SlideShare a Scribd company logo
2
Most read
3
Most read
5
Most read
By: Jerade Bucher
Summary: Mydoom was named by Craig Schmugar, an employee of computer security firm McAfee and one of the earliest discoverers of the worm. Schmugar chose the name after noticing the text “mydom” within a line of the program's code. He noted:  “It was evident early on that this would be very big. I thought having 'doom' in the name would be appropriate.” Mydoom is primarily transmitted via e-mail, appearing as a transmission error, with subject lines including “Error”, “Mail Delivery System”, “Test” or “Mail Transaction Failed” in different languages, including English and French. The mail contains an attachment that, if executed, resends the worm to e-mail addresses found in local files such as a user's address book. It also copies itself to the “shared folder” of peer-to-peer file-sharing application KaZaA in an attempt to spread that way. Mydoom avoids targeting e-mail addresses at certain universities, such as Rutgers, MIT, Stanford and UC Berkeley, as well as certain companies such as Microsoft and Symantec. The worm's rapid spread slowed down overall internet performance by approximately ten percent and average web page load times by approximately fifty percent.
Summary(Cont…) The virus can be prevent by not opening the e-mail and its attachment. 26 January 2004:  Mydoom.A is identified in North America. 12 February 2004:  Mydoom.A is programmed to stop spreading. However, the backdoor remains open after this date.  28 January 2004:  Mydoom.B is created. This time it is a direct attack on Microsoft.com 1 March 2004:  Mydoom.B is programmed to stop spreading; as with Mydoom.A, the backdoor remains open. The only thing they knew was that the virus originated from Russia. Many people in the U.S and other countries were affected.(Didn’t find a specific number)
My Opinion Overall, I think the impact was economic. The first version of the worm affected any average person who received and opened the e-mail, but the second version and other versions after affected specific companies like Microsoft. Since it slowed the internet, which is used in many countries in the world, I would definitely call that an economic impact.
My Opinion(Cont…) Since I couldn’t find anything about what the creator of Mydoom was thinking, I would say he wanted to have a little bit of fun. Although he probably knew it was illegal, he most likely created it to entertain himself. It’s probably not the only thing he could have done, but who knows.  If you were to get this virus on your computer you should follow these steps or download one of the programs that were released to do get rid of it for you. 1. Restart your computer. 2. Press F8 after the Power-On Self Test (POST) is done. If the  Windows Advanced Options Menu  does not appear, try restarting and then pressing F8 several times after the POST screen.  3. Choose the Safe Mode option from the Windows Advanced Options Menu then press Enter. 4. Open Registry Editor. Click Start>Run, type REGEDIT, then press Enter.  5. In the left panel, double-click the following: HKEY_LOCAL_MACHINE>Software>Microsoft> Windows>CurrentVersion>Run 6. In the right panel, locate and delete the entry:  •  JavaVM="%Windows%\java.exe"   •  Services=“%Windows%\services.exe"   (Note: %Windows% is the default Windows folder, usually C:\Windows or C:\WINNT.)
Resources: http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MYDOOM.M&VSect=Sn http://antivirus.about.com/cs/allabout/a/mydoom.htm http://en.wikipedia.org/wiki/Mydoom

More Related Content

PDF
CNIT 129S: Ch 6: Attacking Authentication
PPTX
A5: Security Misconfiguration
PPT
Types of attacks and threads
PPT
Network security cryptographic hash function
PDF
OWASP Top 10 A4 – Insecure Direct Object Reference
PPTX
Intrusion detection
 
PPTX
Authentication
PPTX
Application security
CNIT 129S: Ch 6: Attacking Authentication
A5: Security Misconfiguration
Types of attacks and threads
Network security cryptographic hash function
OWASP Top 10 A4 – Insecure Direct Object Reference
Intrusion detection
 
Authentication
Application security

What's hot (20)

PPT
Hacking web applications
PPTX
Web application attacks
PPTX
Security Policies and Standards
PPTX
Ciphers and codes
PPTX
Web Exploitation Security
PPTX
Password Policy and Account Lockout Policies
PPT
PPTX
iOS Application Static Analysis - Deepika Kumari.pptx
PDF
OWASP Top 10 Web Application Vulnerabilities
PPTX
Network security
PPT
Chapter 5 Planning for Security-students.ppt
PPSX
Sessions and cookies
PDF
Stuxnet
PPTX
Block Cipher
PPTX
What is Asymmetric Encryption? Understand with Simple Examples
PPTX
Subnet Masks
PDF
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
PDF
Brute Force Attack Security Use Case Guide
PPS
Security testing
PPT
Secure code practices
Hacking web applications
Web application attacks
Security Policies and Standards
Ciphers and codes
Web Exploitation Security
Password Policy and Account Lockout Policies
iOS Application Static Analysis - Deepika Kumari.pptx
OWASP Top 10 Web Application Vulnerabilities
Network security
Chapter 5 Planning for Security-students.ppt
Sessions and cookies
Stuxnet
Block Cipher
What is Asymmetric Encryption? Understand with Simple Examples
Subnet Masks
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
Brute Force Attack Security Use Case Guide
Security testing
Secure code practices
Ad

Viewers also liked (17)

PDF
Rediscovery Collection Veneer Close Ups 11.08
PDF
JF Burguet - ERP Experiences
PPTX
汉语桥招商
PPT
project 4
PDF
Alliance door mid2 mod web 1.28.14
PDF
Rediscover Doors 11.08
PDF
Alliance Door | Eight Star Invitational Golf Tourney
POT
impact of color in political advertisements
PDF
French Door 1.18.13 web version
PPT
Chuẩn bị sản xuất ở Công ty Cổ phần May Hai
PDF
Lynden Door | VanAir Door Ventilated Architectural Door web 5.8.15
PPTX
Microdata semantic-extend
PPT
Changing Earth
PPT
User Experience as an Organizational Development Tool
PPTX
In-tic Coruña mayo 2011
PDF
LD Res Bro Web Dec 11 2013
PPT
chamba rumal
Rediscovery Collection Veneer Close Ups 11.08
JF Burguet - ERP Experiences
汉语桥招商
project 4
Alliance door mid2 mod web 1.28.14
Rediscover Doors 11.08
Alliance Door | Eight Star Invitational Golf Tourney
impact of color in political advertisements
French Door 1.18.13 web version
Chuẩn bị sản xuất ở Công ty Cổ phần May Hai
Lynden Door | VanAir Door Ventilated Architectural Door web 5.8.15
Microdata semantic-extend
Changing Earth
User Experience as an Organizational Development Tool
In-tic Coruña mayo 2011
LD Res Bro Web Dec 11 2013
chamba rumal
Ad

Similar to My Doom Worm (20)

DOC
Web virus activity
PPT
Information of Virus
PPT
How Computer Viruses Work
PPTX
Computervirus
PPT
Computer Malware and the examples of anti-virus
PDF
La1 information and communication technology and society
PDF
Learning area 1 information and communication technology and society
PDF
Learning area 1_-_information_and_communication_technology_and_society
DOCX
Mydoom virus
PPTX
Computer Security 101
DOCX
COMPUTERS ( types of viruses)
PPT
Virus and antivirus
PPTX
computer virus presentation
PPT
Virus, Worms And Antivirus
PPTX
Computer virus (Microsoft Powerpoint)
PDF
Viruses and antiviruses
PDF
Computer crimes
PPTX
Computer virus
PDF
The process of computer security
PPT
Web virus activity
Information of Virus
How Computer Viruses Work
Computervirus
Computer Malware and the examples of anti-virus
La1 information and communication technology and society
Learning area 1 information and communication technology and society
Learning area 1_-_information_and_communication_technology_and_society
Mydoom virus
Computer Security 101
COMPUTERS ( types of viruses)
Virus and antivirus
computer virus presentation
Virus, Worms And Antivirus
Computer virus (Microsoft Powerpoint)
Viruses and antiviruses
Computer crimes
Computer virus
The process of computer security

Recently uploaded (20)

PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Cloud computing and distributed systems.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
KodekX | Application Modernization Development
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Big Data Technologies - Introduction.pptx
Empathic Computing: Creating Shared Understanding
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
20250228 LYD VKU AI Blended-Learning.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation theory and applications.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Cloud computing and distributed systems.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation_ Review paper, used for researhc scholars
Spectroscopy.pptx food analysis technology
Programs and apps: productivity, graphics, security and other tools
Digital-Transformation-Roadmap-for-Companies.pptx
Spectral efficient network and resource selection model in 5G networks
KodekX | Application Modernization Development
“AI and Expert System Decision Support & Business Intelligence Systems”
Network Security Unit 5.pdf for BCA BBA.
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

My Doom Worm

  • 2. Summary: Mydoom was named by Craig Schmugar, an employee of computer security firm McAfee and one of the earliest discoverers of the worm. Schmugar chose the name after noticing the text “mydom” within a line of the program's code. He noted: “It was evident early on that this would be very big. I thought having 'doom' in the name would be appropriate.” Mydoom is primarily transmitted via e-mail, appearing as a transmission error, with subject lines including “Error”, “Mail Delivery System”, “Test” or “Mail Transaction Failed” in different languages, including English and French. The mail contains an attachment that, if executed, resends the worm to e-mail addresses found in local files such as a user's address book. It also copies itself to the “shared folder” of peer-to-peer file-sharing application KaZaA in an attempt to spread that way. Mydoom avoids targeting e-mail addresses at certain universities, such as Rutgers, MIT, Stanford and UC Berkeley, as well as certain companies such as Microsoft and Symantec. The worm's rapid spread slowed down overall internet performance by approximately ten percent and average web page load times by approximately fifty percent.
  • 3. Summary(Cont…) The virus can be prevent by not opening the e-mail and its attachment. 26 January 2004: Mydoom.A is identified in North America. 12 February 2004: Mydoom.A is programmed to stop spreading. However, the backdoor remains open after this date. 28 January 2004: Mydoom.B is created. This time it is a direct attack on Microsoft.com 1 March 2004: Mydoom.B is programmed to stop spreading; as with Mydoom.A, the backdoor remains open. The only thing they knew was that the virus originated from Russia. Many people in the U.S and other countries were affected.(Didn’t find a specific number)
  • 4. My Opinion Overall, I think the impact was economic. The first version of the worm affected any average person who received and opened the e-mail, but the second version and other versions after affected specific companies like Microsoft. Since it slowed the internet, which is used in many countries in the world, I would definitely call that an economic impact.
  • 5. My Opinion(Cont…) Since I couldn’t find anything about what the creator of Mydoom was thinking, I would say he wanted to have a little bit of fun. Although he probably knew it was illegal, he most likely created it to entertain himself. It’s probably not the only thing he could have done, but who knows. If you were to get this virus on your computer you should follow these steps or download one of the programs that were released to do get rid of it for you. 1. Restart your computer. 2. Press F8 after the Power-On Self Test (POST) is done. If the Windows Advanced Options Menu does not appear, try restarting and then pressing F8 several times after the POST screen. 3. Choose the Safe Mode option from the Windows Advanced Options Menu then press Enter. 4. Open Registry Editor. Click Start>Run, type REGEDIT, then press Enter. 5. In the left panel, double-click the following: HKEY_LOCAL_MACHINE>Software>Microsoft> Windows>CurrentVersion>Run 6. In the right panel, locate and delete the entry: • JavaVM="%Windows%\java.exe" • Services=“%Windows%\services.exe" (Note: %Windows% is the default Windows folder, usually C:\Windows or C:\WINNT.)