Most Read Technology Reporter For More Than Two Decades

Maureen O'Gara

Subscribe to Maureen O'Gara: eMailAlertsEmail Alerts
Get Maureen O'Gara: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


SCO & Microsoft Post Bounties of $250,000 Each on the Head of MyDoom Author

SCO & Microsoft Post Bounties of $250,000 Each on the Head of MyDoom Author

The SCO Group is offering a $250,000 reward for information leading to the arrest and conviction of the person or persons responsible for unleashing the MyDoom e-mail virus. Microsoft followed suit and is offering $250,000 for the capture and conviction of the MyDoom.b vandal.

SCO CEO Darl McBride's people say it's a check he really wants to write.

Starting Monday afternoon and quickly turning into a tsunami, MyDoom, a mass mailer that requires recipients to open a zip file, has clogged e-mail servers with as many as 1,000 junk e-mails a minute, bringing systems to their knees and slowing down the Internet generally. It impacted Windows machines and hopped on the Kazaa P2P file-sharing network. Three days after it got into the wild, it had done an estimated $22.6 billion and rising in damage. It may grow to be more viral than last year's notorious SoBig virus that is calculated to have done $37 billion worth of damage.

MyDoom, aka Novarg and Shimg, singles out SCO and threatens to unleash a massive Distributed Denial of Service on SCO's Web site this Sunday, Super Bowl Sunday. Either the SCO attack is MyDoom's real purpose, or, it's perverse justification.

A copycat MyDoom.b cropped up on Wednesday aimed at taking out Microsoft's Web site on February 3 as well as SCO's. MyDoom.b is a particularly nasty piece of work. It prevents infected machines from reaching computer support and anti-virus sites like Network Associates and Symantec. It also prevents access to Office and Windows update sites.

Experts believe both viruses may come from the same source. MyDoom.b reportedly contains the message, "I'm just doing my job, nothing personal, sorry." There was talk about MyDoom resembling Russian spam and machines infected with MyDoom tripping off MyDoom.b.

mi2g Ltd in the UK says it may be a new generation of viruses and may have a bigger target than either SCO or Microsoft like online transaction fraud or mass identity theft.

SCO has been hit with several DDoS attacks since it sued IBM for allegedly putting SCO's Unix code in Linux. McBride, however, labeling MyDoom "criminal," said in a prepared statement that MyDoom is "different and much more troubling, since it harms not just our company, but also damages the systems and productivity of a large number of other companies and organizations around the world.

SCO's initial statement Tuesday stopped short of blaming the Linux community for MyDoom as SCO has blamed it for the DDoS attacks before. Instead, SCO said, "We do not know the origins or reasons for this attack, although we have our suspicions."

But by the time McBride was being interviewed on CNBC Wednesday he labeled the virus "apparently" the work of a "radical element of the Linux community." And independent industry watchers started predicting that open source could easily suffer a backlash because of the association between viruses and Linux. They speculated that the government could clamp down on the Internet because of the geopolitics of such stunts.

SCO is also likely to garner some sympathy from the corporate world because of MyDoom. It doesn't help the Linux/open source cause that boobs with open source convictions publicly rejoiced in the virus.

Open source leader Bruce Perens, presuming that SCO has the necessary skills, claimed either a spammer or SCO itself concocted MyDoom.

Perens wrote an open letter saying, "SCO...has a reason to defame us, as part of their stock-kiting scheme. We have assembled ample evidence that they have lied under oath in court. Such a company would not balk at attacking their own site in order to paint their opponents in a bad light. Thus, it is likely that this virus has been assembled for the purpose of defaming the Linux developers by spammers, SCO or others."

SCO said it was working with law enforcement including the Secret Service and FBI and said anyone with information on the identity of the perpetrator should contact the FBI.

More Stories By Maureen O'Gara

Maureen O'Gara the most read technology reporter for the past 20 years, is the Cloud Computing and Virtualization News Desk editor of SYS-CON Media. She is the publisher of famous "Billygrams" and the editor-in-chief of "Client/Server News" for more than a decade. One of the most respected technology reporters in the business, Maureen can be reached by email at maureen(at) or paperboy(at), and by phone at 516 759-7025. Twitter: @MaureenOGara

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.