You can now instant message with a worm.
A new worm that targets users of America Online's AOL Instant Messenger is believed to be the first that actually chats with the intended victim to dupe the target into activating a malicious payload, IM security vendor IMlogic warned Tuesday.
According to IMlogic, the worm, dubbed IM.Myspace04.AIM, has arrived in instant messages that state: "lol thats cool" and included a URL to a malicious file "clarissa17.pif." When unsuspecting users have responded, perhaps asking if the attachment contained a virus, the worm has replied: "lol no its not its a virus", IMlogic said.
The malicious file disables security software, installs a backdoor and tweaks system files, the company said. Then it starts sending itself to contacts on the victim's buddy list.
But the worm is programmed so that the infected user cannot see the messages that are being sent out by the worm, according to IMlogic.
"This is a first," said Andrew Burton, director of product management at Waltham, Mass.-based IMlogic. This worm is not widespread, but attackers are just trying out this new technique, he said. "We will see one or two instances of an attack, there will be a refinement and then there will be an outbreak."
The inclusion of an IM bot is another sign that IM worms are becoming more sophisticated. Another worm, also spotted on Tuesday, takes a more traditional route: it spreads under the guise of a holiday greeting card, IM security specialist Akonix Systems said Tuesday.
The holiday worm, dubbed Aimdes.E, targets AIM users and arrives with the message: "The user has sent you a Greeting Card, to open it visit:" followed by a link. Once the target clicks on the link, the worm installs itself on the system. It opens a backdoor on the computer and sends itself to contacts on the buddy list, Akonix said.
Advice to users is to be careful when clicking on links in IM messages--even when they seem to come from friends--and to use up-to-date antivirus software. When receiving a link in an instant message, the best practice is to verify with the sender if the link was sent intentionally or not.
J L Dec 8, 2005, 7:24 PM PST
Ronald Ammerman Dec 8, 2005, 6:40 PM PST
Chris Toohey Dec 8, 2005, 9:48 AM PST
The Sentinel Dec 8, 2005, 4:22 AM PST
Rab Townsend Dec 8, 2005, 1:00 AM PST
Brandon Fowler Dec 7, 2005, 11:59 PM PST
Tom Fiset Dec 7, 2005, 7:50 PM PST
Eskie Eskie Dec 7, 2005, 6:21 PM PST
N3td3v Dec 7, 2005, 11:55 AM PST
Jeremy Cook Dec 7, 2005, 8:19 AM PST
Matthew S Dec 7, 2005, 7:07 AM PST
Chris Parks Dec 7, 2005, 6:18 AM PST
Terry Bates Dec 7, 2005, 5:36 AM PST
Digitally Sick Dec 6, 2005, 7:06 PM PST