Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security IT

After 7 Years, MyDoom Worm Is Still Spreading 133

An anonymous reader writes "Researchers at Sophos have revealed that the MyDoom worm, which spread via email and launched denial-of-service attacks against websites belonging to SCO and Microsoft, is still spreading on the internet after more than seven years in existence. The firm suggests, tongue-in-cheek, that it would be nice if computer users updated their anti-virus software at least once every 5 years to combat the malware threat."
This discussion has been archived. No new comments can be posted.

After 7 Years, MyDoom Worm Is Still Spreading

Comments Filter:
  • by Anonymous Coward on Saturday June 18, 2011 @07:52AM (#36484424)

    I'll support that.
    Right after we require a license to have children.

    That would fix alot more stupid thanjust a computer worm problem.

  • Oh, I see! (Score:4, Insightful)

    by Ross R. Smith ( 2225686 ) on Saturday June 18, 2011 @07:55AM (#36484430)
    The only thing that comes to mind is 'PEBKAC'.
  • Comment removed (Score:3, Insightful)

    by account_deleted ( 4530225 ) on Saturday June 18, 2011 @08:02AM (#36484458)
    Comment removed based on user account deletion
  • by geekmux ( 1040042 ) on Saturday June 18, 2011 @08:30AM (#36484562)

    Is this really any surprise to anyone? People still believe that Bill Gates is going to pay you for forwarding email. Most attacks (malware, trojans, viruses, etc.) feed on the ignorance of the average person. It's sad really, but I don't expect anything different 27 years later, much less 7.

  • by Opportunist ( 166417 ) on Saturday June 18, 2011 @10:27AM (#36485078)

    And if you drive carefully, what do you need safety belts and airbags for?

  • Re:XP Mode? (Score:4, Insightful)

    by rvw ( 755107 ) on Saturday June 18, 2011 @11:12AM (#36485318)

    XP versions before SP1 would get root'd by simply having internet access.

    If I run a VM (XP or something else), that VM must have a different ip-address than the host, and to have internet access, there must be some kind of router or routing system. To reach the VM from the internet, port forwarding must be configured. Maybe the host IP is directly accessible from the outside, but the VM is not. Even if no firewalls are active, there is no way that the VM can be infected simply by starting it up and giving it internet access. So for an infection to occur, you need to start a browser to visit a website that infects the OS of the VM. (And of course the host could be infected, and then spread the virus to the local network, but that's something else.)

    So can you explain how this VM will be infected after it started up without doing anything else on the machine?

  • by Anonymous Coward on Saturday June 18, 2011 @01:05PM (#36485898)

    impossible to roll back any changes, besides reformatting and restoring from a backup

    Btrfs snapshots. Fedora already has support for automatic snapshotting with yum so that you can yum install or yum remove something and, hey, unintended change? Rollback.

    Even such basic functionality as letting a program change what it will, but only applying the changes only to said program's context - pretend-admin, in other words - is missing

    Google for cgroups and isolation... there's a more specific term that will get you there immediately, but I can't think of it at the moment, as I've never used it, only read about it. It's basically a better, Linux-only chroot capability.

    What the grandparent is trying to say about FTP vs. email is that FTP clients won't automatically execute the viruses they download (unlike Outlook.)

I've noticed several design suggestions in your code.

Working...