This is far from any proof of anything. There are other reports out there such as these:
http://www.upi.com/view.cfm?StoryID=20040128-081558-7375r CHICAGO, Jan. 28 (UPI) -- Internet-based hacker-activists -- known as hacktivists -- seem to be behind the mass e-mailing this week of the MyDoom worm, which has commandeered consumers' computers around the globe to serve as a staging area for another, more potent attack on their primary, commercial target next month.
Computer experts told United Press International that MyDoom -- a self-replicating string of malicious computer code -- could turn out to be the most widespread worm of all time, topping last summer's well-known attack by the SoBig virus.
As of Tuesday, one of every nine e-mail messages being received by the average computer user was infected with the worm, according to research by Central Command, an anti-virus software maker in Medina, Ohio.
So far, there does not seem to be much consumers who use personal computers running Microsoft Corp. products can do to stop the worm -- once it has infected their systems. Computer scientists are striving to complete a cure for it.
"This worm appears to be a form of hacktivism," Gary Morse, president of Razorpoint Security Technology, a computer consultancy in New York City, told UPI. "It is only infecting machines that are running Windows as their operating system, not those that are running the Mac operating system or the Solaris operating system." ...
"They have their own flavor of Unix," an operating system for technical computing projects, Morse said. "They are embattled with IBM and Red Hat and Novell in a fight over intellectual property rights for the software. This has set off discussions on Web boards around the world. And it appears that someone who does not like where SCO stands has taken matters into their own hands."
This is all part of the global, ideological war online between the backers of the free operating system Linux, a version of Unix, and the supporters of the industry standard, Microsoft Windows, Morse said.
http://www.internetnews.com/dev-news/article.php/3304311 The
W32.Novarg.A@mm (MyDoom) virus, which has emerged as an unlikely weapon in the ongoing 'Linux War' between SCO and the open-source community, is set to launch the DDoS attack against SCO on Feb. 1 and has a trigger date to stop spreading on Feb. 12.
Lindon, Utah-based SCO has drawn the ire of open-source advocates in recent months because of its litigation against Linux vendors IBM , Red Hat (Quote, Chart) and Novell (Quote, Chart), claiming that some of its code was being used in implementations of the Linux OS.
http://edition.cnn.com/2004/TECH/internet/01/27/mydoom.spread/ A sneaky e-mail worm continued to clog Internet traffic Tuesday, spreading faster than previous Web bugs by appearing as an innocuous error message.
The worm -- dubbed "MyDoom," "Novarg" or "WORM_MIMAIL.R" -- was copying itself at a fierce pace, so fast that some companies were having to shut down their mail servers to stop it. And a new clue was emerging as to the source of the infection.
Virus experts suggested MyDoom's author was a fan of the Linux open source community, because the bug, which targets computers running Microsoft Windows, launched a Denial of Service Attack on SCO's site. Utah-based SCO Group, which says it owns the UNIX operating system, alleges some versions of the Linux operating system use its proprietary code.
"The MyDoom worm takes the Linux Wars to a new intensity," said Chris Belthoff, an analyst for anti-virus firm Sophos. "It appears that the author of MyDoom may have taken the war of words from the courtrooms and Internet message boards to a new level by unleashing this worm which attacks SCO's Web site."
Past History would lend to that theory as well:
Embattled SCO Group's Web site hit with a 'denial of service' strike
http://www.sltrib.com/2003/Aug/08262003/business/86967.asp Eric Raymond, president of the Open Source Initiative, called the attack "rather sophisticated" and said he was convinced it had been launched "by an experienced Internet engineer."...
Raymond, who published his findings on the Linux Today Web site, said the unidentified perpetrator had agreed to halt the attack, at Raymond's request. SCO's Web site was operating again by Monday afternoon.
"I had been hoping, and actually expecting, that the attacker would turn out to be some adolescent cracker with no real connection to the open-source community," Raymond stated. But "I was told enough about his background and how he did it to be pretty sure he is one of us -- and I am ashamed for all of us."