Most Read Technology Reporter For More Than Two Decades

Maureen O'Gara

Subscribe to Maureen O'Gara: eMailAlertsEmail Alerts
Get Maureen O'Gara: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


SCO Hit with DoS Attack; Penguinistas Thought Responsible

SCO Hit with DoS Attack; Penguinistas Thought Responsible

The SCO Group, an industry pariah since it sued IBM alleging that it misappropriated SCO's Unix trade secrets and put them in Linux, says it experienced a massive denial of service (DoS) attack last Friday that consumed 90% of its ISP's available bandwidth, about 150 Mbps, the equivalent of about 100 T1 circuits.

SCO's ISP termed the attack "large" and "extremely well-orchestrated." It thinks the perpetrator or perpetrators put a BOT or worm on a compromised machine that loaded the worm on "hundreds of other machines" and they all hit at once.

The ISP has reportedly identified 138 different machines as the intermediate source, but could not identify the original source. The ISP, which declined to say what operating system or systems were on the infected machines, characterized the attack as the second largest it has ever encountered.

The FBI's Cyber Crimes Division in Salt Lake City was brought in and SCO says the US Attorney's Office is also investigating.

Late last week SCO publicly started putting a little meat on the bones of its charges and claimed that Linux is "riddled" with its Unix IP. It alleged that a comparison of Unix and Linux source code has turned up a "significant" number of lines of SVR5 in Linux - in the kernel, in associated files and in add-on files. There are also supposed to be "substantial" instances of barely redacted lines of Unix code in Linux. SCO said it's still not sure yet how big the piracy is.

SCO said in a statement that it is "examining whether a link exists between SCO's legal action and some of the Linux community who are hostile toward SCO for asserting its legal rights."

SCO is promising to prosecute. "Unfortunately," it said, "some programmers who disagree with SCO's corporate policies have ignored the seriousness of cyber terrorism. This was a mistake on the part of the people involved, because we will prosecute them to the fullest extent of the law and will do everything possible to assure that justice is done for the commission of this crime."

Linuxgram is published weekly by G2 Computer Intelligence Inc. 323 Glen Cove Ave.; Sea Cliff, NY 11579, USA;
Tel: 516 759-7025 - Fax: 516 759-7028

Send press releases to: [email protected]
Subscription price per year: $195/£140 individual reader.
Corporate Subscription available at quantity discounts. E-mail: [email protected]

(c) Copyright 2003 G2 Computer Intelligence, Inc.

More Stories By Maureen O'Gara

Maureen O'Gara the most read technology reporter for the past 20 years, is the Cloud Computing and Virtualization News Desk editor of SYS-CON Media. She is the publisher of famous "Billygrams" and the editor-in-chief of "Client/Server News" for more than a decade. One of the most respected technology reporters in the business, Maureen can be reached by email at maureen(at) or paperboy(at), and by phone at 516 759-7025. Twitter: @MaureenOGara

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.