malicious code in history, causing the greatest epidemic ever seen. It is








Panda Software Outlines Mydoom.A: timeline of an epidemic



Glendale, CA, February 02, 2004 - Mydoom.A is the fastest spreading

malicious code in history, causing the greatest epidemic ever seen. It is

now estimated that over half a million computers around the world have been

infected, including many thousands of businesses.


In fact, 1 in 4 e-mails in circulation -a total of more than 8 million-

have been infected by this worm.


Financial losses caused by Mydoom.A are incalculable. Last Thursday (Jan

29), CNN estimated that due to loss of productivity and costs of tech

support, the damage could reach 250 million dollars. More information at:

http://money.cnn.com/2004/01/28/technology/mydoom_costs/index.htm.


The mi2g consultancy firm has estimated losses caused by this virus at 38.5

billon dollars.


And the costs of the Mydoom.A epidemic could continue to increase as the

worm is designed to continue spreading until February 12. The rates of

propagation have in fact remained constant with even the occasional

increase.


To help users better understand the situation, Panda Software has published

a timeline of the Mydoom.A epidemic since it first appeared.


Tuesday January 27.


The antivirus laboratories first detected the presence of the new worm. At

the same time, tech support services began to receive the first incidents

–almost continuously- in several countries around the world. Because of

this, and as the worm itself was being analyzed and the antidote created, a

red alert was declared.


The procedure for detecting a virus may be simple to explain, but it is no

simple task. First and foremost, you need the malicious code itself. There

are various sources. One of these is antivirus users sending suspicious

files, either due to their own worries or because the heuristic scan engine

has identified the file as suspicious.


IT experts then reverse engineer the virus code. They discover the internal

code and the functions of the virus. At the same time, in an isolated

network, several computers are infected. These test computers are set up to

record how the virus behaves and its ability to spread.


Once this information is gathered, a ‘vaccine’ is generated. This involves

finding an identifier or ‘signature’ for the virus and creating a mechanism

for disinfecting it. This data is used to create an update to the

antivirus, and is made available to users through the website.


Panda Software quickly made the antidote to Mydoom.A. available to its

users.


However, there are still many computers without adequate, updated,

antivirus protection. This meant that Mydoom.A spread unchecked. The worm

is designed to spread rapidly via e-mail.


For this reason, in order to stop Mydoom.A’s explosive propagation, Panda

Software offered all users its free PQremove tool, which detects and

eliminates Mydoom.A from infected computers and restores any changes this

worm has made to the system configuration. This utility can be downloaded

from http://www.pandasoftware.com/download/utilities.


Mydoom.A however continued to spread rapidly, infecting numerous computers,

and gradually confirming its place in history as one of the worst viruses

ever.


Antivirus companies continued to warn users of the dangers, in particular

to companies, as they are the chief target of the worm. Some companies were

even reporting that their antiviruses were blocking up to 3,000 e-mails

infected by Mydoom.A. trying to enter the network.


Estimates indicated that there were more than a million and a half e-mails

infected by the worm in circulation, and up until then more than 150,000

computers around the world had been affected.



Wednesday January 28.


The Mydoom.A worm was still spreading rapidly. Latest statistics indicated

that one in every twelve e-mails in circulation was carrying this malicious

code. This figure significantly exceeds that reached by Sobig.F (1 in every

17) last summer and which, up until the previous day, was considered the

fastest spreading virus ever.


According to data collected by Panda Software’s online antivirus, Panda

ActiveScan, Mydoom.A had infected six times more computers than Bugbear.B,

the second virus most frequently detected.


Similarly, it was estimated that 300,000 computers worldwide, including

thousands of companies, had been infected by Mydoom.A.


Towards the end of the day, Mydoom.B appeared, a dangerous variant

programmed to prevent antivirus applications from updating. The number of

incidents caused however was not significant.


Thursday January 29.


Mydoom.A was still spreading rapidly. One in every five e-mails was

carrying this worm, making four million infected e-mails currently in

circulation. “Mydoom.A is not reaching higher rates because of the security

measures that companies have adopted after being infected”, explained Luis

Corrons, director of PandaLabs. “But” he added “it isn’t stopping either,

as it is now hitting companies without protection that survived the first

wave of infected messages.”


According to data collected by Panda Software’s online antivirus, Panda

ActiveScan, Mydoom.A had infected six times more computers than Bugbear.B,

the second most frequently virus detected. Corporate environments around

the globe were hit the hardest by Mydoom.A, and for this reason, the number

of infected computers reached 400,000.


Friday January 30.


The number of infections caused by the Mydoom.A worm seemed to have

stabilized, but, it still caused almost six times more infections than

Downloader.L, the second virus most frequently detected by Panda

ActiveScan. An estimated 500,000 computers worldwide –mainly in corporate

environments- had been infected by this malicious code. This demonstrated

the magnitude of the activity of this worm, as even though hundreds of

thousands of companies had already cleaned their computers, others were

still being infected.


However, this worm was still spreading and there were 8 million infected e-

mails in circulation, this meant that one out of every four e-mails was

carrying the Mydoom.A worm.


As company activity was interrupted for the weekend, the epidemic is

expected to cool off on Saturday. However, on Sunday, February 1, the worm

was due to launch a distributed denial of service (DDoS) attack against

SCO, in order to prevent users from accessing its website.


However, the fact that this worm’s activity was expected to drop off didn’t

mean that users could drop their guard. Mydoom.A creates a backdoor in

infected computers that allows unauthorized accessed to malicious users. In

fact, a large amount of activity was detected on the Internet involving

hackers looking for computers infected by Mydoom.A, which are therefore

vulnerable to attack.


For this reason, Panda Software still advised users to install and set up

firewalls. By doing this, they could prevent DDoS and hacker attacks,

neutralizing the effects of this worm.


Saturday January 31.


As business activity slowed down, the epidemic slackened off, although the

number of infections caused by Mydoom.A was still high.


Sunday February 1.


Mydoom.A started to launch its distributed denial of service attack (DDoS)

against the web page of SCO. The web page became unavailable to users.


Monday February 2.


Despite a slight respite in activity over the weekend, the number of

incidents remains high. As the working day began, Mydoom.A kicked back into

action again in countries like Japan.


On a worldwide level, the number of infections caused by Mydoom.A is more

than five times that caused by Downloader.L, the second most frequently

detected by Panda ActiveScan. And as business activity resumes across the

world, incidents are on the increase again.


As with the previous day, SCO’s website is out of action.


THE PROPAGATION OF MYDOOM.A


With respect to Mydoom, measuring the rate of propagation is relatively

simple with no need to use external detections. This virus searches for e-

mail addresses in the affected computer, but in order to send e-mails, it

needs to work out the name of the e-mail server used for each mail. To do

this, it tries different combinations of SMTP server addresses, hoping that

one will work.


This behavior however causes a disproportionate increase in attempts to

resolve names in DNS servers. An observation of statistics generated in

root servers gives an insight into virus incidence.


The graph below shows activity in DNS servers administered by RIPE (Reseaux

IP Europeéns) over the last week, (rejected name resolutions).


It shows that the number of rejected requests is much higher than normal.

This is due to attempts to resolve non-existent names.


However the number of queries received, although there is an increase,

doesn’t reflect the same growth as those refused:


In the week prior to the appearance of the virus, there were never more

than 5.5 million requests, when the virus began to spread, it reached 7

million, less than double. However rejected queries increased more than 100

times.


|MYDOOM.A TECHNICAL CHARACTERISTICS: |

|Mydoom.A is a worm that will spread until February 12 2004 via e-mail |

|in a message with variable characteristics and through the peer-to-peer|

|(P2P) file sharing program KaZaA. |

|The message carrying Mydoom.A has the following characteristics: |

|a)Sender: Never the real one. Mydoom.A spoofs the e-mail address from |

|which is sent, obviously leading to confusion. |

| |

|b) Subject: one of the following: |

|test; hi; hello; MailDelivery System; Mail Transaction Failed; Server |

|Report; |

|Status; Error |

|c) Message text: one of the following: |

|Mail Transaction Failed.   Partial message is available. |

|The message contains Unicode characters and has been sent as a binary |

|attachment. |

|The message cannot be represented in 7-bit ASCII encoding and has been |

|sent as a binary attachment. |

| |

|d) Attached file: both the extension and the file name are variable. |

|Possible names: |

|DOCUMENT ; README ; DOC ; TEXT ; FILE; DATA; TEST; MESSAGE; BODY. |

|Possible names: |

|PIF; SCR; EXE; CMD; BAT; ZIP. |

|The file can sometimes have a double extension. If this is the case, |

|the first will always be one of the following: HTM, TXT or DOC. |

|Mydoom.A also carries out a distributed denial of service (DDoS) attack|

|against http://www.sco.com if the system date is between the 1st and |

|12th of February 2004. To do this it launches GET/ HTTP/ 1.1 requests |

|every 1024 milliseconds. |

|On February 12, 2004, the worm finishes its payload, ending its |

|execution whenever it is activated. |

|Mydoom.A downloads a file called SHIMGAPI.DLL, creating a backdoor |

|which opens the first TCP port available between 3127 and 3198. This |

|backdoor allows an executable file to be downloaded and run, and acts |

|as a proxy which could give the hacker remote access to network |

|resources. |

|Infection by Mydoom.A is easy to recognize as, when it is run, it opens|

|the Windows notepad (NOTEPAD.EXE) and displays garbled text. |

|It also creates two files. One of these, TASKMON.EXE, contains a copy |

|of the worm. The other is called MESSAGE and contains the text |

|displayed in Notepad when the worm is first run. |

|Mydoom.A creates several Windows registry entries to ensure it is run |

|every time the machine is started up |

|Mydoom.A spreads via e-mail and the peer-to-peer application KaZaA. |

|1.- Propagation via e-mail. |

|Mydoom.A spreads in the following way: |

|It reaches computers in a file attached to an e-mail. When the file is |

|run, the computer is infected. |

|Once the computer is infected, Mydoom.A searches for addresses in files|

|with the following extensions: HTM, SHT, PHP, ASP, DBX, TBB, ADB, PL, |

|WAB and TXT. |

|Mydoom.A sends itself to all addresses it finds and to all contacts in |

|the Windows address book, using its own SMTP engine. To do this it |

|tries to open an SMTP session and connect itself to mail servers, by |

|adding the following prefixes to the domain of the target address: |

|gate., mail., mail1., mx., mx1., mxs., ns., relay., smtp. |

| |

|2.- Propagation via KaZaA. |

| |

|Mydoom.A does the following: |

|- It creates copies of itself in the shared directory of KaZaA. These |

|copies have a variable name, which consists of a random file name and a|

|random extension: |

|Possible file names: WINAMP5, ICQ2004-FINAL, ACTIVATION_CRACK, |

|STRIP-GIRL-2.0BDCOM_PATCHES, ROOTKITXP, OFFICE_CRACK, NUKE2004. They |

|can have the following extensions: PIF, SCR, BAT, EXE.  |


Panda Software advises users to update their antivirus solutions, if they

haven’t already done so. The company has already made the updates to its

products available to its clients to ensure their solutions can detect and

eliminate Mydoom.A. Even though Panda Software’s products can be

automatically updated every day, those whose software is not configured to

update automatically, should update their solutions from

http://www.pandasoftware.com/.

Panda Software has also released its PQremove tool which detects and

eliminates the Mydoom.A.worm from infected computers and restores any

changes this worm has made to the system configuration. This utility can be

downloaded from http://www.pandasoftware.com/download/utilities.


Panda Software also offers users its free, online tool Antivirus Checker,

which will inform you of the protection status of your computer. This tool

specifies whether an antivirus is installed, which one and if it is

updated, and therefore keeping the computer safe from viruses. Antivirus

Checker is available at: http://www.pandasoftware.com/protected.


Users can also detect this and other malicious code using the free, online

antivirus, Panda ActiveScan, which is available on the company’s website at

http://www.pandasoftware.com/.


More detailed information on Mydoom.A is available from Panda Software’s

Virus Encyclopedia.


About PandaLabs


PandaLabs works round the clock in search of new viruses and threats that

could appear in any corner of the globe or that are sent in by users who

have found suspicious files. The PandaLabs team immediately scrutinizes

every malicious code they receive, analyzing its characteristics and

behavior. After completing these tasks, they develop detection and

disinfection routines, which are then distributed, every day, to the users

of Panda Software's antivirus products. As a result, the multinational's

solutions against malicious code are always armed against any threat,

however recent it may be. More information about PandaLabs is available at

http://www.pandasoftware.com/virus_info/pandalabs.

.


For more information:

Alan Wallace

[email protected]

Tel. (818) 543-6909