[Full-Disclosure] Mydoom: perfect storm averted or just ahead?
c2_protect at hotmail.com
Thu Jan 29 01:34:26 GMT 2004
Worms traveling across the Internet are like waves rolling and swelling
across an ocean. Just because the first swell does not catch inundate a
network, one should not assume invincibility to next wave in the perfect
Reports vary in Mydoom.a generated traffic; between 1 in 7-12 Emails.
Although Mydoom.a infested may networks, it apparently bypassed others.
Sophos http://www.sophos.com/virusinfo/analyses/w32mydooma.html reported
that the initial variant was programmed to bypass certain domains or
addresses with strings to include the following:
acketst, arin., avp, berkeley, borlan, bsd, example, fido, foo., fsf., gnu,
google, .gov, gov., hotmail, iana, ibm.com, icrosof, ietf, inpris, isc.o,
isi.e, kernel, linux, math, .mil, mit.e, mozilla, msn., mydomai, nodomai,
panda, pgp, rfc-ed, ripe., ruslis, secur, sendmail, sopho, syma, tanford.e,
unix, usenet, utgers.ed
Experience shows that programmers are quick to improve upon initial code,
modifying and releasing variants (note Sobig and now Mydoom.b -
1. Do not rest on your laurels, assuming your network has good
defense-in-depth ( Executables stripped away at Email server, Outlook
security patch installed) . The next version could be modified with
condition right to target your environment and hit you with a perfect storm.
2. It would be difficult for a malicious programmer, cyber terrorists or
cyber activists to target a specific environment and protect others ( Eg.,
launch denial of service against SCO.com because I like LINUX and dont like
SCO legal actions. Protect my computer at Berkley.edu because I dont want
to effect my own Email.) Programmers can easily modify code and launch an
attack against another environment.
MSN 8 with e-mail virus protection service: 2 months FREE*
Full-Disclosure is hosted and sponsored by Secunia.