Please create an account to participate in the Slashdot moderation system


Forgot your password?

MyDoom Windows Worm DDoSing SCO 694

We mentioned the myDoom Worm just a few hours ago, but more information is available now, mainly that its ultimate goal is apparently to DDoS SCO. You can see some more detail at NetCraft. Obviously SCO has a lot of enemies out there right now, but it's always sad to watch someone stoop to this level.
This discussion has been archived. No new comments can be posted.

MyDoom Windows Worm DDoSing SCO

Comments Filter:
  • by no_nicks_available ( 463299 ) on Tuesday January 27, 2004 @09:48AM (#8098866)
    the DOS isn't supposed to start until Feb 1. Maybe this is related to some sort of network "hardening" in preparation. More info []
  • by GrenDel Fuego ( 2558 ) on Tuesday January 27, 2004 @09:49AM (#8098870)
    SCO has been under repeated DDOS attacks for months now. Netcraft is most likely showing details on those ones.
  • dupe (Score:2, Informative)

    by CGP314 ( 672613 ) <CGP AT ColinGregoryPalmer DOT net> on Tuesday January 27, 2004 @09:51AM (#8098880) Homepage
    Here is the origional story on slashdot:

    There is a new virus out by the name of Novarg which can infect all Windows versions from 95 to XP. It has two interesting features - first, in addition to mass mailing, it also distributes itself via the P2P network Kazaa. Second, it can perform a denial-of-service against Details at Symantec and F-Secure, although neither seems to have finished their analysis." Other readers have sent in links to coverage at CNET and Security Response, and Russ Nelson provides a sample message.

    So tell me again, what new information did we learn between now and then. Looks like slashdot just loves SCO stories to me, even if they are repeats.

    In London? Need a Physics Tutor? []

    American Weblog in London []
  • Funny, I think: (Score:5, Informative)

    by cockroach2 ( 117475 ) on Tuesday January 27, 2004 @09:53AM (#8098898)
    On the bottom of the netcraft report you can see an OS history of - apparently they switched from SCO UNIX to Linux in August 2002...
  • by Quantum-Sci ( 732727 ) on Tuesday January 27, 2004 @09:57AM (#8098946) Homepage
    The hammering of SCO doesn't start until Feb 1 though. Supposed to be Feb 1-12.

    I received three of these yesterday, and it's been ages since I received anything with a virus. Must be massive.

  • DDoS (Score:4, Informative)

    by savagedome ( 742194 ) on Tuesday January 27, 2004 @09:58AM (#8098956)
    Note that the DDoS attack is timed to be performed between 1st and 12th Feb, 2004 [].
  • by codepunk ( 167897 ) on Tuesday January 27, 2004 @10:01AM (#8098976)
    Yes it does use outlook (the typhoid mary of the internet) to spread itself. I suggest you stick with windows as being a Linux administrator is a very lonely job. It is very much like being a Maytag repairman, nobody ever calls.
  • by Anonymous Coward on Tuesday January 27, 2004 @10:08AM (#8099030)
    ripped straight from

    W32/MyDoom-A also drops a file named shimgapi.dll, which is a backdoor program loaded by the worm. The backdoor allows outsiders to connect to TCP port 3127 on your computer.
  • by Kredal ( 566494 ) on Tuesday January 27, 2004 @10:12AM (#8099075) Homepage Journal
    the s/foo/bar command will replace all instances of "foo" with "bar". In this example, it changes "this" to "their".
  • s/is/eir

    It is a regex [] statement. Essentially, the string typically instructs a language interpreter (PERL, for instance) to search for a pattern and subsequently replace it.

    In this case, it is replacing any instances of "is" with "eir"; thus, the following alteration is committed:

    Before: but it's always sad to watch someone stoop to this level
    After: but it's always sad to watch someone stoop to their level
  • by JRHelgeson ( 576325 ) on Tuesday January 27, 2004 @11:07AM (#8099639) Homepage Journal
    The DDoS against doesn't start until the infected machine is rebooted any time after February 1, 2004 at 00:00:01 and will continue until the machine is rebooted after February 12, 2004. At that point in time, the DDoS will stop and the infected host will keep its back door open - listening on ports 3127 to 3198 TCP (It only listens on one port, but if 3127 isn't available it'll listen on the next port on up the chain). Presumably, after 12 Feb, the infected machine will be used as a spam relay as the virus obviously has Message Transfer capabilities encoded within it.

    The graphs that are linked to in the /. story simply illustrate that SCO's shxt keeps on crashing - which is not really suprising after Darl had to fire the network admin to feed his Lawyer habit.

  • by fishbert42 ( 588754 ) on Tuesday January 27, 2004 @11:28AM (#8099878)
    ... there is no fscking point in sending the "you sent me a virus" panic mail.

    Actually, there is... but in sending an email to others who know your email address. For example, I got 3 messages yesterday which contained this virus. Now, from what I understand, this worm pulls email addresses from one's computer, and sticks those addresses in the 'from' field. One of those emails I received was "from" the United States Air Force Band's Singing Sergeants Yahoo Group. That's pretty specific, so I sent everyone I know (who runs windows) a message saying, basically, that if you know of the Singing Sergeants, or these few other email addresses, then it's likely you have this worm.

    Sending a "you gave me a virus" email to whomever is in the 'from' field is pretty useless, but the above tactic may prove helpful for this particular worm. At the very least, it lets other (possibly less-informed) folks know there's a worm about, and reminds them to practice good email usage (not opening unexpected attachments, etc.) and to update their anti-virus software.
  • Re:Change domain (Score:2, Informative)

    by BenBenBen ( 249969 ) on Tuesday January 27, 2004 @11:32AM (#8099925)
    Maybe theyll change their domain name like M$ did to instead of
    Windows Update exists at and or similar.

    The dDOS was just aimed at the first one, whilst all links (web and local) to Windows Update point at the other one. The attack was therefore not hugely disruptive, especially once a nice layer of properly hardened computers [] was in the way.

    According to NetCraft, SCO is currently pinging at about the 16 second mark - are there really that many computers with fast clocks, or is it bad coding, or is something else happening here? Feb 1st is supposed to mark the start of the GET storm.

  • by sunset ( 182117 ) on Tuesday January 27, 2004 @01:03PM (#8101072) Homepage

    I just created and installed a Postfix remedy for this recent deluge, and thought I'd pass it on.

    In, insert this:


    Create a file virus_body_checks containing this:

    /^TVqQAAMAAAAEAAAA\/\/8AALg/ REJECT Microsoft executable attachments are not allowed here.
    /^UEsDBAoAAAAAA...OzDKJx\+eAFgAAABYAA/ REJECT Attached zip file appears to contain a virus.

    If anyone has an improved solution, let me know, but this seems to work.

  • On the contrary.... (Score:2, Informative)

    by Elusive_Cure ( 645428 ) on Tuesday January 27, 2004 @02:46PM (#8102404)
    Quoting from parent : "all this time we've been bitching and moaning about viruses when we could have been using them on spamtrap addresses to track down spammers to their *own* internet connection."

    1. ... On the contrary, that's what honeypots all over the web do, it's a fairly effective way to back-trace spam...
  • by TwinkieStix ( 571736 ) on Tuesday January 27, 2004 @03:08PM (#8102715) Homepage
    I would have moderated this as informative, but I'm going to reply instead. We're going to take your idea and change it in two ways. First, it appears that the virus is forging the senders address, so we shouldn't reply to the message because it causes undue hysteria. Instead, we're going to simply send the virus to /dev/null with a procmail script after postfix gets the message:

    :0 B

    Does this work for everybody? We haven't gotten another e-mail since implimenting it.

I go on working for the same reason a hen goes on laying eggs. -- H.L. Mencken