Tech Industry

"MyParty" worm fails to attract a crowd

A viral e-mail attachment posing as a Web link has spread moderately throughout computers in the United States and Great Britain.

An e-mail attachment that poses as a Web link but is actually a mass-mailing computer worm spread slowly over the weekend, but it managed to infect systems in more than 50 countries.

Known within the antivirus industry as W32.MyParty@MM or W32/MyParty-A, the worm appears to be a link to a Web site, www.myparty.yahoo.com--which doesn't actually exist. If the link is clicked, the worm sends itself out to every entry in the Windows address book, used by Outlook and Outlook Express. The worm affects all variants of Windows, from 95 to XP.

While it has spread worldwide, the number of infections is quite low, according to antivirus experts.

"It's quiet, and it has been relatively quiet all day," said Graham Cluley, senior technology consultant for U.K.-based antivirus company Sophos. "Most vendors had protection for this before the U.S. woke up." The worm was first spotted in Asia and later tracked in Europe.

MyParty uses a trick of semantics to convince victims that the file attachment is a Web site. Certain Windows programs use a .COM extension, which of course mimics the tail end of many Web site names.

The e-mail containing the worm has a subject line touting "new photos from MyParty!" The body adds:

"Hello! MyParty...It was absolutely amazing! I have attached my web page with new photos! If you can please make color prints of my photos. Thanks!"

While MyParty may not be overly clever, said Roger Thompson, director of malicious code research for security-services company TruSecure, it seems to have worked moderately well.

"It got lucky," Thompson said, adding that computer users should have learned by now not to click on attachments, no matter what they are named. "It's an exercise in the public's short attention span."

Very little data exists to show the true spread of the worm. However, U.K.-based e-mail service provider MessageLabs received copies of MyParty from more than 50 countries since Saturday, when the worm started spreading.

Rival Postini saw an increase in malicious attachments--currently running at 1 out of every 100 e-mail messages compared with a normal average of 1 in every 1,000--and found that 72 percent of that traffic consisted of copies of MyParty.

MyParty also leaves behind a file that some antivirus software makers believe to be a copy of itself and others say is a program designed to send information back to the creator.

The worm's programming limits MyParty to infecting computers from Jan. 25 to Jan. 29 and also ensures that any computer that has a Russian version of Windows installed won't be infected. That detail, plus the fact that the worm attempts to send infection information to an e-mail address at a Russian Web service provider, seems to make a case that a Russian created the worm.

"There is a suspicion that the people who created this came from Russia," Cluley said. However, he cautioned that a virus writer anywhere else in the world could have manufactured such details to mislead investigators.

Compared with other worms that spread in 2001--such as Code Red, Nimda and SirCam--MyParty is only a small gathering, said antivirus researchers.