Free Essay

Mydoom Worm

In:

Submitted By DAStevenson
Words 809
Pages 4
Running head: Malicious Code

MyDoom Worm
Daniel Stevenson
11/22/2013
ITT-Tech North Las Vegas

Abstract
In this paper I will be detailing the Mydoom worm and what this has done to computer systems as well as what was the steps in how to prevent or remove this hazard from your computer.

MyDoom Worm
No one wants a virus on their computer, especially when it means that you may be spending money to remove these nasty pests from your system. There are all sorts of things that can infect your computer from viruses, worms, rootkits that make your computer into a puppet and also malicious spam ware and malware. All of these things can wreak havoc on your network. In this paper I will tell you about a worm that still has the record for being the fastest spreading virus. This virus is known as W32.MyDoom@mm. This worm has other names but this is the one that it is most known by.
The Beginning
MyDoom was a worm that came to the public eye at the beginning of 2004. Finnish security company F-Secure named is the worst virus to date because of the way it quickly infested users emails and quickly attached itself to any email that was going out that had an attachment. When the worm first came into the spotlight F-Secure stated that the worm was on 20-30% of the worldwide internet traffic. Another company that screens emails for companies, MessageLabs, also stated that it had intercepted the worm more than 3.4 million times at a rate of every 1 in 12 emails at its highest. This was faster than the ILOVEYOU bug that was found in the year 2000 which spread its way around the world, unfortunately, sharing its love.
The Inside
There are different types of viruses. Some are passively waiting on your computer until a time comes that they are activated. Other will open holes in your system so it can invite more friends in to party on your network and slow you down. Lastly you think of viruses that are active and aggressive, chewing on bits of data or even taking a bite out of your hard drive or memory trying to bog you down. MyDoom was the aggressive type and was made to go after certain programs that would enable it to be shared, unwittingly, by people who were just trying to email friends, family, and co-workers. This virus would copy itself onto the computer and from that location would look for a way off through email. Once it was on though it would go and open up TCP ports 3127 through 3198 which could allow hackers or more malicious content onto your computers or network. Once that process was complete the virus was known to start Denial of Service attacks (DoS).
The Solution The solution that was made to stop the worm from spreading was about a 6 step process: 1. Turning off the Windows Restore Point – this is because if you try doing a restore point it may restore a part of the virus/worm and it will still be on your computer. 2. Update your virus definitions – To catch anything that is new or even some old ones you should regularly update your virus definitions so that you do not fall victim to a virus or worm. 3. Restarting the computer in VGA or Safe Mode – By turning the computer on in Safe Mode you are starting only the minimum amount of resources for it to run. This way if the virus or worm is attached to something even in the registry it may not be in use because of what is running in Safe Mode. 4. Scan for infections with your Anti-Virus – Your Anti-Virus should be running in Safe Mode , if not you should start it and scan for infections on your system. Some files that are infected may have the W32.Mydoom.A@mm attached to it. 5. Deleting Files from the registry – This can be a very scary thing because if you delete a file from the registry by accident than you will have to install the operating system all over again. So choose the infected file carefully and delete it. So delete the line saying: Taskmon"="%System%\taskmon.exe 6. Reregistering the Webcheck.dll file – by typing in regsvr32 webcheck.dll this will remove any modifications that may load the virus.

Bibliography
CNet News. (n.d.). Retrieved November Friday, 2013, from CNet: http://news.cnet.com/2100-7349_3-5149764.html
Macafee. (2003-2013). Retrieved November Friday, 2013, from Macafee Home: http://home.mcafee.com/VirusInfo/VirusProfile.aspx?key=131207#none
Symantec Corporation. (1995-20013). Symantec. Retrieved November Friday, 2013, from http://www.symantec.com/security_response/writeup.jsp?docid=2004-012612-5422-99&tabid=3

Similar Documents

Free Essay

Introduction to Computer Security

...malicious computer worm that spread rather quickly and affected thousands of people and targeted a company in Utah. I will discuss how the worm spread in detail. Lastly, I will discuss how to prevent / defend against such worms. On January 26, 2004 MyDoom, also known as W32.MyDoom@mm, Novarg, Mimail.R and Shimgapi was a computer worm that affected Microsoft Windows (wildammo.com, 2010). MyDoom in 2004 had set the record for spreading the fastest through email. It was said to be started by e-mail spammers through junk mail being sent. That was one way the worm was sent. MyDoom was also sent out as failure sent messages. One of the messages that MyDoom had sent out was “Andy; I’m just doing my job, nothing personal, sorry.” (wildammo.com, 2010). With messages such as that and sent failure / system error messages, one whom was not knowledgeable of such worms would foolishly open it. These messages including but not limited to the one mentioned above brought suspicion to a lot of people and it was believed that the maker of the worm was paid. To date, the author of MyDoom is not known. It is thought though that MyDoom was created in Russia by a programmer (wildammo.com, 2010). In the result of MyDoom globally internet access had slowed down immensely and had affected the access of several websites. Once the MyDoom worm infection begun, it would search for random addresses then send itself. Also upon loading MyDoom, it would launch ...

Words: 622 - Pages: 3

Free Essay

Princiles of Security

...Matthew Quillman (username: matthew.quillman) Attempt 1 Written: Sep 20, 2015 4:55 PM - Sep 20, 2015 5:44 PM Submission View Question 1 2 / 2 points An overflowing of water into a data center can cause direct damage to all or part of the information system. A) True B) False Question 2 2 / 2 points A mail bomb is a form of DoS. A) True B) False Question 3 2 / 2 points A timing attack involves interception and analysis of cryptographic elements to determine keys and encryption algorithms. A) True B) False Question 4 2 / 2 points A firewall is a device that keeps certain kinds of network traffic out of a private network. A) True B) False Question 5 2 / 2 points Two watchdog organizations that investigate allegations of software abuse: SIIA and NSA. A) True B) False Question 6 2 / 2 points ____ is an integrated system of software, encryption methodologies, and legal agreements that can be used to support the entire information infrastructure of an organization. A) SSL B) PKI C) PKC D) SIS Question 7 2 / 2 points Acts of ____ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter. A) bypass B) nature C) trespass D) security Question 8 2 / 2 points There are generally two skill levels among hackers: expert and ____. A) novice ...

Words: 669 - Pages: 3

Free Essay

Pump Parts

...De Montfort University | ENGD1019 -Computer Aided Engineering – Assignment 3 | | P. J. Prickett 3/27/2014 | Solid models of all the components 1 1 The following dimensions have been put into place to ensure that the depth of the ridges are kept the same. Doing this will reduce all forms of likelihood of any abnormalities occuring when the driver worm is connect to the gear. 3 3 Here are the three stages of the creation of the driver worm. A sketch round the x axis of 360 degrees was drawn followed by a mirror bein created by the datum plane for the seep that was to be made. 2 2 The exact same steps were repeated in this stage, the only differences being a few dimensions and a change in the directions of the sweeps. To be more specific the difference in this case between the plane and the sweep was 6, this was to ensure that the heical sweepes were at an eaqual distance from each other in order for the two distances to stay equal when the overall size is changed. Doing this removes the likelhood of any mechanical issues. 5 5 4 4 3 3 2 2 1 1 Each of the 5 parts shown above are all derived from the centre of circles. Because they are each from the same centre circles they all then contain associativity from the same cross section of planes. 4 4 3 3 2 2 1 1 These are the creation and extrudes on the sides of the casing the bottom one is in a fixed position right at the bottom...

Words: 1097 - Pages: 5

Premium Essay

On-Line Security: Attacks and Solutions

...EVREN KUCUKKAYA E-COMMERCE SEMINAR Elias A. Hadzilias, PhD NTUA Assignment: On-line security: attacks and solutions 2012 ISG – INTERNATIONAL MBA Table of Context 1. INTRODUCTION ................................................................................................................................... 3 2. MAIN TYPES OF MALWARE ................................................................................................................. 4 2.1. Computer Viruses ............................................................................................................................. 4 2.1. Computer Worms ............................................................................................................................. 5 2.3. Trojan Horses.................................................................................................................................... 6 2.4. Spyware ............................................................................................................................................ 6 2.5. Backdoor........................................................................................................................................... 6 2.6. Spams ............................................................................................................................................... 7 2.7. Keyloggers ....................................................................................................

Words: 5692 - Pages: 23

Free Essay

Broccoli

...about waist height and workers don’t have to bend over as much. A common pest on broccoli is Cabbage worms. These pests are the larvae of moths and butterflies. The word broccoli comes from the Latin word brachium and the Italian word braccio, which means “arm”. Broccoli is a high-quality vegetable for fresh use and is one of the more popular frozen vegetables. Broccoli is highly nutritious and has been deemed an anti-cancerous food by the American Cancer Society. This vegetable is a good source of Vitamin A, calcium, and Vitamin B2. Broccoli has to be grown on well drain soil pH should be 6.0 to 6.5. Omar Alejo ABT-92 Outline 4/6/2014 Broccoli How Is It Grown 1. Introduction a. Broccoli Is good for your health b. Broccoli is a part of the cabbage family. c. It has been shown to fight cancer cells in lab tests 2 Soil Quality a. Soils that are well-suited for the production of broccoli are fertile b. Well drained c. Have texture ranging from sandy loam to clay loam d. Soil pH should be 6.0 to 6.5 e. Organic soil does not require such a high pH 3. Irrigation a. Irrigate 1 to 1 1/2 inches of water per week b. Broccoli requires above average moisture c. When moisture is lacking it responds with slow growth and poor appearance. 4. Insect that attack Crop a. Several species of caterpillars attack broccoli b. Cabbage loopers c. Imported cabbage worm d. Diamondback moth, the cabbage...

Words: 473 - Pages: 2

Free Essay

Worms

...ABSTRACT This minor research report is about the computer worm which is a self-navigating malicious program that is being utilized by many attackers to damage the target machine substantially. This report begins by giving an idea of what exactly is computer worm, then we discuss about the mechanism which this malicious code uses to attack the target machine, then we discuss about the various worms which have been discover and design till now, an overview is given about this worm infects the system and the exten to which these worms have cause damage. After that we discuss various prevention tools which are design to detect and eliminate such worms. In the end we discuss about the future potential worms and predicted what kind code will be written and how much damage it can cause to system or network. INTRODUCTION Everyone, almost everyone and every big organization like bank, pharmaceutical companies, and retail chain companies uses computer these days to do most of the important work so it is understood that their computer will contain certain sensitive information which they do not want to disclose, and as result such kind of information need security, and the term information security was introduced. In this minor research paper we discuss about one malicious code which is a serious threat to such information called WORM. A computer worm is a kind of malicious program which has the capability of reproducing itself and uses computer network to distribute throughout...

Words: 2891 - Pages: 12

Free Essay

It 240 Week 8

...Define each of the following terms in your own words: Boot sector File Multipartite Macro Trojan horse E-mail worms Instant messaging worms IRC worms File-sharing networks worms Internet worms * Explain how each virus or worm functions and spreads. Determine in which category the threat you researched in Week Seven belongs. Your response must be between 200 and 300 words. A boot sector threat is a type of virus that infects host computers by writing the malicious code to the boot sector of the drive that’s infecting. This method of infiltration ensures that whenever the infected volume attempts to boot, the virus will boot first. File threats are virii that attach themselves to executable program files such as .exe files. After being run, the virus then effects other programs as they attempt to run, or infect the entire directory or volume in which they’ve been introduced. A multipartite threat is a threat with attributes of both boot sector and file viruses. These types of threats can spread from the MBR or boot sector to infect executable programs, or spread from a single file to infect the boot sector. A macro is a type of formula language used in complex tasks in software such as Microsoft word or excel. These threats are capable of assigning multiple key commands to one action . Macros infect systems through a document file type and infect he host once the file is accessed. A Trojan Horse threat is a threat that presents itself as a legitimate...

Words: 644 - Pages: 3

Premium Essay

It590 Journal 4

...Unit 4 Journal Jasmine Battle IT 590 – Kaplan University 11/27/2013 Unit 4 Journal In Unit 4, I learned how hacking have become a huge issue with technology in today’s society. I learn three ways to capture someone username and password. You can do that by eavesdropping, dumpster diving, and social engineering. People are also hacking into users’ networks. Sidejacking is a way where hijackers capture a user cookie. I learned in details more about malware. Malware consists of virus, worm, and spyware. Viruses are a code that has been added or embedded into another application. Worm is a self-contaminated program which can spread throughout the network. Spyware is a program that communicates over the internet without user’s consent. I learned the difference between phishing and spear-phishing. Phishing is when a large scale of information is capture from various computer users. Spear-phishing is when they go through email address to select a particular group of recipients to target. I learned that you can still make money even when you are a cyber-criminal. However, it is kind of a good choice to make to give to companies that are looking for a protection shield. I had already learned about online voting which could be a quicker way to save time on manual counting. In conclusion, I have learned a variety of information that could carry me forward with my education of learning something new every time. Knowing that you can become a hacker and not charge for a crime...

Words: 273 - Pages: 2

Premium Essay

Project Part 1: Current Security Threats

...IS4560 Week 4 Project Part 1: Current Security Threats The three top security threats I have chosen for Aim Higher College are malware, exploit vulnerabilities, and social networking. Malware in another term that means malicious software. It is used to infiltrate and damage computers without the user’s permission. Some examples of malware are viruses, spyware, worms, Trojans, and rootkits. This is a top security threat because a computer can easily get infected. While students or staff members use the schools computers, they can download music or pictures, and a virus can be attached to those and the computer will get infected right away. Another security threat is exploit vulnerabilities. An exploit is an attack on a computer system, and this exploit will take advantage of vulnerabilities that exist on a system. This is why vulnerabilities need to be mitigated and taken care of right away. If not, attackers will always find a way to get on a system and steal data and personal information. This will affect students because there personal information but be out there to the public without their knowledge. The third threat that I believe is a main concern for this college is social networking. Nowadays everyone uses social networking such as Facebook, Twitter, and etc. The scams on Facebook include cross-site scripting, clickjacking, survey scams, and identity theft. Cross-site scripting is when the site tricks you to go to another webpage and this has hidden malware that...

Words: 326 - Pages: 2

Free Essay

Sec 280 Week 4

...information backed up somewhere you practically wont be able to retrieve your information. There are techniques that these attackers use to access information on your system. Potential security threats start with people; people who create these threats are to blame. These people are called hackers and predators. Hackers and predators create security threats and malware. They are computer programmers who use these security threats and malware to victimize other people by breaking into their systems to steal, change or destroy information. This is known as cyber-terrorism. Due to these hackers and predators computers are vulnerable at any time. These people create things like. Computer virus threats, Spyware threats, Phishing threats, Internet Worms, Rootkit, Zombies, Browser Hijacker, Email Virus, Mousetrapping, Spam, and Adware. Out of all the computers security threats out there the most well known is computer virus threats. The virus is a program that alters how a computer operates. The virus replicates and executes itself, this usually does damage to your computer. Spyware threats are an undercover cop in a way because it monitors your online activity or it can install software without your permission to gain personal information. It does all that without you even knowing. Phishing threat is when a hacker attempts to steal information through email or instant messaging. They send emails or instant messages that look real to people or businesses. The hackers attempt to steal...

Words: 734 - Pages: 3

Free Essay

Malicious Code

...includes virus, worms, Trojan programs, and logic bombs, the focus of this paper will concentrate on the comparison of viruses and worms. I will also examine the question as to weather of not non-Microsoft operating systems as less prone to virus threats. Malicious code threats are primarily programmed to create havoc or major problems within the computing and networking environment. Exploitation of internet based services and applications are probably the hardest hit because of the increase in everyday usage and the unfamiliarity of threat countermeasures of many users. Virus and other malicious are created only to create problems; nothing more. There are various levels that indicate the proficiency in developing or writing the program for viruses. These levels range from low skilled students to program researchers who have acquired many years of experience in developing their programming skills. The researchers are the group that introduces highly complex and sometimes anti-virus resistant code into computing/networking systems. Although they differ, most users do not distinguish virus and worms; the term virus is simply used by some as a catch-all for both threats. A virus is basically a self-replicating program that causes damage by attaching itself to files. Normally, A virus is spread to various computers through human actions, particularly files sharing and email. Worms are similar to virus in some respect but they are more sophisticated in nature. Worms are often referred...

Words: 490 - Pages: 2

Free Essay

Checkpoint Week 8

... The world of technology is threatened each day by malicious viruses and worms that can cripple an entire company. I will explain how each virus or worm functions and spreads through computer systems. Boot Sector - is a virus that is spread by floppy disk. The disk is left in the drive with the virus and will spread to the C: drive during the next boot sequence. File – is a virus that corrupts the computers executable files on a network. When the file is opened, the virus overwrites it and causes damage to the infected file. Multipartite – is a virus that uses the boot sector to move quickly, infecting both the boot sector and the executable files at the same time. This makes the virus very dangerous because just by turning on the computer, the virus latches onto the hard disk and broadcasts malicious payloads throughout the program files. Macro – is a virus that affects files that contain macro codes in them that is interpreted by an application. They are commonly spread by electronic emails. Trojan horse – is a program that seems to be functioning normally but has a hidden malicious virus in it, and by accessing the system or computer, can corrupt the authorizations. Email worms – is a worm or virus that is spread through email. They are usually sent as an attachment or spread inside the body of an email. Instant Messaging Worms – or IM Worm, is a self replication malicious code that is spread by using instant messaging networks...

Words: 420 - Pages: 2

Free Essay

Alienation

...life who has given me the strength, courage, and inspiration in completing this assessment. I would also like to thank my teacher who has helped me in every step of the way. I would also like to thank my friends and family, specifically my parents who has provided the necessary resources needed to complete this assessment and also in giving me the ongoing encouragement and assistance. Once again I say thank you. WATER BOURNE DISEASES HOOKWORM Hookworm is an intestinal parasite of humans. The larvae and adult worms live in the small intestine can cause intestinal disease. The two main species of hookworm infecting humans are Anclostoma duodenale and Necator americanus. Hookworm eggs are passed in the faeces of an infected person. If an infected person defecates outside (near bushes, in a garden, or field) or if the faeces from an infected person are used as fertilizer, eggs are deposited on soil. They can then mature and hatch, releasing larvae (immature worms). The larvae mature into a form that can penetrate the skin of humans. Hookworm infection is transmitted primarily by walking barefoot on contaminated soil. One kind of hookworm (Anclostoma duodenale) can also be transmitted through the ingestion of larvae. Itching and a localized rash are often...

Words: 2608 - Pages: 11

Free Essay

Advantage and Disadvanatge of Modern Tec

...Unemployment With the advancement of technology business processes have become more streamlined. This creates job redundancy , downsizing and out sourcing For example: In a factory, skilled technicians and machinists can be replaced by computer-controlled robots which can work faster, for longer and more consistently Before a company employed many typist and now can be replaced by a sigle person with a word processor Privacy Though information technology made communication quicker , easier and more convient it also brought along privacy issues. From cell phone signal interception to email hacking . Microchip dust – also known as smart dust can be virtually embedded in everything that we buy, wear, drive and read, allowing retailers and law enforcement to track consumer items — and, by extension, consumers — wherever they go, from a distance. Overriding Cultures While ICT may have made the world a global village, it has also contributed to one culture consuming another weaker one. For example, it is now argued that teenagers in the US influence how most young teenagers all over the world now act, dress, and behave. Languages too have become overshadowed, with English becoming the primary mode of communication for business and everything else. Reliance on Technology People technology to remember things and less use of their own memory, the poorer it becomes People don’t bother learning to spell because they use spell-checker, or need a calculator do perform minor...

Words: 319 - Pages: 2

Premium Essay

Unit 1 Assignment 1 Application of Risk Management Techniques

...In accordance with each of the threat/vulnerability pairs and their likelihood of occurrence, each of the possible risk will be listed below and how we will mitigate each: -Malware This can occur because of outdate virus protection and lack of employee knowledge. The best mitigation for this would be to update the current virus protection program and allow for constant updates through the firewall for updates for each program. -Equipment Failure This will occur when equipment isn’t maintained properly or just failure over time. This will lead to data loss due to not backing up data. The best way to mitigate this issue would be to back up data regularly and keep copies of all data to an off-site location. -Denial of Service Attacks This can occur when proper firewall and intrusion detection systems are not properly implemented. Mitigation for this would be to implement firewalls along with intrusion detection systems and monitor all traffic accordingly. -Users Users themselves that are not properly trained and kept on check can cause major damage to a company’s network. Lack of access control and giving out admin privileges to all users is dangerous. Mitigation for this issue can be implemented by add access controls and authentication parameters. In this brief report, I have included all of the possible threats and vulnerabilities and have proposed solutions for each. Upon researching and studying on probable causes of concern for you company’s assets, I have...

Words: 251 - Pages: 2