Feeds

Skype worm leaps onto MSN

IM in peril

The essential guide to IT transformation

Malware miscreants have created the first worm targeting Skype that's also capable over other instant messaging networks, such as MSN and ICQ.

The unnamed worm poses as a chat message linking to a website, as with other example of Skype-spreading malware before it. This malicious website contains a .pif file, that poses as "photos". Users tricked by this simple ruse will find themselves infected by the Stration worm, a mass mailer that also attempts to foil attempts to remove it by blocking access to security-related websites, and other items of malware.

Skype contacts of users infected by the worm get sent a message pointing to the hacker-controlled website. This is all fairly standard.

The twist comes via an attempt by VXers to hedge their bets. One of the files dropped onto infected PCs checks to see if a number of different instant messaging programs are installed.

Although the main vector for infection is Skype, the malware also attempts to spread by punting messages across MSN and ICQ, according to an analysis of the malware by researchers at IM security firm FaceTime Communications.

"The infection checks the registry for evidence of programs like AIM, Trillian, Yahoo Messenger, Miranda and ICQ - however, so far we've only seen it fire a message to an ICQ and an MSN Messenger Client," writes Chris Boyd, director of malware research at FaceTime. "The main target appears to be Skype with regards a delivery mechanism for the messages sent, but the potential for the infection to leap across various networks is obviously there."

FaceTime speculates that the cross-network IM worm is probably the work of the same VXers who created early Skype worm. The latest IM malware menace once again emphasises the importance for users to think before they click. ®

5 things you didn’t know about cloud backup

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.