Anti-virus vendors report an increased chatter of virus activity on Microsoft Corp.s Microsoft Network messenger Sunday night through Monday.
In what appears to be a concentrated attack on users of the MSN instant messaging client, security experts warn that several new worms with unique replication techniques have been launched alongside mutants of the known Bropia virus family.
“We are regularly adding detection for new Bropia worm variants,” F-Secure virus analyst Alexey Podrezov said in a notice.
In addition, he said two new MSN worms—identified as Kelvir and Sumom—have also joined the fray.
Both Kelvir and Sumom, like the Bropia mutants, are capable of installing the Backdoor.Rbot Trojan horse, which gives an attacker remote access to a compromised system.
The Rbot Trojan can be controlled via IRC (Internet Relay Chat) to monitor networks and hijack sensitive information; scan a network of machines for unpatched security holes; or to launch denial-of-service attacks.
The Trojan can also be used to log keystrokes and send detailed information about the victim machine, including passwords, to the attacker.
Shane Coursen, senior technology consultant at Kaspersky Lab, said the increased instant messaging worm activity underscores the use of social engineering tactics to trick victims into executing a malicious file.
In the case of the Bropia variants, the worm author uses the lure of adult-oriented images (Paris Hiltons name is commonly associated with the worms) transmitted as hyperlinks in an IM session.
The worms all arrive with a .PIF (program information file) extension and, once a user clicks on the link, the computer becomes infected and in turn continues the propagation by sending the file to all found MSN Messenger contacts.
Next Page: Powerful potential.
Powerful potential
“This has the potential to massively distribute itself,” Coursen told eWEEK.com. “It sends itself wholesale to all contacts on the MSN buddy list. One more click there and the cycle continues.”
Additionally, the worm attempts to download a file named “me.jpg” save it to the infected C: drive as “dumprep.exe.”
When executed, the downloaded file is a variant of the RBot backdoor, Coursen said.
Anti-virus experts at Trend Micro Inc. rate the latest threat as “medium risk” and warned that the backdoor Trojan element could present untold dangers.
“The similarities between these worms may be attributed to MSN propagation code that has been posted to forums used by virus writers,” the company said in an advisory.
DEALING WITH AN INFECTION:
- Kaspersky Lab offers detailed descriptions for the Bropia and the Rbot Trojan family.
- Trend Micro Inc. offers Housecall, a free virus scanner. The company has also posted updated virus definitions for the latest threat.
- McAfees Stinger is a stand-alone utility used to detect and remove specific viruses. It is not meant to be a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system.
Check out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.