101communications Longhorn Packed with Changes
ENT News at ENTmag.com
ENT News: Maximizing the Enterprise Windows Experience
Tuesday, January 27, 2004 

Advanced Search
ENT Newsline
Free subscription
to the 3x/week newsletter:




.. Home .. News .. Article
e-mail article  e-mail article
print article  printable format
comment on article  comment now

More News
read... Enhanced Security Tool Posted to Microsoft.com
read... Gartner: Windows 9.x Support Extension an Attempted Linux Deterrent
read... Microsoft Revenues Up, Profits Down
read... Salesforce.com Plugs into Microsoft Office
read... AppSense Makes the Most of Windows Servers

Special Report
read... Enterprise Instant Messaging

Related Articles
News Archive
 
News

MyDoom Spreads Rapidly, but Corporate IT Well Prepared

by Stephen Swoyer

1/27/04 — A new mass-mailing virus known as MyDoom or Novarg spread at a record-setting pace this week, but its rate of success was fairly low against corporate servers already hardened against similar attacks.

The new mass-mailing virus, also known as Worm_MiMail.R, first appeared in the wild Monday afternoon, and has since proliferated at a furious pace. Anti-virus vendor Symantec Corp. reports that Novarg is already more active than the summer’s most notorious mass-mailer, SoBig.F.

“With SoBig, we saw 1,800 submissions in a single day,” said Oliver Friedrichs, a senior manager with Symantec Security Response, in a conference call Tuesday morning. Friedrichs said that Symantec had logged 2,500 Novarg submissions in just 18 hours, at a rate of about 150 per hour.

-- advertisement --

At the same time, Friedrichs said, only 9 percent of submissions were from corporate accounts.

There’s good reason for that, says Russ Cooper, editor of the NT Bugtraq listserve and surgeon general with security consultancy TruSecure. “Most [companies] are intercepting this stuff as it comes in [with spam gateways] or restricting access to attachments, or ideally doing both,” he says. “You can do one or both, but you can’t afford to do neither.”

Ray Zorz, a network administrator with an advocacy group based in the Southwest, reported a heavy load of Novarg-related e-mail traffic in the hours after the new mass-mailer first appeared. "Fortunately my Sybari Antigen AV software seems to be catching them, primarily because I filter out the various file extensions like .scr and .pif. So far I do not believe it's affecting my end users, and like all virus outbreaks, I just hope to weather the storm.”

Bryan Lucas, an Exchange administrator with Texas Christian University, says that neither Novarg or its predecessor, Bagle, Bagel or Beagle, have had much impact, if any, in his environment. “The Bagel/Beagle virus and this new Doom virus have been of very little impact to us. With so many viruses, we, like so many other businesses have had to harden our mail systems. It takes a pretty clever virus to get through,” he says.

Lucas says blocking common attachments is the difference between safely riding out or foundering in a mass-mailing storm. “Bagel, like this new MyDoom both depend on an executable file attachment. We block .exe's along with another 20-30 file extensions. That offers us a fair amount of protection until our anti-virus vendors release their definitions.”

Like other mass-mailers, Novarg infects a system by means of a malicious attachment, which appears as a .zip file – although there’ve been accounts that it also appears as a text file. Once it infects a system, Novarg typically copies itself into the Windows\System folder (as TASKMON.EXE), to the Windows Desktop (as Document.scr) and into a share folder associated with the Kazaa file-sharing service (activation_crack.scr). Novarg propagates by scanning local files, including HTML files and the databases associated with popular contact management software, for e-mail addresses.

In addition, Friedrichs reports, Novarg opens a back door on TCP ports 3127 through 3198. “[It] allows other people [to] come in and connect to an infected system,” he explains. “They can actually send programs and other files up to the infected system and have them execute, that exposes the infected system to further attacks, [because] anyone can come into one of these infected systems, install another Trojan or another program, and take control.”

A malicious attacker can also exploit the Novarg back door to relay spam. “There’s certain commands that this backdoor accepts, by issuing those commands, someone can cause the infected system to open up a network connection to any arbitrary host on any arbitrary port,” he says.

The virus also has a political motive. It is programmed to launch a denial-of-service attack against the SCO Group Inc., the company that mounted a full-on legal attack on Linux on intellectual property grounds. That DoS attack is scheduled to start Feb. 1 and run through Feb. 12.

Symantec and most other vendors issued virus updated definitions Monday night, although some are still working on Novarg clean-up tools. Virus experts say that while there’s certain to be some damage at the enterprise level from the latest mass-mailer – there is, after all, some lag time between when a virus first appears and anti-virus vendors issue updated virus definitions -- its impact can be minimized if administrators simply follow the best practice of restricting access to most if not all attachments, including .zip files and .txt files.

“I had an e-mail from one individual who says … that there are business reasons that you need executable attachments, which I just don’t accept, there’s no valid business reason anymore, especially when you take into account the damage that these [mass-mailers] can cause,” says TruSecure’s Cooper.

Cooper doubts that Novarg is a big problem in the enterprise, noting that it typically spreads by exploiting common first names – i.e., “John,” “Peter,” or “Mary” – appended to a destination domain name. “The reason that this thing is getting legs is possibly the result of … a machine that had previously been trojaned and was being used for spam production, and then gets this, and meanwhile it’s got a huge list of addresses that this can exploit,” he says.

You can contact Stephen about "MyDoom Spreads Rapidly, but Corporate IT Well Prepared" at mailto:swoyerse@yahoo.com?Subject=MyDoom Spreads Rapidly, but Corporate IT Well Prepared.

Related Articles:
There are no related articles at this time.

Current ENT News user comments for:
MyDoom Spreads Rapidly, but Corporate IT Well Prepared
No postings yet.

ADD YOUR COMMENT BELOW:
name: (optional) location: (optional) e-mail: (optional)
comment about MyDoom Spreads Rapidly, but Corporate IT Well Prepared
 
top

Sponsored Links:
DevDays2004 Is Coming: Register before 2/10 for just $75. Click Here.
Free Download: Real-Time Monitoring of Exchange Server from TNT Software
Free GOexchange DEMO: Prevents Disasters, Repairs Problems, Accelerates Performance
Great Moments at Work with: Microsoft(R) Office System
3 days of Spam Fighting Strategies: The Anti-Spam Summit – March 17-19
More hands-on, technical sessions: TechMentor New Orleans, April 4-8

Click here to download the MCP TechMentor PDF Brochure

Resource Guide
Essential information for evaluating Microsoft's operating system in the enterprise.
Free Download
about ENT | archives | contact us | job search | news | newsletters | products | polls | special reports
search | site map | media kit | press releases | resources | ENT home | RSS Feeds ENT News RSS Feeds
comments to mailto:editor@entmag.com?Subject=ENTmag_Comments | contact ENT at 1300 Virginia Drive, Suite 401, Fort Washington, PA 19034
copyright 1996-2004, 101communications LLC | see our privacy policy