We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,258 News Articles

Trojan attacks Windows Live Messenger

Botnet threat to thousands of PCs infected

Windows Live Messenger users have been warned about a new Trojan horse that targets Microsoft's instant messaging client.

The as-yet-unnamed Trojan horse began hitting systems on Sunday, according to Roei Lichtman, the director of product management at Aladdin Knowledge Systems. "We still haven't found what it's meant to do, but at the moment, it's creating an army [of bots]," he said. "Eventually, of course, the operator will send commands to do something."

Users of Microsoft's Windows Live Messenger receive a message that includes spoofed Zip files, such as one named 'pics' that is actually a double-extension executable in the format 'filenamejpg.exe' or a file labelled "images" that in reality is a .pif executable.

"This is really growing rapidly," said Lichtman. Six hours after it first found the Trojan horse, Aladdin put the total number of assembled bots at about 500; three hours later, that had climbed to several thousand. By 12:30 p.m. EST Monday, the botnet had been built out to 11,000 machines.

As with other malware spread through instant messaging software, the messages bearing malicious code appear to come from people on the recipient's IM contact list.

But while its speed in spreading is impressive, Lichtman pointed to another characteristic of the Trojan horse: it can also propagate via virtual private network (VPN) clients, the programs typically used by businesspeople to connect with their employer's networks when they're outside the corporate firewall.

"That just increases the effectiveness of its spreading," Lichtman said. Once the Trojan horse has installed itself on an in-the-field PC - most likely a laptop - through IM, it can penetrate a corporation's perimeter via VPN to infect systems in the business. "It's after machines that aren't running Messenger," Lichtman explained, who added that to his knowledge, the VPN vector was a first.

Aladdin will continue to monitor the bot's spread by tapping into the Internet Relay Chat channel being used to command and control the compromised PCs, said Lichtman.

IM-based threats, while still relatively rare compared with those that spread via email or from malicious websites, aren't unknown. Neither are vulnerabilities within IM software. In September, for example, Microsoft forced users of its aged MSN Messenger software to upgrade to Windows Live Messenger 8.1 to stymie a vulnerability in the older program.

See Security Advisor for more PC security news, reviews and tutorials.


IDG UK Sites

Samsung Galaxy Note 4 review: Great if you like big, expensive phones

IDG UK Sites

Why Sony's PS4 2.0 update is every gamer's dream (well, mine at least)

IDG UK Sites

This Grolsch ad combines stop-motion & CG for majestic results

IDG UK Sites

Apple rumours and predictions for 2015: What to expect from Apple in 2015