The Web    Google
4/6: Mydoom-AJ Worm Uses Email

4/6: Mydoom-AJ Worm Uses Email
April 6, 2005

Similar to earlier MYDOOM variants, Worm_Mydoom.AJ propagates via email messages. It also uses social engineering techniques by sending an email message that poses as a love letter. It sends the said email message using a spoofed sender's name.

It obtains target email addresses from files using specific extension names. It also generates email addresses by selecting a user name, which it appends to a selected domain name, from its own list. It skips email addresses that contain certain strings.

The email message it sends has varying subjects, message body content, and attachment file names. For specific details about this worm's email message, please click here. Aside from email, this worm also attempts to propagate via popular peer-to-peer (P2P) file-sharing networks.

This worm also has the ability to prevent users from accessing security and antivirus Web sites by modifying the system's HOSTS file. It also terminates certain malware-related, security-related, and Windows-related processes running on the affected system.

Technical details can be found at Trend Micro page.

  • CERT Issues Warning for OpenSSH Flaw
  • A case study in security incident forensics and response.
  • Symantec Offers Enhanced Portal for Enterprises
  • Arrested Criminal Hackers Used Wi-Fi
  • 9/7: MyWife-C a Mass-Mailing Worm
  • 'Critical' Windows Hijack Flaw Reported
  • Check Point Appliances Target Small Businesses
  • 10/26: Famus-B Worm Sends Email About Iraq
  • A New Breed of Phish
  • 11/1: Fakepatch-A an Elf Executable
  • 7/20: Mydoom.L@mm a Mass-Mailing Worm
  • Discussion on Security Camera