Feeds

Skype IM malware smut surfaces

Nudge-nudge, wink-wink, say no more

High performance access to file storage

Skype's Instant messaging client has once again been misused as a vector to spread malware.

The Pykse-A worm is spreading via Skype instant messages, posing as a chat message linking to a website featuring racy picture of a young, scantily-clad woman. Clicking on these messages does display pics of a model wearing black lingerie, but only after an attempt has been made to infect PCs using a Trojan downloader that installs other items of malware. Infected PCs spread the infection by sending a variety of short messages promoting soft-core smut to an infected user's online friends using the Skype API.

The plausibility of the attack is increased because infected messages likely come from a target's list of known contacts, though the abrupt dialogue it generates from infected machines might trigger a few alarm bells. The malware sets the infected Skype user's status to DND (Do Not Disturb), another factor that might cause doubts about the authenticity of the bogus messages.

"Once it's up and running, the Pykse worm attempts to connect to a number of remote websites, presumably in an attempt to generate advertising revenue for them by increasing their number of 'hits'," said Graham Cluley, senior technology consultant for Sophos.

The malware is far from the first to use Skype's instant messaging client to spread. None of these attacks have proved particularly successful in the past. Anti-virus researchers reckon there's nothing about Pykse that will make it any more prolific. Most security firms consequently rate Pykse as a low risk threat. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.