Breaking News

Lexar Launches the NM990 PCIe 5.0 SSD DJI Agras T100, T70P and T25P Launches Globally Sony Introduces the RX1R III Razer Introduces Next-Generation Connectivity and Performance with New Thunderbolt 5 Dock and Core X V2 Transcend's New ESD420 Portable SSD Offers MagSafe Compatibility and Pro-Level Performance

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Hackers building 'botnet' with AOL instant messaging worm

Hackers building 'botnet' with AOL instant messaging worm

Enterprise & IT Sep 20,2006 0

Hackers using computer worms sneakily implanted via America Online (AOL) instant messages were building a potentially evil "botnet," a Silicon Valley Internet security firm said. FaceTime security specialists advised users not to open any files sent to them via AIM.

FaceTime Security Labs identified the worm as "W32.pipeline" and said the executable software tricked its way into people's computers by posing as a picture attached to an instant message from someone on their AOL "buddy list."

Once in computers, the worms open the doors to download infectious software that essentially lets those behind the invasion take control of the machines, according to FaceTime.

"The motivation for the bad guys seems to be in lining up as many 'install chains' as possible to insure a consistent pipeline that can be controlled by their rogue botnet," said FaceTime director of malware research Chris Boyd.

AIM users are duped into letting the worms in through psychological ploy from the "social engineering" playbook, according to FaceTime.

The infected attachments are disguised as image "JPEG" files and arrive with AIM messages to the effect of "hey would it (be) okay if i upload this picture of you to my blog?"

The worm sends copies of itself to addresses found on AOL instant messaging (AIM) buddy lists of newly infected machines, FaceTime said.

The robotic computers can be amassed in a network referred to as a "botnet."

"FaceTime researchers believe that the ultimate goal of the W32.pipeline is to create a sophisticated botnet that can be used for a range of malicious purposes," the Foster City, California, company said in a statement.

Botnets under the control of hackers can be mined for personal information or used to send junk e-mail or overwhelm business websites with simultaneous requests in what are known as "denial-of-service" attacks.

Hackers could also use zombie machine armies to commit "click fraud" by having them repeatedly connect to Internet advertising for which businesses are charged per click.

Tags: Virus
Previous Post
BenQ Mobile to close plants
Next Post
Nokia Unveiled New 3G Slide phone 6288

Related Posts

  • Samsung Laptop Full of Notorious Malware Is On Sale For $1.2M

  • Cisco Identifies Virus That Kills Off PCs

  • Researchers Identify iOS Espionage App

  • Researchers Identify New iOS Vulnerability

  • Dropbox, WordPress Used To Spread Malware

  • Microsoft Says Viruses Are Back On The Rise

  • First Targeted Attack Utilising Malware for Android Devices Reported

  • Cyber Attack Targets Nato, Government Websites

Latest News

Lexar Launches the NM990 PCIe 5.0 SSD
PC components

Lexar Launches the NM990 PCIe 5.0 SSD

DJI Agras T100, T70P and T25P Launches Globally
Drones

DJI Agras T100, T70P and T25P Launches Globally

Sony Introduces the RX1R III
Cameras

Sony Introduces the RX1R III

Razer Introduces Next-Generation Connectivity and Performance with New Thunderbolt 5 Dock and Core X V2
Gaming

Razer Introduces Next-Generation Connectivity and Performance with New Thunderbolt 5 Dock and Core X V2

Transcend's New ESD420 Portable SSD Offers MagSafe Compatibility and Pro-Level Performance
PC components

Transcend's New ESD420 Portable SSD Offers MagSafe Compatibility and Pro-Level Performance

Popular Reviews

be quiet! Light Loop 360mm

be quiet! Light Loop 360mm

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Noctua NH-D15 G2

Noctua NH-D15 G2

Soundpeats Pop Clip

Soundpeats Pop Clip

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

Crucial T705 2TB NVME White

Crucial T705 2TB NVME White

be quiet! Pure Base 501

be quiet! Pure Base 501

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed