New, fast-spreading worm spells ‘doom’ for many

A new e-mail worm is spreading rapidly on the Internet, clogging e-mail servers and staging an attack on the Web site of Unix vendor The SCO Group Inc., antivirus software vendors said.

The worm surfaced Monday and has been given several names by antivirus software vendors, including Mydoom, Novarg and Mimail.R. Experts don’t all agree on the worm’s payload, but they do agree that it is spreading faster than Sobig-F, the worm that topped the charts for the most widespread email worm last year.

“It has been moving very quickly for the past three hours and has been generating a hell of a lot of e-mail,” Vincent Gullotto, vice-president of the Anti-Virus Emergency Response Team at Network Associates Inc., said Monday afternoon. Some businesses have shut down their e-mail gateways to block the worm, he said. Syamntec Corp. said it plans on having a tool to eradicate the worm available by end of Tuesday.

This worm has taken off like a rocket, with well over 20,000 interceptions within just two hours of it being discovered, Ken Dunham, director of malicious code at Internet security company iDefense Inc., said in a statement via e-mail.

Massive spreading of the worm slowed down performance of the top 40 U.S. business Web sites Monday afternoon, according to Keynote Systems Inc., a San Mateo, Calif.-based Web performance monitoring firm. The average time for a site to load exceeded four seconds, while they normally load in two to three seconds, Keynote said in a statement.

The worm arrives as an e-mail with an attachment that can have various names and extensions, including .exe, .scr, .zip or .pif. The e-mail can have a variety of subject lines and body texts, but in many cases it will appear to be an error report stating that the message body can’t be displayed and has instead been attached in a file, experts said.

The sender’s address can be spoofed, meaning that the message could appear to be from a colleague, friend or the e-mail system administrator.

“This is something you might see from a mail system, so you click on the attachment,” said Sharon Ruckman, senior director for Symantec Corp. Security Response. Only users of computers running Microsoft Corp.’s Windows are at risk, according to Symantec.

Both Network Associates and Symantec agree that when the attached file is executed, the worm scans the system for e-mail addresses and starts forwarding itself to those addresses. If the victim has a copy of the Kazaa file-sharing application installed, it will also drop several files in the shared files folder in an attempt to spread that way.

Symantec also identified more malicious acts. The worm will start sending requests for data to, the Web site of The SCO Group, on Feb. 1 as part of a denial of service attack, said Oliver Friedrichs, senior manager with Syamntec Corp. Security Response. Friedrichs added that earlier statements that the worm installed a keystroke logger appear to be false but that the worm leaves ports 3127 to 3198 open, thus potentially allowing an attacker to install one at a later time.

Antivirus vendors Trend Micro Inc. and F-Secure Corp. report that the worm installs a “backdoor,” potentially allowing an attacker access to the infected system.

SCO has noticed that its Web site performance has intermittently slowed, but it is too early to say if there is an attack on the site, said SCO spokesperson Blake Stowell. “It may be showing the early stages of a DoS attack,” he said. SCO has enraged the open source community by claiming that the Linux operating system contains software that violates SCO’s intellectual property, and has been the subject of various attacks on its Web site.

The Mydoom worm so far has spread mostly in the U.S., after it was first detected in Russia, e-mail filtering company MessageLabs Inc. reported on its Web site late Monday night. Information from Trend Micro at the same time showed the worm is also spreading in Australia, New Zealand and Japan.

Antivirus software vendors urge users to update their antivirus software and be careful when opening e-mail attachments. “If you’re not expecting an e-mail, don’t open it,” Symantec’s Ruckman said.

Network Associates’ Gullotto expects the worm to keep causing headaches for a while. “It will be a couple of days before we’re going to get to the point that it won’t have any impact. It has a full head of steam, there are hundreds of thousands of e-mails and we may see well into the millions (of e-mails), and possibly hundreds of thousands of machines infected,” he said.

— With files from Chris Conrath, IT World Canada

Related Download
A Guide to Print Security for Canadian Organizations Sponsor: HP
A Guide to Print Security for Canadian Organizations
IT security vulnerabilities are a growing cause for concern for organizations trying to protect their data from printer breaches.
Register Now