MyDoom.C Making Its Way Across The Net 519
Iphtashu Fitz writes "eWeek is reporting that the latest variant of MyDoom is now making its way across the internet and may have been responsible for some disruptions to Microsofts website over the weekend. This new variant apparently doesn't spread via e-mail but instead scans for machines with an open TCP port 3127. This version appears to be a very stripped down version of its earlier cousins since it also doesn't leave a backdoor into infected machines nor does it have a shutoff date for when to stop attacking Microsoft." Reader billstewart adds links to reports at Australia's ABC News and carried by Reuters; Unloaded adds a link to CNET's coverage.
MyDoom (Score:5, Funny)
Re:MyDoom (Score:5, Interesting)
Re:MyDoom (Score:5, Interesting)
Re:MyDoom (Score:5, Funny)
Nimda (Score:5, Informative)
I'm sure if the file you sent out was called "thisvirusisnamedJim.vbs", it would be called Jim.
Tell that to the author of Nimda, the first major worm to spread multiple ways. He clearly named his worm "Concept Virus(CV) V.5, Copyright(C)2001 R.P.China" in a string in the binary, but the antivirus people called it "Nimda" anyway [wired.com]. Nimda 0.6 contained the string "Concept Virus(CV) V.6, Copyright(C)2001, (This's CV, No Nimda)" but it was still called Nimda.
Re:Nimda (Score:5, Interesting)
Maybe that's because the name Concept Virus was already taken.
The original Concept Virus was a significant milestone - the first virus written to infect MS-Word documents (using Word's own macro language - thanks Microsoft, we really need all that capability in a word processor). It was the start of an era where macro viruses became the most prevalent method of virus transmission on the planet, surpassing boot sector viruses (remember floppy diskettes?) and other formerly common methods.
Re:Nimda (Score:4, Funny)
thats too bad
The ULTIMATE Vaporware Virus (Score:5, Funny)
MyDukeNukeMForever.A
Why are you contradicting yourself? (Score:4, Funny)
Well you seem to be making one mistake....
The virus writers ARE the anti-virus companies!
Re:MyDoom (Score:5, Interesting)
But yeah, the anti-virus companies named it.
Comment removed (Score:5, Funny)
Re:MyQuake (Score:5, Funny)
Re:MyQuake (Score:5, Funny)
Although some networks will allow you to be pre-infected with an empty shell virus that will automatically download and install MyDoom.III when it begins to spread.
Re:MyQuake (Score:5, Funny)
MyDaikatana (Score:5, Funny)
New MyDaikatana Release Date (Score:3, Funny)
Re:MyDoom (Score:4, Funny)
*shrugs*
My poor firewall logs (Score:2, Funny)
mydoom source (Score:4, Funny)
gcc mydoom.c -o mydoom
Re:mydoom source (Score:5, Funny)
Re:mydoom source (Score:5, Funny)
Subject: "Awesome Linux screensaver!"
Body: "Check out this awesome screensaver! Follow the steps below to install it. If you can, it would be helpful to switch to your root account first."
1. Save the attached file to your home directory.
2. Open a command prompt window.
3. Type: gunzip screensaver.tar.gz
4. Type: tar xvf screensaver.tar
5. Type: cd screensaver
6. Type: make
7. Type:
Re:mydoom source (Score:4, Interesting)
Where you'll get into trouble, is you'll have assholes who write popular programs that require you to run as root, so every dumbass will be root. And users won't care at all. One example of software for windows like this is the sims -- it requires you run it as administrator. The sims is at the same time the most popular and most crappily written games of all time. That is scary.
Re:mydoom source (Score:5, Insightful)
No, but you do need to have run chmod u+x on the file... By default files aren't executable. Scripts (executable text files) are run by the interpreter which is specified on the first line of the script. Binary files have a magic number, which is used to determine the appropriate way to load and run them.
Actually, Mydoom.C does give you the source :-) (Score:4, Interesting)
A new worm, named Doomjuice and MyDoom.C by various AV vendors, was identified. It spreads by exploiting the backdoor left by MyDoom.A and MyDoom.B. After infecting a system, it leaves a copy of the Mydoom.A source in a file named 'sync-src-1.00.tbz'. Doomjuice is also set to perform a DDOS against www.microsoft.com.
Re:Actually, Mydoom.C does give you the source :-) (Score:3, Interesting)
So by the reasoning of the popular media, this one must have been written by the US Justice Department, because it attacks microsoft?
Is it just getting started? (Score:5, Insightful)
Therefore, it's not a far stretch to assume that the 50,000 to 75,000 machines that are still infected by MyDoom.A or MyDoom.B will catch DoomJuice with a 100% infection ratio. Those machines by definition do not have an anti-virus program that's been updated recently enough to capture the original MyDoom virus, so DoomJuice will be able to walk in through the backdoor at port 3127 with nobody gaurding that door.
The author of MyDoom has basically created a network of zombies that he/she/it has full control of without the knowledge of any of the infected users. And now, this author has demonstrated the ability to send a patch-virus out with new updated instructions.
Right now, this patch seems to not have much of a payload. But, we don't know if we've seen its full payload yet, and there's certainly the possible of DoomJuice2 coming out with a worse payload.
To put it lightly... these 50,000 to 75,000 zombies need to be pulled from the Internet stat.
Re:Is it just getting started? (Score:5, Interesting)
Re:Is it just getting started? (Score:4, Funny)
Tech: Hello? Is this the system administrator of the house?
Dad: Jimmy? It's a call for you.
Tech: Hello, are you the system administrator of the hose?
Jimmy: Yes, but my friends in school call me Jimmy.
Tech: Okay, Jimmy. We've detected that your house has a computer that's infected by a virus.
Jimmy: Comuputers can catch colds?
Tech:
dshield and the number of infected systems (Score:4, Interesting)
ISC [incidents.org] and dshield [dshield.org] are showing the number of sources scanning port 3127 building up at an alarming rate. The number of sources seems to be increasing by about 2000 every 10 minutes, which is much more in line with the number of sources I'm seeing scanning my backwater.
Target American Idol !!! (Score:5, Funny)
Re:Target American Idol !!! (Score:3, Insightful)
Re:Target American Idol !!! (Score:5, Interesting)
Re:Is it just getting started? (Score:5, Interesting)
Actually, we have the antivirus companies mostly to blame for this one; they discovered it wasn't enough to sell people the software(and that coming up with new features to get upgrades was difficult), but they had to lock them into updates too; pure corporate greed. Instead, people either don't realize they're no longer getting updates, or they think the older definitions will work just fine. I tell people either to update their subscription, or to use a mailer other than Outlook if possible and run any of the various free virus scanning tools(McAfee and Trend for example both have free web-based scanners) on a regular basis or whenever the system starts doing weird stuff.
Lastly- some vendors dragged their feet. McAfee took almost 2-3 days to release "regular" definitions which could either be downloaded to your proxy server and then deployed to all your clients...or downloaded by clients automatically. Until they did it, you had to download special "extra" definition files, put them in certain folders, etc. Ie, impossible for the end-user, and a pain in the ass for small businesses without the tools to deploy stuff like that easily automatically.
Therefore, it's not a far stretch to assume that the 50,000 to 75,000 machines that are still infected by MyDoom.A or MyDoom.B will catch DoomJuice with a 100% infection ratio.
Except for all the systems behind firewalls that got infected because they got the virus via email...
Right now, this patch seems to not have much of a payload.
Who said anything about it being a patch? Ok, so maybe it is- but "not much of a payload" doesn't mean much, since a compressed diff can be very small...
By the way- off-topic rant, McAfee's corporate software sucks. You can run a mirror of their definitions, but you need Windows Server to do it(2k or 2003). You can deploy sitewide policies, but you need to build it into the installer and any further changes require an overblown management system that needs Windows Server AND MS SQL Server. it gets better- unlike NAV and others, you can't do email scanning on anything except Outlook(NAV has supported POP/IMAP scanning via proxy for years). And the best part? If you get a virus alert from the on-access scan, the user can't click any of the action buttons, because get this- and I swear, this was straight from the mouth of a McAfee rep- "they'll always click ignore to make it go away". "So why did you also disable the delete and quarantine buttons as well?!?" NAV and others let you restrict what option set the user gets(so they can delete, but not ignore...or do whatever). Last but not least, their support is mostly based out of india.
Re:Is it just getting started? (Score:4, Interesting)
Granted it costs money to update virus scanners, but that should be part of the one time purchasing fee. I guess you get what you pay for, the last few dells I've played with on the residential front came with McAfee that expired in TWO months.
You can only blame the user for so much. They were sold lemons and they have to deal with lemons. If Dell et al cared about security they would cut a deal with the people from AVG or someone who can actually provide updates for free. Not to mention start ghosting their drives with service pack one and the patches for blaster. It would cost next to nothing to toss in a disk or CDROM with 'critical updates - install before putting computer on net' if moving up to a more current ghost image is too expensive.
Persoanlly, I don't see why ISPs can't get in on this. Everytime I switch broadband providers they send a guy out to install crap on my PC. I usually stop them, but their install packages are simple ad-ware or PPPoE drivers. Why not toss in a n anti-virus for a huge discount, if not free, if the computer doesn't have a working one? Its good for the network and its good for the customer. Yes, it shouldn't be mandatory but for the average person it would be a great opportunity to get an up to date scanner. Heck, toss in a firewall while you're at it and make sure their windows update settings are correct. They could automate this when they put their ad-ware and change the name of IE to IE provided by Comcast crap.
Re:Is it just getting started? (Score:3, Insightful)
"Your car isn't working." "Yes it is, just the wheels are missing". Sorry, I don't consider an AV app working that only catches viruses older than a week, no matter why this is so.
Re:Is it just getting started? (Score:3, Informative)
He isnt 110% right on that point, because Ive set this up for serveral organizations.
Now, as I said, this may have changed with the newer versions: I cant say, because I havent used them. But with the 4.x versions, you can either manually enter the alternate FTP server, or just edit the registry settings via logon script (which is what I did). The only thing I *couldnt* do via registr
Re:Is it just getting started? (Score:3, Insightful)
Re:Is it just getting started? (Score:5, Insightful)
Things are about to get worse before they get better.
Re:This just in... (Score:3, Insightful)
Or, since you've never used any anti-virus software, you'r not aware that the machine has been infected by a virus... :-D
But yes, a little caution goes a long way, just don't expect it to save your back all the time. I've learned the hard way that every once in a while you're confronted with something you didn't know could be a problem and you're bitten.
Still, props for being so vigilant.
Re:This just in... (Score:5, Insightful)
How can you say that you never had a virus when you never used an AV-scanner? Some viruses may not be noticable when on your system.
Re:This just in... (Score:3, Informative)
just question.. how can you confirm that you have never recieved a virus if you never run an antivirus? so either you
a) dont have a computer (then all statements = true) or
b) you have your head up your ass (can i email you at your @micosoft.com work address?)
i have like a million analogies for this to p
Part of the story? (Score:2, Interesting)
Uh, ok.. so what is on port 3127?
We are not all so nerdly that we memorize port tables... (emphasis on ALL)
Re:Part of the story? (Score:5, Informative)
Re:Part of the story? (Score:5, Interesting)
I'm amazed that someone else hasn't already jumped on this hole. From the analysis I read, you just plonk two bytes down, and then pipe in the executable, and the victim machine runs it. I mean, nmap tied together with netcat would be enough to build an exploiter.
I am more amazed that neither SCO nor Microsoft didn't start tailing their http logs, and firing a disinfector back at hits that match the fingerprint of the ddos thread spool. I know, I know... hackback is bad, but in this case...
YLFIRe:Part of the story? (Score:4, Informative)
grep 3127 /etc/services
Hmm... (Score:4, Insightful)
MSN messenger? (Score:5, Interesting)
Re:MSN messenger? (Score:4, Informative)
-JackAsh
Not really MyDoom.C (Score:5, Insightful)
The MyDoom.C name used in links such as the ABC one is probably for good headlines
Question about this virus and its activity (Score:4, Interesting)
Seems to be doing some damage already. (Score:5, Interesting)
MyDoom.C's effects seem to already be felt. My girlfriend's been complaining that she can't get onto MSN all night, and sure enough messenger.msn.com is completely unresponsive, as was Hotmail a few hours ago (though, it seems to be up now). I wish I could just convince her to use Jabber.
No shutoff date? (Score:5, Interesting)
Re:No shutoff date? (Score:5, Interesting)
no backdoor (Score:5, Informative)
This version appears to be a very stripped down version of it's earlier cousins since it also doesn't leave a backdoor into infected machines
It doesn't open a backdoor, as TCP port 3127 is the port that the MyDoom.A and .B backdoor opens.
This isn't really a variant of the same virus as it only attacks machines already infected with MyDoom, rather than spreading via email.
Any legit use for 3127? (Score:5, Interesting)
Re:Any legit use for 3127? (Score:5, Funny)
Re:Any legit use for 3127? (Score:5, Informative)
-Rusty
Re:Any legit use for 3127? (Score:5, Insightful)
At home I have only ssh exposed to the world, and on a nonstandard port at that. From there I can ppp over ssh and do whatever I want. Fine for a home network at least.
Outgoing ports I only monitor logs from now and then, to make sure a virus/trojan didnt find its way on to my wifes, or one of the kids boxes.
Re:Any legit use for 3127? (Score:5, Funny)
Learn how to use the apostrophe key. Else you might get misunderstood.
Re:Any legit use for 3127? (Score:5, Informative)
Ideally a firewall is in a default deny state. That way you can open it up for things you know you need rather than missing something and having a hole into your LAN. If you followed that advice then you wouldn't need to worry about closing the port.
ISP firewalls vs. End-User or Company firewalls (Score:3, Interesting)
Re:Port 25 (Score:3, Insightful)
Re:Port 25 (Score:3, Interesting)
Great timing on this post (for me). I just got done reading how Microsoft has implemented RPC over HTTP in Exchange Server 2003. What next? Redirect ports 137-139 and 445 over HTTP to allow file sharing through corporate firewalls? :(
Re:Port 25 (Score:3, Insightful)
Re:Any legit use for 3127? (Score:5, Insightful)
If you're not using a specific port, close it up. That includes 3127. And everything below 3127, and everything above 3127. Close them ALL off except the ones you are specifically using.
Now I realize that this is extremely difficult to do in Windows, but do it anyway. Repeat, do it anyway. This is your responsibility as the owner of a node on the network. And don't think you're done just because you're secured the firewall. Secure all of your client systems as well. My company got hit hard by Blaster because someone walked into the lab with a laptop.
An idea revisited... (Score:3, Insightful)
Re:An idea revisited... (Score:3, Interesting)
This Internet isn't for me (Score:5, Insightful)
Aunt Bertha switches on her 2 GHz supercomputer, and hooks up to the Internet with a connection speed that would have rivaled an ISP in the early 1990's. She sees a pretty icon in her inbox, so she points and clicks, unleashing some spammer's [spamhaus.org] latest mass-mailing creation. By the time Bertha goes and gets a triscut, she has already spammed a million Internet neighbours.
Anyone else see why the Internet is full of crap? And if you think it's as easy to control as "blocking port 25" ... ha ha. You wish! The worm only has to send mail via the ISP's outgoing mail server (remember... the one you reminded me "I should be using" [google.ca])
So no, controlling this spam/virus menace isn't quite that easy. Whatever method you use to legitimately send mail, the worms will follow that same method.
Parasitic Viruses attacking My-Doom Infected Boxen (Score:5, Interesting)
Re:Parasitic Viruses attacking My-Doom Infected Bo (Score:3, Insightful)
You misspelled "dumbasses". (MyDoom doesn't exploit software weaknesses but idiot users who click on everything that looks like it could make funny noises when clicked.)
When will someone use this to their advantage? ... (Score:3, Interesting)
Regards,
Steve
i can see it now ... (Score:5, Funny)
Subject: Clickety-click!
Attachment:clickety.exe
Text:
Yeah, you know, the files you axed me for.
<SmallerFont>
By starting the attached file, you agree to: A) have remote administration software installed on your computer, B) allow that remote administration software to replicate to other computers as well, C) have a mail relay installed on your computer, D) have software that might conflict with the remote administration software (e.g. anti-virus software) disabled, E) you're not reading this anymore, are you? F) have updates to the remote administration software automatically installed, G) this text is so boring, H) even if that updates fundamentally alter the functionality of the software (e.g. DDOS the shit out of macrohard.com or dashslot.org) I) why not check out the nice file i sent you instead. J) you agree to never sue the author or distributor of this remote administration software for anything. K) no, really. the file is so nice - maybe it even makes funny sounds when you click it? L) neither anyone who uses your computer to send electronic mail, no matter what quantity or content.
</SmallerFont>
We all know, nobody reads those EULAs
Netcraft confirms it... (Score:5, Informative)
Re:Netcraft confirms it... (Score:3, Insightful)
That sad part is.. (Score:5, Insightful)
We can't give users restricted accounts becasue it stops them from doing things like installing valid software. But don't you think it is time we took steps to sandbox the email applications?
Macs are feeling it, too (Score:5, Interesting)
Right now, Macs are feeling the effects of this virus, too; it's slowing down internet connections for ALL platforms thanks to the fact that it's indiscriminately flooding networks with "noise" in trying to find other machines with the MyDoom-opened port. To my knowledge, it doesn't stop searching, either.
And a "counter-virus" would only make things worse. Sure, you eventually stop the original worm(s), but you also do more damage and risk opening up a can of worms in doing so. Not only is YOUR "counter-virus" going to add to the network congestion, but it may well become a problem itself if it's not written just right. In other words, the cure might be worse than the disease.
For the short term, we need an education campaign. Teach the standard (and sub-standard) users of the world how to identify a virus, how to prevent getting infected, and why they should care. As the old saying goes, "you can give a man a fish, and feed him for a day, or you can teach a man to fish and feed him for a lifetime."
~UP
It's an open source virus! (Score:4, Informative)
Doomjuice distributes source code for MyDoom.A [f-secure.com]
Making this one of the first high-profile open-source viruses?
<zealot cause="BSD">The first being a license rather than a piece of software, namely the GNU General Public Virus.</zealot>
eternal return (Score:5, Interesting)
Wonderful (Score:5, Funny)
So in other words, to prevent MyDoom from DDoSing Microsoft's website, Microsoft decides to DDoS themselves instead. What a wonderful world!
Head Explodes MS Security report by Gartner (Score:5, Insightful)
Re:Head Explodes MS Security report by Gartner (Score:3, Insightful)
Blaster on the other hand was a result of a security flaw in Windows.
crap (Score:5, Funny)
Maybe one day (Score:5, Insightful)
I know the ISP isn't untimately responsible for their users actions, but they'd be doing themselves a big favor by eliminating most of that traffic. During the heyday of the Blaster virus I was getting a few port 53 requests per second from infected machines on Verizon's dsl...that's quite an additional load on their network.
How about..... (Score:3, Funny)
Actually Microsoft should be advertising the fact that it is the best OS on the planet for virus development and deployment. It would look good on the Windows vs Linux propaganda.
Port 3127 (Score:5, Informative)
The writeup from Symantec is here. [symantec.com]
Wow, a virus that updates itself over the network (Score:4, Funny)
MyDoom.C - A critical update for the MyDoom virus is now available. This update fixes the flaw that prevented infected machines from launching DOS attacks at microsoft.com past the expiry date. Install this update if you need microsoft.com DOSing capabilities.
myDoom[a-z] (Score:4, Funny)
backscatter (Score:4, Interesting)
I couldn't care less if it weren't for the flood of "you sent us an infected mail" spam that has been flooding my inbox for days because some stupid morons don't know that auto-notifications on virus scanners should be smashes, crucified, cooked in hot oil and quartered before being shot through the head with a shotgun because all the recent viruses fake the damn sender address.
Re:backscatter (Score:3, Informative)
You realize, of course.... (Score:3, Funny)
The REAL ORIGINS of MyDoom (Score:3, Insightful)
After the release of MyDoom.A, there was more than a little speculation that the true hidden purpose of these e-mail worms was to spawn a network of zombied PCs to use for spamming. The 'A' version made it a little too obvious, even with the included red herrings of DoS attacks against SCO and MS. Uh oh. And now Mr. Spammer is getting a little antsy -- has the FBI made the same connection many in the infosec scene have? Uh oh. Time to cover your tracks.
What better way to do that than to release another version of your virus that throws all the investigations off the trail, looking for some OSS Loving Blackhat who'd want to DoS SCO instead of the criminal head of a spam gang trying to enlarge his empire?
And before anyone suggests I put on a tin foil hat...go gather some statistics. Specifically, make a chart of the release of e-mail worms, and another chart of the accuracy-rate of DNSBLs. You'll see, as I did, that as DNSBL accuracy reaches 100% (they contain all currently-zombied hosts), boom, out comes another e-mail worm. The release of MyDoom seems to have gone off poorly -- admins received warning and were prepared, not very many machines (relatively) were infected, and a lot of attention from the infosec community was directed at the source of the releases. I'm sure purely by coincidence, my DNSBL hit rate remains high, and spams by a certain well known individual who I believe to be responsible for this don't seem to be coming at nearly the volume one would expect from such a prolific scumbag.
Re:Dumbass alert (Score:2, Informative)
Did you happen to notice the part where it said This new variant apparently doesn't spread via e-mail but instead scans for machines with an open TCP port 3127?
Re:Dumbass alert (Score:4, Interesting)
I'm not sure what to think about this: How many times can you tell people never to open attachments until you just give up and accept that a certain casualty rate is to be expected? (As a sidenote -- I party blame Netscape and other email proggies that send forwards or replies as attachments rather than as inline quoted text. This makes uses accustomed to opening attachments).
Re:Dumbass alert (Score:4, Funny)
How could it be harmful if it says "I love you"?
Re:What about a CodeBlue variant? (Score:5, Interesting)
While it's a somewhat noble idea, in the real world it is just another pain in the ass.
Re:What about a CodeBlue variant? (Score:5, Funny)
Here it is!
Why dont I create a machine that will fix your car for you too, and mow your lawn, and take out your trash and solve that pesky virginity problem of yours?
Because thats why WOMEN were invented! They solve all of the worlds problems! Go away from your computer, and find a woman who will download the new anti-virus definitions for you and solve the rest of your problems!
Now to all the women out there: YES, I am avaliable, please send me your resume containing important skillsets outlined above.
(but seriously, I am going to die alone)
Re:Somebody please... (Score:5, Interesting)
The only way to find the computers with open ports is to scan them. And this is what is the big problem with the counterworms. They infect a host and go on the offensive, spewing as much traffic as the original infected host did, making us scratch our heads and wonder why.
I wish people would take the high road and let the losers who can't admin their way out of a paper bag wallow around in their own ignorance, but if you feel like you must absolutely write a counterworm, please, please, PLEASE make it only counterattack against boxes that are connecting to the host!
For example, instead of scanning for machines, simply lie in wait on a computer, and when something connects to you on 3127, then attack and clean that computer, and only that computer.
Re:Somebody please... (Score:4, Interesting)
A cool enhancement would be to leave a friendly worm on the recently cleaned computer for a while (say a couple days) that cleans any other machine that attacks it. This would have a much greater impact without any scanning.
No, NOT a Virus, just a scanner/cleaner (Score:3, Interesting)
Re:Why not use the MyDoom backdoor for virus remov (Score:3, Insightful)