Tuesday, April 16, 2024

MyDoom Worm Sweeps Across Internet

Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

MyDoom, by many accounts, is swiftly becoming the fastest spreading virus ever, even

surpassing Sobig-F, which carpet bombed the Internet late last summer.

The mass-mailing worm, also known by some security companies as Novarg, hit the wild on

Monday and has been racing around the globe infecting computers with backdoor trojans and

proxies. MessageLabs, an email security services company based in New York, reports that

MyDoom accounts for one in 17 emails today.

As of 11 a.m. today, company analysts say they have stopped 1.2 million copies of the worm.

By comparison, the company stopped 1 million copies of Sobig-F in the first 24 hours.

The worm has caused more than $850 million worth of economic damages worldwide in just the

first 24 hours, according to mi2g, a security analyst company based in London.

And anti-virus experts say the problem will most likely get worse before it gets better.

”This one is very dangerous,” says Chris Belthoff, a senior analyst at Sophos, Inc., an

anti-virus and anti-spam company based in Lynnfield, Mass. ”It’s spreading pretty

pervasively and we expect to see it increasing over the course of the day. A lot of people

may already have copies sitting in their in-boxes and as time zones wake up and get to work,

it may pick up.”

MyDoom spreads via email and by copying itself to any available shared directories used by

Kazaa. It harvests addresses from infected machines, and generally uses the words ‘test’,

‘hi’ and ‘hello’ in the subject line.

Analysts say MyDoom is spreading so quickly because it is successfully fooling users into

opening firs the email and then the attachment. The email often disguises itself as an email

that the user sent that has bounced back. The user, wanting to know why the email failed,

opens it up and then sees a text file icon, instead of the icon for an executable.

”From a propagation perspective, it has been effective, much more than we would have

suspected,” says Brian Dunphy, a senior manager at Symantec Managed Security Services,

which is based in Alexandria, Va. ”It took a unique twist on social engineering. We’ve told

them not to open executables but this one masquerades as a harmless text file. It’s

exploiting the end user and their desire to want to open up attachments.”

MyDoom also sets up a backdoor trojan in infected computers, allowing the virus writer or

anyone else capable of sending commands to an infected machine to upload code or send spam.
The worm also is geared to launch a denial-of-service attack against SCO.com starting Feb.

1. SCO, a Linux company, is embroiled in legal disputes over Linux and open source issues.

Some analysts say the worm is the latest round in the ‘Linux wars’.

The worm has a kill date of Feb. 12.

Ken Dunham, director of malicious code at iDefense, Inc., a security and anti-virus company,

says the specific kill date leads him to expect the onslaught of MyDoom variants.

”This may be the first of many attacks and we ,perhaps, may see this worm refined in future

attacks,” says Dunham. ”Like we did with Sobig in 2003, we might see copy cat attacks

featuring MyDoom in 2004.”

Subscribe to Data Insider

Learn the latest news and best practices about data science, big data analytics, artificial intelligence, data security, and more.

Similar articles

Get the Free Newsletter!

Subscribe to Data Insider for top news, trends & analysis

Latest Articles