Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Bug Operating Systems Software Windows

More MyDoom Gloom 730

StarWreck points out this article in The Atlanta Journal Constitution citing "experts who believe the worm was put out for criminal profit motives by spammers and not by Linux Advocates." Further on that, deadmonk writes "MessageLabs is reporting that the recent Mydoom virus seems to have originated in Russia. A place where nobody gives a wet slap about a court case in the U.S. Personally, I'm looking for a serious apology (or at least a retraction) for the 'alleged' link between this ugly little nasty and Open Source / Linux users." Of course, there could be evil spammers who also like Linux (or don't like SCO), but until someone's caught, or fesses up, it's impossible to say. Read on for some more MyDoom updates, including a new variant (with a new payload), ramifications for Australians, and a forensic analysis of the worm.

fudgefactor7 writes "Hot on the heels of the last virus, Mydoom.b is on the loose. According to Computerworld, this variant has a larger payload and targets Microsoft's Web site for a distributed denial-of-service attack on Feb. 1, instead of The SCO Group Inc. Patch those systems and keep your A-V up to date. Definitions are available currently."

decaying writes "With the amount of virus-laden emails flying about due to the latest virus, Australian ISP Optus have started selectively blocking port 25 outbound. Optus say they are acting in accordance with their "Terms of use", quoting that they reserve the right to restrict access to any TCP/IP port. The only option is to use Optus' SMTP server and nothing else. Community site Whirlpool has an on-going discussion about the issue."

carnun writes "Just another link on MyDoom. Apparently the FBI are also getting in on the act. Interesting to see such a fast response." And to me, the most interesting one: Zeriel writes "After much discussion on a mailing list discussing trojan horses, some people have reached the conclusion that MyDoom doesn't accomplish its stated goal of DDOSing SCO at all! Choice quote from the analysis: "I have the new critter in a test environment where we conducted a preliminary and rudimentary functionality and threat analysis...I have played with the date, etc, but still no activity directed toward www.sco.com." The link also includes disassembly and analysis of the worm code."

This discussion has been archived. No new comments can be posted.

More MyDoom Gloom

Comments Filter:
  • For profit? (Score:3, Interesting)

    by spun ( 1352 ) <loverevolutionary&yahoo,com> on Wednesday January 28, 2004 @06:07PM (#8117525) Journal
    You mean, a big bag of money showed up on some spammer's doorstep with a note promising much more if a DDoS against www.sco.com is included in the next release?

    Completely untraceable, even if caught: the spammer wouldn't know who sent the money, and could even claim, "I think it was some Linux Zealot."
  • by Samuel Duncan ( 737527 ) on Wednesday January 28, 2004 @06:09PM (#8117555) Journal
    Two steps:
    • Make bad system adminstrators personally responsible for the damages they create by not fixing security holes.
    • Give physical punishment to the virus writers. Money charges won't usually do the trick (paid by parents/community), but a decent spanking will teach them a lesson.
  • Proof of who's lying (Score:5, Interesting)

    by Saven Marek ( 739395 ) on Wednesday January 28, 2004 @06:09PM (#8117557)
    I have the new critter in a test environment where we conducted a preliminary and rudimentary functionality and threat analysis...I have played with the date, etc, but still no activity directed toward www.sco.com." The link also includes disassembly and analysis of the worm code."

    So basically, SCO being down right now is Yet Another Big Lie from SCO. Nice to see them shown up as spreaders of misinformation yet again. I'm sure the FBI will love to hear their excuses as to why they're pretending to be down, especially if they're attempting to blame the worm. Fascinating
  • It's interesting (Score:3, Interesting)

    by nil5 ( 538942 ) on Wednesday January 28, 2004 @06:09PM (#8117564) Homepage
    if this is not a more effective form of economic terrorism, I don't know what is. These worms seem to cost US companies millions if not billions of dollars, and they're probably not so difficult to develop either.

    With such a hugely damaging effect for such little cost, wouldn't you say that is almost the perfect weapon?
  • by phaetonic ( 621542 ) on Wednesday January 28, 2004 @06:11PM (#8117600)
    Wouldn't it be ironic if a worm were to DDoS slashdot.

  • by jaymzter ( 452402 ) on Wednesday January 28, 2004 @06:13PM (#8117639) Homepage
    A report [channelnewsasia.com] covering F-Secure's work on the virus reveals this interesting comment imbedded in the virus:

    Buried in its programming code -- and only readable after it has been decrypted -- was also the message "Andy; I'm just doing my job, nothing personal, sorry" from the creator

    My tinfoil hat says it's some poor guy at SCO!
  • by djupedal ( 584558 ) on Wednesday January 28, 2004 @06:19PM (#8117731)
    OS X....works for me...all go to the trash.

    Oh what a relief it is :)
  • by qortra ( 591818 ) on Wednesday January 28, 2004 @06:23PM (#8117784)
    Many worms nowadays are capable of traveling along multiple protocols and containing multiple payloads. Of course, worm writers generally don't bother because there are indeed far more copies of Windows out in the wild than anything else. However, if we began to see a more substantial plurality of OSes, I suspect multiple-architecture worms would become more common place; just pick your favorite exploit from each os, and make a separate payload for each. The worm might double or triple in size (depending on the number of architectures supported), but authors won't care.

    Further more, universal binaries like those associated with Java or .NET/Mono might eventually make it so worm writers don't even have to include multiple payloads; just multiple exploits.

    Maybe diversifying will help a little for a short while, but the real solution to this problem is to write better code.
  • by Anonymous Coward on Wednesday January 28, 2004 @06:31PM (#8117894)
    There was an Andrew Sharpe who worked for Caldera. Dunno if he's still with them.
  • by forevermore ( 582201 ) on Wednesday January 28, 2004 @06:34PM (#8117945) Homepage
    would TURN OFF those blasted "Your mail has a virus!" auto-replies

    I agree - I've taken to replying to them in person, telling them of all the useless traffic they're making. Then again, I've only received one so far.

    On the other hand, I really wish that Amavis would respect its "locals" settings and when set not to reply to offsite addresses, NOT to respond to offsite senders. What the heck is an offsite recipient, anyway? If they're getting mail on my server, they're local. It's the senders that I care about being offsite, not the recipients.

  • Re:Block port 25? (Score:3, Interesting)

    by Sandman1971 ( 516283 ) on Wednesday January 28, 2004 @06:38PM (#8117992) Homepage Journal
    No, most viruses run their own SMTP engines. The smarter ones do an MX lookup for the host domain (based on reverse DNS) and use that as the MTA. Smart ISPs, however, split inbound and outbound MTAs to block this.
  • by Anonymous Coward on Wednesday January 28, 2004 @06:38PM (#8117994)
    From the article:

    "only activity I can get it to perform related
    to www.sco.com is to resolve the name. In fact,
    it seems very unhappy if it cannot resolve
    www.sco.com. Once it can, it happily scans
    local files for anything that can be construed
    (very loosely) as a domain and tries to resolve
    mail servers based on these."

    So, rather than being a DDOS, this worm/virus
    essentially says "take down www.sco.com or else".
    Taking down www.sco.com is Darl's responsibility.
    Will he do it to stop the worm? If he doesn't,
    can be be said to support the worm?

  • Re:Off Track (Score:2, Interesting)

    by Popageorgio ( 723756 ) <popsnap@gmail.com> on Wednesday January 28, 2004 @06:38PM (#8117999) Homepage
    After all, it doesn't target Mac users either, and the new anti-Microsoft.com DOS attack of MyDoom.B would fit the intentions of a Mac activist. But I haven't seen anyone accuse Mac users. All the evidence is circumstantial.

    Except-

    The SCO DOS attack (geez, the TLAs are bumping and grinding today) suggests the pro-Linux link. Does any other faction have a beef with Darl?

  • by Anonymous Coward on Wednesday January 28, 2004 @06:46PM (#8118112)
    contains the text string: "sync-1.01; andy; I'm just doing my job, nothing personal, sorry"
    Maybe it is a confession of the author that he was hired by somebody?
  • by sheriff_p ( 138609 ) on Wednesday January 28, 2004 @06:48PM (#8118125)
    You can read a good rebuttal against the 'MONOCULTURE IS DEATH' argument here:

    http://www.virusbtn.com/magazine/archives/200312/m onoculture.xml [virusbtn.com]

    written by someone who actually knows a little about malicious mobile code :-)
  • by Havokmon ( 89874 ) <rick@h[ ]kmon.com ['avo' in gap]> on Wednesday January 28, 2004 @06:51PM (#8118174) Homepage Journal
    .. would TURN OFF those blasted "Your mail has a virus!" auto-replies. They accomplish nothing but the generation of yet more useless traffic.

    A nice guy on the FreeBSD Mail-Toaster list put out a good script..

    I now grab all the IP's out of infected emails, and put them in my etc/tcp.smtp file:

    123.123.17.50:allow,RBLSMTPD="-VIRUS SOURCE Please check your computer for infections"
    IP obfuscated to protect the guilty

    How about that? You only get your mail bounced, with a virus warning if your IP (sure dial-up _could_ be hit - but I'm a standalone email provider) sent a virus through my system in the last day.

  • by mabu ( 178417 ) on Wednesday January 28, 2004 @07:00PM (#8118275)
    Why is this so hard for other people to do that this virus is actually getting through to their clients?


    1. Nowadays your average computer user is a moron.

    I'm sure you and everyone else knows some hopeless PC user who uses Outlook, can't help but click on some attachment, believes everything they read online, or does not patch their Windows on a regular basis. All it takes is a few of these n00bs to make life miserable for others in one form or another.

    2. Filtering on the client side doesn't really address the larger problem of these scripts consuming *tremendous* amounts of bandwidth, network and system resources.

    If you're an end-user, you can't appreciate how much fun it is to manage a server that is getting hammered with this crap. Even if you block it out, you still have to deal with reduced performance and limited bandwidth available to all your users because of yet another unpatched MS hole or irresponsible ISP.

    And of course, whenever there's another announcement of a "virus" every person with a PC who can't get it to work right is convinced that the "virus" is the culprit.
  • by Net_Wakker ( 576655 ) <puddingdepot@yahoSTRAWo.com minus berry> on Wednesday January 28, 2004 @07:18PM (#8118490)
    Email for my domain is wildcarded, so it really doesn't matter that much what's in front of the @ and I'll get it.
    The past 2 days I've received a shitload of Mydooms, and there's something funny going on. Mydoom will put common names in front of the @. I've started receiving viruses for brian@ and bill@ and claudia@ and fred@ and jerry@ and george@ and smith@ and and and. I even received one for debby@. What, she's doing my domain now?
    I've also noticed that some of the "senders" are constructed the same way.
  • by John Walker ( 68738 ) on Wednesday January 28, 2004 @07:18PM (#8118493) Homepage
    In the discussion cited [math.org.il] in the main article, the observation is made from disassembly of the payload:

    Nicolas Brulez:
    -----
    from my quick and dirty analysis, its a thread that does the DDOS.
    It has below normal priority, and it just does a GET.

    GET / HTTP/1.1\r\nHost: www.sco.com\r\n\r\n"

    This is very interesting, because my site has been under a broadly based but inexplicably benign apparent DDoS attack which is bombarding my site with precisely such requests (obviously www.fourmilab.ch, not www.sco.com) at a rate of just one hit from each IP every four minutes. (This rate is not absolutely consistent, and some seem to be running multiple copies of the requester, each hitting every four minutes.)

    I've been watching this and running analyses since it became obvious something was up and have posted an incident report [fourmilab.ch] page on my site which I'm updating as things develop. Bottom line, the apparent attack appears to have reached equilibrium with a total of 2894 different IP addresses hitting my site since the outbreak, with the hit rate following a diurnal pattern (there's a chart in the incident report) which peaks at around 20,000 hits per hour from on the order of 1000 different hosts at 20:00-21:00 UTC every day.

    I'd previously concluded this probably had nothing to do with MyDoom. Although a few of the hosts hitting me are listening on the MyDoom remote control post, most aren't. (Of course, a test version may use a different port or none at all--I discuss in the document.) But the fact that the hits are precisely the same--a simple request to the home page--makes me wonder. All of these sites hitting me request only the "/" page (which at my site is just a <frameset> container, which any browser would follow up with hits on the content frames).

    Has anybody else seen this kind of traffic hitting their sites?
  • needs re-thinking (Score:5, Interesting)

    by aca ( 442822 ) on Wednesday January 28, 2004 @07:19PM (#8118506)
    In my opinion, I don't think it was a Linux fan that caused it.

    Firstly, he attack was not technologically sophisticated, in that it required exploiting a weakness in the operating system. The style of the attack was conceptually sophisticated, it was a worm not a virus. Which means that the attack relied on 'social engineering' or 'human weakness' to succeed.

    The exploit however was quite creative. It was multi-faceted, even doing a DDOS on 'www.sco.com'.

    Personally, I suspect that the creator and the executor of this worm may be two different persons altogether. Most importantly, the one ultimately responsible for the worm's spread and impact on the internet is not a Linux fan.

    Linux users, ones that are capable enough to create such a worm, would more likely be above average intelligence. They would know very well, the consequences of DDOS'sing SCO's web-site, and that these consequences will most definitely be extremely detrimental to Linux. They would also know very well that a DDOS of SCO's web-site is almost a trivial thing to fix, and doesn't help in reducing SCO's position in any way.

    Other than making SCO spend some money to rectify the DDOS, and preventing some of SCO's limited customer base from accessing SCO's web-site, it doesn't do relatively much harm to SCO (as compared to finding a back-door or hole into SCO's internal network). There is no real motivation for a Linux fan to carry out a DDOS on SCO's web-site.

    I think the REAL reason for this worm, was for a 'frame-up'. It coincides with the conceptually sophisticated thinking as evidenced in its style of attack. I think the real reason was to *help* SCO and Microsoft, because both of these entities have the most to gain from it. Even with the recent 'b' variant of the worm targetting Microsoft. I still think the original motive remains the same.

    Either that, or we're dealing with an extremely shallow and stupid 'Linux fan', which I very highly doubt.

    People reading this may start having this thought of 'oh, another conspiracy theory...', but I would ask readers to carefully think about the obvious and carefully consider the occurence of this worm. Industrial espionage has been around for a long-time, and we know that it happens. What's to prevent it worms or viruses being used in industrial espoinage? Especially when the internet is a lot more relevant to businesses today.
  • Version 2 commentary (Score:5, Interesting)

    by WebGangsta ( 717475 ) on Wednesday January 28, 2004 @07:22PM (#8118544)
    By now you probably have heard that there's a new version (MyDoom.B) that is also making it's way across the Internet, this time supposedly targeting Microsoft.

    According to Symantec [symantec.com], this version now modifies your HOSTS file to try and disable the user from being able to reach antivirus websites.

    Among other entries in the HOSTS file are Doubleclick, FastClick, and some other advertising-related companies. Should I be concerned or happy that the virus may make surfing the web a little bit better by doing this?

  • by LearnToSpell ( 694184 ) on Wednesday January 28, 2004 @07:34PM (#8118667) Homepage
    Netcraft's got an interesting idea - Journalists reporting on SCO and people interested in the www.sco.com site can now subscribe to receive alerts [netcraft.com] when the site is unavailable.
  • Re:Off Track (Score:2, Interesting)

    by mindbooger ( 650932 ) on Wednesday January 28, 2004 @07:36PM (#8118693)
    Exactly! Have you noticed that the last 3 or 4 of these oubreaks (at least!) have installed backdoors or keystroke loggers and all anyone will talk about is the SPAM and DDOS aspects of them? Aargh!

    "There's an arsonist running loose, and he keeps stepping on people's flowers as he runs away. Oh, the poor flowers. Won't somebody think of the flowers....."
  • by Zocalo ( 252965 ) on Wednesday January 28, 2004 @07:42PM (#8118752) Homepage
    A couple of thoughts leapt to mind about that. Firstly the comment is in English, and the name is in English (Andre[i] would be the Russian equivalent) which kind of implies an English speaking author, despite the first capture being in Russia. Using compromised box(es) to initiate the spread of the worm would be a fairly obvious step to cover ones tracks.

    Secondly, since "andy" is one of the email addresses spoofed by the worm I'm guessing that the worm's author was a) commissioned to write the worm by parties unknown, and b) included a colleague's email in the spoof list, perhaps by mistake.

    So the question is, will Andy, whoever he is, get pissed off enough to turn his colleague in for the $250,000 reward posted by SCO and turn over a new leaf? /tinfoil Assuming he's not working for SCO of course. /tinfoil

  • Or some tiny cog in the beaucracy with an old copy of the mailing list ran the attachment. It's probably very difficult to say at this point. I know that I should be on the financial aid listserv that has apparently been comprimised, but only since last fall, and I've only been sent the virus about 30 times. Most of those were from individual's email accounts (which could have been spoofed) but still it sounds to me like some luser had a copy of an old mailing list otherwise I would have received many more emails.

    Some VT students who have been here longer said they've received the virus on average twice per minute for the last 36 hours. Ouch? Dumb user, no doubt, but I wouldn't yet conclude that it was some mission critical machine that was comprimised.

  • by Ingenium13 ( 162116 ) <ingeniumNO@SPAMgmail.com> on Wednesday January 28, 2004 @08:18PM (#8119077) Homepage
    You know, with all the stunts SCO has pulled lately, wouldn't it be ironic if they created this worm themselves or were somehow responsible? According to the article it doesn't DDoS SCO, but even if it did, isn't this in a way what they want? They can now point the finger at the Open Source Movement. They can draw negative media attention toward Linux which may, in their minds, help their court case. If people become under the impression that Linux and Linux users are "bad" than they will be more likely to sympathize with SCO.

    This is of course an unlikely situation since if it was discovered SCO was behind the worm then it would all be over for the company. However, it is an interesting thought...
  • Re:Off Track (Score:1, Interesting)

    by Anonymous Coward on Wednesday January 28, 2004 @08:29PM (#8119150)
    I seriously believe that SCO might have hired a Russian spammer to do this.

    SCO got more publicity today than it has in months at a time when their case was running out of steam.

    Their stock also went up a couple of times today before the whole market took a dive.
  • by CAIMLAS ( 41445 ) on Wednesday January 28, 2004 @08:29PM (#8119153)
    I can't believe this worm has been remotely successful. It's hard to believe that so many people are so incredibly stupid.

    It's a bloody -attached- zip file, with a file inside it! People have been told for over a decade to NOT OPEN ATTACHMENTS. You'd think they'd catch on sooner than later.

    This is all the more reason to strip all binaries from email at the server. Granted, then viruses would be linking to sites - but that'd be relatively easy to shut down, and wouldn't pose any significant threat.
  • Re:Off Track (Score:2, Interesting)

    by kkerwin ( 730626 ) on Wednesday January 28, 2004 @10:04PM (#8119746)
    But what the virus does do is shed light on the SCO v IBM controversy. Anyone heard anything about SCO on NBC? How about MyDoom? It's all over the place. While it certainly does little to aid our cause, and probably more to hinder it, it does make the general public aware of it. -- Kris
  • Re:Off Track (Score:5, Interesting)

    by LnxAddct ( 679316 ) <sgk25@drexel.edu> on Wednesday January 28, 2004 @10:14PM (#8119807)
    Why is everybody looking at this so negatively? I've got tons of people finally talking to me about what this Linux thing is that they've heard me mention and that they saw in the news paper today. In the past 3 days I've gotten probably about 40 people interested in Linux who had never known about it before. Most are corporate types too. These are people that barely know what a harddrive is for, and here I am explaining not only what Linux is, but the whole Open Source movement and how great it is. This is great publicity! Didn't anyone ever hear "Any publicity is good publicity." ? The media finally has their story straight about what scum SCO is and I'm seeing Linux on the front page of my local newspaper ! This is great for the community. Linux is in the press and the media is making a mockery of SCO, and people are finally interested in Linux that never would have been before. And when you are talking to them about Novarg/MyDoom, don't forget to mention that it doesn't affect Linux.
    Regards,
    Steve
  • by Anonymous Bullard ( 62082 ) on Wednesday January 28, 2004 @10:47PM (#8120026) Homepage
    A while ago I was listening to the BBC World Service radio when they suddenly broadcast a story about the SCO virus attacks, with the "exciting" issue of newsworthiness apparently being their US$250,000 reward for the head(s) of the script kiddies involved. Knowing SCO I smelled rat and sure enough, SCO's Sonntag was allowed to turn the radio interview into an extended rant against Linux and the whole open-source model while "reaffirming" their ownership of the platform!

    I immediately clicked on the feedback link on the BBC website and let the editors know how lopsided and unreasonable their reporting actually was, pointing them to the groklaw.net website as well.

    I have considerable experience in attempting to correct misrepresented facts in the media and know that it is often quite hopeless, but if enough people do it and give some proper backing to their arguments perhaps some of the damage can still be repaired.

  • Re:Why OT (Score:2, Interesting)

    by Daengbo ( 523424 ) <daengbo@gmail. c o m> on Wednesday January 28, 2004 @11:20PM (#8120253) Homepage Journal
    The plural for air is "airs." Of course, you have to be referring to different kinds of airs, just like any collective noun, e.g. fishes.
  • Anybody else notice (Score:2, Interesting)

    by Overphiend ( 227888 ) on Thursday January 29, 2004 @12:02AM (#8120505)
    SQL Slammer came out a day less than a year before this one.
  • Re:Off Track (Score:3, Interesting)

    by RML ( 135014 ) on Thursday January 29, 2004 @12:35AM (#8120699)
    My mom is a molecular biologist who works on viruses for a living, and I've worked with molecular biologists before. Let me assure you that if you said "virii" in a scientific conference you would be laughed out of the room.

    In my opinion it might be acceptable to use "virii" for computer viruses. If we can pluralize "box" as "boxen", why not. But it's definitely not the standard plural of "virus".

THEGODDESSOFTHENETHASTWISTINGFINGERSANDHERVOICEISLIKEAJAVELININTHENIGHTDUDE

Working...