Worms sent via IM pose serious, growing threat

Virulent new worms that exploit vulnerable instant messaging (IM) clients and could infect hundreds of thousands of computers in seconds are a real threat for Internet users worldwide, according to security researchers from Symantec.

A small but growing number of documented IM security holes and the rapid adoption of IM technology within corporations are combining to pose significant risks of infection and information theft, the two researchers said Friday at the Virus Bulletin conference in Toronto.

Currently, there are about 60 published IM vulnerabilities, according to Eric Chien, chief researcher at Symantec Security Response in Dublin, Ireland. Those range from security holes that could be used to crash IM clients in denial of service (DOS) attacks to those that allow attackers to remotely install and run malicious code on computers running the vulnerable IM clients.

Such vulnerabilities are already being used by hackers to compromise individual machines, Chien said.

However, the IM vulnerabilities become particularly dangerous when they are combined with hacker applications written using documented APIs (application programming interfaces) from the major vendors and used to create an IM worm, according to Neal Hindocha of Symantec Security Response.

The APIs can be used to make tools that silently send virus files or Trojan horse programs to IM users or capture a remote user's list of IM correspondents or "buddies," Hindocha told an audience of antivirus researchers and corporate security experts.

The ability of hackers to grab a user's buddy list also gives IM worms the potential to be more virulent than predecessors like Code Red, Slammer or Blaster, which spread over the Internet rather than over IM networks, Chien said.

Unlike those worms, IM worms do not need to scan the Internet for the IP (Internet Protocol) addresses of vulnerable systems to infect, a process that greatly slows the spread of traditional worms. Instead, IM worms simply use the infected user's buddy list to find new targets.

Even with a scenario in which the buddy lists of infected and target machines were identical except for just one IM user, an IM worm could infect 500,000 machines in just 31 seconds, Chien and Hindocha showed.

Most popular IM networks, including America Online's AOL Instant Messenger, Microsoft's MSN Messenger and Yahoo's Messenger are designed to be fast and support hundreds of thousands of users, rather than be secure, the researchers found.

User passwords and other sensitive data are not encrypted and can easily be obtained from Windows systems or sniffed from IM traffic, Hindocha said.

While about 30 IM worms have been identified, there could be barriers to widespread IM worm outbreaks of the magnitude of Slammer or the recent Blaster worm, which quickly spread worldwide, Chien said.

Because communication on IM networks often relies on centralized servers, IM companies can quickly filter attack traffic for all users once new threats are identified. In addition, IM companies can deny unpatched users access to the network, forcing them to upgrade their client software once patches are available, Chien said.

Finally, massive traffic generated by even 10,000 or 50,000 infected hosts would likely knock IM servers offline, halting the spread of the worm, he said.

Companies worried about the security threats posed by IM worms should seriously consider blocking communications ports used by common IM clients. Full inspection firewalls are also useful for IM clients that communicate using essential ports such as those used for Web HTTP (Hypertext Transfer Protocol) traffic, he said.

Organizations should also assess the business need for IM, which Chien said is often not used for essential business communications.

For those organizations that absolutely need to use IM, organizations should consider investing in enterprise-class IM products that use encryption to protect sensitive data and allow employees to communicate within a corporate intranet without exposing IM traffic to the public Internet , Chien said.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Paul Roberts

IDG News Service
Show Comments

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?