Breaking News

ASUS Unveils Mac-Friendly Features on ProArt Displays to Enhance Workflows Ricoh announces GR IV Monochrome Acer ProDesigner PE320QX monitor excels at tests! MSI announces Roamii BE Pro Mesh WiFi 7 System Samsung Mobile Gaming Hub Reshapes Personalized Play

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Hackers building 'botnet' with AOL instant messaging worm

Hackers building 'botnet' with AOL instant messaging worm

Enterprise & IT Sep 20,2006 0

Hackers using computer worms sneakily implanted via America Online (AOL) instant messages were building a potentially evil "botnet," a Silicon Valley Internet security firm said. FaceTime security specialists advised users not to open any files sent to them via AIM.

FaceTime Security Labs identified the worm as "W32.pipeline" and said the executable software tricked its way into people's computers by posing as a picture attached to an instant message from someone on their AOL "buddy list."

Once in computers, the worms open the doors to download infectious software that essentially lets those behind the invasion take control of the machines, according to FaceTime.

"The motivation for the bad guys seems to be in lining up as many 'install chains' as possible to insure a consistent pipeline that can be controlled by their rogue botnet," said FaceTime director of malware research Chris Boyd.

AIM users are duped into letting the worms in through psychological ploy from the "social engineering" playbook, according to FaceTime.

The infected attachments are disguised as image "JPEG" files and arrive with AIM messages to the effect of "hey would it (be) okay if i upload this picture of you to my blog?"

The worm sends copies of itself to addresses found on AOL instant messaging (AIM) buddy lists of newly infected machines, FaceTime said.

The robotic computers can be amassed in a network referred to as a "botnet."

"FaceTime researchers believe that the ultimate goal of the W32.pipeline is to create a sophisticated botnet that can be used for a range of malicious purposes," the Foster City, California, company said in a statement.

Botnets under the control of hackers can be mined for personal information or used to send junk e-mail or overwhelm business websites with simultaneous requests in what are known as "denial-of-service" attacks.

Hackers could also use zombie machine armies to commit "click fraud" by having them repeatedly connect to Internet advertising for which businesses are charged per click.

Tags: Virus
Previous Post
BenQ Mobile to close plants
Next Post
Nokia Unveiled New 3G Slide phone 6288

Related Posts

  • Samsung Laptop Full of Notorious Malware Is On Sale For $1.2M

  • Cisco Identifies Virus That Kills Off PCs

  • Researchers Identify iOS Espionage App

  • Researchers Identify New iOS Vulnerability

  • Dropbox, WordPress Used To Spread Malware

  • Microsoft Says Viruses Are Back On The Rise

  • First Targeted Attack Utilising Malware for Android Devices Reported

  • Cyber Attack Targets Nato, Government Websites

Latest News

ASUS Unveils Mac-Friendly Features on ProArt Displays to Enhance Workflows
Enterprise & IT

ASUS Unveils Mac-Friendly Features on ProArt Displays to Enhance Workflows

Ricoh announces GR IV Monochrome
Cameras

Ricoh announces GR IV Monochrome

Acer ProDesigner PE320QX monitor excels at tests!
GPUs

Acer ProDesigner PE320QX monitor excels at tests!

MSI announces Roamii BE Pro Mesh WiFi 7 System
Enterprise & IT

MSI announces Roamii BE Pro Mesh WiFi 7 System

Samsung Mobile Gaming Hub Reshapes Personalized Play
Smartphones

Samsung Mobile Gaming Hub Reshapes Personalized Play

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed