SCO switches sites to evade MyDoom

The SCO Group has switched site domain addresses temporarily in an attempt to thwart the continuing denial-of-service attack from...

The SCO Group has switched site domain addresses temporarily in an attempt to thwart the continuing denial-of-service attack from the MyDoom.A worm.

The attack is scheduled to continue until 12 February, and SCO will use the alternative website - at - for the duration.

IDC security analyst Charles Kolodgy said the temporary domain address change will work because it will allow customers to access SCO's site while its normal address is under attack. It will, however, be inconvenient for anyone who has not heard about the temporary site relocation.

"Everyone who has the old SCO website bookmarked will have to try to find them. That was kind of one way to get rid of a denial-of-service, by getting rid of the website," he said.

"Security experts are calling MyDoom the largest virus attack ever to hit the internet, costing businesses and computer users around the world in excess of $1bn in lost productivity and damage," said SCO president and chief executive officer Darl McBride.

"Because one of its purposes is to interrupt access to the website, we are taking steps to help our important stakeholders continue to access the information, data and support that they need from this new ... website."

In addition to the usual SCO links and information, the temporary site also includes links for security companies, including Network Associates and Symantec, where users can get the latest information on how to download software updates and protect their PCs against MyDoom.

SCO believes the latest DDoS attack and several that preceded it are the work of open-source advocates who have been critical of the $3bn legal fight against IBM and Linux that SCO launched last March.

SCO sued IBM alleging that the company illegally donated some of SCO's System V Unix code to the Linux open-source project.

Last week, SCO posted a $250,000 reward for information leading to the capture of the person or people responsible for the MyDoom worm. Two days later, Microsoft announced its own $250,000 bounty.

"We believe that Microsoft's $250,000 reward, in addition to the $250,000 reward offered by SCO, will significantly assist the FBI in obtaining serious leads that may help catch the perpetrators of this virus," McBride said.

A free patch capable of wiping the program from an infected machine is available at many antivirus sites, including Sophos - and F-Secure, at

Meanwhile, Microsoft is bracing itself for an attack from MyDoom.B today. However, security experts have said the variant is badly written and may not have such a devastating effect.

Todd R Weiss writes for Computerworld

Read more on IT risk management