News

Instant messaging worms pose growing threat

Virulent worms that exploit vulnerable instant messaging (IM) clients and could infect hundreds of thousands of computers in seconds are a real threat for internet users worldwide, security researchers from Symantec have warned.

A small but growing number of documented IM security holes and the rapid adoption of IM technology within corporations are posing significant risks of infection and information theft, the two researchers said Friday at the Virus Bulletin conference in Toronto.

There are about 60 published IM vulnerabilities, according to Eric Chien, chief researcher at Symantec Security Response in Dublin. Those range from security holes that could be used to crash IM clients in denial-of-service attacks, to those which allow attackers to  install and run malicious code remotely on computers running the vulnerable IM clients.

Chien added that such vulnerabilities are already being used by hackers to compromise individual machines.

However, the IM vulnerabilities become particularly dangerous when they are combined with hacker applications written using documented application programming interfaces (APIs) from the major suppliers and used to create an IM worm, according to Neal Hindocha of Symantec Security Response.

The APIs can be used to make tools that silently send virus files or Trojan horse programs to IM users or capture a remote user's list of IM buddies.

The ability of hackers to grab a user's buddy list also gives IM worms the potential to be more virulent than the likes of Code Red, Slammer or Blaster, which spread over the internet rather than over IM networks.

Unlike those worms, IM worms do not need to scan the internet for the IP addresses of vulnerable systems, a process that greatly slows the spread of traditional worms. Instead, IM worms simply use the infected user's buddy list to find new targets.

Even with a scenario in which the buddy lists of infected and target machines were identical except for just one IM user, an IM worm could infect 500,000 machines in just 31 seconds.

Most popular IM networks, including America Online's AOL Instant Messenger, Microsoft's MSN Messenger and Yahoo's Messenger are designed to be fast and support hundreds of thousands of users rather than be secure.

User passwords and other sensitive data are not encrypted and can easily be obtained from Windows systems or sniffed from IM traffic, Hindocha said.

While about 30 IM worms have been identified, there could be barriers to widespread IM worm outbreaks of the magnitude of Slammer or the recent Blaster worm, which quickly spread worldwide.

Because communication on IM networks often relies on centralised servers, IM companies can quickly filter attack traffic for all users once new threats are identified. In addition, IM companies can deny unpatched users access to the network, forcing them to upgrade their client software once patches are available, Chien said.

Finally, massive traffic generated by even 10,000 or 50,000 infected hosts could knock IM servers offline, halting the spread of the worm, he added.

Companies worried about the security threats posed by IM worms should seriously consider blocking communications ports used by common IM clients. Full inspection firewalls are also useful for IM clients that communicate using essential ports such as those used for Web HTTP traffic, he said.

Organisations should also assess the business need for IM, which is often not used for essential business communications.

Those organisations that absolutely need to use IM should consider investing in enterprise-class IM products which use encryption to protect sensitive data and allow employees to communicate within a corporate intranet without exposing IM traffic to the public internet, Chien said.

Paul Roberts writes for IDG News Service


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
 

COMMENTS powered by Disqus  //  Commenting policy