Trojan horse spreads quickly through Microsoft's IM
Compromises 11,000 PCs in first 24 hours, says researcher
Computerworld - A new Trojan horse that started to spread early Sunday via Microsoft Corp.'s instant messaging client has already infected about 11,000 PCs, a security company said today.
The as-yet-unnamed Trojan horse began hitting systems about 7 a.m. EST on Sunday, according to Roei Lichtman, the director of product management at Aladdin Knowledge Systems Ltd. "We still haven't found what it's meant to do, but at the moment, it's creating an army [of bots]," he said. "Eventually, of course, the operator will send commands to do something."
Users of Microsoft's Windows Live Messenger instant messaging program receive a message that includes spoofed Zip files, such as one named "pics" that is actually a double-extension executable in the format "filenamejpg.exe" or a file labeled "images" that in reality is a .pif executable.
"This is really growing rapidly," said Lichtman. Six hours after it first found the Trojan horse, Aladdin put the total number of assembled bots at about 500; three hours later, that had climbed to several thousand. By late today, the botnet had been built out to 12,000 machines.
As with other malware spread through instant messaging software, the messages bearing malicious code appear to come from people on the recipient's IM contact list.
But while its speed in spreading is impressive, Lichtman pointed to another characteristic of the Trojan horse: It can also propagate via virtual network computing (VNC) clients, the generic term for remote control programs used to access one computer's files and desktop from another.
Once the Trojan horse has installed itself on a PC through IM, it can sniff out a VNC client, then use it to infect a remotely controlled system, perhaps one inside a corporation's firewall. "You increase your reach to these PCs as well, as if you infected them," Lichtman said, momentarily taking the hacker's point of view. To his knowledge, the Trojan's use of a VNC vector was a first.
Aladdin will continue to monitor the bot's spread by tapping into the Internet Relay Chat channel being used to command and control the compromised PCs, said Lichtman.
IM-based threats, while still relatively rare compared with those that spread via e-mail or from malicious Web sites, aren't unknown. Neither are vulnerabilities within IM software. In September, for example, Microsoft forced users of its aged MSN Messenger software to upgrade to Windows Live Messenger 8.1 to stymie a vulnerability in the older program.
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Gartner Report: A Guide to Gartner's Enterprise Mobile Security Self-Assessment Gartner introduces a model and a Toolkit intended to help mobility and security IT leaders assess their enterprise mobility programs from a security...
- Gartner Report: Containing Mobile Security Risks With the 80/20 Rule IT planners can deliver better mobile protection with higher user satisfaction by segmenting users into risk groups before committing to specific management or...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts