears to have released the final version of the code-base to include a sarcastic taunt directed at
Glen Bredon
Glen Eugene Bredon (August 24, 1932 in Fresno, California – May 8, 2000, in North Fork, California) was an American mathematician who worked in the area of topology.
Education and career
Bredon received a bachelor's degree from Stanford Uni ...
, one of the programmers who was selling anti-virus software.
The last strain of the CyberAIDS/Festering Hate variants appears to have been released in 1988 and was fixed by
Morgan Davis
Morgan Davis is a Canadian blues singer, guitarist, and songwriter.
He was born and spent his childhood in Detroit, Michigan, before relocating to Toronto, Ontario, Canada, in 1968. He moved to Halifax, Nova Scotia, in 2001.Chris MartinWhat's in t ...
, who put an end to feud between the "Kool/Rad Alliance" and the writers of anti-virus software by releasing VirusMD for free. Even so, within months VirusMD became a commercial product. By this point the authors of the CyberAIDS and Festering Hate code-base appear to have lost interest in their virus and the Apple II platform itself.
Legacy
A description of the behaviour of CyberAIDS was published in the Summer 1988 issue of
''2600'' Magazine, by ''The Plague'' of MOD. The source code is not known to be available. The article that appeared in 2600 was interesting for a variety of reasons. In addition to publishing a de facto "how to" guide for potential virus writers, "The Plague" showed a remarkable understanding of the damage he caused, while demonstrating no remorse for his actions and perhaps inadvertently disclosing some of the behind-the-scenes information regarding the pseudonyms of people involved, namely the
LOD
Lod ( he, לוד, or fully vocalized ; ar, اللد, al-Lidd or ), also known as Lydda ( grc, Λύδδα), is a city southeast of Tel Aviv and northwest of Jerusalem in the Central District of Israel. It is situated between the lower Shephe ...
members
Lord Digital
Patrick Karel Kroupa (also known as Lord Digital, born January 20, 1969) is an American writer, hacker and activist. Kroupa was a member of the Legion of Doom and Cult of the Dead Cow hacker groups and co-founded MindVox in 1991, with Bruce Fanc ...
(a.k.a. ''Cereal Killer'') and
Dead Lord
Bruce Fancher (also known as Timberwolf) (born April 13, 1971) is a former Hacker (computer security), computer hacker and member of the Legion of Doom (hacking), Legion of Doom hacker group. He co-founded MindVox in 1991 with Patrick K. Kroupa.
...
(a.k.a. ''Rancid Grapefruit''), who later launched
MindVox. There are "
easter eggs
Easter eggs, also called Paschal eggs, are eggs that are decorated for the Christian feast of Easter, which celebrates the resurrection of Jesus. As such, Easter eggs are common during the season of Eastertide (Easter season). The oldest tra ...
" scattered throughout a variety of that era's documents and files, seeing their last appearance in MindVox-era texts, and
Patrick Kroupa
Patrick Karel Kroupa (also known as Lord Digital, born January 20, 1969) is an American writer, hacker and activist. Kroupa was a member of the Legion of Doom and Cult of the Dead Cow hacker groups and co-founded MindVox in 1991, with Bruce Fan ...
's parody of
William Gibson
William Ford Gibson (born March 17, 1948) is an American-Canadian speculative fiction writer and essayist widely credited with pioneering the science fiction subgenre known as ''cyberpunk''. Beginning his writing career in the late 1970s, hi ...
's ''Agrippa''. References to the virus appear very openly in mainstream media pieces about Kroupa and Fancher.
The last traces of recognition for ''Cereal Killer'' and ''The Plague'' appear in
Rafael Moreu
Rafael Moreu is an American screenwriter, best known for his work in horror and thrillers. Career
Moreu wrote the movies ''Hackers'' (1995) and '' The Rage: Carrie 2'' (1999).[Hackers
A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...]
. The credits for the movie include former LOD member
Dave Buchwald
Dave Buchwald (; born September 4, 1970), is a filmmaker and former phone phreak, hacker, and leader of the Legion of Doom in the mid-1980s, then known as Bill From RNOC.
Hacker
In the late 1980s, as a teenager, Buchwald was a social engineer, kn ...
and 2600 Magazine publisher
Eric Corley
Eric Gordon Corley (born December 16, 1959), also frequently referred to by his pen name of Emmanuel Goldstein, is a figure in the hacker community. He directs the non-profit organization 2600 Enterprises, Inc., publishes a magazine called ''2600 ...
. Additionally,
IMDb
IMDb (an abbreviation of Internet Movie Database) is an online database of information related to films, television series, home videos, video games, and streaming content online – including cast, production crew and personal biographies, p ...
lists
Nicholas Jarecki
Nicholas Jarecki (born June 25, 1979) is an American film director, producer, and writer best known for his 2012 feature film ''Arbitrage''.
Early life
Jarecki was born on June 25, 1979 in New York City, to Henry Jarecki and Marjorie Heidsieck. ...
and
Bruce Fancher
Bruce Fancher (also known as Timberwolf) (born April 13, 1971) is a former computer hacker and member of the Legion of Doom hacker group. He co-founded MindVox in 1991 with Patrick K. Kroupa.
Early years
Bruce Fancher grew up in New York Cit ...
as uncredited consultants, who apparently wanted their names removed from the film after seeing the direction it was taking.
While ''The Plagues 1988 article made it relatively obvious that Lord Digital was ''Cereal Killer'', and Dead Lord was ''Rancid Grapefruit'', the real identity of ''The Plague'' himself remains unknown.
References
External links
CyberAIDS and Festering Hate overview- written by Open Apple and A2 Central's Tom Weishaar (comp.sys.apple)
Saga of the Apple II Viruses(comp.virus)
{{MindVox
Wikipedia articles with ASCII art
Computer viruses
MindVox
Legion of Doom (hacker group)
Masters of Deception