Meet your DOOM...
- GAMER
- Gaming Demi-god
- Posts: 1527
- Joined: Sun Sep 22, 2002 4:55 am
- Location: chasing chikeds in the snow!
Meet your DOOM...
Hello.
What do we all know about this DOOM virus that has everyone so worked up about? Is it trying to kill Linux? Mum was just telling me about it and to not open any knew FWDs? What's the deal?
GAMER
What do we all know about this DOOM virus that has everyone so worked up about? Is it trying to kill Linux? Mum was just telling me about it and to not open any knew FWDs? What's the deal?
GAMER
<img src="http://thumbs.deviantart.com/300W-96A09 ... rs_Sig.jpg">
i have a chik magnet...observe!
<MARQUEE BEHAVIOR="slide"><font color="crimson">
[MAGNET]-------------------- </marquee>
i have a chik magnet...observe!
<MARQUEE BEHAVIOR="slide"><font color="crimson">
[MAGNET]-------------------- </marquee>
-
- Way too much free time
- Posts: 558
- Joined: Wed Apr 23, 2003 10:28 pm
- Location: Nowhere.
Yes, I have 10 virus emails... a new record. 3 were from '[email protected]', 2 were from '[email protected]'. I assume it was Doom, because of this virus warning I got from my ISP:
There are a number of potent viruses currently circulating the internet and we'd like to advise you about how to protect yourself in advance or remove the virus if you have already been infected.
The MyDoom or Norvarg virus may appear in emails headed "Hi", "Hello", "Error", "Status", "Server Report", "Mail Transaction Failed", "Failed Delivery System" or infect via share sites like music download site Kazaa.
A newer variant of this virus - MyDoom-B - is also circulating. It arrives as an e-mail attachment that sends itself out to other addresses if opened, and may allow unauthorised access to computers.
- Thunderdog
- <b>Token Black Guy</b>
- Posts: 1737
- Joined: Sat Sep 14, 2002 9:25 pm
This virus is Extremely overrated, if you ask me. There are a lot of viruses that send themselve out via Email attachments. If you do get it somehow, If you want to keep it, or anything else from sending itself out through your Addresses, just put a false Email that starts with a number, symbol, or space. Since it will be at the top of the list (Alphabetically ordered), when the virus tries to send itself out, it'll fail with that one, and skip all the rest. Simple?
Or better yet, since the only way to get this virus is to manually open an email attachment ... you could not be a complete idiot and don't open strange email attachments!!! (or ANY attachments that don't contain a PERSONAL message from a known sender, for that matter!)
Owner / Webmaster of DOSGames.com for over 20 years
Download my free ebook: The Historical Reliability of the New Testament
Download my free ebook: The Historical Reliability of the New Testament
- Thunderdog
- <b>Token Black Guy</b>
- Posts: 1737
- Joined: Sat Sep 14, 2002 9:25 pm
- 486 player
- Gaming Demi-god
- Posts: 1223
- Joined: Wed Sep 18, 2002 6:32 am
- Location: Europe
is Novarg and MyDoom the same thing? I didn't think they were. Regardless, It's purpose is impossible. Once you re-format your system, it blows all that shit off anyway. If it destroys the Master Boot Record (MBR) just use a bootdisk to fix it.... it's all gay. (but for the record, I get about 8+ per day)
-Richard-
-Richard-
- Thunderdog
- <b>Token Black Guy</b>
- Posts: 1737
- Joined: Sat Sep 14, 2002 9:25 pm
-
- Member
- Posts: 49
- Joined: Wed Nov 12, 2003 4:44 am
- Location: Newcastle NSW Australia
Virus Information
Name: W32/Mydoom@MM
Risk Assessment
- Home Users: High-Outbreak
- Corporate Users: High-Outbreak
Date Discovered: 1/26/2004
Date Added: 1/26/2004
Origin: Unknown
Length: 22,528 bytes
Type: Virus
SubType: E-mail
DAT Required: 4319
Virus Characteristics
This is a mass-mailing and peer-to-peer file-sharing worm that bears the following characteristics:
contains its own SMTP engine to construct outgoing messages
contains a backdoor component (see below)
contains a Denial of Service payload
If you think that you may be infected with Mydoom, and are unsure how to check your system, you may download the Stinger tool to scan your system and remove the virus if present. This is not required for McAfee users as McAfee products are capable of detecting and removing the virus with the latest update. (see the removal instructions below for more information).
Note: Receiving an email alert stating that the virus came from your email address is not an indication that you are infected as the virus often forges the from address.
The virus arrives in an email message as follows:
From: (Spoofed email sender)
Do not assume that the sender address is an indication that the sender is infected. Additionally you may receive alert messages from a mail server that you are infected, which may not be the case.
Subject: (Varies, such as)
Error
Status
Server Report
Mail Transaction Failed
Mail Delivery System
hello
hi
Body: (Varies, such as)
The message cannot be represented in 7-bit ASCII encoding and has been sent as a binary attachment.
The message contains Unicode characters and has been sent as a binary attachment.
Mail transaction failed. Partial message is available.
Attachment: (varies [.bat, .exe, .pif, .cmd, .scr] - often arrives in a ZIP archive) (22,528 bytes)
examples (common names, but can be random)
doc.bat
document.zip
message.zip
readme.zip
text.pif
hello.cmd
body.scr
test.htm.pif
data.txt.exe
file.scr
In the case of two file extensions, multiple spaces may be inserted as well, for example:
document.htm (many spaces) .pif
When this file is run (manually), it copies itself to the WINDOWS SYSTEM directory as taskmon.exe
%SysDir%\taskmon.exe
(Where %Sysdir% is the Windows System directory, for example C:\WINDOWS\SYSTEM)
It creates the following registry entry to hook Windows startup:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
CurrentVersion\Run "TaskMon" = %SysDir%\taskmon.exe
The virus uses a DLL that it creates in the Windows System directory:
%SysDir%\shimgapi.dll (4,096 bytes)
This DLL is injected into the EXPLORER.EXE upon reboot via this registry key:
HKEY_CLASSES_ROOT\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InProcServer32 "(Default)" = %SysDir%\shimgapi.dll
The virus will not replicate on the 12th February or later (although the DLL will still be installed).
Peer To Peer Propagation
The worm copies itself to the KaZaa Shared Directory with the following filenames:
nuke2004
office_crack
rootkitXP
strip-girl-2.0bdcom_patches
activation_crack
icq2004-final
winamp
Remote Access Component
The worm (this functionality is in the dropped DLL) opens a connection on TCP port 3127 (if that fails it opens next available port up to port 3198). The worm can accept specially crafted TCP transmissions.
On receipt of one kind of such a transmission it will save the embedded binary into a temporary file and execute it. Then the temporary file is deleted.
On receipt of another kind it can relay TCP packets thus providing IP spoofing capabilities (possibly to facilitate SPAM distribution)
Denial of Service Payload
If the worm is run after February 1st 16:09:18 (UTC), it changes its behavior from mass mailing to initiating a denial of service attack against www.sco.com. This denial of service attack will stop on the first system startup after February 12th 02:28:57 (UTC) , and thereafter the worm's only behavior is to continue listening on TCP port 3127 (or up to 3198). Due to a bug in the code, the DoS attack will fail to start 75% of the time.
The denial of service executes by creating 64 threads each of which makes a HTTP GET request from random ports on the infected machines to port 80 of www.sco.com.
Indications of Infection
Upon executing the virus, Notepad is opened, filled with nonsense characters
Existence of the files and registry entry listed above
Method of Infection
This worm tries to spread via email and by copying itself to the shared directory for Kazaa clients if they are present.
The mailing component harvests address from the local system. Files with the following extensions are targeted:
wab
adb
tbb
dbx
asp
php
sht
htm
txt
pl
The worm avoids certain address, those using the following strings:
.gov
.mil
abuse
acketst
arin.
avp
berkeley
borlan
bsd
example
fido
foo.
fsf.
gnu
google
gov.
hotmail
iana
ibm.com
icrosof
ietf
inpris
isc.o
isi.e
kernel
linux
math
mit.e
mozilla
msn.
mydomai
nodomai
panda
pgp
rfc-ed
ripe.
ruslis
secur
sendmail
sopho
syma
tanford.e
unix
usenet
utgers.ed
Additionally, the worm contains strings, which it uses to randomly generate, or guess, email addresses. These are prepended as user names to harvested domain names:
sandra
linda
julie
jimmy
jerry
helen
debby
claudia
brenda
anna
alice
brent
adam
ted
fred
jack
bill
stan
smith
steve
matt
dave
dan
joe
jane
bob
robert
peter
tom
ray
mary
serg
brian
jim
maria
leo
jose
andrew
sam
george
david
kevin
mike
james
michael
john
alex
Finally the virus sends itself via SMTP - constructing messages using its own SMTP engine. The worm guesses the recipient email server, prepending the target domain name with the following strings:
mx.
mail.
smtp.
mx1.
mxs.
mail1.
relay.
ns.
Removal Instructions
All Users :
Use specified engine and DAT files for detection and removal.
The shimgapi.dll file is injected into the EXPLORER.EXE process if the system has been rebooted after the infection has occured. In this situation, a reboot and rescan is required to remove this DLL from the system with the 4319 DAT files. The 4320 DAT files, and later, do not require a reboot.
Alternatively, following EXTRA.DAT packages are available.
EXTRA.DAT
SUPER EXTRA.DAT
Modifications made to the system Registry and/or INI files for the purposes of hooking system startup will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).
Additional Windows ME/XP removal considerations
Stinger
Stinger 1.9.8 has been made available to assist in detecting and repairing this threat. A reboot is not required after running Stinger v 1.9.8.
Manual Removal Instructions
To remove this virus "by hand", follow these steps (WinNT/2K/XP):
Terminate the process TASKMON.EXE
Delete the file TASKMON.EXE from your WINDOWS SYSTEM directory (typically c:\windows\system32 or c:\winnt\system32)
Edit the registry
Delete the "TaskMon" value from
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Run
Change the (Default) value to webcheck.dll here
HKEY_CLASSES_ROOT\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InProcServer32
Terminate the process EXPLORER.EXE
From the WINDOWS TASK MANAGER, click FILE - RUN, type EXPLORER.EXE and hit ENTER.
Delete the file SHIMGAPI.DLL your WINDOWS SYSTEM directory (typically c:\windows\system32 or c:\winnt\system32)
Reboot the system
McAfee Security Desktop Firewall
To prevent possible remote access McAfee Desktop Firewall users can block incoming TCP port 3127.
Sniffer Customers: Filters have been developed that will look for MyDoom traffic [Sniffer Distributed 4.1/4.2/4.3, Sniffer Portable 4.7/4.7.5, and Netasyst].
W32_MyDoom@MM Sniffer Filters.zip
ThreatScan users
The latest ThreatScan signature (2004-01-27) includes detection of the Mydoom virus. This signature is available for ThreatScan v2.0, v2.1, and v2.5.
ThreatScan users can also detect the backdoor portion of the virus by running a "Resource Discovery" task utilizing the port scanning options.
To update your ThreatScan installations with the latest signatures perform the following tasks:
From within ePO open the "Policies" tab.
Select "McAfee ThreatScan" and then select "Scan Options"
In the pane below click the "Launch AutoUpdater" button.
Using the default settings proceed through the dialogs that appear. Upon successful completion of the update a message will appear stating that; update 2004-01-27 has completed successfully.
From within ePO create a new "AutoUpdate on Agent(s)" task.
Go into the settings for this task and ensure that the host field is set to ftp.nai.com , the path is set to /pub/security/tsc20/updates/winnt/ and that the user and password fields are both set to ftp. Note that "tsc20" in the above path is used for ThreatScan 2.0 and 2.1. The correct path for ThreatScan 2.5 is "tsc25".
Launch this task against all agent machines.
When the task(s) complete information will be available in the "Task Status Details" report.
To create and execute a new task containing the new update functionality, do the following:
- Create a new ThreatScan task.
- Edit the settings of this task.
- Edit the "Task option", "Host IP Range" to include all desired machines to scan.
To scan for the virus:
Select the "Remote Infection Detection" category and "Windows Virus Checks" template. -or-
Select the "Other" category and "Scan All Vulnerabilities" template.
To create and execute a new task to perform a port scan, do the following:
Create a new Resource Discovery task.
Edit the settings of this task.
Edit the "Task option", "Host IP Range" to include all desired machines to scan.
To scan for the virus:
Select the "Port Scan" option.
Select the "TCP Port Scan" option.
Enter 3127 in the "TCP Port Ranges" field.
Launch the scan.
For additional information:
Run the "ThreatScan Template Report"
Look for module number #4061
Aliases
Novarg (F-Secure), W32.Novarg.A@mm (Symantec), W32/Mydoom.a@MM, Win32.Mydoom.A (CA), Win32/Shimg (CA), WORM_MIMAIL.R (Trend)
I copied this Information from the McAfee Virus Alerts Page...If you have the virus please either down a removal kit or get a professional to remove it for you...if you have Anti-Virus installed make sure it's up-to-date with it's definitions this little baby can easily go unrecognised!!
:Angry:
Name: W32/Mydoom@MM
Risk Assessment
- Home Users: High-Outbreak
- Corporate Users: High-Outbreak
Date Discovered: 1/26/2004
Date Added: 1/26/2004
Origin: Unknown
Length: 22,528 bytes
Type: Virus
SubType: E-mail
DAT Required: 4319
Virus Characteristics
This is a mass-mailing and peer-to-peer file-sharing worm that bears the following characteristics:
contains its own SMTP engine to construct outgoing messages
contains a backdoor component (see below)
contains a Denial of Service payload
If you think that you may be infected with Mydoom, and are unsure how to check your system, you may download the Stinger tool to scan your system and remove the virus if present. This is not required for McAfee users as McAfee products are capable of detecting and removing the virus with the latest update. (see the removal instructions below for more information).
Note: Receiving an email alert stating that the virus came from your email address is not an indication that you are infected as the virus often forges the from address.
The virus arrives in an email message as follows:
From: (Spoofed email sender)
Do not assume that the sender address is an indication that the sender is infected. Additionally you may receive alert messages from a mail server that you are infected, which may not be the case.
Subject: (Varies, such as)
Error
Status
Server Report
Mail Transaction Failed
Mail Delivery System
hello
hi
Body: (Varies, such as)
The message cannot be represented in 7-bit ASCII encoding and has been sent as a binary attachment.
The message contains Unicode characters and has been sent as a binary attachment.
Mail transaction failed. Partial message is available.
Attachment: (varies [.bat, .exe, .pif, .cmd, .scr] - often arrives in a ZIP archive) (22,528 bytes)
examples (common names, but can be random)
doc.bat
document.zip
message.zip
readme.zip
text.pif
hello.cmd
body.scr
test.htm.pif
data.txt.exe
file.scr
In the case of two file extensions, multiple spaces may be inserted as well, for example:
document.htm (many spaces) .pif
When this file is run (manually), it copies itself to the WINDOWS SYSTEM directory as taskmon.exe
%SysDir%\taskmon.exe
(Where %Sysdir% is the Windows System directory, for example C:\WINDOWS\SYSTEM)
It creates the following registry entry to hook Windows startup:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
CurrentVersion\Run "TaskMon" = %SysDir%\taskmon.exe
The virus uses a DLL that it creates in the Windows System directory:
%SysDir%\shimgapi.dll (4,096 bytes)
This DLL is injected into the EXPLORER.EXE upon reboot via this registry key:
HKEY_CLASSES_ROOT\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InProcServer32 "(Default)" = %SysDir%\shimgapi.dll
The virus will not replicate on the 12th February or later (although the DLL will still be installed).
Peer To Peer Propagation
The worm copies itself to the KaZaa Shared Directory with the following filenames:
nuke2004
office_crack
rootkitXP
strip-girl-2.0bdcom_patches
activation_crack
icq2004-final
winamp
Remote Access Component
The worm (this functionality is in the dropped DLL) opens a connection on TCP port 3127 (if that fails it opens next available port up to port 3198). The worm can accept specially crafted TCP transmissions.
On receipt of one kind of such a transmission it will save the embedded binary into a temporary file and execute it. Then the temporary file is deleted.
On receipt of another kind it can relay TCP packets thus providing IP spoofing capabilities (possibly to facilitate SPAM distribution)
Denial of Service Payload
If the worm is run after February 1st 16:09:18 (UTC), it changes its behavior from mass mailing to initiating a denial of service attack against www.sco.com. This denial of service attack will stop on the first system startup after February 12th 02:28:57 (UTC) , and thereafter the worm's only behavior is to continue listening on TCP port 3127 (or up to 3198). Due to a bug in the code, the DoS attack will fail to start 75% of the time.
The denial of service executes by creating 64 threads each of which makes a HTTP GET request from random ports on the infected machines to port 80 of www.sco.com.
Indications of Infection
Upon executing the virus, Notepad is opened, filled with nonsense characters
Existence of the files and registry entry listed above
Method of Infection
This worm tries to spread via email and by copying itself to the shared directory for Kazaa clients if they are present.
The mailing component harvests address from the local system. Files with the following extensions are targeted:
wab
adb
tbb
dbx
asp
php
sht
htm
txt
pl
The worm avoids certain address, those using the following strings:
.gov
.mil
abuse
acketst
arin.
avp
berkeley
borlan
bsd
example
fido
foo.
fsf.
gnu
gov.
hotmail
iana
ibm.com
icrosof
ietf
inpris
isc.o
isi.e
kernel
linux
math
mit.e
mozilla
msn.
mydomai
nodomai
panda
pgp
rfc-ed
ripe.
ruslis
secur
sendmail
sopho
syma
tanford.e
unix
usenet
utgers.ed
Additionally, the worm contains strings, which it uses to randomly generate, or guess, email addresses. These are prepended as user names to harvested domain names:
sandra
linda
julie
jimmy
jerry
helen
debby
claudia
brenda
anna
alice
brent
adam
ted
fred
jack
bill
stan
smith
steve
matt
dave
dan
joe
jane
bob
robert
peter
tom
ray
mary
serg
brian
jim
maria
leo
jose
andrew
sam
george
david
kevin
mike
james
michael
john
alex
Finally the virus sends itself via SMTP - constructing messages using its own SMTP engine. The worm guesses the recipient email server, prepending the target domain name with the following strings:
mx.
mail.
smtp.
mx1.
mxs.
mail1.
relay.
ns.
Removal Instructions
All Users :
Use specified engine and DAT files for detection and removal.
The shimgapi.dll file is injected into the EXPLORER.EXE process if the system has been rebooted after the infection has occured. In this situation, a reboot and rescan is required to remove this DLL from the system with the 4319 DAT files. The 4320 DAT files, and later, do not require a reboot.
Alternatively, following EXTRA.DAT packages are available.
EXTRA.DAT
SUPER EXTRA.DAT
Modifications made to the system Registry and/or INI files for the purposes of hooking system startup will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).
Additional Windows ME/XP removal considerations
Stinger
Stinger 1.9.8 has been made available to assist in detecting and repairing this threat. A reboot is not required after running Stinger v 1.9.8.
Manual Removal Instructions
To remove this virus "by hand", follow these steps (WinNT/2K/XP):
Terminate the process TASKMON.EXE
Delete the file TASKMON.EXE from your WINDOWS SYSTEM directory (typically c:\windows\system32 or c:\winnt\system32)
Edit the registry
Delete the "TaskMon" value from
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Run
Change the (Default) value to webcheck.dll here
HKEY_CLASSES_ROOT\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InProcServer32
Terminate the process EXPLORER.EXE
From the WINDOWS TASK MANAGER, click FILE - RUN, type EXPLORER.EXE and hit ENTER.
Delete the file SHIMGAPI.DLL your WINDOWS SYSTEM directory (typically c:\windows\system32 or c:\winnt\system32)
Reboot the system
McAfee Security Desktop Firewall
To prevent possible remote access McAfee Desktop Firewall users can block incoming TCP port 3127.
Sniffer Customers: Filters have been developed that will look for MyDoom traffic [Sniffer Distributed 4.1/4.2/4.3, Sniffer Portable 4.7/4.7.5, and Netasyst].
W32_MyDoom@MM Sniffer Filters.zip
ThreatScan users
The latest ThreatScan signature (2004-01-27) includes detection of the Mydoom virus. This signature is available for ThreatScan v2.0, v2.1, and v2.5.
ThreatScan users can also detect the backdoor portion of the virus by running a "Resource Discovery" task utilizing the port scanning options.
To update your ThreatScan installations with the latest signatures perform the following tasks:
From within ePO open the "Policies" tab.
Select "McAfee ThreatScan" and then select "Scan Options"
In the pane below click the "Launch AutoUpdater" button.
Using the default settings proceed through the dialogs that appear. Upon successful completion of the update a message will appear stating that; update 2004-01-27 has completed successfully.
From within ePO create a new "AutoUpdate on Agent(s)" task.
Go into the settings for this task and ensure that the host field is set to ftp.nai.com , the path is set to /pub/security/tsc20/updates/winnt/ and that the user and password fields are both set to ftp. Note that "tsc20" in the above path is used for ThreatScan 2.0 and 2.1. The correct path for ThreatScan 2.5 is "tsc25".
Launch this task against all agent machines.
When the task(s) complete information will be available in the "Task Status Details" report.
To create and execute a new task containing the new update functionality, do the following:
- Create a new ThreatScan task.
- Edit the settings of this task.
- Edit the "Task option", "Host IP Range" to include all desired machines to scan.
To scan for the virus:
Select the "Remote Infection Detection" category and "Windows Virus Checks" template. -or-
Select the "Other" category and "Scan All Vulnerabilities" template.
To create and execute a new task to perform a port scan, do the following:
Create a new Resource Discovery task.
Edit the settings of this task.
Edit the "Task option", "Host IP Range" to include all desired machines to scan.
To scan for the virus:
Select the "Port Scan" option.
Select the "TCP Port Scan" option.
Enter 3127 in the "TCP Port Ranges" field.
Launch the scan.
For additional information:
Run the "ThreatScan Template Report"
Look for module number #4061
Aliases
Novarg (F-Secure), W32.Novarg.A@mm (Symantec), W32/Mydoom.a@MM, Win32.Mydoom.A (CA), Win32/Shimg (CA), WORM_MIMAIL.R (Trend)
I copied this Information from the McAfee Virus Alerts Page...If you have the virus please either down a removal kit or get a professional to remove it for you...if you have Anti-Virus installed make sure it's up-to-date with it's definitions this little baby can easily go unrecognised!!
:Angry:
Give Me Blood, Guts n' Glory...Shoot to Kill!!
- Thunderdog
- <b>Token Black Guy</b>
- Posts: 1737
- Joined: Sat Sep 14, 2002 9:25 pm
Mydoom overwhelms SCO site
Globe & Mail. February 2, 2004
Salt Lake City - A computer virus that targeted a small Utah software
company performed as its perpetrators promised on Sunday, bringing down The
SCO Group's website two days before a similar virus was programmed to attack
Microsoft Corp.
The "Mydoom" or "Novarg" virus launched the attack early Sunday with
hundreds of thousands of requests, which crippled the site, SCO spokesman
Blake Stowell said.
The virus was spread last week by e-mail and caused infected computers to
launch the electronic attack against SCO, which has been targeted at least
twice this year with such attacks because of its threats to sue users of the
Linux operating system in an intellectual property dispute.
On Tuesday, Lindon, Utah-based SCO announced a $250,000 (U.S.) reward for
information leading to the arrest and conviction of Mydoom's creator. Mr.
Stowell said the company believes someone within the Linux community is
behind the worm.
Sunday's attack had a higher profile because the well-publicized Mydoom
virus was involved, but that doesn't make the assault unique, a computer
expert said.
"To SCO, it means quite a bit," said Marty Lindner, an analyst at US-CERT, a
public-private partnership focused on Internet security. "But in the big
scheme of things, this happens all the time."
Internet traffic to SCO's website began building late Saturday night, and
overwhelmed it just after 12 a.m. EST.
"It's on the scale of hundreds of thousands of computers, all trying to
access www.sco.com all at the same time, several times a minute," Mr.
Stowell said. "Our capacity to be able to handle that amount of bandwidth,
or the number of requests coming in, was completely saturated."
The attack is programmed to continue on SCO's website until Feb. 12,
according to messages left inside the virus' code.
But Mr. Stowell said the company would announce a contingency plan Monday
for customers to access the site. He declined to discuss those plans, citing
hackers.
It will likely involve slightly altering the wording SCO's web address, said
David Perry, a spokesman for antivirus firm Trend Micro.
SCO does not expect the website interruption to affect its business.
"The way we really look at this, people don't come to our website to conduct
commerce," Mr. Stowell said. "They come to obtain information and maybe
receive a product update or software patch."
The strain that shut down SCO's website was the Mydoom.A virus. Another
strain, called Mydoom.B, is set to launch an attack Tuesday on Microsoft.
The companies have been sharing information about the virus and how each is
addressing it. Microsoft also has offered a $250,000 reward to help catch
those behind the virus.
Mr. Lindner said it's difficult to predict the same type of shutdown for
Microsoft.
"Depending on the number of machines launching the attack, the outcomes
could be the same or completely different," he said. "There are too many
unknowns."
----------------------
To sum it all up, MyDOOM (or Novarg) preforms a DDOS (denial of service) attack on the SCO (an anti-Linux group) website.
-Richard-
Globe & Mail. February 2, 2004
Salt Lake City - A computer virus that targeted a small Utah software
company performed as its perpetrators promised on Sunday, bringing down The
SCO Group's website two days before a similar virus was programmed to attack
Microsoft Corp.
The "Mydoom" or "Novarg" virus launched the attack early Sunday with
hundreds of thousands of requests, which crippled the site, SCO spokesman
Blake Stowell said.
The virus was spread last week by e-mail and caused infected computers to
launch the electronic attack against SCO, which has been targeted at least
twice this year with such attacks because of its threats to sue users of the
Linux operating system in an intellectual property dispute.
On Tuesday, Lindon, Utah-based SCO announced a $250,000 (U.S.) reward for
information leading to the arrest and conviction of Mydoom's creator. Mr.
Stowell said the company believes someone within the Linux community is
behind the worm.
Sunday's attack had a higher profile because the well-publicized Mydoom
virus was involved, but that doesn't make the assault unique, a computer
expert said.
"To SCO, it means quite a bit," said Marty Lindner, an analyst at US-CERT, a
public-private partnership focused on Internet security. "But in the big
scheme of things, this happens all the time."
Internet traffic to SCO's website began building late Saturday night, and
overwhelmed it just after 12 a.m. EST.
"It's on the scale of hundreds of thousands of computers, all trying to
access www.sco.com all at the same time, several times a minute," Mr.
Stowell said. "Our capacity to be able to handle that amount of bandwidth,
or the number of requests coming in, was completely saturated."
The attack is programmed to continue on SCO's website until Feb. 12,
according to messages left inside the virus' code.
But Mr. Stowell said the company would announce a contingency plan Monday
for customers to access the site. He declined to discuss those plans, citing
hackers.
It will likely involve slightly altering the wording SCO's web address, said
David Perry, a spokesman for antivirus firm Trend Micro.
SCO does not expect the website interruption to affect its business.
"The way we really look at this, people don't come to our website to conduct
commerce," Mr. Stowell said. "They come to obtain information and maybe
receive a product update or software patch."
The strain that shut down SCO's website was the Mydoom.A virus. Another
strain, called Mydoom.B, is set to launch an attack Tuesday on Microsoft.
The companies have been sharing information about the virus and how each is
addressing it. Microsoft also has offered a $250,000 reward to help catch
those behind the virus.
Mr. Lindner said it's difficult to predict the same type of shutdown for
Microsoft.
"Depending on the number of machines launching the attack, the outcomes
could be the same or completely different," he said. "There are too many
unknowns."
----------------------
To sum it all up, MyDOOM (or Novarg) preforms a DDOS (denial of service) attack on the SCO (an anti-Linux group) website.
-Richard-
-
- Newbie
- Posts: 7
- Joined: Mon Feb 02, 2004 10:39 pm
- johpower
- Way too much free time
- Posts: 428
- Joined: Mon Jan 06, 2003 6:59 pm
- Location: Colorado North 40
A rather simple avoidance for this is to enable your CMOS "virus detect" or "anti-virus". It ain't perfect but it catches most attemps to access the MBR. One of which was on a customer's bootdisk and therefore I had no A-V up and running (whew!). It has caught a few on my PC before I D/L'd "AntVir" www.free-av.com. I've been bug-free now for over 2 yrs.wardrich wrote:is Novarg and MyDoom the same thing? I didn't think they were. Regardless, It's purpose is impossible. Once you re-format your system, it blows all that shit off anyway. If it destroys the Master Boot Record (MBR) just use a bootdisk to fix it.... it's all gay. (but for the record, I get about 8+ per day)
Sig: "The Universe is change... but it is not exact change." -Fusco Bros.
My mom got an e-mail which's heading was: "Here's the file you asked for" and there was an attachment that was something with TWO file extensions!
Microsoft claims that Linux has made the virus but some people belive that Microsoft has launched the virus themselves to get Linux out of the market.
Or something...
Microsoft claims that Linux has made the virus but some people belive that Microsoft has launched the virus themselves to get Linux out of the market.
Or something...
"Long before there was ultra-super-duper-128-bit-polygon-video-capture, hardware hype, wEiRd TyPe, pointless game ratings, E3, SCREAMING GUYS in ads, Virtual Reality, cliches like "in your face" and "it's the ultimate", 360 degree roto-scope-rhetoric from self righteous reviewers, CD-this, 3-D that, multi-million-dollar TV commercials tainted with TOILET humor...
...there was fun."
The OPCFG - dedicated to the preservation of classic forms of gaming since 1998!
...there was fun."
The OPCFG - dedicated to the preservation of classic forms of gaming since 1998!
- Thunderdog
- <b>Token Black Guy</b>
- Posts: 1737
- Joined: Sat Sep 14, 2002 9:25 pm
Oh? But she didn't ask anybody for any file. Well it was a virus mail anyway. It is highly probable that I'm wrong.
"Long before there was ultra-super-duper-128-bit-polygon-video-capture, hardware hype, wEiRd TyPe, pointless game ratings, E3, SCREAMING GUYS in ads, Virtual Reality, cliches like "in your face" and "it's the ultimate", 360 degree roto-scope-rhetoric from self righteous reviewers, CD-this, 3-D that, multi-million-dollar TV commercials tainted with TOILET humor...
...there was fun."
The OPCFG - dedicated to the preservation of classic forms of gaming since 1998!
...there was fun."
The OPCFG - dedicated to the preservation of classic forms of gaming since 1998!