AIM worm

Strange AIM worm going around. It apparently includes an interesting combination of rootkits, a rootkit detector, spyware/adware, and a specialized bittorrent client. The machines can then be controlled through IRC. Source seems to be the Middle East…

IM hackers then control a global botnet where their infections can be tested and payloads are pushed. Facetime traced these hackers to the Middle East.
The same IM hackers sent movies by way of IRC and their own version of BitTorrent, installing it without consent. Now the IM hackers are back with more, nastier malware, Rootkit Revealer and adware from 180solutions/Zango.

According to the Sunbeltblog it the tease come-on for AIM is the following:

The worm lures victims through the following AOL Instant Messenger with the following messages:
“great picture :)”, or

“not a right time to take a picture haa :-)”

“not a right time to take a picture haa :-)”

“not a right time to take a picture haa :-)”

Be suspicious of links.

Related Posts

Blog Traffic Exchange Related Posts
  • List of Open Source software Packages The following is long, but likely not complete. This is a list of open-source software packages: Computer software licensed under an open-source license. Software that fits the Free software definition may be more appropriately called free software; the GNU project in particular objects to their works being referred to as......
  • Computer security software nets $2.6 Billion over last two years. SecurityFix is talking about the computer security industry. Further, computer users spend $9 billion a year on computers repairs from spyware and antivirus. This reminds me of a recent story of a man that threw out a perfectly good machine because it was infested with spyware. For starters, I do......
  • Having multiple domains direct to one web site Recently I've consolidated a few domain names that I've acquired to direct to this site, and a few others to direct to another site that I maintain. One of the things that I wondered about after I set things up in the sites control panel to receive requests as the......
Blog Traffic Exchange Related Websites
  • Make Blogging Work for Your Business pt 2 Are you ready to make blogging work for your business? If you already know the benefits associated with corporate blogging, then the next step is to put these concepts to work by creating your own corporate blog and sharing your company with the world. This is part 2 in a......
  • My Lessons on Buying a Car. This post was originally written at the start of 2009, but has been lost on my PC until now, so I thought I'd share with you now. My wife and I just bought a new minivan, and I thought I'd share some of the lessons I learned along the way.......
  • The Downsides of Free Blogging Platforms for Corporate Blogging (Blogger, etc... focus on how posts may be deleted forever without warning, lack of professionalism, etc...) In a lot of different instances when it comes to blogging, making use of a free blogging platform can really come in handy. If you are writing a personal blog or a blog that......
PDF24    Send article as PDF   

Similar Posts

See what happened this day in history from either BBC Wikipedia
Amazon Logo

One Response to “AIM worm”

  1. Spyware Informer Says:

    M Hackers Give Away Spyware and More…

    Chris Boyd (aka Paperghost) talks more about it on Vitalsecurity and explains that the worm not only installs a number of rootkits, but also a rootkit remover (the screenshot is from his blog). The said rootkit remover is called Rootkit Revealer. Thi…

Switch to our mobile site