Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management

    Researchers Chart Sizable IM Threat Growth

    By
    Matt Hines
    -
    May 3, 2006
    Share
    Facebook
    Twitter
    Linkedin

      New research indicates that hackers are increasingly turning their efforts toward IM-borne attacks, with experts saying that businesses and end users remain largely ignorant to the growing problem.

      According to the latest report from anti-malware applications vendor Postini, the sheer volume of instant messaging threats it tracked during April 2006 increased by nearly 25 percent, compared with the number of similar threats it detected during March. While the percentage of IM traffic that included viruses remains relatively low, at less than 1 percent of all the IM conversations monitored by Postini during April, the shift toward IM threats appears to be gaining momentum, company officials said.

      As evidence of the increasing sophistication of IM attacks, Postini said it discovered a variant of the Mytob virus, which previously had been seen only in e-mails, that was leveled at all major IM and enterprise messaging clients. Among the Trojan horse viruses that are being delivered via IM were the IMFlood and JahuKit attacks, while related worm viruses included the Appflet, YahooSpy, Mpass and MSNFake threats.

      /zimages/2/28571.gifResearchers say automated IM worms are inevitable. Click here to read more.

      “Unfortunately the hackers are out in front of the good guys in terms of recognizing that IM is a very palatable way to attack desktops,” said Andrew Lochart, senior director of marketing for Postini. “Since the hackers have perfected their craft in e-mail, in terms of what the payload does when it gets to a victims computer, were seeing every variation of virus being delivered over IM, from rootkits to keystroke loggers and worms.”

      Postini maintains that security threats aimed at IM systems, file-sharing tools and other real-time communication technologies increased by just under 1,700 percent in 2005, compared with 2004, with a total of over 2,400 unique attacks. The firm said that 90 percent of the of IM-related security attacks it observed during 2005 included worm propagation, while 9 percent delivered viruses and only 1 percent of the threats utilized known client vulnerabilities or exploits.

      From a regional perspective, Lochart said that U.S. companies tend to be at an even greater risk because IM applications have become such popular workplace productivity tools across the nation, while far fewer European workers are using the messaging systems.

      As with other forms of IT threats, Postini contends that IM attacks are increasingly being launched by organized criminals looking for financial returns from their efforts, versus the script kiddies of years past who merely sought to gain fame via the creation of more nuisance-oriented types of malware.

      “One of the things that has limited the adoption of protective measures for IM is the nature of viruses in general, as the writers are looking for a way to hide their attacks instead of trying to let you know that they are on your computer,” Lochart said. “And if youre a hacker, spammer or phisher, youre realizing that the e-mail virus filters have gotten a lot better while IM remains largely unprotected, which is just the sort of opportunity that these guys are looking for.”

      /zimages/2/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Avatar
      Matt Hines

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×