lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <18211723468.20040129222413@tolna.net>
From: pappgeza at tolna.net (Papp Geza)
Subject: Mydoom: Perfect Storm Averted or Just Ahead?

Hello WolfgangK ,

2004. janu?r 29., 6:34:49, ?rtad:
Experience shows that programmers are quick to "improve" upon initial code,
modifying and releasing variants (note Sobig and now Mydoom.b -
http://www.computerworld.com/securitytopics/security/virus/story/0,10801,89494,00.html?SKC=news89494 ).

*************
Early information indicates that the new variant is likely spreading in the wild,
said Ken Dunham, director of malicious code at iDefense Inc., a security consulting
company in Reston, Va.

Dunham said the Mydoom.B worm modifies the standard hosts file in a Windows folder
that can block access to 65 Web sites, most of which are antivirus Web sites, in an
apparent attempt to block users from downloading antivirus solutions and data. 

?This new variant of Mydoom is worse than Mydoom.A,? Dunham said in a statement via e-mail.
?And an attack on the Microsoft.com Web site could cause a significant disruption of
services for users worldwide. It?s feasible that Mydoom.A computers are now being used to
help launch Mydoom.B, via the proxy setup supported by the worm. If this is the case,
Mydoom.B will likely become very prevalent in the wild in just a few short hours.? 

Although that doesn?t mean millions of computers are actually infected, it could mean millions
of e-mails harboring the worm are in the wild, Dunham said. 

He said computer users should be on guard for a succession of worm attacks this year.
?Undoubtedly, attackers are now mirroring the success of worms like Sobig to launch
successive attacks in 2004,? Dunham said.

>Describe specialist, you plead who.
 http://www.computerworld.com/securitytopics/security/virus/story/0,10801,894
94,00.html?SKC=news89494 )link.
************************************
Lesson learned - >read you:
1. Do not rest on your laurels, assuming your network has good
defense-in-depth ( Executables stripped away at Email server, Outlook
security patch installed)because the first wave didn't affect you.  The next
version could be modified with condition right to target your environment
and hit you with a perfect storm.

2.  It would be difficult for a malicious programmer, cyber terrorists or
cyber activists to target a specific environment and protect others ( Eg.,
launch denial of service against SCO.com because I like LINUX and don't like
SCO legal actions.  Protect my computer at Berkley.edu because I don't want
to effect my own Email.)  Programmers can easily modify code and launch an
attack against another environment.

Comments?
**************************
Karl,
>You write what, so that Sobig is and connection between the MydoomB - this is
>fancy only. MydoomA  other hardly B variant - but this deviates in bulk from Sobig.
>The variant from Sobig!s  worm gear represents also this header MydoomB  from one.src file.
?_3?r?|
J???'Vw_????5????;Cw?Ud??
"?pc?4??H-?{L?W??_???r?0?
J???5???[3???8?~?*S/?????z?t?.?^ES_?G?^%???v???????U?????(.????j????M7????}#?7?V??j??#?qI?!?X?????y?,'g??}??????u????????s??????????g?e?o0W???
n?c\&T?^??ki?|
HPCw???xh???r(K~sec??\?L
h_?n|H??V?!i?
?4gj???v???????D?
?$}8?k<,?[????????,k?A?/?????/)????????~?JJ?{?m?PBP??*?&??,?5\?????Wp5??T??*
??L??i??M?xW$y????)???I
?r???B???
v?R???si??.??I?t?QW??;V#X???Hv??NCqr??2??z1????v?,????[T9????v,__dz?????E????yG:nw`???5?$k??g?;6??I.O???b?Nz?3&h/I????r:v9????w?x????<7?a?9????
?4???
fU?????n?y^D????????7Q????>?r?Q??N2?
{P??z?n?????U?l?Ddw\,L?~T??I3?\*?d?yV$?UU?"!d?

-- 
?dv?zlettel,
  Geysap
  Network and Virussecurity from Hungary                            mailto:pappgeza@...na.net

www.gyik.com
"VIRUS CORE TEAM"
====================================
Fiat justitia, pereat mundus!
------------------------------------
we protect your digital worlds... 
====================================

















 

 



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ