Mydoom

Mydoom
Example of a randomly generated file opened by Mydoom after execution
Common nameMydoom
TypeComputer worm
Operating system(s) affectedWindows 2000, Windows XP
Written inC++
Discontinued
  • 12 February 2004 (Mydoom.A)
  • 1 March 2004 (Mydoom.B)

Mydoom was a computer worm that targeted computers running Microsoft Windows. It was first sighted on January 26, 2004. It became the fastest-spreading e-mail worm ever, exceeding previous records set by the Sobig worm and ILOVEYOU, a record which as of 2024 has yet to be surpassed.

Mydoom appears to have been commissioned by e-mail spammers to send junk e-mail through infected computers. The worm contains the text message "andy; I'm just doing my job, nothing personal, sorry," leading many to believe that the worm's creator was paid. Early on, several security firms expressed their belief that the worm originated from a programmer in Russia. The actual author of the worm is unknown.

The worm appeared to be a poorly sent e-mail, and most people who originally were e-mailed the worm ignored it, thinking it was spam. However, it eventually spread to infect at least 500 thousand computers across the globe.

Speculative early coverage held that the sole purpose of the worm was to perpetrate a distributed denial-of-service attack against SCO Group. 25 percent of Mydoom.A-infected hosts targeted SCO Group with a flood of traffic. Trade press conjecture, spurred on by SCO Group's own claims, held that this meant the worm was created by a Linux or open source supporter in retaliation for SCO Group's controversial legal actions and public statements against Linux. This theory was rejected immediately by security researchers. Since then, it has been likewise rejected by law enforcement agents investigating the virus, who attribute it to organized online crime gangs.

Mydoom was named by Craig Schmugar, an employee of computer security firm McAfee and one of the earliest discoverers of the worm. Schmugar chose the name after noticing the text "mydom" within a line of the program's code. He noted: "It was evident early on that this would be very big. I thought having 'doom' in the name would be appropriate."

Technical overview

Mydoom is primarily transmitted via e-mail, appearing as a transmission error, with subject lines including "Error", "Mail Delivery System", "Test" or "Mail Transaction Failed" in different languages, including English and French. The mail contains an attachment that, if executed, resends the worm to e-mail addresses found in local files such as a user's address book. It also copies itself to the "shared folder" of peer-to-peer file sharing application Kazaa in an attempt to spread that way.

Mydoom avoids targeting e-mail addresses at certain universities, such as Rutgers, MIT, Stanford and UC Berkeley, as well as certain companies such as Microsoft and Symantec. Some early reports claimed the worm avoids all .edu addresses, but this is not the case.

The original version, Mydoom.A, is described as carrying two payloads:

A second version, Mydoom.B, as well as carrying the original payloads, also targets the Microsoft website and blocks access to Microsoft sites and popular online antivirus sites by modifying the hosts file, thus blocking virus removal tools or updates to antivirus software. The smaller number of copies of this version in circulation meant that Microsoft's servers suffered few ill effects.

Timeline

Although Mydoom's denial of service attack was scheduled to begin on 1 February 2004, SCO Group's website goes offline briefly in the hours after the worm is first released. It is unclear whether Mydoom was responsible for this. SCO Group claimed it was the target of several distributed denial of service attacks in 2003 that were unrelated to computer viruses. The spread of Mydoom peaks; computer security companies report that Mydoom is responsible for roughly one in five e-mail messages at this time.

See also

References

  1. ^ "Security firm: MyDoom worm fastest yet". CNN.com. Time Warner. 2004-01-28. Archived from the original on 2007-11-14. Retrieved 2007-10-14.
  2. ^ Tiernan Ray (2004-02-18). "E-mail viruses blamed as spam rises sharply". The Seattle Times. The Seattle Times Company. Archived from the original on 2012-08-26. Retrieved 2004-02-19.
  3. ^ "Mydoom threat still high;Microsoft offers reward". NBC News. 26 January 2004. Retrieved 2022-06-29.
  4. ^ "More Doom?". Newsweek. Washington Post Company. 2004-02-03. Archived from the original on 2009-03-02. Retrieved 2007-10-28.
  5. ^ " MyDoom Virus: The Most Destructive & Fastest Email Worm - MiniTool". www.minitool.com. Retrieved 2023-10-12.
  6. ^ "Mydoom virus starts to fizzle out". BBC News. BBC. 2004-02-04. Archived from the original on 2004-04-16. Retrieved 2004-02-04.
  7. ^ "How to Thwart Renewed 'MyDoom' E-Mail Bug". ABC News. Archived from the original on 2020-09-28. Retrieved 2020-06-28.
  8. ^ "Microsoft Information: MyDoom (Wayback Archive from 4 Feb 2004)". microsoft.com. 2004-02-04. Archived from the original on February 4, 2004.{{cite web}}: CS1 maint: unfit URL (link)
  9. ^ "W32.HLLW.Doomjuice". Symantec Corporation. 2007-02-13. Archived from the original on 2004-04-15. Retrieved 2004-02-10.
  10. ^ "Lazy Hacker and Little Worm Set Off Cyberwar Frenzy". Wired News. 2009-07-08. Archived from the original on 2009-07-10. Retrieved 2009-07-09.

External links