Tracking down a worm's source

Monday, 2 February 2004, 10:30 AM EST

The MyDoom worm has had me in a defensive crouch all week long. Not because I'm worried about it infecting any computers I use (my Mac is not vulnerable to it, my Windows computers run non-Microsoft mail clients, and I don't open unexpected attachments anyway). Nor am I that worried about all the copies of the worm that have "borrowed" my work e-mail address from their victims' address books and browser caches (it's an unavoidable fact of having a published e-mail address).

No, what I'm concerned about is whether my private, home address will get "outed" by MyDoom as it was by SoBig. This is the one I have under a domain name I've registered, which I don't give out to companies and only use in correspondence with friends and family. Having gone to the trouble of registering a personal domain, I don't plan on giving it up, which means I don't want to see this address wind up on any spammers' mailing lists.

By Rob Pegoraro at TechNews.

[ Read more ]

Related items




Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //