Knowledge

Byte Bandit

Source 📝

25: 446: 226: 213:
Byte Bandit made no attempt to disguise itself as modern viruses, trojans, and worms do. While it naturally over-wrote the bootblock, it also hooked into the system, remaining reset-resident and causing system data corruption and system failures. The virus increments a copy counter every time it
214:
writes itself to a disk, which is in the text string "Virus by Byte Bandit in 9.87. Number of copys:" which also gives a date of September 1987 for the creation, as well as the assumed name of the programmer.
296: 273: 245: 487: 89: 61: 266: 108: 375: 169: 68: 46: 516: 301: 259: 75: 42: 57: 480: 385: 380: 360: 415: 410: 210:
and SADDAM, Byte Bandit was not destructive. It just spread automatically from system to system.
35: 511: 506: 350: 473: 345: 425: 405: 8: 365: 82: 390: 207: 157: 461: 145: 400: 457: 322: 196: 177: 500: 231: 395: 327: 193: 174: 370: 251: 127: 24: 150: 453: 337: 181: 445: 420: 314: 200: 162: 206:
In contrast to the feared Amiga viruses like the infamous
203:
personal computer. It first appeared in January 1988.
239: 221: 49:. Unsourced material may be challenged and removed. 498: 481: 267: 488: 474: 274: 260: 109:Learn how and when to remove this message 281: 242:– Swiss Cracking Association's homepage 499: 255: 440: 47:adding citations to reliable sources 18: 13: 14: 528: 217: 444: 224: 23: 248:at the Amiga Virus Encyclopedia 34:needs additional citations for 1: 246:Byte Bandit-Virus description 460:. You can help Knowledge by 7: 10: 533: 439: 336: 313: 287: 168: 156: 144: 136: 126: 456:-related article is a 517:Hacking in the 1980s 282:Hacking in the 1980s 43:improve this article 366:Christmas Tree EXEC 123: 16:1988 computer virus 391:Lamer Exterminator 240:http://www.sca.ch/ 208:Lamer Exterminator 128:Original author(s) 121: 469: 468: 434: 433: 308: 307: 187: 186: 119: 118: 111: 93: 524: 490: 483: 476: 448: 441: 376:Father Christmas 290: 289: 276: 269: 262: 253: 252: 234: 229: 228: 227: 199:created for the 146:Operating system 124: 120: 114: 107: 103: 100: 94: 92: 51: 27: 19: 532: 531: 527: 526: 525: 523: 522: 521: 497: 496: 495: 494: 437: 435: 430: 332: 309: 283: 280: 230: 225: 223: 220: 137:Initial release 115: 104: 98: 95: 52: 50: 40: 28: 17: 12: 11: 5: 530: 520: 519: 514: 509: 493: 492: 485: 478: 470: 467: 466: 449: 432: 431: 429: 428: 423: 418: 413: 408: 403: 398: 393: 388: 383: 378: 373: 368: 363: 358: 353: 348: 342: 340: 334: 333: 331: 330: 325: 319: 317: 311: 310: 306: 305: 299: 294: 293:← — 288: 285: 284: 279: 278: 271: 264: 256: 250: 249: 243: 236: 235: 219: 218:External links 216: 197:computer virus 185: 184: 178:computer virus 172: 166: 165: 160: 154: 153: 148: 142: 141: 138: 134: 133: 130: 117: 116: 31: 29: 22: 15: 9: 6: 4: 3: 2: 529: 518: 515: 513: 512:Amiga viruses 510: 508: 507:Malware stubs 505: 504: 502: 491: 486: 484: 479: 477: 472: 471: 465: 463: 459: 455: 450: 447: 443: 442: 438: 427: 424: 422: 419: 417: 414: 412: 409: 407: 404: 402: 399: 397: 394: 392: 389: 387: 384: 382: 379: 377: 374: 372: 369: 367: 364: 362: 359: 357: 354: 352: 349: 347: 344: 343: 341: 339: 335: 329: 326: 324: 321: 320: 318: 316: 312: 304: → 303: 300: 298: 295: 292: 291: 286: 277: 272: 270: 265: 263: 258: 257: 254: 247: 244: 241: 238: 237: 233: 222: 215: 211: 209: 204: 202: 198: 195: 191: 183: 179: 176: 173: 171: 167: 164: 161: 159: 155: 152: 149: 147: 143: 139: 135: 131: 129: 125: 113: 110: 102: 91: 88: 84: 81: 77: 74: 70: 67: 63: 60: –  59: 58:"Byte Bandit" 55: 54:Find sources: 48: 44: 38: 37: 32:This article 30: 26: 21: 20: 462:expanding it 451: 436: 355: 323:The Analyzer 232:Amiga portal 212: 205: 189: 188: 140:January 1988 105: 96: 86: 79: 72: 65: 53: 41:Please help 36:verification 33: 396:Morris worm 356:Byte Bandit 328:Markus Hess 315:Individuals 194:boot sector 190:Byte Bandit 175:Boot sector 122:Byte Bandit 501:Categories 371:Elk Cloner 69:newspapers 426:WANK Worm 401:Ping-Pong 386:Jerusalem 381:Ghostball 297:Timeline 158:Platform 151:Amiga OS 99:May 2011 454:malware 361:Cascade 338:Malware 182:malware 132:Unknown 83:scholar 421:Virdem 416:Stoned 411:Scores 85:  78:  71:  64:  56:  452:This 351:Brain 302:1990s 201:Amiga 192:is a 163:Amiga 90:JSTOR 76:books 458:stub 346:1260 170:Type 62:news 406:SCA 45:by 503:: 180:, 489:e 482:t 475:v 464:. 275:e 268:t 261:v 112:) 106:( 101:) 97:( 87:· 80:· 73:· 66:· 39:.

Index


verification
improve this article
adding citations to reliable sources
"Byte Bandit"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
Original author(s)
Operating system
Amiga OS
Platform
Amiga
Type
Boot sector
computer virus
malware
boot sector
computer virus
Amiga
Lamer Exterminator
Amiga portal
http://www.sca.ch/
Byte Bandit-Virus description
v
t
e

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.