IM malware attacks increase, report

Share this article:
Malicious code attacks through instant messaging services have tripled between March and April, according to a report from Akronix Systems.

The jump accompanies a boom in deployment of enterprise unified communications systems over the past few months, a fact that is unlikely to be a mere coincidence, the company said. The systems are designed to organize business communications technology onto a common internet protocol infrastructure, which often includes an IM service.

Twenty-one new malicious codes were tracked throughout April. Among the new IM worms identified were ArcServe, IMspread and QVOD. IRCBot and Tiotua were the most common worms, with three variants each.

The recent increase in malware attacks through the use of instant messaging is almost exclusively via the use of the public IM networks -- AIM, Yahoo!, MSN and GoogleTalk, Kip Quackenbush, vice president of worldwide sales at Akonix Systems told SCMagazineUS.com on Thursday.

“However, as the take-up of enterprise unified communications systems continues to grow, companies need to be aware that if they choose to deploy public IM gateways in these systems, the security risk is identical,” Quackenbush said.

IM worms work in much the same way as email worms do -- by tricking the user into clicking a link which infects them with a virus, according to Matt Sergeant, senior anti-spam technologist at MessageLabs.

“They then use the victim's ‘Buddy List' to IM all their friends with the exploit,” Sergeant added. “As instant messaging grows in popularity these exploits become ever more powerful and widespread.”
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Florida Supreme Court rules warrants a must for real-time cell location tracking

Florida Supreme Court rules warrants a must for ...

The Florida Supreme Court put the kibosh on warrantless real-time tracking using location data obtained from cell phone providers.

Modular malware for OS X includes backdoor, keylogger components

Modular malware for OS X includes backdoor, keylogger ...

The modular malware was named "Ventir," by researchers at Kaspersky.

Fake Dropbox login page nabs credentials, is hosted on Dropbox

Fake Dropbox login page nabs credentials, is hosted ...

Symantec researchers received a phishing email linking recipients to a fake Dropbox login page that is hosted on Dropbox's user content domain and served over SSL.