WEBINAR: Live Date: December 14, 2017 @ 1:00 p.m. ET / 10:00 a.m. PT
Modernizing Authentication — What It Takes to Transform Secure Access REGISTER >
The mass-mailing worm, also known by some security companies as Novarg, hit the wild on Monday and has been racing around the globe infecting computers with backdoor trojans and proxies. MessageLabs, an email security services company based in New York, reports that MyDoom accounts for one in 17 emails today.
As of 11 a.m. today, company analysts say they have stopped 1.2 million copies of the worm. By comparison, the company stopped 1 million copies of Sobig-F in the first 24 hours.
The worm has caused more than $850 million worth of economic damages worldwide in just the first 24 hours, according to mi2g, a security analyst company based in London.
''This one is very dangerous,'' says Chris Belthoff, a senior analyst at Sophos, Inc., an anti-virus and anti-spam company based in Lynnfield, Mass. ''It's spreading pretty pervasively and we expect to see it increasing over the course of the day. A lot of people may already have copies sitting in their in-boxes and as time zones wake up and get to work, it may pick up.''
MyDoom spreads via email and by copying itself to any available shared directories used by Kazaa. It harvests addresses from infected machines, and generally uses the words 'test', 'hi' and 'hello' in the subject line.
Analysts say MyDoom is spreading so quickly because it is successfully fooling users into opening firs the email and then the attachment. The email often disguises itself as an email that the user sent that has bounced back. The user, wanting to know why the email failed, opens it up and then sees a text file icon, instead of the icon for an executable.
''From a propagation perspective, it has been effective, much more than we would have suspected,'' says Brian Dunphy, a senior manager at Symantec Managed Security Services, which is based in Alexandria, Va. ''It took a unique twist on social engineering. We've told them not to open executables but this one masquerades as a harmless text file. It's exploiting the end user and their desire to want to open up attachments.''
MyDoom also sets up a backdoor trojan in infected computers, allowing the virus writer or anyone else capable of sending commands to an infected machine to upload code or send spam. The worm also is geared to launch a denial-of-service attack against SCO.com starting Feb. 1. SCO, a Linux company, is embroiled in legal disputes over Linux and open source issues.
Some analysts say the worm is the latest round in the 'Linux wars'.
The worm has a kill date of Feb. 12.
Ken Dunham, director of malicious code at iDefense, Inc., a security and anti-virus company, says the specific kill date leads him to expect the onslaught of MyDoom variants.
''This may be the first of many attacks and we ,perhaps, may see this worm refined in future attacks,'' says Dunham. ''Like we did with Sobig in 2003, we might see copy cat attacks featuring MyDoom in 2004.''