Feeds

MyDoom and Netsky cause chaos

Viral plagues pillage and burn

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

MyDoom.F and Netsky.C have been sweeping across the Internet, deleting files, hijacking PCs and apparently attacking the Microsoft and the RIAA Web sites.

Self-propagating e-mail bug MyDoom.F, which emerged last Friday, has been corrupting digital entertainment files and Microsoft Office documents. It also uses the host computer to launch a distributed denial of service (DDoS) attack against the Web sites of both Microsoft and the Recording Industry Association of America (RIAA). The RIAA, a lobbying group for the music industry, has drawn the hostility of computer users since it began suing on-line song swappers last year.

PandaLabs, which produces the Panda ActiveScan anti-virus software, said that Netsky.C reaches computers in an email message whose subject, message body and attached file are selected at random from a long list of options. When the attached file is run, Netsky.C copies itself to all the disk drives on the computer under the name WINLOGON.EXE.

The bug spreads by sending itself out to all e-mail addresses it finds in files with extensions such as .eml, .txt, .php, .htm, .wab and .msg. It does this using its own SMTP engine, the programme required to send emails between computers.

The worm also copies itself under a wide range of names to all the folders on the computer whose name contains the sequence of letters "shar." By doing this, it can also spread through file sharing applications like KaZaA.

© ENN

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.