The new generation of 'super-powerful' IM networks

Hackers have created enough worms to penetrate every IM chat network today, on both Mac and PC platforms, security experts have just issued a warning.

Picture 1 of The new generation of 'super-powerful' IM networks Source: SecurityLabs According to Kaspersky security firm, next time will witness the jump of a new generation of IM worms that can spread " across the network IM ". They will completely disrupt traditional IM worms like Bropia, Kelvia and Prex, which can only spread on a single IM chat service, or MSN, or Yahoo, or AOL .

IM worms like IRCBot.lo have a huge risk, because they can jump from one network to another and use a variety of message variations and download links, making it difficult for users to find room.

" In most cases, the IM worm cannot be considered a standalone malware. Rather, it's like a" slave ", used to help spread IRCBot, " said Kaspersky's expert Roel Schouwenberg. Lab said.

" The appearance of IRCBot.lo shows that the destructive function of the IM worm has reached the upper level and extremely energetic ."

The most worrying thing is that the code of IRCBot.lo can be copied extremely easily, which results in "cross-network" IM worms that reproduce at the rate of laying eggs.

Schowenberg believes that sophisticated worms like IRCBot.lo also signal the extinction of traditional generations of IM worms.

" Since the IM worm first appeared, there have been huge changes in the delivery method, in the sophistication of the code used and their target. Besides, IM messages The users' tireless sending also helps extend the life cycle of malware and botnet ".

Not only is the weak Windows computer vulnerable to IM worms, Macs are also at risk. On February 13, 2006, the first worm aimed at Mac OS X was discovered: an IM worm called OSX / Leap.A spread via iChat application.

" Apple's small market share in the global computer market has helped Macs get rid of the malware's attention. However, more and more, Apple's system becomes more and more popular and sure, malware will start pouring. set ".

Although OSX / Leap.a is just a "proof-of-concept" attack code, it is enough to prove that the Mac operating system is vulnerable.

"And once a vulnerability is discovered, remember that malware authors never sit still." Schowenberg warns.

Trong Cam