Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Banner Left
Banner Right

‘MyDoom’ Internet worm spreads around globe

‘MyDoom’ Internet worm spreads around globe

JOHANNESBURG – Anti-virus vendors have issued urgent alerts about a fast-spreading new Internet worm, MyDoom, which is exploding globally via e-mails with subject lines such as “Hi”.

The worm appears to attempt denial of service attacks on SCO’s web site. SCO Group has been in the news recently over royalty-related disputes with other vendors and Linux users.The MyDoom worm was discovered on Tuesday afternoon and spread so quickly that Trend Micro, Network Associates, Symantec and other anti-virus companies have rated it as a “high” outbreak.Central Command describes the MyDoom outbreak as the first serious virus outbreak in 2004.Central Command says the new worm is spreading globally, with exceptionally heavy concentrations initially in the US and Europe.Local inboxes were also cluttered with the virus mails this morning, although the exact number of infections is not known yet.Brett Myroff, CEO of local Sophos distributor Netxactics, says the worm harvests ‘to’ and ‘from’ e-mail addresses from a recipient’s mailbox and appears to launch a distributed denial of service attack on SCO’s Web site from infected computers.He says the e-mail appears to be fairly technical in nature – unlike many mass-mailing worms that use photos or personal-sounding subject lines.It arrives in mail with subject lines such as “hi”, “hello”, “test” or “status”.”When the MyDoom worm forwards itself via e-mail, it can create its attachment in either Windows executable or Zip file format,” says Myroff.”It is possible the worm’s author did this in an attempt to bypass company filters which try and block EXE files from reaching their users from the outside world.”Other anti-virus companies report that it arrives in an attachment with a .scr or .pif extension.When the worm, also dubbed Novarg, Shimgapi or Mimail-R, is activated, the infected computer’s hard disk is harvested by the worm for more e-mail addresses to send itself to.The worm opens a backdoor onto infected computers, which allows hackers to gain access.”We’re seeing fast-spreading malicious worms being released one after another today,” said Steven Sundermeier, VP of products and services at Central Command, late yesterday.”Initial reports of MyDoom have already surpassed the other new releases in a matter of minutes.The alarming rate of submissions closely mimics that of later variants of Sobig.F. This has all the characteristics of being the next big one”.Central Command’s Emergency Virus Response Team confirmed over 3800 infections of MyDoom in fewer than 45 minutes of initial discovery.Ken Dunham, director of Malicious Code at iDefense, reported early this morning that over 700 000 interceptions had already been made in the first few hours of the outbreak.”This type of blitzkrieg attack may be leveraging formerly infected zombie computers to quickly spread the worm in the wild.It’s a growing problem in prolific worm attacks, where many computers are compromised with a worm and Trojan mix within a few short hours,” says Dunham.iDefense reports that the ‘kill date’ for this worm is 12 February, but warns that a new variant could emerge in the wild around that time.- Itweb.co.zaSCO Group has been in the news recently over royalty-related disputes with other vendors and Linux users. The MyDoom worm was discovered on Tuesday afternoon and spread so quickly that Trend Micro, Network Associates, Symantec and other anti-virus companies have rated it as a “high” outbreak. Central Command describes the MyDoom outbreak as the first serious virus outbreak in 2004. Central Command says the new worm is spreading globally, with exceptionally heavy concentrations initially in the US and Europe. Local inboxes were also cluttered with the virus mails this morning, although the exact number of infections is not known yet. Brett Myroff, CEO of local Sophos distributor Netxactics, says the worm harvests ‘to’ and ‘from’ e-mail addresses from a recipient’s mailbox and appears to launch a distributed denial of service attack on SCO’s Web site from infected computers. He says the e-mail appears to be fairly technical in nature – unlike many mass-mailing worms that use photos or personal-sounding subject lines. It arrives in mail with subject lines such as “hi”, “hello”, “test” or “status”. “When the MyDoom worm forwards itself via e-mail, it can create its attachment in either Windows executable or Zip file format,” says Myroff. “It is possible the worm’s author did this in an attempt to bypass company filters which try and block EXE files from reaching their users from the outside world. “Other anti-virus companies report that it arrives in an attachment with a .scr or .pif extension. When the worm, also dubbed Novarg, Shimgapi or Mimail-R, is activated, the infected computer’s hard disk is harvested by the worm for more e-mail addresses to send itself to. The worm opens a backdoor onto infected computers, which allows hackers to gain access. “We’re seeing fast-spreading malicious worms being released one after another today,” said Steven Sundermeier, VP of products and services at Central Command, late yesterday. “Initial reports of MyDoom have already surpassed the other new releases in a matter of minutes. The alarming rate of submissions closely mimics that of later variants of Sobig.F. This has all the characteristics of being the next big one”. Central Command’s Emergency Virus Response Team confirmed over 3800 infections of MyDoom in fewer than 45 minutes of initial discovery. Ken Dunham, director of Malicious Code at iDefense, reported early this morning that over 700 000 interceptions had already been made in the first few hours of the outbreak. “This type of blitzkrieg attack may be leveraging formerly infected zombie computers to quickly spread the worm in the wild. It’s a growing problem in prolific worm attacks, where many computers are compromised with a worm and Trojan mix within a few short hours,” says Dunham. iDefense reports that the ‘kill date’ for this worm is 12 February, but warns that a new variant could emerge in the wild around that time. – Itweb.co.za

Stay informed with The Namibian – your source for credible journalism. Get in-depth reporting and opinions for only N$85 a month. Invest in journalism, invest in democracy –
Subscribe Now!

Latest News