Breaking News

COLORFUL Expands B850 Motherboard Lineup with New CVN, Battle-Ax, and MEOW Models HighPoint Unveils the MCIO-PCIEX16-G5 CASIO introduces a new limited edition Hammered heritage model, the New MRG-B5000HT Introducing the Game-Changing MINISFORUM G1 Pro PlayStation Plus Monthly Games for December 2025

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Hackers building 'botnet' with AOL instant messaging worm

Hackers building 'botnet' with AOL instant messaging worm

Enterprise & IT Sep 20,2006 0

Hackers using computer worms sneakily implanted via America Online (AOL) instant messages were building a potentially evil "botnet," a Silicon Valley Internet security firm said. FaceTime security specialists advised users not to open any files sent to them via AIM.

FaceTime Security Labs identified the worm as "W32.pipeline" and said the executable software tricked its way into people's computers by posing as a picture attached to an instant message from someone on their AOL "buddy list."

Once in computers, the worms open the doors to download infectious software that essentially lets those behind the invasion take control of the machines, according to FaceTime.

"The motivation for the bad guys seems to be in lining up as many 'install chains' as possible to insure a consistent pipeline that can be controlled by their rogue botnet," said FaceTime director of malware research Chris Boyd.

AIM users are duped into letting the worms in through psychological ploy from the "social engineering" playbook, according to FaceTime.

The infected attachments are disguised as image "JPEG" files and arrive with AIM messages to the effect of "hey would it (be) okay if i upload this picture of you to my blog?"

The worm sends copies of itself to addresses found on AOL instant messaging (AIM) buddy lists of newly infected machines, FaceTime said.

The robotic computers can be amassed in a network referred to as a "botnet."

"FaceTime researchers believe that the ultimate goal of the W32.pipeline is to create a sophisticated botnet that can be used for a range of malicious purposes," the Foster City, California, company said in a statement.

Botnets under the control of hackers can be mined for personal information or used to send junk e-mail or overwhelm business websites with simultaneous requests in what are known as "denial-of-service" attacks.

Hackers could also use zombie machine armies to commit "click fraud" by having them repeatedly connect to Internet advertising for which businesses are charged per click.

Tags: Virus
Previous Post
BenQ Mobile to close plants
Next Post
Nokia Unveiled New 3G Slide phone 6288

Related Posts

  • Samsung Laptop Full of Notorious Malware Is On Sale For $1.2M

  • Cisco Identifies Virus That Kills Off PCs

  • Researchers Identify iOS Espionage App

  • Researchers Identify New iOS Vulnerability

  • Dropbox, WordPress Used To Spread Malware

  • Microsoft Says Viruses Are Back On The Rise

  • First Targeted Attack Utilising Malware for Android Devices Reported

  • Cyber Attack Targets Nato, Government Websites

Latest News

COLORFUL Expands B850 Motherboard Lineup with New CVN, Battle-Ax, and MEOW Models
PC components

COLORFUL Expands B850 Motherboard Lineup with New CVN, Battle-Ax, and MEOW Models

HighPoint Unveils the MCIO-PCIEX16-G5
Enterprise & IT

HighPoint Unveils the MCIO-PCIEX16-G5

CASIO introduces a new limited edition Hammered heritage model, the New MRG-B5000HT
Consumer Electronics

CASIO introduces a new limited edition Hammered heritage model, the New MRG-B5000HT

Introducing the Game-Changing MINISFORUM G1 Pro
Enterprise & IT

Introducing the Game-Changing MINISFORUM G1 Pro

PlayStation Plus Monthly Games for December 2025
Gaming

PlayStation Plus Monthly Games for December 2025

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed