[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-Disclosure] Dig SCO?



they have moved to

www.thescogroup.com

Here is their Partner Alert from Monday AM ;-)

From - Mon Feb 2 10:00:48 2004
X-UIDL: -==-=-=-=-=-=-=-=-=-=-=-
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <TeamSCO@sco.rsc01.com>
Received: from om-thescogroup.rgc3.net ([66.35.244.29])
by simmts1-srv.bellnexxia.net
(InterMail vM.5.01.06.05 201-253-122-130-105-20030824) with ESMTP id <20040202130902.PTTS5069.xxxxx.xx.x.x.x@om-thescogroup.rgc3.net>
for <XXXX@XXX.XX>; Mon, 2 Feb 2004 08:09:02 -0500
Received: by om-thescogroup.rgc3.net id XXXXXX; Mon, 2 Feb 2004 05:09:02 -0800 (envelope-from <TeamSCO@sco.rsc01.com>)
MIME-Version: 1.0
Content-Type: text/plain;
charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Date: Mon, 2 Feb 2004 05:09:02 -0800
From: "SCO Partner Program" <TeamSCO@sco.rsc01.com>
Reply-To: "SCO Partner Program" <partners@sco.com>
Subject: SCO Partner Alert - MyDoom and Novarg Work-Arounds
X-cid: caldera.XXXX.X
To: XXXXX@XXXX.XX
Message-Id: <20040202130902.PTTSXXX9.XXXXX@om-thescogroup.rgc3.net>




SCO Partner Alert:

* Mydoom or Novarg Virus Work-arounds
* Mirrored availability of SCO Web site at http://www.thescogroup.com

As you are probably aware, on Monday, January 26, a computer virus called Mydoom (Network Associates' name) or Novarg (Symantec's name) spread quickly across the Internet. Antivirus companies have determined that this worm is coded such that computers infected with the Mydoom variant are set to conduct a distributed denial of service (DDOS) attack against www.sco.com from February 1 - 12.

In short, the virus is activated when users open an innocent-looking e-mail message that contains an attached program file (with a .bat, .cmd, .exe, .pif, .scr, or .zip extension) which then accesses the user's e-mail address book and sends itself to all of that user's contacts. The offending e-mail message usually arrives with a subject line such as "Test," "Hi," or "Mail Transaction Failed."

The SCO Group boldly condemns this latest action, and is taking several active steps to fight against acts of cyber-terrorism such as that launched by the creator(s) of the Mydoom virus.

* On January 27, SCO announced that we are offering a reward of up to a total of $250,000 for information leading to the arrest and conviction of the individual(s) responsible for creating the Mydoom virus.

* SCO is working closely with U.S. law enforcement authorities including the U.S. Secret Service and the Federal Bureau of Investigation (FBI) to determine the identity of the Mydoom creator(s)

* SCO is launching a "mirrored" Web site (which will provide all of the information currently available at www.sco.com) to continue business as usual with partners and customers - see http://www.thescogroup.com

As a valued SCO Solution Provider, your uninterrupted, successful SCO UNIX business is important to us. If you are unable to connect to the information or resources that you need during the targeted dates of the Mydoom virus, please contact SCO right away. For general issues, you can call 1-800-SCO-UNIX or e-mail SCO at partners@sco.com. For sales specific concerns, you can call our Inside Sales team at 1-800-726-6561.

Thank you for your continued support,

Darl McBride
President & CEO
The SCO Group

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html