Topic: Warning to all who use IM | |
---|---|
Has any one heard of this scam yet?
Vicious! If You Get This IM, Don't Click It If you get either of these Instant Messages: "hey, would it be ok if i upload this picture of you to my blog?" or "hey is it alright if i put this picture of you on my egallery album?" DO NOT CLICK ON THEM. Remember, they will come to you from someone on your buddy list--that is, a close friend, family member or even your boss. The files will look like image files ending in jpg. But they aren't! If you click on either one and allow the file to execute, your computer could become a botnet drone that will be under the complete control of the hackers, reports Chris Boyd of FaceTime Security Labs on SpyWareGuide.com. Researchers believe that the ultimate goal of the worm, known as Win32.Pipeline, is to create a sophisticated botnet that can be used for a range of malicious purposes, reports VNU Network. This appears to be a very sophisticated operation. Like many IM worms, W32.pipeline first appears as an instant message from a familiar contact, luring users into clicking on a link with a contextual phrase. The IM message "hey would it okay if i upload this picture of you to my blog?" downloads a command file called image18.com, which is disguised as a JPEG. Running the file results in csts.exe being created in the user's system32 folder, part of the Windows operating system. The infection has the potential to call, via the Internet Relay Chat (IRC) channel, numerous other files that are constantly being updated. Depending on the files downloaded, the infection may create an unwanted service named RPCDB, open up SMTP port 25 (used for email) and attempt to connect to a file upload site. In addition, some files attempt to exploit ADS (alternate data streams). Users may also potentially end up with a rootkit installed on their PC as a result of this chain of infections. Once the user's PC is infected and under control of the botnet, it can be used to propagate the worm to other users using the same highly refined contextual message, for example "hey is it alright if i put this picture of you on my egallery album? " which will download another command file, again disguised as a JPEG, on additional computers. FaceTime researchers have noted that this botnet demonstrates much more sophisticated characteristics than any they have seen before, including the ability to authorize only specific IRC clients to log in and manipulate the botnet. "The emphasis for this latest worm is not so much on the files that are delivered to the users' computers, but rather on the way these files are deposited onto the system," said Chris Boyd, director of malware research for FaceTime Security Labs. "Previous IM attacks have tended to focus on the damage done by the files, with little thought on the method of delivery, save for the quickest way to get those files onto a PC. Here, the motivation for the bad guys seems to be in lining up as many ‘install chains' as possible to insure a consistent pipeline that can be controlled by their rogue botnet." |
|
|
|
good to know.
bad to run afoul of. Andrew Wee www.WhoIsAndrewWee.com |
|
|
|
i'm not a tech genius, but if u think u might have accidently downloaded
or accepted something of that matter then all you should have to do is go to ur start menu, pull up settings, add/remove file then scroll through and delete whatever shouldn't be on there. just make sure u don't delete the important things that makes ur comp work. ok. i hope this is helpful, when deleted do the same thing to ur trashcan. but, u dont have to take my word for it. like i said i'm not a net genius. |
|
|
|
that's only if it hasn't attached itself to any other files yet though.
they have some viruses that are sophistcated enough to sit undetected and record all of your personal information and a hacker can just get in and take all of it. ghost recon, is that a kitten with a sniper rifle...lmao |
|
|
|
lol, i know, glad u put up a pic ghost. i love it! so who's the bitch
he's taking aim at? lol HEY KB,HOW R YA? yeah, hacks can take whatever they want, but i doubt they'd be interested in u unless u present urself as to be such and such, thats why you got to careful of where u go even on the net. like with many sites, there are sub sites. same goes for ur files, they always attach them selves to something else, so that u never really lose it. it's like playing a BIG game of hide-n-seek. but, u can be just as quick as they are if u use ur common sense. |
|
|
|
With the credit rating the ex left me with they would not want my info, LOL. |
|
|
|
as they say a scam a day keeps your doctor away.
Andrew Wee www.WhoIsAndrewWee.com |
|
|
|
Hi Myn
Actually I didn't get infected. I just saw this info on my IP web brouser and was just spreading the word to othere's to watch out for but Thanks for the info. Hey Andrew. Yes it is bad. Hi breeze Yes, he's got some sort of sniper rifle. Not sure what kind. I think it's a Berret 182A1 .50 Caliber. I tried to compare it with that and a Russian Dragnov. But I think it's a Berret. Originally I think he's trying to snipe dogs I guess. I use it on other sites and use the caption that he's the real guy who shot Kennedy and Oswald. LOL! Thanks for stopping bye guys. have a good weekend. |
|
|