25:
246:
The second payload, activated after 4 days, will start causing crashes if programs with the ERIC or VULT signatures are run. Both signatures are found on programs written by
Electronic Data Systems of Plano, Texas. If a program from the company is run, the virus will crash the system after 25
232:. There is a simple way to identify infection. Normal Notepad and Scrapbook icons will have specific icons under System 7, or little Macintosh icons under System 6. If the icons are blank document icons, it is a good indication the system is infected.
215:
machines. It was first discovered in Spring 1988. It was written by a disgruntled programmer and specifically attacks two applications that were under development at his former company. These programs were never released to the public.
258:(FBI) soon after the virus was discovered. There were no federal laws with which to charge the author, so they remain free to this day. This loophole resulted in the "Computer Virus Eradication Act of 1988".
250:
The third payload activates after 7 days, and will actively try to stop programs with the VULT signature from writing to disk. If no write to disks happen within 10 minutes, the virus will crash the system.
281:
437:
414:
287:
324:
89:
42:
61:
68:
407:
75:
294:
108:
516:
57:
587:
255:
46:
592:
442:
400:
526:
521:
372:
501:
82:
556:
268:
35:
491:
486:
566:
546:
308:
274:
229:
8:
506:
301:
531:
236:
541:
463:
240:
208:
172:
581:
235:
Scores begins to spread to other applications two days after infection. The
536:
496:
468:
511:
392:
212:
154:
24:
225:
348:
478:
561:
455:
224:
Scores infects the System, Notepad, and
Scrapbook files under
288:
Sabotage Aimed at
Computer Company Destroys Government Data.
267:
Norstad, John. The
Viruses. Disinfectant 3.7.1, 1988-1997
254:
The alleged author of the virus was questioned by the
309:
A description of computer virus epidemic at Miami U.
49:. Unsourced material may be challenged and removed.
295:FBI to investigate rogue computer program at NASA.
302:SCORES Virus (Mac) Sighted At Washington State U.
273:John Norstad. INFO-MAC Digest (through Virus-L),
579:
300:Joshua Yeidel. VIRUS-L Virus Discussion List,
293:Keith Petersen. VIRUS-L Virus Discussion List,
408:
415:
401:
109:Learn how and when to remove this message
422:
243:Handler often become infected as well.
580:
396:
47:adding citations to reliable sources
18:
13:
14:
604:
377:agn-www.informatik.uni-hamburg.de
349:"Scores - The Virus Encyclopedia"
286:The New York Times, Technology,
23:
256:Federal Bureau of Investigation
34:needs additional citations for
365:
341:
317:
1:
307:Joe Simpson, Virus-L Digest,
277:, The Scores Virus 1988-04-18
261:
58:"Scores" computer virus
7:
219:
10:
609:
477:
454:
428:
194:
186:
178:
168:
160:
150:
136:
128:
123:
16:Macintosh computer virus
269:Northwestern University
588:Classic Mac OS viruses
325:"Virus:MacOS/Scores.A"
164:Categorisation needed
593:Hacking in the 1980s
423:Hacking in the 1980s
280:Symantec Antivirus,
43:improve this article
507:Christmas Tree EXEC
532:Lamer Exterminator
275:Volume 6, Issue 40
575:
574:
449:
448:
353:virus.wikidot.com
329:www.microsoft.com
202:
201:
119:
118:
111:
93:
600:
517:Father Christmas
431:
430:
417:
410:
403:
394:
393:
387:
386:
384:
383:
369:
363:
362:
360:
359:
345:
339:
338:
336:
335:
321:
121:
120:
114:
107:
103:
100:
94:
92:
51:
27:
19:
608:
607:
603:
602:
601:
599:
598:
597:
578:
577:
576:
571:
473:
450:
424:
421:
391:
390:
381:
379:
371:
370:
366:
357:
355:
347:
346:
342:
333:
331:
323:
322:
318:
264:
222:
145:
143:
141:
115:
104:
98:
95:
52:
50:
40:
28:
17:
12:
11:
5:
606:
596:
595:
590:
573:
572:
570:
569:
564:
559:
554:
549:
544:
539:
534:
529:
524:
519:
514:
509:
504:
499:
494:
489:
483:
481:
475:
474:
472:
471:
466:
460:
458:
452:
451:
447:
446:
440:
435:
434:← —
429:
426:
425:
420:
419:
412:
405:
397:
389:
388:
373:"Scores Virus"
364:
340:
315:
314:
313:
312:
305:
298:
291:
284:
278:
271:
263:
260:
221:
218:
209:computer virus
200:
199:
196:
192:
191:
188:
184:
183:
180:
176:
175:
170:
169:Classification
166:
165:
162:
158:
157:
152:
148:
147:
138:
134:
133:
130:
129:Technical name
126:
125:
117:
116:
31:
29:
22:
15:
9:
6:
4:
3:
2:
605:
594:
591:
589:
586:
585:
583:
568:
565:
563:
560:
558:
555:
553:
550:
548:
545:
543:
540:
538:
535:
533:
530:
528:
525:
523:
520:
518:
515:
513:
510:
508:
505:
503:
500:
498:
495:
493:
490:
488:
485:
484:
482:
480:
476:
470:
467:
465:
462:
461:
459:
457:
453:
445: →
444:
441:
439:
436:
433:
432:
427:
418:
413:
411:
406:
404:
399:
398:
395:
378:
374:
368:
354:
350:
344:
330:
326:
320:
316:
310:
306:
303:
299:
296:
292:
289:
285:
283:
279:
276:
272:
270:
266:
265:
259:
257:
252:
248:
244:
242:
238:
233:
231:
227:
217:
214:
210:
206:
197:
193:
189:
185:
181:
177:
174:
171:
167:
163:
159:
156:
153:
149:
139:
135:
131:
127:
122:
113:
110:
102:
91:
88:
84:
81:
77:
74:
70:
67:
63:
60: –
59:
55:
54:Find sources:
48:
44:
38:
37:
32:This article
30:
26:
21:
20:
551:
464:The Analyzer
380:. Retrieved
376:
367:
356:. Retrieved
352:
343:
332:. Retrieved
328:
319:
253:
249:
245:
234:
223:
204:
203:
146:San Jose Flu
105:
99:October 2015
96:
86:
79:
72:
65:
53:
41:Please help
36:verification
33:
537:Morris worm
497:Byte Bandit
469:Markus Hess
456:Individuals
582:Categories
512:Elk Cloner
382:2016-03-23
358:2016-03-23
334:2016-03-23
311:1988-04-28
304:1988-11-22
297:1988-07-06
290:1988-07-04
262:References
211:affecting
69:newspapers
567:WANK Worm
542:Ping-Pong
527:Jerusalem
522:Ghostball
247:minutes.
213:Macintosh
155:Macintosh
438:Timeline
230:System 7
226:System 6
220:Overview
502:Cascade
479:Malware
198:Unknown
195:Authors
190:Unknown
182:Unknown
161:Subtype
83:scholar
562:Virdem
557:Stoned
552:Scores
282:Scores
237:Finder
207:was a
205:Scores
187:Origin
179:Family
132:Scores
124:Scores
85:
78:
71:
64:
56:
492:Brain
443:1990s
173:Virus
137:Alias
90:JSTOR
76:books
487:1260
239:and
228:and
151:Type
144:NASA
142:Vult
140:Eric
62:news
547:SCA
45:by
584::
375:.
351:.
327:.
241:DA
416:e
409:t
402:v
385:.
361:.
337:.
112:)
106:(
101:)
97:(
87:·
80:·
73:·
66:·
39:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.