new anti-sco worm. really.
dep
dep
Mon May 17 11:58:42 PDT 2004
http://news.com.com/2100-7349_3-5147605.html?tag=nefd_lede
A mass-mailing virus that quickly spread around the Internet on Monday
is compromising computers so they attack the SCO Group's Web server
with a flood of data, according to antivirus companies.
The virus--known as MyDoom, Novarg and as a variant of the Mimail virus
by different antivirus companies--arrives in an in-box with one of
several different random subject lines such as "Mail Delivery System,"
"Test" or "Mail Transaction Failed." The body of the e-mail contains an
executable file and a statement such as: "The message contains Unicode
characters and has been sent as a binary attachment."
"It's huge," said Vincent Gullotto, a vice president in security
software maker Network Associates' antivirus emergency response team.
["Oh, wait -- that's a different spam email." (I made the part in
brackets up.)] "We have it as a high-risk outbreak."
In one hour, Network Associates itself received 19,500 e-mails bearing
the virus from 3,400 unique Internet addresses, Gullotto said. One
large telecommunications company has already shut down its e-mail
gateway to stop the virus.
Once the virus infects a PC, it installs a program that allows the
computer to be controlled remotely. The PC then starts sending data to
the SCO Group's Web server, a Symantec spokesman said.
The SCO Group has incurred the wrath of the Linux community for its
claims that important pieces of the open-source operating system are
covered by SCO's Unix copyrights. IBM, Novell and other Linux backers
strongly dispute the claims.
SCO technicians couldn't immediately confirm that a denial-of- service
attack had begun. By 4 p.m. PST, the company's Web site was slow to
load, a SCO spokesperson acknowledged, but the site was still
accessible from the World Wide Web.
SCO's Web site was taken offline by such denial-of-service attacks a
handful of times in the last year. In the past, the company has blamed
Linux sympathizers for at least one of the attacks.
Antivirus companies were scrambling on Monday afternoon to learn more
about the virus, which started spreading about noon PST.
"A lot of the information is encrypted, so we have to decrypt it," said
Sharon Ruckman, a senior director in antivirus software maker
Symantec's security response center. Symantec has had about 40 reports
of the virus in the first hour, a high rate of submission, Ruckman
said.
Security companies are still analyzing the virus. Variations in the body
text include: "The message cannot be represented in 7-bit ASCII
encoding and has been sent as a binary attachment."
Early data indicated an epidemic several times the size of the Sobig.F
virus, which caused widespread infections last summer, said Scott
Petry, a vice president of engineering at e-mail service provider
Postini.
"At its current run rate, we will trap almost 8 million in a day," Petry
said. The company quarantined only 1,400 copies of Sobig.F in its first
day and 3.5 million copies of the virus during that epidemic's peak
24-hour period.
Mail systems that remove executable files from e-mails can stop the
program from spreading.
--
dep
It's remarkable how quickly a problem goes away once the people with
a vested interest in there being a problem go away. -- Mark Steyn
More information about the Linux-users
mailing list