Preview

The Mydoom virus

Good Essays
Open Document
Open Document
953 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Mydoom virus
The Mydoom virus (also known as a worm and as Win32.Mydoom.A) was a very damaging computer virus that affected Microsoft Windows-based computers. The worm was spread through mass emailing, disguised as badly sent email.
Design and infection The virus was made to be sent in an email with an attachment that carried the virus. When the attachment was opened, the virus would download itself to the computer. The virus can only affect Windows based computers. The virus came with a package that would spam the SCO Group website. SCO had caused arguments within the Linux community for getting copyrights in some open source software. However, only 25% of the infected computers would launch the attack. After the virus has been downloaded, it leaves the computer open to other malware by leaving a "backdoor" open.
History
The virus was found to be a threat on January 26, 2004. The virus quickly spread and proved a threat to the SCO group. To try and get the public to catch the maker of the virus, the SCO group offered $250,000 U.S. dollars as a reward for catching the creator. Another type of the virus, Mydoom.B was found on January 28. Because it was made to attack the Microsoft web site, Microsoft offered a $250,000 U.S. dollar reward if the maker of the virus was caught. This was the third time Microsoft offered a reward for catching a virus creator. On February 1, 2004, the virus downed the SCO group site with many denial-of-service attacks. On February 3 the virus attacked the Microsoft site and little damage was caused.

26 January 2004: The Mydoom virus is first identified around 8am EST (1300 UTC), just before the beginning of the workday in North America. The earliest messages originate from Russia. For a period of a few hours mid-day, the worm's rapid spread slows overall internet performance by approximately ten percent and average web page load times by approximately fifty percent. Computer security companies report that Mydoom is responsible for

You May Also Find These Documents Helpful

  • Satisfactory Essays

    |E-mail worms – A worm that spreads through the user of the user’s email account(s). |…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Nt1330 Unit 1 Essay

    • 601 Words
    • 3 Pages

    The number two web based attack of 2009 was the Microsoft Internet Explorer ADODB.Stream Object file installation weakness. This exploit accounted for 18% of the total number of web based exploits for the year.This vulnerability allows hackers to install malicious files on a vulnerable computer when a user visits a website hosting an exploit. In…

    • 601 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Email worms – A worm that can attach itself to a computer system when a user open’s an unknown attachment in an email.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The article also identified the threat as a Pony Botnet Controller that captured and compromised over two million accounts. The possibilities of these types of threats are very real as experienced by many websites during this incident. One of the best ways to try and combat these type threats is to keep your patches and antivirus up to date, which was also mentioned in this article. According to a CNN Money article on this incident, the below website accounts were compromised during this event (Pagliery J, 2013).…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Us Vs Arabo Case Study

    • 459 Words
    • 2 Pages

    This was causing disruption to the operations of major online retail businesses, data backup, and companies that provide communications, banks, and information services to the medical and pharmaceutical industries resulting in severe attacks of their corporate websites, internet access, data-storage, e-mail and disaster-recovery systems. The infected computers also targeted students at two college campuses in Pennsylvania and Massachusetts. Based on what I found in my research, an estimate of $504,000 in financial losses resulted from these…

    • 459 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The Montgomery Bus Boycott was successful because of the buses’ dependence on the African American community, the protest’s copious amount of supporters, and the demonstrators’ nonviolent practices. Despite the fact that many of them were segregated, the buses in the South heavily relied on the African Americans for their source of income. A majority of the people who boarded the buses and paid the fares were blacks. Specifically, according to the president of the Women’s Political Council, Jo Ann Robinson, African Americans made up three-fourths of the riders (Document B). Therefore, removing this large portion of the revenue would greatly hinder the public transport. The Montgomery Bus Boycott did exactly that. The protest called for people to refuse riding in segregated buses to express the dependence that the bus companies had on…

    • 326 Words
    • 2 Pages
    Good Essays
  • Good Essays

    * This virus can duplicate itself to no end. It will send itself ro everyone in your address book appearing as an email sent from your email address.…

    • 669 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Enforcing rules through software that monitors and records IM conversations, and also through disciplinary action.…

    • 5657 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    When it comes to viruses and the types that get put onto your computer there are many of them. For example: the Trojan Horse, it is put into your computer by saying it is good for file converting or cleaning a system out, when it is really putting bad programs into your computer along with spyware and other potentially harmful programs. Just like when you go into your email and you see an…

    • 783 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Armin Greder’s The Island is a picture book that explores the negative concepts of ‘belonging’ through instances of alienation and judgement. The text presents symbols and metaphors that can be applied to universal social issues, particularly the migrant experience. Although the tone of the text is ultimately pessimistic, there are suggestions of Christian ideals such as sharing, caring for the less fortunate and having a clear conscious. The text also not only discusses an outsider’s perspective of not belonging, but also the negative aspects of belonging to a group or community.…

    • 568 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    For the .725 Ransomware virus to be spread, the makers may send vindictive records acting like legitimate email attachments. While each of the records other…

    • 235 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    Falls can be problematic for people of all ages, especially for the elderly. Falls are the second most common adverse event within the healthcare system (Quigley, 2006). Falls can result in serious injury and even death. Falls can be costly and most are preventable. Nearly one-third of older adults have experienced a fall, and about one in ten have resulted in a hospital stay due to injury (www.cdc.gov, n.d.). Older adults are more prone to falls and injury than other patients due to their age and accompanying illness (American Society of Registered Nurses…

    • 1077 Words
    • 5 Pages
    Best Essays
  • Good Essays

    A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Good Essays

    according to Morris, gauge the size of the Internet. Morris served no jail time, but…

    • 272 Words
    • 2 Pages
    Good Essays

Related Topics