Feeds

Skype worm chats up victims - then holds PCs to ransom

U mad lol?!

SANS - Survey on application security programs

A worm that locks Windows PC users out of their computers unless they pay a $200 ransom is rapidly spreading via Skype.

Once it has secreted itself into a machine, the malware tricks further victims into installing it by using the Microsoft-owned VoIP software to send messages that read "lol is this your new profile pic?" The malicious missives, dispatched to the infected user's contacts, include a shortened goO.gl link to a zip file hosted by Hotflie.com.

This archive contains an executable that, antivirus biz Sophos says, installs a variant of the Dorkbot worm and recruits the compromised machine into a botnet army.

Left to its own devices, the worm may switch to its ransomware mode, locking the punter out of his or her computer and inform them that all their files have been encrypted and will be deleted unless a $200 payoff is forthcoming.

Previous Skype scams have also spread through bogus links in the software's instant messaging client.

Graham Cluley, a senior technology consultant at Sophos, added: “Skype users may be less in the habit of being suspicious about links sent to them than, say, Facebook users."

Trend Micro said some 400 computers were infected in the first 24 hours of the worm outbreak last Thursday. Skype said in a statement:

Skype takes the user experience very seriously, particularly when it comes to security. We are aware of this malicious activity and are working quickly to mitigate its impact. We strongly recommend upgrading to the newest Skype version and applying updated security features on your computer.

The chat biz recommends users do not click on "strange or unexpected" links. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.