Sponsor for PC Pals Forum

Author Topic: MY DOOM  (Read 3712 times)

Offline TR

  • Forum Fanatic
  • ******
  • Posts: 7149
MY DOOM
« on: January 27, 2004, 13:07 »
Hi All,

Please be aware of a new strain of computer virus generally referred to as "MyDoom" or W32.Novarg.A@mm which has been identified across various networks around the globe. This particular variant is a Worm Virus will attach to email addresses within your Outlook and forward itself onto them. It will also attach itself to the PC registry and load up every time the PC is restarted.

For further recognition of infected emails please be especially aware of emails with words in the subject line including error, hello, hi, mail delivery system, mail transaction failed, server report, status and test. Also be aware of any email with the attachments with titles including the words: body, data, doc, document, file, message, readme and test.

Should you identify any suspicious email please ensure they are deleted both from the Email inbox and deleted items folders. For Safety do not open suspect attachments for any reason, unless you are confident the file is safe.


Look Here for info


I edited the URL for you - Adept

Offline Clive

  • Administrator
  • *****
  • Posts: 75153
  • Won Quiz of the Year 2015,2016,2017, 2020, 2021
Re:MY DOOM
« Reply #1 on: January 27, 2004, 13:56 »
Mydoom spreading as fast as Sobig
 
A malicious computer virus spread via e-mail is clogging networks and may allow unauthorised access to personal computers, experts have warned.

The worm, Mydoom or Novarg, is carried as an e-mail attachment in a text file and sends itself out to other e-mail addresses once opened by the recipient.

The virus may also open a "back door" to the computer to give hackers access.

It is also spread through file-sharing networks and experts think it could be worse than last summer's Sobig worm.

Thousands of e-mails triggered by the worm, which only affects computers using Microsoft Windows, were bombarding networks within hours of its discovery on Monday.

E-mail security firm MessageLabs said it had stopped over 580,000 copies of the worm in the last 24 hours, and Symantec have had more than 150 reports an hour from companies and individuals who have received it.

Website attack?

The mass-mailing worm is very similar to other types, such as 2003's Bugbear and Sobig, and relies on e-mail to get from place to place, Symantec's Kevin Hogan explained to BBC News Online.

"It is very much in line with Bugbear or Sobig. We are seeing almost exactly the same number of reports of the virus, which means it has the same rate of spread.

"It is a very simple example. It simply relies on a human to double click on an attachment to run it."

 MYDOOM DETAILS
From: random e-mail address
To: address of the recipient
Subject: random words
Message body: several different mail error messages, such as: Mail transaction failed. Partial message is available
Attachment (with a textfile icon): random name ending with ZIP, BAT, CMD, EXE, PIF or SCR extension
When a user clicks on the attachment, the worm will start Notepad, filled with random characters  

If the attachment is opened, it will do two things, Mr Hogan said. It deposits a back door, or a piece of software that listens to commands sent remotely over the net and acts on them.

"But it also seems it will attempt to perform a denial of service attack on SCO from 1 February to the 12th," said Mr Hogan.

SCO is one of the largest Unix open-source vendors in the world. It has been in the news recently because it has claimed that key parts of the open-source operating system, Linux, are under SCO's copyright.

Last year's Blaster worm attempted a similar attack on Microsoft's website, which was stopped.

No porn promise

Unlike many of its predecessors, Mydoom does not entice the recipient to open the attachment by promising nude pictures or personal messages.

Instead, the e-mail carrying the virus often bears the subject "Test" or "Status". The message inside may read: "The message contains Unicode characters and has been sent as a binary attachment".

It also "spoofs" the sender's e-mail address, in an attempt to fool the recipient into opening the e-mail. Some examples of spoofed addresses which have been received by BBC News Online have included aol.com, oxfam.org.uk, and usc.edu.

"Mydoom can pose as a technical-sounding message, claiming that the e-mail body has been put in an attached file," said Graham Cluley from security firm Sophos.

"Of course, if you launch that file you are potentially putting your data and computer straight into the hands of hackers."

Users are advised to delete or ignore the e-mail attachment - which usually ends .exe, .scr, .zip, .cmd or .pif - to avoid damage.

Symantec have advised anyone who has received the worm to avoid opening or double clicking the attachment.

Users should also ensure their anti-virus software is up-to-date, so that if the attachment is opened by accident, the software will catch it.

If anti-virus software does not spot an infection once the attachment is launched, users should download the free tools available to deal with it.

The security firm added if users start getting unusual pop-up messages from their desktop firewall, the chances are the computer has been infected.

The top two viruses of 2003, Sobig-F and Blaster-A, accounted for more than one-third of all the malicious programs seen during 2003.

http://news.bbc.co.uk/1/hi/technology/3432639.stm

 

Offline Clive

  • Administrator
  • *****
  • Posts: 75153
  • Won Quiz of the Year 2015,2016,2017, 2020, 2021
Re:MY DOOM
« Reply #2 on: January 27, 2004, 22:33 »
It's for real.  Mrs Clive has already received two of these today.

Offline chorleydave

  • Forum Fanatic
  • ******
  • Posts: 5035
Re:MY DOOM
« Reply #3 on: January 27, 2004, 22:40 »
I get very little spam, but I have had several e-mails with the subject "Hi" in the last couple of days.  Fortunately, Mailwasher has deleted them.


Offline Simon

  • Administrator
  • *****
  • Posts: 77923
  • First to score 7/7 in Quiz of The Week's News 2017
Re:MY DOOM
« Reply #4 on: January 27, 2004, 23:42 »
I think I had two today as well.  One was a 'Hi' one (addressed to my PC Pals address), and I've just this minute had another one, to my main address, which proported to be a 'server report'.  They both contained attachments, and needless to say, I deleted them from the server with Pop Tray.
Many thanks to all our members, who have made PC Pals such an outstanding success!   :thumb:

Offline Tony

  • Loyal Member
  • *****
  • Posts: 3367
    • http://www.sugrue.ndo.co.uk
Re:MY DOOM
« Reply #5 on: January 28, 2004, 00:43 »
Yes I got a W32.Novarg.A@mm disguised as a failed returned email, Mailwasher missed it, but Norton AV zapped it.
Athiesm is a non-prophet organization.

Offline Clive

  • Administrator
  • *****
  • Posts: 75153
  • Won Quiz of the Year 2015,2016,2017, 2020, 2021
Re:MY DOOM
« Reply #6 on: January 28, 2004, 09:00 »
Mydoom virus 'biggest in months'
 
A computer virus spread via e-mail has been described by security experts as the "largest virus outbreak in months".

The malicious worm, called Mydoom or Novarg, has clogged networks and may allow unauthorised access to computers.

It arrives as an e-mail attachment in a text file which sends itself out to other e-mail addresses if opened.

Security experts MessageLabs said, at its peak, one in 12 e-mails carried the worm. It has now stopped more than 1.5 million copies of it.

It said this latest rapidly-spreading worm is bigger and faster than Sobig.F, the virus which crippled inboxes and networks last August, and it shows little sign of slowing.

"Sobig, at its peak, infected one in every 17 e-mails, causing many internet relays to become severely clogged," Mark Sunner, chief technology officer at MessageLabs told BBC News Online.

"Mydoom has now surpassed this, infecting an incredible one in every 12 e-mails, and so the impact of this latest virus may be very serious for affected e-mail users."

Full article:

http://news.bbc.co.uk/1/hi/technology/3432639.stm

Offline Clive

  • Administrator
  • *****
  • Posts: 75153
  • Won Quiz of the Year 2015,2016,2017, 2020, 2021
Re:MY DOOM
« Reply #7 on: January 28, 2004, 15:35 »
Bounty on creators of e-mail worm
 

The malicious e-mail worm, Mydoom, is still burrowing through global e-mail networks, but will plateau in the next two days, said security experts.

SCO said it was offering a $250,000 reward to find who was responsible.

The US company has been involved in a legal row with the open-source community, after claiming versions of the Linux operating system used code it said it owned.

'Spill the beans'

"Although Mydoom's author may be sympathetic to the open source community's case, and this may have been the reason they targeted SCO, responsible members of the community would never condone such illegal activity," said Graham Cluley, senior technology consultant for Sophos.

"It is hoped that this reward may tempt the computer underground into 'spilling the beans' about who might be responsible for this latest attack on all users of the internet."

 
http://news.bbc.co.uk/1/hi/technology/3436835.stm

Offline Simon

  • Administrator
  • *****
  • Posts: 77923
  • First to score 7/7 in Quiz of The Week's News 2017
Re:MY DOOM
« Reply #8 on: January 28, 2004, 18:02 »
I had another two today, which is more than I've ever had in a 24 hour period.  This more than justifies having a utility like Mail Washer or Pop Tray, but one did slip through and Norton zapped it.
Many thanks to all our members, who have made PC Pals such an outstanding success!   :thumb:

Offline Clive

  • Administrator
  • *****
  • Posts: 75153
  • Won Quiz of the Year 2015,2016,2017, 2020, 2021
Re:MY DOOM
« Reply #9 on: January 28, 2004, 21:28 »
MyDoom variant attacks Microsoft.com
By John Leyden
Posted: 28/01/2004 at 18:49 GMT

A variant of the prolific MyDoom worm which is programmed to attack both Microsoft.com and SCO's Web site has been unleashed onto the Net.

Like its predecessor, MyDoom-B spreads via email or the KaZaA file-sharing network.

The worm made its first appearance this afternoon and is far less common than MyDoom-A, according to Alex Shipp, senior AV technologist at mail filtering firm MessageLabs.

AV vendors are still analysing the malware.

Denis Zenkin, of Russian AV outfit Kaspersky Labs, told El Reg that it was convinced the variant was released by the same person or group responsible for the original virus.

Revamping a virus requires access to source code - which hasn't been published on virus writing sites up till now, according to Zenkin.

Kaspersky also reckons MyDoom-B is probably using machines infected by the original virus to propagate, another factor which points to the same perpetrator behind both attacks.

AV vendors are in the process of updating protection to defend against the worm. For now probably the best advice is to treat unsolicited attachments with extreme scepticism. ®

http://www.theregister.co.uk/content/56/35189.html

Offline Tony

  • Loyal Member
  • *****
  • Posts: 3367
    • http://www.sugrue.ndo.co.uk
Re:MY DOOM
« Reply #10 on: January 29, 2004, 00:37 »
Yes Simon it got through Mailwasher on my PC, but Norton zapped it. Last virus attack I have was yonks ago [Love San] but Mailwasher sussed that one straight away.
Athiesm is a non-prophet organization.

Offline Michelle

  • Forum Fanatic
  • ******
  • Posts: 5242
    • Techieminx
Re:MY DOOM
« Reply #11 on: January 29, 2004, 17:34 »
I've had several of these with Hi and I've had some the last few days that are fake returned mails I didn't look to see if they had attachments but you are saying these are the same virus then?   It can only affect you if you open the attachement can't it?
Its okay to open the email I mean?
Out of all the things I've lost .......I miss my mind the most!!

Offline Simon

  • Administrator
  • *****
  • Posts: 77923
  • First to score 7/7 in Quiz of The Week's News 2017
Re:MY DOOM
« Reply #12 on: January 29, 2004, 18:28 »
Quote
"It is a very simple example. It simply relies on a human to double click on an attachment to run it."


Well, it seems these are triggered only by opening the attachment, but to be honest, I would still delete any e-mails (without opening) which come with unexpected attachments, unless you are certain they are OK.  These 'mydoom' e-mails are fairly easy to spot, if you bear in mind what's been posted here, and be vigilant for the various subjects which give them away.  If one does slip through, your anti-virus software should zap it, providing it's been updated.   :)
Many thanks to all our members, who have made PC Pals such an outstanding success!   :thumb:

Offline Michelle

  • Forum Fanatic
  • ******
  • Posts: 5242
    • Techieminx
Re:MY DOOM
« Reply #13 on: January 29, 2004, 20:07 »
okay thanks simon  ;)   Updated? course its updated

................. runs off to check.   :D
Out of all the things I've lost .......I miss my mind the most!!

Offline Simon

  • Administrator
  • *****
  • Posts: 77923
  • First to score 7/7 in Quiz of The Week's News 2017
How to Kill the Worm
« Reply #14 on: January 31, 2004, 10:38 »
How to Kill the Worm[/u]
 
Mydoom readies its weekend attack, but you can make sure your PC doesn't participate.

Peggy Watt, PC World  Friday, January 30, 2004

For the past week, an insidious worm has been crawling into vulnerable systems around the Internet, preparing for attack this weekend--but there's still time to stop it from burrowing in and recruiting your PC to join its planned assault, and to eject it if it's there.
   
All of the major antivirus vendors have updated their virus definitions to identify and eradicate the fast-moving worm, which goes by several names. It was identified Monday as the Mydoom worm, and is also called Novarg and Mimail.R (a variant of the Mimail worm that appeared in November).

Also available from most antivirus program developers are removal tools to eradicate the pest from an infected system, before it can be recruited into the 12-day-long distributed denial of service attack scheduled to begin February 1. Depending on the variation, the seeded worms are expected to attack Unix software company The SCO Group and Microsoft, say antivirus experts who have studied the pest.

Meet the Worm

You can still avoid having your PC being dragged into the melee.

Prevention is best: Update your antivirus program's definition files regularly. Also, avoid opening suspicious e-mail attachments. Because this worm, like many others, harvests addresses from its victims' e-mail address books, an infected message may actually arrive from a known (but unwitting) sender. That's why the security experts urge you to keep your antivirus software current.

Infected messages usually have a random, false sender's address, and any of eight possible subject headers, according to Eugene Kaspersky, head of antivirus research at Kaspersky Labs. His researchers have identified 18 possible names for the attachment that contains the worm, and numerous possible extensions to the file--including the most common file types, such as bat, exe, pif, pdf, zip, tif, mp3, and many others.

Novarg appears on Kazaa under several names, including "winamp5" and "icq2004-final," and with several extensions.

If a user launches an infected file (by clicking on the attachment), the worm installs itself and begins propagating. According to Kaspersky Labs, it opens a Notepad window that displays a series of random characters. The worm also creates two files in the Windows folder, taskmon.exe (the worm carrier) and shimgapi.dll (a Trojan horse program to remotely control the infected system and recruit it for a DOS attack). The worm also registers these files in the system's Registry autorun key to activate the malicious program when the PC restarts.

To spread, the worm scans the disk for e-mail addresses and sends infected messages. It also checks for a Kazaa connection, and if it finds one, copies itself into the public folder for file exchange.

Exterminating MyDoom

You can search for and delete the files the worm places on your system, but security experts advise applying the longer-term protection of an antivirus program.

Protection against MyDoom as well as removal programs are available from all the major antivirus vendors, which have been tracking the worm's travels.

F-secure calls MyDoom the "worst e-mail worm incident in virus history" because of its fast and prolific spread. The company offers a manual, step-by-step detection and removal process, which involves deleting the worm files from your system and from the Windows Registry, as well as re-enabling access to sites blocked by MyDoom. The company offers an array of prevention, detection, and repair tools online.

Antivirus vendor Symantec recently upgraded the worm to a Level 4 threat because of its rapid distribution. A downloadable update to its Norton Antivirus provides definitions and a removal tool.

Symantec calls it W32.Novarg.A@mm but notes its several aliases, including Novarg, Shimgapi, W32/Mydoom@MM, and Win32/Shimg.

McAfee Security, part of Network Associates, also offers a downloadable fix through a McAfee VirusScan.

New Tactics

Several security vendors note MyDoom's virulence as a weapon.

"The danger of the integration of virus and spam technologies to create united, dedicated networks for cyber-criminals is becoming a reality," says Eugene Kaspersky, head of antivirus research at Kaspersky Labs. "This problem may well signal a new era in computer virology in the near future, an era marked by even more frequent and serious outbreaks." Kaspersky is also posting regular reports on the worm's progress and its mutations. One variant has shifted the target of the DOS attack from SCO to Microsoft.

BitDefender, which calls the worm Mimail.Q, describes it as "simple, effective, and SCO-unfriendly," noting the pending DOS attack on The SCO Group.

"This is not the only indication that the virus was written by someone trying to make a point, since the virus will also try to avoid annoying certain people by infesting their domains" says Sorin Dudea, head of virus research at BitDefender. He says the worm contains a "do not touch" list of servers it will not infect, including as those operated by Google and the University of California at Berkeley.

The security firm is tracking the worm's progress, and notes that it made the Evil Top Ten list for January even though it appeared the last week of the month.

Web hosting service C I Host has developed a virus filter it has dubbed 'Doompster' to extract and eradicate the MyDoom worm from its client systems.

"This virus is spreading as fast as anything we have ever seen," says Christopher Faulkner, CEO of C I Host. "We are taking the infected e-mails and the attachments out of the system." He says that at its peak, the worm appeared to be riding in one of every 12 e-mail messages. The hosting company also reported that response times from major Web sites fell by about 50 percent as MyDoom spread early in the week, although the Internet backbone itself has been largely unaffected.

http://www.pcworld.com/news/article/0,aid,114564,00.asp
Many thanks to all our members, who have made PC Pals such an outstanding success!   :thumb:


Show unread posts since last visit.
Sponsor for PC Pals Forum