Modernizing Authentication — What It Takes to Transform Secure Access
The mass-mailing worm, also known by some security companies as Novarg, hit the wild onMonday and has been racing around the globe infecting computers with backdoor trojans andproxies. MessageLabs, an email security services company based in New York, reports thatMyDoom accounts for one in 17 emails today.
As of 11 a.m. today, company analysts say they have stopped 1.2 million copies of the worm.By comparison, the company stopped 1 million copies of Sobig-F in the first 24 hours.
The worm has caused more than $850 million worth of economic damages worldwide in just thefirst 24 hours, according to mi2g, a security analyst company based in London.https://o1.qnsr.com/log/p.gif?;n=203;c=204650394;s=9477;x=7936;f=201801171506010;u=j;z=TIMESTAMP;a=20392931;e=i And anti-virus experts say the problem will most likely get worse before it gets better.
''This one is very dangerous,'' says Chris Belthoff, a senior analyst at Sophos, Inc., ananti-virus and anti-spam company based in Lynnfield, Mass. ''It's spreading prettypervasively and we expect to see it increasing over the course of the day. A lot of peoplemay already have copies sitting in their in-boxes and as time zones wake up and get to work,it may pick up.''
MyDoom spreads via email and by copying itself to any available shared directories used byKazaa. It harvests addresses from infected machines, and generally uses the words 'test','hi' and 'hello' in the subject line.
Analysts say MyDoom is spreading so quickly because it is successfully fooling users intoopening firs the email and then the attachment. The email often disguises itself as an emailthat the user sent that has bounced back. The user, wanting to know why the email failed,opens it up and then sees a text file icon, instead of the icon for an executable.
''From a propagation perspective, it has been effective, much more than we would havesuspected,'' says Brian Dunphy, a senior manager at Symantec Managed Security Services,which is based in Alexandria, Va. ''It took a unique twist on social engineering. We've toldthem not to open executables but this one masquerades as a harmless text file. It'sexploiting the end user and their desire to want to open up attachments.''
MyDoom also sets up a backdoor trojan in infected computers, allowing the virus writer oranyone else capable of sending commands to an infected machine to upload code or send spam. The worm also is geared to launch a denial-of-service attack against SCO.com starting Feb.1. SCO, a Linux company, is embroiled in legal disputes over Linux and open source issues.
Some analysts say the worm is the latest round in the 'Linux wars'.
The worm has a kill date of Feb. 12.
Ken Dunham, director of malicious code at iDefense, Inc., a security and anti-virus company,says the specific kill date leads him to expect the onslaught of MyDoom variants.
''This may be the first of many attacks and we ,perhaps, may see this worm refined in futureattacks,'' says Dunham. ''Like we did with Sobig in 2003, we might see copy cat attacksfeaturing MyDoom in 2004.''