Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security Bug Operating Systems Software Windows

Today's Windows Virus - MyDoom / Novarg 847

Oddster writes "There is a new virus out by the name of Novarg which can infect all Windows versions from 95 to XP. It has two interesting features - first, in addition to mass mailing, it also distributes itself via the P2P network Kazaa. Second, it can perform a denial-of-service against www.sco.com. Details at Symantec and F-Secure, although neither seems to have finished their analysis." Other readers have sent in links to coverage at CNET and Security Response, and Russ Nelson provides a sample message.
This discussion has been archived. No new comments can be posted.

Today's Windows Virus - MyDoom / Novarg

Comments Filter:
  • Oh no (Score:0, Insightful)

    by Raster Burn ( 213891 ) on Monday January 26, 2004 @08:41PM (#8094794)
    Now Darl seems to have some credibility with the Linux == terrorism threat. Good going, guys....
  • Bad example... (Score:1, Insightful)

    by evilmuffins ( 631482 ) on Monday January 26, 2004 @08:42PM (#8094797)
    It is pretty obvious that this was written by someone in the Linux community. But, is this really the way to fight againest SCO? Whoever wrote this virus is kind of like an angery 6th grader, who orders pizza to a bullies house because the bully stole their lunch money.
  • by Kenja ( 541830 ) on Monday January 26, 2004 @08:43PM (#8094816)
    Dumb people. Problem is that dumb people make up a majority of internet users. This is the same reason that spam works as an advertising method. Its also why toner refills have warnings not to drink the contents and windex warns you not to spray it in your eyes.
  • by Tassleman ( 66753 ) on Monday January 26, 2004 @08:43PM (#8094823) Homepage
    Second, it can perform a denial-of-service against www.sco.com

    Great. This will give SCO some good PR ammo. Thanks guys.
  • by Anonymous Coward on Monday January 26, 2004 @08:44PM (#8094829)
    NOT FUNNY! That's exactly how I expect SCO are going to try and spin this.

    What goes on?

    http://www.cert.org/advisories/CA-2003-21.html
    http://kerneltrap.org/node/view/1584
    http://news. zdnet.co.uk/software/linuxunix/0,39020 390,39118285,00.htm
    http://www.trusecure.com/know ledge/hype/20031209_l inux.shtml

    I see a pattern forming and it ain't pretty.
  • DDoS (Score:5, Insightful)

    by DRUNK_BEAR ( 645868 ) on Monday January 26, 2004 @08:45PM (#8094846)
    It's all fun and jokes at first, but if we look at it from the public's eyes, these types of attacks give a bad name to OSS and the Linux community.

    Obviously, SCO has many ennemies. Most of them are probably nix users and the public knows that. If we want to have the public favor OSS, reputation is also important.

    Just my 0.02$

  • by Tyrdium ( 670229 ) on Monday January 26, 2004 @08:45PM (#8094849) Homepage
    Think about it. Until now, the Linux community has seemed very innocent over this whole issue. It's simply a matter of a company trying to oppress people for it's own gain (at least in the courts' eye). When people start doing illegal things such as writing viruses to get back at SCO, on the other hand, the Linux community loses much of its innocence. Look beyond the surface; this is a big PR hit for the Linux community. Remember the debate when SCO was DDoSed? This is the same thing, but much worse, and on a larger scale. Writing a virus in itself is illegal, given their nature, and a DDoS is also illegal (I'm not counting Slashdottings and the like).
  • Re:Oh no (Score:5, Insightful)

    by the_mad_poster ( 640772 ) <shattoc@adelphia.com> on Monday January 26, 2004 @08:50PM (#8094924) Homepage Journal

    Why on earth would you assume that it would be some fringe Linux zealot? It could be a pissed off SCO employee, an investor, someone from IBM, any number of UNIX developers. SCO pissed off a lot of people and you don't actually HAVE to use Linux or even care about it to be smart enough to exploit a dumbass Windows user's gullibility.

    The only thing more blatantly paranoid than YOUR comment would be to say that Darl himself wrote and released it to make people like you say things like that. Except, Darl is a meathead and I doubt he can spell his own name, so I doubt he wrote it.

  • Re:DDoS (Score:2, Insightful)

    by BakaMark ( 531548 ) <markl@noSPAM.netluminous.com.au> on Monday January 26, 2004 @08:52PM (#8094952) Homepage
    On the flip side of the coin, it could have been created by SCO in order to hammer their own systems, and get the fact that people are purposely bombarding them into the press to make others in big business feel pity for them.

    This will work well for SCO from a PR standpoint.
  • Re:DOS huh? (Score:3, Insightful)

    by ciroknight ( 601098 ) on Monday January 26, 2004 @08:52PM (#8094955)
    People.. seriously. If you want to DDOS SCO, use wget and grab the whole site to /dev/null/. Sure, it's not anything special, but it works, and you dont have to load a virus which massmails and fucks up filesharing..
  • A threat? Really? (Score:5, Insightful)

    by unfortunateson ( 527551 ) on Monday January 26, 2004 @08:52PM (#8094956) Journal
    Let me get this straight:
    1) It has a simple text message plus a binary payload attachment.
    2) It uses no M$ exploits (patched or unpatched) to install itself.
    3) It depends on someone opening the attachment to start an infection.

    And after all this time, people are still clicking on binary attachments? Great googly moogly. At least this sucker is only 20-40K. I'm sick of the 140-160K ones swamping my hotmail account. This one will barely be an annoyance.

    To quote Evil Willow Rosenberg: "Bored now."
  • Re:Great! (Score:4, Insightful)

    by tigerc ( 628630 ) on Monday January 26, 2004 @08:53PM (#8094980)
    "Second, it can perform a denial-of-service against www.sco.com."

    Even though I do not approve of SCO's actions against Linux and the open source movements, the spread of a DOS attack against SCO's website is downright wrong. You should be ashamed of the fact that you place yourself one the side of the people who think it is indeed funny to take a company's site down. Does it really matter if they are a hated group? A DOS attack is just plain wrong. In fact, it might be the lowest form of 'revenge' out there.

    If you continue to support these crackers, then SCO is no longer the big Goliath, and SCO's allegations about the dirty open source movement have some validity. The statement, "hey, it's SCO" proves that we are indeed as worse as McBride. If we want to be victorious in the open source/Linux vs. SCO, then we must hold ourselves higher than supporting DOS attacks against SCO.
  • Quick to judge (Score:5, Insightful)

    by jmichaelg ( 148257 ) on Monday January 26, 2004 @08:53PM (#8094981) Journal
    This topic has barely 30 posts and several posts are already saying it's a Linux user who wrote it. That's a pretty amazing conclusion given the absence of any data.

    Absence of data, hmmm....You guys wouldn't happen to work for sco would you?

  • Re:Oh no (Score:5, Insightful)

    by aralin ( 107264 ) on Monday January 26, 2004 @08:54PM (#8094998)
    Now Darl seems to have some credibility with the Linux == terrorism threat. Good going, guys....

    I'm not so sure, this was obviously done by a WINDOWS hacker. Most of the Linux hackers I know have no freaking idea about MS Windows internals and they honestly don't even care for that sort of "knowledge".

  • by Anonymous Coward on Monday January 26, 2004 @08:58PM (#8095067)
    As much as we all hate SCO, we want them to go down for the illegal and immoral acts they have commited. But we want that to happen through the courts.

    Although I admire the authors conviction and obvious disliking for SCO, this is not what the OSS community needs. In fact, this probably hurts us more then it does SCO.

    Hell, given the factors I'd almost wonder if SCO themselves weren't responsible for this in yet ANOTHER attempt to discredit the OSS community.

    On the other hand, many say fight fire with fire. I can't imagine anything more comparable to SCO then a worm. *laughs*
  • by TrentC ( 11023 ) on Monday January 26, 2004 @09:02PM (#8095113) Homepage
    To all the people who are busy vaulting onto their high horse, ready to scold the Slashdot community for our apparent complicity in this, don't bother. I get so sick of the holier-than-thou attitudes that people cop when the "Linux community" does something to "make Linux look bad".

    First off, why do you assume that the person who wrote the virus is reading Slashdot?
    Second, how do you know he or she isn't cackling with glee over the froth you guys are working up?
    Third, what exactly the hell am I supposed to do about this virus, given that I didn't write it and most likely don't know the person who did write it? Feel bad for SCO?

    If I were a script kiddie, this is exactly the effect I'd go for; try to piss off Windows users and Linux users all in one shot.

    Face it, the "Linux community" is made up of lots and lots of different people, and it only takes a handful to make life harder for the rest of us. But scolding Slashdot isn't going to do anything other than make yourself feel good.

    Jay (=
  • by quantaman ( 517394 ) on Monday January 26, 2004 @09:02PM (#8095120)
    What leads you to believe this is someone from the Linux community?

    Doesn't matter, unless they catch the writer and prove it to be something else. As you showed with the SCO conspiracy theory it's the Linux community that is going to catch the flack.
  • by placeclicker ( 709182 ) on Monday January 26, 2004 @09:03PM (#8095124) Journal
    NEVER underestimate the power of human stupidity.
  • But..... (Score:4, Insightful)

    by agent dero ( 680753 ) on Monday January 26, 2004 @09:05PM (#8095159) Homepage
    Does it run on linu.....

    Oh nevermind
  • by hamjudo ( 64140 ) on Monday January 26, 2004 @09:07PM (#8095185) Homepage Journal
    SCO has used past denial of service attacks as "the dog ate my homework" type of excuses in court. They were so happy to be attacked the last time, that they put out multiple press releases. SCO's next court date is in early February, maybe they haven't done all their homework this time.

    SCO just started yet another lawsuit, this time with Novell. Now the financial types could be recalculating how many quarters until SCO runs out of cash and has to cease operations. Let's not let them get distracted by stupid email tricks.

  • Re:DOS huh? (Score:5, Insightful)

    by caluml ( 551744 ) <slashdot@spamgoe ... minus herbivore> on Monday January 26, 2004 @09:12PM (#8095228) Homepage
    I see that they run with a 60 second DNS refresh - is this forward thinking by them in case they have to change the servers IP, or add more servers? That way, they don't have hours, or days of stale data hanging around.

    Also, does the virus target by IP address, or does it do a full DNS lookup? If it's just IP, it will be easy for them to change the www record, and the servers address. 60 seconds later, everyone apart from the virus will be able to access the site.

  • Re:DDOS SCO (Score:4, Insightful)

    by balthan ( 130165 ) on Monday January 26, 2004 @09:18PM (#8095277)
    Come on now, you should realize by now that people here don't actually DO anything. Sure, we talk a lot of crap about how thing should be done, but we're a bit short on the actually doing.
  • Re:DOS huh? (Score:3, Insightful)

    by zangdesign ( 462534 ) on Monday January 26, 2004 @09:35PM (#8095423) Journal
    I disagree. I think they make exactly the right amount.
  • by kalidasa ( 577403 ) * on Monday January 26, 2004 @09:35PM (#8095424) Journal
    Because the users are too bloody stupid to learn. "I know I'm not supposed to click attachments, but this one came from Judy and it said 'Hi!'"
  • Darl the hacker? (Score:3, Insightful)

    by Saeed al-Sahaf ( 665390 ) on Monday January 26, 2004 @09:36PM (#8095432) Homepage
    Normally I would say this idea is paranoia. But then, your point deals with SCO, and we know they are both paranoid and dishonest. It is without many questions that SPAMers have used virus to advance their cause, and there is good reason to believe Darl et al have less integrity than SPAMers do...
  • Re:Mom (Score:5, Insightful)

    by Jimithing DMB ( 29796 ) <dfe@tg[ ].org ['wbd' in gap]> on Monday January 26, 2004 @09:44PM (#8095545) Homepage

    Then you're obviously failing to communicate to your mother the gravity of the situation. In all the years my mother used a Windows machine her computer did not have one virus. The rules are very simple. I also have no trouble at the office. With the exception of the H.R. guy who must open attachments (primarily Word documents) in order to read people's resumes it's been a long time since we had any viruses running on any machines in the Hampton office. Furthermore, through a mistake either my boss or I had made we hadn't set his machine to update virus definitions automatically so I give the H.R. guy a lot of credit for having avoided viruses without it.

    It certainly doesn't hurt to have a Symantec Anti-Virus Corporate Edition and to be running Novell GroupWise instead of Microsoft Outlook^WOutbreak but it's not the end-all of virus protection either. Proper user education is an important part of running a network. I keep the users at the office informed about how viruses work and how they propagate. I let them know that I've done all I can and that it's up to them to use their good judgement. I remind them that message headers are just as easily forgeable as the return address on an envelope.

    It's worth the time. I'm not saying I just wrote one message and all viruses were gone. I wrote several. I talked face to face with people in the office about it. I ask them what they think about viruses and spam. I give them the information they need to make informed decisions. In the end, it makes my life a lot easier.

    The simple problem is that people don't know unless you tell them. They only hear what Tom Brokaw or Katie Couric tells them. Tell them how it really works and they will understand and try their best. A few will slip up. Don't be mad at them, just explain things again so they understand.

    The only case where this won't work is if you have a high employee turnover. If you do then let your boss know that viruses are simply another cost of high employee turnover. If you do that then he will have the information he needs to make an informed business decision. Maybe he'll decide it's worth taking some measures to keep people around. Put it in terms of dollars. Do whatever it takes but viruses can become a thing of the past if more companies started to do this.

  • by nathanh ( 1214 ) on Monday January 26, 2004 @09:51PM (#8095608) Homepage
    When people start doing illegal things such as writing viruses to get back at SCO, on the other hand, the Linux community loses much of its innocence.

    The "Linux community" did not write this virus. At least, I don't recall seeing the "Let's Write Viruses" thread on LKML. There's no "Anti-SCO DDOS Virus" project on Sourceforge.

    This DDOS virus was probably written by a lone individual. The Linux community is not responsible for the actions of individuals.

    I consider it just as likely that the virus was written by SCO to garner sympathy. Their stock is in decline (again) and they need something to talk about in their next stock-pumping press release.

  • Re:Oh no (Score:3, Insightful)

    by the_mad_poster ( 640772 ) <shattoc@adelphia.com> on Monday January 26, 2004 @09:55PM (#8095686) Homepage Journal

    It'd be moronic for a Linux zealot to not be at the top of the suspects list for what happened here.

    There's absolutely no reason to believe that. While I wouldn't be surprised if some fringe looney tune did release it, I'd be equally unsurprised to discover it was a disgruntled SCO employee or just somebody looking to make Linux users in general look bad publicly.

    Or, to put it another way, until there's evidence pointing at someone, I'm not going to go jumping off the conclusion cliff like so many of the other folks here have already done.

  • by King_TJ ( 85913 ) on Monday January 26, 2004 @09:59PM (#8095732) Journal
    I hate to say it, but Norton Anti-Virus doesn't exactly inspire much confidence with me to begin with.

    I've removed a *bunch* of back-door trojan horse programs (MovieWorld and so forth) from Windows PCs that were running Norton AntiVirus 2003 with all the latest signature updates being "Live Updated". The freeware AVG Anti-Virus personal edition found them, as did a relatively unknown scanner called Avast.

    Why is it people have to pay $30+ per year for a subscription renewal for a big-name, commercial scanner that can't even find things the freeware packages find and remove?
  • by Anonymous Coward on Monday January 26, 2004 @10:32PM (#8096043)
    that aims to define exactly who it is that is opening email, saving attachments, opening the attachment, running the payload, and is not using AV software.

    What does?

    But anyway, perhaps these are people who DO run AV software, but it's out of date. Or they DO run it at work, but don't realize that it didn't come already installed at home. In either of these situations, they might have a false sense of security, might think that anything that the computer lets them run should be perfectly safe.

    But then I remember some of the people I'm related to, and istm that, for a lot of people, all higher-level thinking just shuts off as soon as they sit down at a computer. Perhaps they think that there's no way they'd understand it all, so there's no point in trying to understand any of it.
  • Re:Mom (Score:3, Insightful)

    by The Ape With No Name ( 213531 ) on Monday January 26, 2004 @10:34PM (#8096067) Homepage
    This has been a war since the mid-90s. At some point, you just give up. There are people, bless them, who are trusting by their nature. She knows to NOT click on things sent to her, but when her friends send her a joke program and she doesn't click on it then she has to field the "Didn't you see the funny thing I sent you?" questions. People don't like to be left out. Call it gullibility, but there are people in the world who will ALWAYS do what the script kiddies and worm writers want just on default behavior alone.
  • Re:Finally! (Score:5, Insightful)

    by Nucleon500 ( 628631 ) <tcfelker@example.com> on Monday January 26, 2004 @10:34PM (#8096069) Homepage
    I know you were joking, but no, attacking sco.com does not make it a worthwhile virus. Yes, SCO deserves a lot of hardship. But any retaliation should be done in a completely legal manner. Why? SCO is trying to make open source look bad in the eyes of businesses. They've said we don't respect copyrights, they say we're anti-business. They screamed loudly about joking death threats and DDoS attacks. They're trying to make us look bad, and whatever we do should make them look bad, make them look like the aggressor they are. Doing obviously illegal things only makes us look bad and SCO look like a victim. So this is a major step backwards.
  • Re:Finally! (Score:4, Insightful)

    by superpeach ( 110218 ) <adamf@s[ ]a.uklinux.net ['nik' in gap]> on Monday January 26, 2004 @11:08PM (#8096333) Homepage
    You could try kazaa.

    I thought something like 'ooh' when I read it spreads by kazaa too. I thought maybe it was connecting to the fasttrack network and being a fake kazaa node, but, it just seems to be copying itself to the default kazaa shared folder - so it will only spread via kazaa if you actually use kazaa.
  • Re:DOS huh? (Score:1, Insightful)

    by Anonymous Coward on Monday January 26, 2004 @11:17PM (#8096404)
    Nice move, son.

    As every /. user goes to port scan you, the folks at the Alamaba Supercomputer club are going to start getting irate that their bandwidth has gone to shit.

    Filtered or not, 129.66.100.74 is still taking a whole bunch of traffic in, and sending rejection packets back, all of which takes bandwidth, and processing time on that router.

    Eventually, the folks at API Digital are going to get rather mad about it. But knowing /. folks, a few of them are going to call over there, and say where they found this address and the probable cause of the DDoS attack (you), at which point I don't think the good Cmdr Taco or any of the /. crew are going to protect you. If I were them, I'd dig up your IP and start tracing who you really are.

    So, it's a nice prank now, but wait til the feds wave the Patriot Act in your face, as your thrown into a black van for destinations classified. It doesn't matter how much you plead with them, you've just brought yourself into the ranks of a clueless cyber-terrorist wanna-be, punishable by an indefinate time in jail before even seeing your lawyer.

    Enjoy, dumbass.
  • Re:Great! (Score:2, Insightful)

    by sprprsnmn ( 619113 ) on Monday January 26, 2004 @11:44PM (#8096567) Homepage Journal
    I think what he was saying is that his servers that run IIS do a sad job of it, and that the rest of his servers run apache.

  • that aims to define exactly who it is that is opening email, saving attachments, opening the attachment, running the payload, and is not using AV software.

    Mac users fit that defintion. Why should they care about attachments, really? There will be, one day, I'm sure, a virus that infects Macs--just as there have been in the past. And that will be a day of reckoning, as millions of Mac users scramble to get virus-smart. But the last 4 years of being virus-free, without any A/V software, and blithely opening attachments has made most Mac users pretty carefree, and careless.
  • A step backwards for reputation of the Linux and open source communities in the eyes of people who haven't followed the SCO case closely and don't know any better. It's not material harm, but I think perception is important here.

    Darl will say Linux supporters must have done it, and the media will quote him, and clueless people will read it and associate whoever did it with us. So while we know it wasn't "one of us" and we don't support it (except in jest), people will read otherwise. We unfortunately don't get to choose who the public associates us with.

  • by cyril3 ( 522783 ) on Tuesday January 27, 2004 @02:37AM (#8097425)
    I agree with your general comment about non obvious ingredients but not your application to this situation.

    I'd have thought the warning was akin more to one on nuts that says "Ingesting these nuts through your nose while driving may be hazardous". I mean they know its an iron and that irons are hot, that's their point. Be different if they grabbed a box at Walmart labled "Clothes Flattening Device" and they had never used an iron before.

  • Re:DDoS (Score:3, Insightful)

    by lone_marauder ( 642787 ) on Tuesday January 27, 2004 @10:21AM (#8099151)
    If we want to have the public favor OSS, reputation is also important.

    Please. The average Joe knows nothing about OSS. We have no way to inform him as to our motives and principles, because he will be told what those in power want him to know. There is no PR angle we can take to affect that public perception, because we do not have the required power.
  • by bonch ( 38532 ) on Tuesday January 27, 2004 @12:22PM (#8100530)
    I just think it's funny that Slashdot STILL reports *user-run* attachments as "Windows viruses," as though it's some major flaw in Windows that users are dumb enough to run whatever executables come into their inbox.

    Hell, my Outlook won't even let those attachments through to begin with. "BUT IT'S A WINDOWS VIRUS!!1"

Software production is assumed to be a line function, but it is run like a staff function. -- Paul Licker

Working...