[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-Disclosure] Dig SCO?
- To: full-disclosure@lists.netsys.com
- Subject: Re: [Full-Disclosure] Dig SCO?
- From: Steve Menard <smenard@nbnet.nb.ca>
- Date: Mon, 02 Feb 2004 10:52:17 -0400
they have moved to
www.thescogroup.com
Here is their Partner Alert from Monday AM ;-)
From - Mon Feb 2 10:00:48 2004
X-UIDL: -==-=-=-=-=-=-=-=-=-=-=-
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <TeamSCO@sco.rsc01.com>
Received: from om-thescogroup.rgc3.net ([66.35.244.29])
by simmts1-srv.bellnexxia.net
(InterMail vM.5.01.06.05 201-253-122-130-105-20030824) with
ESMTP id
<20040202130902.PTTS5069.xxxxx.xx.x.x.x@om-thescogroup.rgc3.net>
for <XXXX@XXX.XX>; Mon, 2 Feb 2004 08:09:02 -0500
Received: by om-thescogroup.rgc3.net id XXXXXX; Mon, 2 Feb 2004 05:09:02
-0800 (envelope-from <TeamSCO@sco.rsc01.com>)
MIME-Version: 1.0
Content-Type: text/plain;
charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Date: Mon, 2 Feb 2004 05:09:02 -0800
From: "SCO Partner Program" <TeamSCO@sco.rsc01.com>
Reply-To: "SCO Partner Program" <partners@sco.com>
Subject: SCO Partner Alert - MyDoom and Novarg Work-Arounds
X-cid: caldera.XXXX.X
To: XXXXX@XXXX.XX
Message-Id: <20040202130902.PTTSXXX9.XXXXX@om-thescogroup.rgc3.net>
SCO Partner Alert:
* Mydoom or Novarg Virus Work-arounds
* Mirrored availability of SCO Web site at http://www.thescogroup.com
As you are probably aware, on Monday, January 26, a computer virus
called Mydoom (Network Associates' name) or Novarg (Symantec's name)
spread quickly across the Internet. Antivirus companies have determined
that this worm is coded such that computers infected with the Mydoom
variant are set to conduct a distributed denial of service (DDOS) attack
against www.sco.com from February 1 - 12.
In short, the virus is activated when users open an innocent-looking
e-mail message that contains an attached program file (with a .bat,
.cmd, .exe, .pif, .scr, or .zip extension) which then accesses the
user's e-mail address book and sends itself to all of that user's
contacts. The offending e-mail message usually arrives with a subject
line such as "Test," "Hi," or "Mail Transaction Failed."
The SCO Group boldly condemns this latest action, and is taking several
active steps to fight against acts of cyber-terrorism such as that
launched by the creator(s) of the Mydoom virus.
* On January 27, SCO announced that we are offering a reward of up to a
total of $250,000 for information leading to the arrest and conviction
of the individual(s) responsible for creating the Mydoom virus.
* SCO is working closely with U.S. law enforcement authorities including
the U.S. Secret Service and the Federal Bureau of Investigation (FBI) to
determine the identity of the Mydoom creator(s)
* SCO is launching a "mirrored" Web site (which will provide all of the
information currently available at www.sco.com) to continue business as
usual with partners and customers - see http://www.thescogroup.com
As a valued SCO Solution Provider, your uninterrupted, successful SCO
UNIX business is important to us. If you are unable to connect to the
information or resources that you need during the targeted dates of the
Mydoom virus, please contact SCO right away. For general issues, you can
call 1-800-SCO-UNIX or e-mail SCO at partners@sco.com. For sales
specific concerns, you can call our Inside Sales team at 1-800-726-6561.
Thank you for your continued support,
Darl McBride
President & CEO
The SCO Group
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html