A new e-mail worm is spreading rapidly on the Internet, clogging e-mail servers and staging an attack on the Web site of Unix vendor The SCO Group Inc., antivirus software vendors said.
The worm surfaced Monday and has been given several names by antivirus software vendors, including Mydoom, Novarg and Mimail.R. Experts don’t all agree on the worm’s payload, but they do agree that it is spreading faster than Sobig-F, the worm that topped the charts for the most widespread email worm last year.
“It has been moving very quickly for the past three hours and has been generating a hell of a lot of e-mail,” Vincent Gullotto, vice president of the Anti-Virus Emergency Response Team at Network Associates Inc., said Monday afternoon. Some businesses have shut down their e-mail gateways to block the worm, he said.
This worm has taken off like a rocket, with well over 20,000 interceptions within just two hours of it being discovered, Ken Dunham, director of malicious code at Internet security company iDefense Inc., said in a statement via e-mail.
The worm arrives as an e-mail with an attachment that can have various names and extensions, including .exe, .scr, .zip or .pif. The e-mail can have a variety of subject lines and body texts, but in many cases it will appear to be an error report stating that the message body can’t be displayed and has instead been attached in a file, experts said.
“This is something you might see from a mail system, so you click on the attachment,” said Sharon Ruckman, senior director for Symantec Corp. Security Response.
Both Network Associates and Symantec agree that when the attached file is executed on Windows-based systems, the worm scans the system for e-mail addresses and starts forwarding itself to those addresses. If the victim has a copy of the Kazaa file-sharing application installed, it will also drop several files in the shared files folder in an attempt to spread that way.
Symantec also identified more malicious acts. The worm will install a “key logger” that can capture anything that is entered, including passwords and credit card numbers, Ruckman said. Furthermore, the worm will start sending requests for data to www.sco.com, the Web site of The SCO Group, which could result in the Web site going down if enough requests are sent, she said.
SCO has noticed that its Web site performance has intermittently slowed, but it is too early to say if there is an attack on the site, said SCO spokesman Blake Stowell. “It may be showing the early stages of a DOS attack,” he said. SCO has enraged the open source community by claiming that the Linux operating system contains software that violates SCO’s intellectual property, and has been the subject of various attacks on its Web site.
Antivirus software vendors urge users to update their antivirus software and be careful when opening e-mail attachments. “If you’re not expecting an e-mail, don’t open it,” Symantec’s Ruckman said.
Network Associates’ Gullotto expects the worm to keep causing headaches for a while. “It will be a couple of days before we’re going to get to the point that it won’t have any impact. It has a full head of steam, there are hundreds of thousands of e-mails and we may see well into the millions (of e-mails), and possibly hundreds of thousands of machines infected,” he said.