Preview

The Mydoom virus

Good Essays
Open Document
Open Document
953 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Mydoom virus
The Mydoom virus (also known as a worm and as Win32.Mydoom.A) was a very damaging computer virus that affected Microsoft Windows-based computers. The worm was spread through mass emailing, disguised as badly sent email.
Design and infection The virus was made to be sent in an email with an attachment that carried the virus. When the attachment was opened, the virus would download itself to the computer. The virus can only affect Windows based computers. The virus came with a package that would spam the SCO Group website. SCO had caused arguments within the Linux community for getting copyrights in some open source software. However, only 25% of the infected computers would launch the attack. After the virus has been downloaded, it leaves the computer open to other malware by leaving a "backdoor" open.
History
The virus was found to be a threat on January 26, 2004. The virus quickly spread and proved a threat to the SCO group. To try and get the public to catch the maker of the virus, the SCO group offered $250,000 U.S. dollars as a reward for catching the creator. Another type of the virus, Mydoom.B was found on January 28. Because it was made to attack the Microsoft web site, Microsoft offered a $250,000 U.S. dollar reward if the maker of the virus was caught. This was the third time Microsoft offered a reward for catching a virus creator. On February 1, 2004, the virus downed the SCO group site with many denial-of-service attacks. On February 3 the virus attacked the Microsoft site and little damage was caused.

26 January 2004: The Mydoom virus is first identified around 8am EST (1300 UTC), just before the beginning of the workday in North America. The earliest messages originate from Russia. For a period of a few hours mid-day, the worm's rapid spread slows overall internet performance by approximately ten percent and average web page load times by approximately fifty percent. Computer security companies report that Mydoom is responsible for

You May Also Find These Documents Helpful

  • Good Essays

    Us Vs Arabo Case Study

    • 459 Words
    • 2 Pages

    This was causing disruption to the operations of major online retail businesses, data backup, and companies that provide communications, banks, and information services to the medical and pharmaceutical industries resulting in severe attacks of their corporate websites, internet access, data-storage, e-mail and disaster-recovery systems. The infected computers also targeted students at two college campuses in Pennsylvania and Massachusetts. Based on what I found in my research, an estimate of $504,000 in financial losses resulted from these…

    • 459 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    |Instant messaging worms – A worm that can replicate it’s self and uses the user’s buddy list and address book on an instant messaging application to |…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Nt1330 Unit 1 Essay

    • 601 Words
    • 3 Pages

    What makes the W32.Sality particularly nasty is that it can infect executable files on local, removable, and shared drives. W32.Sality is known as an (EPO) or entry point obscuring polymorphic file infector. Essentially, it’s a sophisticate worm-like virus that ensures its survival by downloading other malware and disabling security software. One of the most damaging features of the W32.Sality virus is how it decentralizes peer to peer networks with sophisticated code instruction that populates the network with infected computers. (W32.Sality.,…

    • 601 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Email worms – A worm that can attach itself to a computer system when a user open’s an unknown attachment in an email.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The article also identified the threat as a Pony Botnet Controller that captured and compromised over two million accounts. The possibilities of these types of threats are very real as experienced by many websites during this incident. One of the best ways to try and combat these type threats is to keep your patches and antivirus up to date, which was also mentioned in this article. According to a CNN Money article on this incident, the below website accounts were compromised during this event (Pagliery J, 2013).…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    For the .725 Ransomware virus to be spread, the makers may send vindictive records acting like legitimate email attachments. While each of the records other…

    • 235 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    * This virus can duplicate itself to no end. It will send itself ro everyone in your address book appearing as an email sent from your email address.…

    • 669 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Enforcing rules through software that monitors and records IM conversations, and also through disciplinary action.…

    • 5657 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A worm can deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Good Essays

    When it comes to viruses and the types that get put onto your computer there are many of them. For example: the Trojan Horse, it is put into your computer by saying it is good for file converting or cleaning a system out, when it is really putting bad programs into your computer along with spyware and other potentially harmful programs. Just like when you go into your email and you see an…

    • 783 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Discussion question

    • 1527 Words
    • 7 Pages

    Screen shot of the detailed view of the 1st infection "";"C:\Helix\IR\RAM\win32dd\win32dd.sys";"Trojan horse Hider.JI";"Moved to Virus Vault"…

    • 1527 Words
    • 7 Pages
    Good Essays
  • Good Essays

    according to Morris, gauge the size of the Internet. Morris served no jail time, but…

    • 272 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    • A COMPUTER VIRUS is a computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged. • Creating and disseminating computer viruses is one of the most widespread types of cybercrimes. Tens of thousands of new viruses or modified versions of old viruses are released each year. • Viruses normally attempt to hide within the code of a host program to avoid detection. Viruses, by definition, have a method to spread themselves. • Any computing device such as a smartphone, notebook, netbook, or iPad can be infected with a virus. Even your car, which now contains embedded computer systems, could catch a virus, especially if it connects to the Internet for software updates.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.…

    • 787 Words
    • 3 Pages
    Good Essays

Related Topics