Santa IM Worm Making a List

Wednesday Dec 21st 2005 by Jim Wagner
Share:

The medium-risk worm downloads a rootkit and starts a keylogger to grab user information.

A worm targeting the three major instant messaging (IM) networks is spreading its payload to buddy lists.

The IM.GifCom.All worm shows up as an innocuous-seeming URL in a chat message screen, featuring a link to what appears to be a Santa Claus site, said IM security vendor IMlogic, which first discovered the worm Monday.

In reality, clicking on the link starts a download that embeds a rootkit on the user's PC. The payload within the rootkit often goes by the name of gift.com, security experts at IMlogic said, and it immediately begins scanning the user's registry, file system and Internet cache.

The rootkit also contains a keylogger that records the keystrokes the user performs, generally used by malicious software writers to collect sensitive information such as credit card numbers, login information and passwords.

The malicious software also attempts to shut down the user's antivirus software and make several networking calls, possibly a repository maintained by the malware writer to collect keystroke information.

The worm may also try to propagate itself to the user's buddy list.

This article was first published on InternetNews.com. To read the full article, click here.

Share:
Home
Mobile Site | Full Site
Copyright 2017 © QuinStreet Inc. All Rights Reserved