Feeds

Santa worm is coming to IM

Someone's been naughty. Very, very naughty

High performance access to file storage

A new virus is taking advantage of the Christmas-time custom of sending cards and joke attachments to spread itself among users of instant messenger software.

The IM.GiftCom.All, or Santa Claus worm presents itself as a harmless image of Santa Claus and appears to be sent from someone known to the recipient. If victims click the file a worm is loaded on to their computer. The worm then sends the same message to everybody on that person's address list.

The virus is part of a growing pattern whereby instant messaging programme users are being targeted by the writers of malware. The Santa Claus virus is just the latest instant messaging virus to be making the rounds, targeting the chat programmes provided by AOL, Microsoft and Yahoo. The worm was identified by IMLogic, which develops enterprise instant messaging software.

"There isn't huge awareness surrounding the risks of instant messaging viruses," Eamonn Phelan, senior consultant at Topsec Technologies told ElectricNews.net. "People need to ensure that their firewall is on and that their anti-virus software up to date."

Such worms are less successful than ones sent via e-mail, since they can only be delivered successfully if the recipient is logged on when the virus is sent. This is in contrast to an e-mail virus, where the malware can be activated at a later point when the victim logs on. In both cases the virus is only activated if the recipient chose to click on the link Home users are more vulnerable than corporate users, because most companies prevent their employees from using instant messaging software. Network administrators block chat programmes to prevent employees from getting distracted from their work, as much as to block viruses.

Santa's name is also being invoked by spammers selling fake luxury watches. These unsolicited e-mail messages contain a detailed recipe, including ingredients and instructions, on how to make "Santa's Chocolate Sleigh Bell Cookies". The spammers also provide a link to their website, which then offers to sell the fake watches.

Copyright © 2005, ENN

High performance access to file storage

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.