Welcome, Guest. Please login or register.

Login with username, password and session length




May 17, 2024, 11:19:22 AM
Funfani.com - Spreading Fun All Over!INFORMATION CLUBTechnical TipsNew Yahoo IM Worm Poses as 'Safety' Browser
Pages: [1]   Go Down
Print
Author Topic: New Yahoo IM Worm Poses as 'Safety' Browser  (Read 917 times)
0 Members and 1 Guest are viewing this topic.
Vatsal
Administrator
FF Trailblazer
*****

Karma: 109
Offline Offline

Gender: Male
Posts: 2218



WWW
« on: May 26, 2006, 10:57:41 PM »

I got this information from another group and copied it to pass on to you.I did not check it out, but feel it is better to be safe than sorry.
 
Security researchers have identified a new worm spreading across Yahoo's instant messaging network that has been cloaked under the guise of a "safety" browser in an attempt to dupe users.

First discovered by anti-malware researchers at FaceTime Communications, the worm, labeled as yhoo32.explr, is forwarding itself throughout Yahoo's IM system via the contact lists of people whose computers it has already been infected. Once loaded onto a PC, the malicious program automatically hijacks the computer's existing browser home page and encourages users to visit a fraudulent Web site that attempts to load spyware programs onto their devices.

FaceTime researchers said they have observed two versions of the attack, one of which is a stand-alone application with no uninstaller that frequently disguises itself with a faked version of Microsoft's Internet Explorer logo. The second, self-propagating iteration of the worm, uses an .exe file to spread the infection through the Yahoo Messenger directories.

Yahoo representatives didn't immediately return calls seeking comment on the IM virus.
In addition to prompting users to visit the malware-loaded Web site, the virus also plays looped guitar music whenever someone starts up a PC it has infected, or opens the fraudulent safety browser itself. FaceTime researchers said that the attack is the first form of virus they have encountered that installs its own Web browser on a PC without the user's permission.

FaceTime officials said that the worm was first discovered by the India-based arm of its Security Labs division using a so-called honeypot trap designed specifically to attract malware code. The threat's ability to take over a user's browser without any specific interaction on the user's part makes it very unique, company officials said.

"This is one of oddest and more insidious pieces of malware we have encountered in years," Tyler Wells, senior director of research at FaceTime Security Labs, said in a statement. "This is the first instance of a complete Web browser hijack without the user's awareness."

Wells indicated that the existence of the new worm and similar rogue browsers, such as the previously identified Yapbrowser attack, prove that the malware writers are adapting to the use of security programs, and he predicted that there will be more of the sophisticated threats.

Much in the style of phishing schemes, the Web site linked to the yhoo32.explr virus appears to be legitimate, using Explorer logos that look very much like the real thing. Mirroring a trend that threatened the anti-virus industry several years ago, attacks that mimic the same types of applications that are used to defeat them are becoming increasingly popular in the spyware community. Experts have tabbed the technique as an attempt to cash in on the growing awareness of online threats and their links to offline identity fraud.

In a report issued in mid-May, security researchers at Finjan's Malicious Code Research Center highlighted the growth of fake anti-spyware applications that promise to help scan for and delete malicious code. Once downloaded onto a user's computer, the applications may deliver their own virus payloads or expose affected machines to subsequent attacks.

In some cases, said Yuval Ben-Itzhak, chief technology officer at Finjan, the false anti-spyware tools even run fake computer security scans that claim to find existing spyware programs on infected devices. The software then directs the computer's user to a Web site where the user is encouraged to purchase a full version of the free application already on the PC.

"This is just more evidence of the level of professionalism among the people writing the attacks, who are likely involved with organized crime," said Ben-Itzhak. "You can imagine that these types of people will continue to try and disguise malicious programs specifically to appear like the types of programs other people are building to defeat them."

Report to moderator   Logged
Pages: [1]   Go Up
Print

Jump to: