Microsoft deflecting Mydoom.B DoS attack

The company said it's well prepared for the expected DDoS attack

Microsoft Corp. today said it had yet to be affected by a Mydoom.B worm-induced distributed denial-of-service (DDoS) attack, which antivirus software companies predicted would be fairly easy for the software company to fend off.

Unlike The SCO Group Inc.'s site, which has been assailed by a denial-of-service (DoS) attack from Mydoom.A worm since Sunday and continues to fight off attacks from both the A and B variants of the Mydoom worm (see story), "everything on the Microsoft site seems to be working fine," a Microsoft spokeswoman in the U.K. said.

The Mydoom.B worm is similar to the Mydoom.A worm but contains an added DoS attack against Microsoft's Web site and a feature that blocks access to antivirus Web sites on infected machines.

According to the code in the worm, the DoS attacks against SCO, a Unix vendor based in Lindon, Utah, are scheduled to continue through Feb. 12.

Microsoft has classified the second variant of the worm as a moderate threat and said it has been well prepared for the DDoS attack, which it expected to begin on Sunday, the spokeswoman said.

"Although Microsoft is unable to discuss the specific remedies it is taking to prevent the reported DDoS attack, we are doing everything we can to ensure that Microsoft properties remain fully available to our customers," the company said on its Web site. "Microsoft is aggressively working with our Virus Information Alliance partners to help protect customers from this outbreak."

The Mydoom.B worm is generally considered by leading antivirus software companies and e-mail security firms to be less effective than Mydoom.A at propagating itself and causing widespread damage to computer systems. London-based Sophos PLC today said it has received very few reports of computers actually infected by Mydoom.B.

The small number of reports of Mydoom.B suggests that the attack on Microsoft will fail, according to Graham Cluley, senior technology consultant at Sophos.

"There was only about a day's separation between Mydoom.A and Mydoom.B, so it's my guess that the real target of the virus writer was SCO, while an attack against Microsoft was something of an afterthought," Cluley said. "When it comes to being able to spread itself, Mydoom.B didn't get as lucky as Mydoom.A, which still poses a significant threat."

Although both SCO and Microsoft are offering rewards of $250,000 each for information leading to the arrest and conviction of the person or persons responsible for creating and releasing the two versions of the Mydoom worm, Cluley sees little chance the money will lead to an arrest.

"It is a long shot, to be honest, but bounties or rewards don't do any harm either and may actually discourage virus writers in the future as it shows companies are serious about catching those responsible," Cluley said. "If virus writers know there is a strong cash incentive for someone to grass them up, they may think twice about unleashing a virus."

Copyright © 2004 IDG Communications, Inc.

It’s time to break the ChatGPT habit
Shop Tech Products at Amazon