Most Read Technology Reporter For More Than Two Decades

Maureen O'Gara

Subscribe to Maureen O'Gara: eMailAlertsEmail Alerts
Get Maureen O'Gara: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


MyDoom - SCO/Microsoft Update

77% of all total infections received in January 2004 was MyDoom, says one expert.

Experts at AlertSite, the Web site monitoring company, indicated this morning that home page load times for both SCO and Microsoft experienced problems over the weekend, the most serious of which was the crashing of the SCO Web site as of 1:00 AM on Sunday February 1.

Of this weekend, they say:

" was available most of the time until after 6:00 PM on Saturday, January 31. It was available very sporadically until about 1:00 AM on February 1 at which point it became completely unavailable. SCO's Web site continues to be unavailable this morning. SCO is now operating a new site. experienced some fairly significant performance degradation. On Feb 1, Microsoft's home page was approximately 24% less responsive than either of the previous two Sundays. During the afternoon on Feb 1 average home page response time was up more than 70%. "

Meantime Central Command, a leading provider of PC anti-virus software and computer security services today released its monthly listing of the top twelve viruses reported for January, 2004. The report, coined the "Dirty Dozen", is based on the number of virus occurrences confirmed through Central Command's Emergency Virus Response Team.

The table below represents the most prevalent viruses for January 2004, number one being the most frequent.

Ranking Virus Name Percentage

1. Worm/MyDoom.A 77.4%
2. Worm/Sober.C 5.9%
3. Worm/Bagle.A 2.0%
4. Worm/ MiMail.I 1.7%
5. Worm/ Gibe.C 1.5%
6. Worm/Klez.E 1.3%
7. Worm/MiMail.J 1.0%
8. Worm/BugBear.B 0.7%
9. Worm/MiMail.A 0.5%
10. Worm/Dumaru.A 0.5%
11. Worm/Hawawi.G 0.4%
12. W32/Nimda 0.3% Others 6.8%

"In only a few days, the hefty volume of circulating MyDoom emails caused pandemonium for computer users worldwide," said Steven Sundermeier, Vice President of Products and Services at Central Command, Inc. Central Command's Emergency Virus Response Team confirmed that over 77% of all total infections received in January 2004 was MyDoom. "It didn't take MyDoom long to become a predominant member of the 'who's who' list of high impacting computer worms. It's safe to say that MyDoom bypassed the big leagues and took a straight path to the hall-of-fame."

More Stories By Linux News Desk

SYS-CON's Linux News Desk gathers stories, analysis, and information from around the Linux world and synthesizes them into an easy to digest format for IT/IS managers and other business decision-makers.

Comments (1) View Comments

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

Most Recent Comments
richm 02/02/04 02:04:07 PM EST

The SCO Group, Inc. will use as an alternate web site while remains under a denial of service attack from machines infected with the My Doom worm, the company said this morning. The URL is expected to serve as an interm site for SCO through Feb. 12, when the DDoS is expected to conclude. "SCO has developed layers of contingency plans to communicate with our valued customers, resellers, developers, partners and shareholders," said Jeff Carlon, the company's director of worldwide IT infrastructure, who called the new domain "the first step" in its planning. actually resolves to the same IP address as

% host has address
% host has address

Performance data on is available now.