Worms wiggle into IM

Like airborne viruses, instant messaging worms are fledglings, but very much on the rise. These new worms are also proving that once inside a corporate network they can be just as destructive, if not more so, than traditional e-mail attacks.

E-mail remains the most widely used and destructive vehicle for spreading viruses and worms over the Internet, but the first three months of 2005 saw a rise in the number of worms using IM to propagate.

Anti-virus company Trend Micro recently released its first quarter 2005 virus roundup, in which half of the reported outbreaks were IM worms. Since emerging as a proof of concept in 2001, IM worms have taken a back seat to e-mail worms. But the sharp increase in IM-based outbreaks this year signals a revival of the IM vehicle, according to Trend Micro officials.

IM worms are on the rise primarily because of the publishing of the source code for existing attacks, said David Perry, global education director at Trend Micro.

"There have been a couple successful [IM worms] and the source code was made available," Perry said. "Most viruses are minor variations on existing viruses."

IM management and security vendor Akonix Systems noted an alarming 400 percent rise in IM attacks in its Q1 IM and peer-to-peer threat summary.

Akonix's numbers showed more than double the total number of targeted attacks on IM and p-to-p networks in the first quarter of 2005 than in all of 2004, according to Francis Costello, chief marketing officer at Akonix.

"We've seen published threat methods, which lets other virus writers jump in," Costello said.

Just last week virus alerts were issued for the latest variants of the Kelvir worm -- W32.Kelvir.U, W32.Kelvir.T, and W32.Kelvir.N -- which targets Microsoft's MSN Messenger and Windows Messenger. The Kelvir worm sends a URL via IM; once a user clicks on the URL, a worm is downloaded that sends itself to the now-infected user's contact list.

Although most IM worms target consumer systems such as MSN Messenger, Yahoo Messenger, and AOL's AIM, corporations still should be concerned.

According to IM security tool vendor IMlogic, nearly 85 percent of enterprises use public IM systems, and most do not have any additional security in place.

In fact, most enterprises are severely unprepared for IM-based malware attacks, according to Michael Osterman, president of Osterman Research.

The various types of IM attacks are not a critical problem yet for enterprises, but are rapidly becoming one, Osterman said.

"Within a matter of months this could become a huge problem that could do a lot of damage," Osterman said. "It would take very little to get totally out of control."

IM by its nature is a little more secure than e-mail, Osterman said. IM requires a user to grant permission to incoming contacts and is not as widely used as e-mail for file transport, through which many malicious payloads are sent.

Once inside a company, however, IM worms can wreak havoc because they bypass existing security defenses in place for e-mail, Osterman said.

Firstly, organizations without enterprise-grade IM in place should find out exactly how much public IM is now running on their network, he said.

"A lot of organizations really underestimate the amount of IM they have deployed," Osterman said. "Sometimes IT managers say they have none but if you put a sniffer on you can see thousands of IM [chats] on the network."

Corporations can deploy enterprise IM systems, such as Microsoft's Live Communications Server or IBM's Lotus Instant Messaging, or they can secure public systems by adding overlay management tools from vendors such as Akonix, FaceTime, IMlogic, and others.

"If you secure the public system and provide security against viruses plus namespace control and auditing and logging, then you have an enterprise grade system," Osterman said.

In addition to a growing number of worms, the types of IM threats are expanding to include SPIM (spam over IM) and phishing attacks. In fact, the first phishing attack using IM hit the Yahoo Messenger application last month. The scam sent a link to an official-looking but fake Yahoo Web site that asked users to provide account and password information. MSN IM users, too, were the targets of a then-new IM worm in March.

As for the SPIM threat, The Radicati Group estimates that SPIM will grow to 17.9 billion messages in 2008, fueled by the growing IM adoption and a sharp increase in published IM names in corporate and public directories.

Akonix currently offers protection from SPIM through dynamically updated SPIM policies, and is paying close attention to the SPIM problem in its development efforts, said Costello.

"SPIM is potentially the next big thing. There is SPIM on IM networks but it is not nearly as bad as e-mail spam," he said. "It is harder to do unsolicited messaging in IM, [but] as more and more people use IM it will become more targeted."

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Cathleen Moore

Show Comments

Brand Post

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Jack Jeffries


As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr


The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?