Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Communications

Skype Worm Infects Windows PCs 127

walterbays writes with news of a worm spreading to Windows PCs through Skype's IM. The worm is variously called Ramex.a and Pykspa.d. A poster on a Skype forum explains how to remove it. "After hijacking contacts from an infected machine's Skype software, it sends messages to those people that include a live link. Recipients who blithely click on the URL — which poses as a JPG image but is actually a download to a file with the .scr extension — wind up infected."
This discussion has been archived. No new comments can be posted.

Skype Worm Infects Windows PCs

Comments Filter:
  • Worm? (Score:5, Insightful)

    by Hatta ( 162192 ) on Tuesday September 11, 2007 @02:44PM (#20560117) Journal
    Recipients who blithely click on the URL -- which poses as a JPG image but is actually a download to a file with the .scr extension -- wind up infected.

    I'm sure I won't be the first to point out that such an attack vector is not a worm [wikipedia.org].
    • Re:Worm? (Score:5, Funny)

      by Anonymous Coward on Tuesday September 11, 2007 @03:11PM (#20560595)
      Given your position of first post, I can't see how you could be anything but the first to point out this.
      • Re:Worm? (Score:5, Funny)

        by Bill, Shooter of Bul ( 629286 ) on Tuesday September 11, 2007 @03:57PM (#20561453) Journal
        That is a good point, and I must admit I thought that as well ... at first. Then I started thinking, How long is something really first? Is something first always first? Like the first European to visit the Americas, Columbus. He was first, but only for 400 odd years before we discovered that the vikings were the first. Also, one can never be so certain that time travel will never exist. Therefore, all of our first records in any given field may be only temporary, before some one from the future comes back and does it first.

        I applaud the gp's modesty, and four dimensional thinking. I think we should all be a little more considerate of our resources, both natural and produced, in light of the fact that they may belong to someone else before us, in the future.
      • by Thaelon ( 250687 )
        As if he knew he'd be the first post!

        Look how many keystrokes are in that baby!

        You'd have to be a ninja to say all that and still be first.
        • Re: (Score:3, Funny)

          by Suhas ( 232056 )
          > You'd have to be a pirate to say all that and still be first.

          There, fixed that for ya.

      • I'm glad this isn't youtube, where a first-poster would've just written "FIRST!" I... "dislike" those guys.
    • Microsoft's fault? (Score:4, Informative)

      by sconeu ( 64226 ) on Tuesday September 11, 2007 @03:23PM (#20560799) Homepage Journal
      With the default behavior of hiding the extension, XP leaves non-technically proficient users vulnerable to this.
      • by recoiledsnake ( 879048 ) on Tuesday September 11, 2007 @03:54PM (#20561391)
        I fail to see how that behavior makes a difference here. The user clicks on a link that ends in .JPG, and the browser asks him to run or save an SCR file. No hiding the extension is involved here. If the user runs it, BAM. If he saves it, THEN he or someone else would not be able to see the extension and would run it(Though I think XP SP2 pops up a warning about it being a file from the internet zone, not sure if the full filename shows up in the warning though).

        Hiding the extension is a very most annoying thing though, it's the first setting that I change on a new install of Windows.

        • by cbhacking ( 979169 ) <been_out_cruising-slashdot@@@yahoo...com> on Tuesday September 11, 2007 @06:18PM (#20563583) Homepage Journal

          I think XP SP2 pops up a warning about it being a file from the internet zone, not sure if the full filename shows up in the warning though
          It doesn't matter, since jpegs (non-executable data files in general) don't present that warning (The text of the warning is something along the line of "this type of file can harm your computer". Not to mention they would presumably notice the file type while downloading and cancel the download / delete the file. Of course, the fact that anybody GETS these warnings (I haven't gotten one in Skype, but I've seen a couple that were near-identical over AIM) means that there are people out there who are actually stupid enough to ignore the warning...

          Hiding the extension is a very most annoying thing though, it's the first setting that I change on a new install of Windows.
          Agreed, although I actually change roughly half the options in Folder Settings. It's gotten better over time; 2000 you had to change almost all of them, XP only about 80%, Vista is down to nearly 50%. IE's default settings have gotten better too, especially with 7.
        • Re: (Score:3, Informative)

          by tsa ( 15680 )
          Hiding the extension is a very most annoying thing though, it's the first setting that I change on a new install of Windows.

          In OSX it's no different. But for some reason Steve's reality distortion field is so strong Mac users don't seem to care about it much.
      • Re: (Score:3, Insightful)

        by everphilski ( 877346 )
        With the default behavior of hiding the extension, XP leaves non-technically proficient users vulnerable to this.

        I fail to see how a 'non-techinically proficient user' would notice the appropriate extension...
        • There are differing levels of technical proficiency; it's not an on/off thing. There are people who know enough not to click on .scr but who haven't found that stupid checkbox hiding in Folder Options. Think "myspace users".

          What's really boneheaded is having to worry about clicking on screensaver links at all.
    • And it is not a Skype trojan either.
      Any other email/im could be a vector for it.
  • "blithely" (Score:1, Funny)

    by Gothmolly ( 148874 )
    I'm not sure how many Skype users would "blithely" click on anything.
    • Re: (Score:3, Funny)

      by Anonymous Coward
      Considering the definition and my general knowledge from doing tech support, I'd say just about all of them:

      blithely: [webster.com]
      1- of a happy lighthearted character or disposition
      2- lacking due thought or consideration

    • by OrangeTide ( 124937 ) on Tuesday September 11, 2007 @07:10PM (#20564237) Homepage Journal
      Most skype users don't know what blithely means. And are unaware of any fundamental difference between a spell-checker and a dictionary.
  • Lovely (Score:2, Interesting)

    by MechaShiva ( 872964 )
    Ramex.a/Pykspa.d injects code into the Explorer.exe process to force it to run the actual malware -- a file named wndrivsd32.exe -- periodically, wrote an infected user on a Skype message forum today. The worm also plugs in bogus entries in the Windows hosts file so that installed security software won't be able to retrieve updates.

    No mention of if this is just piggybacking a windows exploit or is it purely the result of Skype being craptastic. Also, gotta wonder how/if it effects a properly patched wi
    • I got the impression that Skype is only the means of passing on the infection.
    • Re:Lovely (Score:5, Informative)

      by recoiledsnake ( 879048 ) on Tuesday September 11, 2007 @03:29PM (#20560897)
      It does not "inject code" into Explorer any more than Notepad injects code into Explorer to run itself. An "infected user" is probably not the right person to listen to in such technical matters. FSecure has complete details on it if you're really interested here [f-secure.com]
      • Re:Lovely (Score:4, Informative)

        by Peaker ( 72084 ) <gnupeaker@@@yahoo...com> on Tuesday September 11, 2007 @04:06PM (#20561611) Homepage

        It does not "inject code" into Explorer any more than Notepad injects code into Explorer to run itself. An "infected user" is probably not the right person to listen to in such technical matters. FSecure has complete details on it if you're really interested here

        Heh, I am Eyal. I admit I was "infected". Basically I clicked the "scr" link because I foolishly trusted the source of the message to be who it was, did not read the contents before clicking, I don't really give much of a damn about this Windows box, and I forgot that the "scr" extension was executable, and not just an image file (which is typically a less likely attack vector).

        I assumed that since the Explorer.exe was unmodified, but explorer.exe is respawning the virus/worm's executable, that it modified Explorer's behavior in some way, perhaps by code injection. It was just speculation, ofcourse and obviously there are simpler ways to get explorer.exe to respawn your process, but it really is an unimportant detail.
    • Also, gotta wonder how/if it effects a properly patched windows xp machine and/or vista.

      I do not update or patch WindowsXP SP2. I do shut down unneeded services, I use SpybotSD to immunize Internet Explorer and I do tweak windows not to do this or that. I use the firewall to control programs, and have no resident virus scanning programs. I never use the Internet Explorer or Outlook.

      I use skype every day. Yesterday I have been spammed on pure geek English from my non English speaking friend to open some links like www.fakeit.org/somethig/~blahblah/funny.jpg while he was DND. I know that he w

  • F-Secure info (Score:5, Informative)

    by CXI ( 46706 ) on Tuesday September 11, 2007 @02:51PM (#20560261) Homepage
    F-Secure [f-secure.com] has information as well. [f-secure.com]
  • by ZwJGR ( 1014973 ) on Tuesday September 11, 2007 @02:52PM (#20560277)
    Skype itself is (mostly) blameless, how can they be expected to protect users from this sort of attack (perhaps by pointing out to users that the link/download they're clicking on is a screensaver exe..., but Windows ought to tell you that anyway...)
    Naming it a worm is a minor overstatement as well.
    It propagates by user incompetence, not by a technical flaw...

    These sort of malware executables circulate on email lists (and I daresay, other IM networks) already, so it's no surprise that Skype has "joined the club" of being big enough to attract unwanted attention...
    • by jimicus ( 737525 ) on Tuesday September 11, 2007 @03:03PM (#20560455)
      It propagates by user incompetence, not by a technical flaw...

      If the last 8-10 years have taught the IT industry nothing else, we should at least be well aware by now that basing your security on "user never does anything stupid" is a pretty effective way to ensure that the user's system will be emailing everyone and his dog adverts for Geniun Vigara!!!111 (sic) by the end of the day.
      • I always assume everyone is stupid.

        I haven't been proven wrong, yet.

        • by OK PC ( 857190 )
          Well I'll prove you!
        • by AusIV ( 950840 )
          I think that's a slight misquote. My father taught me

          Always assume everyone is stupid.

          You won't be disappointed.
          There are plenty of people who won't screw up, but if you deal with the idiots before they have a chance to screw up, it will be easier than dealing with it later.
      • So what solution do you propose to stop stupid users from hurting themselves, but without severely restricting or inconveniencing their activities? I mean, it's fashionable to bash the IT industry, but can you come up with a solution?
        • by dc29A ( 636871 ) *

          So what solution do you propose to stop stupid users from hurting themselves, but without severely restricting or inconveniencing their activities? I mean, it's fashionable to bash the IT industry, but can you come up with a solution?

          Why develop a solution for a non IT problem? The problem is that everyone and their dogs are running Windows as administrators. The solution is simple: educate the masses about NOT running their boxes as administrators. The security framework is already in Windows.

          There, I solved your problem.

          • by jimicus ( 737525 )
            The problem is that everyone and their dogs are running Windows as administrators.

            There is still a fair bit of software which requires you run it as an administrator. Or if it doesn't, it doesn't exactly make life easy for those who'd like to run it as a non-admin account.

            There is also the Windows XP (don't know if Vista does the same thing, but I doubt it... finally) "feature" where it prompts you to create a user account at install time, explaining that this is "good practise". And then it immediately g
          • That is not really a solution. What if the user wants to install programs that legitimately need admin access(Eg. Virus scanners, graphics drivers, etc) ? And don't mention badly written apps and games that need admin access to run with no reason. With your solution they will have to logout and then login as an admin, which they won't put up with.

            Microsoft already tried to solve this in Vista. Even administrators run with user credentials until they need Admin access at which point they are hit with a U

          • by DrSkwid ( 118965 )
            1. Run as restricted user
            2. Double click on the clock to get the calendar / analogue clock
            3. Call the Administrator to find out why you don't have permission to open the clock !
            4. Listen bemusedly to the Administrator tell you that you can't look at the calendar because you don't have permission to change the system time.
            5. Complain that you don't want to *change* the time, just look at it!
            6. ???
            7. Non-profit
      • Re: (Score:3, Insightful)

        by haeger ( 85819 )
        Yet we happily run around screaming "Linux has no viruses", effectivly teaching our users to not be careful. And almost anything configuration-like we want to do requires a root-like password, effectivly teaching everyone to be careless with that too.

        We've got to start looking out or we will have our shiney metal asses bitten.

         

        .haeger

        • by jimicus ( 737525 )

          We've got to start looking out or we will have our shiney metal asses bitten.

          I know. Bloody wonderful, isn't it?

          The best bit is that every time someone points out that Linux having no viruses does not make it immune from malware, they're silenced by being modded and shouted down as a traditional "file-infector" type virus cannot and does not thrive on the platform.

          I'm going to pre-empt that here and now. I'm even going to shout it in the hope that it will get the point across.


          THE TRADITIONAL "EXECUTABLE F
        • Re: (Score:1, Troll)

          by DrSkwid ( 118965 )
          You can scream all you like, happy or not.
          Lunix is insecure be design.
          Root is a design fault.
          That's why it got removed in the next version [bell-labs.com].
    • by gowen ( 141411 ) <gwowen@gmail.com> on Tuesday September 11, 2007 @03:12PM (#20560617) Homepage Journal

      Skype itself is (mostly) blameless
      You what? Their program runs executable content from a URL without a warning or asking for confirmation. That's insanely bad design.
      • Re: (Score:3, Informative)

        The saddest part about Slashdot is that people read the summary or sometimes a misleading articles, assume things and then comment away which is modded up by moderators who don't have much clue either. Then you see someone picking out holes in the summary and article and usually getting modded up(a good thing!). And then one looks at all the modded up wrong comments and thinks "WTF were these people thinking up when they were posting/modding up this crap?"

        All Skype does is auto link URLs and make them

        • Regardless of how much blame goes to Microsoft, to Skype, and to users for running unknown executables, all of them are harmed by it and have an interest in fixing it. For users the best thing is just to take this as another warning to be careful what you click on. Myself I just try not to use Windows or Explorer, *and* try to be careful with Firefox. Though the best fix could come from Microsoft not allowing arbitrary untrusted code to be run, Skype could intercept suspicious links and add some advice - ju
          • Though the best fix could come from Microsoft not allowing arbitrary untrusted code to be run..

            The second that there is even a hint of MS doing that, everyone on Slashdot would cry wolf about MS and DRM blocking access to what the user wants. That is exactly what happened with Trusted Computing. And who gets to decide what is trusted code and what is not? Will small software vendors have to pay to get their code certified? And will I be prevented from running code that I or a friend made?

            • You're right that people will criticize Microsoft whatever they do.

              > who gets to decide what is trusted code and what is not? Will small software vendors have to pay

              I like the security model of Java Web Start (disclaimer: I work for Sun) where you decide who you trust, and they can earn your trust by paying for a security certificate from a trusted commercial issuing authority, or they can self certify with a certificate from Thawte and earn your trust in other ways. I could imagine a PGP style web of tr
  • That Windows still allows un-sandboxed executables to be run just by clicking on a link. Yes, this is technically responsibility of Skype, but it probably just uses a stock COM control to handle to URL.
    • Re: (Score:1, Informative)

      by Gothmolly ( 148874 )
      Any Unix GUI environment could allow this as well.

      ClickMe.sh

      For instance, could hose up your home directory and data pretty badly, if say, KDE's shell ran shell scripts when clicked.
      • Re: (Score:3, Informative)

        by KiloByte ( 825081 )

        Any Unix GUI environment could allow this as well.

        ClickMe.sh
        You forgot:
        chmod a+x ClickMe.sh
        Even the GUI version of the above requires at least 5 clicks in Gnome, and I guess about as much in KDE.
    • Re:Amazing (Score:4, Informative)

      by recoiledsnake ( 879048 ) on Tuesday September 11, 2007 @03:16PM (#20560699)
      Uh. IE7 on Vista runs in a sandbox(note that this is to mitigate the damage caused by buffer overflows in IE code and not intended to sandbox executable/virus code), and warns you square whenever that boundary is breached(by opening a PDF, EXE or SCR, for example). Additionally, if the EXE requests admin privileges(required to install a rootkit, for example), the infamous UAC dialog appears. And if someone gives admin access when they wanted to view a JPEG, how is it Windows' or Skype's fault? Also, most versions of windows I have used(since 95) ask before opening executable files(even .SCR) So, Windows does not "still" allow un-sandboxed applications to run just clicking links. If users expect a JPEG but get a .scr or exe they have plenty of time/opportunity to click NO. This is not Windows or Skype's fault. It's just clueless users getting owned.
      • Also, most versions of windows I have used(since 95) ask before opening executable files(even .SCR)

        You clearly don't remember the Outlook Midi exploit.

        • Two things. Firstly, MIDI are not "executable" files, like .EXE, .COM, .SCR, or .PIF

          Second, I meant to say browsers in the versions of Windows(this is what TFA is about) and not other apps like Outlook. But, point taken.

          • Re: (Score:2, Interesting)

            by jawtheshark ( 198669 ) *

            Ehm, you really don't remember, do you? There was functionality in Outlook that allowed emails to run midis, except it didn't check the MIME type and ran whatever declared itself as being a midi, including EXE, COM, SRC and PIF. So, the person opening those emails got infected by "just opening the email"

            That was back in the day that we computer scientists were laughing at those "open an email and get virus emails". We didn't count with Outlook.... *sigh* That was a long time ago...

            • by DrSkwid ( 118965 )
              There was also a buffer overrun in the Date: parsing, no need to open anything.
              Then there was auto-executing HTML with embedded ActiveX controls and other documents.

              Checking the MIME Type is hardly a security measure, it's just a header.
              The only way to test a file is to process it with the application. Rememeber the recent MS image opening ownage.
      • by SEMW ( 967629 )

        ...warns you square whenever that boundary is breached(by opening a PDF, EXE or SCR, for example). Additionally, if the EXE requests admin privileges(required to install a rootkit, for example), the infamous UAC dialog appears.

        Actually, technically the first dialogue is a UAC dialogue as well. The "sandbox mode" is really just another privilege level; just a really low one -- much lower than standard user -- so the normal "sandbox dialogue" is an elevation request from "really low" to "standard user".

        Incidentally, that's another reason why it's a bad idea to turn off UAC.

  • by Nimey ( 114278 ) on Tuesday September 11, 2007 @03:02PM (#20560433) Homepage Journal
    They're getting back at all the people who rebooted last month.
  • blithely (Score:3, Funny)

    by AbbyNormal ( 216235 ) on Tuesday September 11, 2007 @03:11PM (#20560605) Homepage
    blithely click my signature link for more information on this developing story!
  • by Thagg ( 9904 ) <thadbeier@gmail.com> on Tuesday September 11, 2007 @03:15PM (#20560669) Journal
    Three weeks ago, Skype was down for quite a while. Was it possible that it was not the benign "updating software" [slashdot.org] that they had previously reported? Perhaps it really was some kind of malicious attack [slashdot.org].

    An aquaintance of mine was hit by this today, he only ran Skype ever with his wife and daughter -- it seems hard to imagine how bad guys got ahold of his address, unless perhaps somebody downloaded the whole database.

    Thad Beier

    • An aquaintance of mine was hit by this today, he only ran Skype ever with his wife and daughter -- it seems hard to imagine how bad guys got ahold of his address, unless perhaps somebody downloaded the whole database.
      Since the malware sends itself to those on an infected user's contact list, I would imagine that means he got it from either his wife or daughter.
      • Re: (Score:1, Troll)

        by jrl ( 4989 )
        Or perhaps he got it from that nice young 16 year old he's been chatting with from the office.
    • by LQ ( 188043 )
      An aquaintance of mine was hit by this today, he only ran Skype ever with his wife and daughter -- it seems hard to imagine how bad guys got ahold of his address, unless perhaps somebody downloaded the whole database.

      And the wife and daughter don't have other contacts? I guess this is just a standard address book trojan - six degrees of separation and all that.

  • How much of a lame brain must one be to fall for the same trick for the second time? A rethorical question, indeed.
    • Re: (Score:2, Funny)

      by Anonymous Coward
      As a US president once said :- "There's an old saying in Tennessee -- I know it's in Texas, probably in Tennessee -- that says, fool me once, shame on -- shame on you. Fool me -- you can't get fooled again."
  • Poor Skype... (Score:2, Flamebait)

    by brouski ( 827510 )
    Hasn't been the best two months for them, has it?

    Interesting that Microsoft is, yet again, directly or indirectly, responsible for their misfortune.
    • Please explain how this is, directly or indirectly, Microsoft's fault. Is it because they don't prohibit the running of executable files period? Or is it because they don't require a competency test to own a computer? I'd like to know.
      • by ^_^x ( 178540 )
        It's not even Skype's fault really... they support URLs.
        I guess some would say it's MS' fault because they allow malicious code to run. Personally I think trying to hold them accountable for that kind of thing just makes subsequent versions of Windows even more restricted and unusable without properly "breaking them in." :/
    • by drsmithy ( 35869 )

      Interesting that Microsoft is, yet again, directly or indirectly, responsible for their misfortune.

      Indeed. Just as interesting as how oxygen is, yet again, directorly or indirectly, responsible for their misfortune.

  • I wondering what happen to all those malware writers. Dear God, I was afraid I would have to change my sig!!! Something like, "You don't have to be smart to use Windows, you just have to be smart enough to install it" Oh the freakin' horror! I shudder to type to type such a sig. Although, this one sounds more appropriate after RTFA, "You can't be dumb to use Windows, you just have to be dumb enough to install it"
  • by RAMMS+EIN ( 578166 ) on Tuesday September 11, 2007 @04:11PM (#20561707) Homepage Journal
    Yet again, us Linux users are left out. The program works only on Windows/x86. And here I am, on my glorious Linux/ppc box, just having painfully gotten Skype to work...and they introduce a new feature that I can't access...boohooo!

    (I kid. I hate Skype passionately (for getting everybody on a proprietary solution when open protocols exist) and would never go through any amount of trouble to get it installed on my computer.)
    • Speak for yourself me and my girlfriend who is 8000 miles away have been trying numerous different voip and webcam services. I'm on Ubuntu with 1Mb and she's on Window's 56k at Home and a 1 Mb line at work.

      It is a lot better then any other voip service Linux can offer. Ekiga sucks compared to Skype voice. Gtalk might be able to beat it in the future but the apps just arn't there and stable right now to support it out of the box. I found Ekiga which comes in a default Ubuntu install to be too quiet and doesn
      • 8000 miles away? I think a simpler and better solution would be to just get a new girlfriend who lives nearby.
    • Crappy code or not, it works well on Windows and Mac machines. It's easy to set up. Its SkypeOut rates are extremely cheap and the call quality is pretty good. It also does video extremely well and works easily with most webcams. But it's going to have to clean up its act when it comes to security because there are some alternatives emerging -- like GizmoProject [gizmoproject.com]. GizmoProject is great, and uses an open standard, but does not do video nor does it show any intentions of adding it. So scratch that one for me f
      • Ah, video. Another thing that Skype added long after the open world had it (at least Ekiga, then Gnomemeeting, did)...and now people are using Skype, because it has video!

        Sorry. I'm bitter. Feel free to ignore me.
  • And I have actually clicked those links. But do nor worry about me and do not call me stupid. I just wanted to see, whether something new happen in the malware scene. Yet I was disappointed - same shitty *.scr binary file. I've seen this years before... Same stupidity-driven "worms" with end users to blame (and, to lesser extend, windows is also to blame since it executes the files without asking, where is chmod +x when you need one...).
    BTW, I was asked by Firefox whether I want to download those files. A
    • by drsmithy ( 35869 )

      Same stupidity-driven "worms" with end users to blame (and, to lesser extend, windows is also to blame since it executes the files without asking, where is chmod +x when you need one...).

      Windows does not execute downloaded binaries without prompting.

      Further, having to chmod +x would add an additional step, but anyone silly enough to download and run some random binary from an IM is hardly going to be slowed down by that - just look at how many people fell victim to the trojan that arrived in a *password

    • by tacet ( 1142479 )
      i did. it doesn't. :)

      interesting thing was, that on my windows box it closed ethereal, never to allow run it again.
  • Perhaps chat clients should by default ban files with executable extensions, namely .exe, .com, .scr and .bat. Links should not even be shown to the user if the file is masked as .jpg, .png, .avi, or any non-executable extension.
    • by DrSkwid ( 118965 )
      Using the filename to decide what to try and execute is already retarded, please don't heap any more shit on an already shitty idea.

      We're still living with .htm ffs

      I blame Apache and it's "let's map uri's straight to filenames" idiocy
  • This isn't a skype worm, it's a human worm. It requires humans to download and install a piece of malignant code, whereupon it simply uses skype to send messages to exploit further vulnerabilities in the human.
    • Actually, it's neither. It is a Skype trojan. It's a trojan because it must trick the user into installing it. It's a Skype trojan because it actually links to Skype to spread itself to other Skype users. So if you're not using Skype, the chance of being infected with it is essentially nil.

      • by Sj0 ( 472011 )
        Oh, I agree.

        But if we're going to call it a 'worm' or 'virus', we've got to accept the vulnerability being exploited: The human.
        • Of course. But I'm waiting for the day that a real virus comes out for Skype. I'm not trying to be a troll. I just feel certain that Skype is a gaping security hole waiting to be exploited, and I can't figure out why no hacker has turned the Skype network into his own personal bot network yet.

          I can only think of two valid reasons for them to stay away from it. One is that they're being lazy and going after lower hanging fruit. The other is that hackers probably all love using Skype because they love having
  • Assume (Score:2, Funny)

    by ShawnCplus ( 1083617 )
    Do we really need the title to say "Windows PCs"? I thought that was implied any time malware was concerned.
    • Re: (Score:3, Insightful)

      by cbiltcliffe ( 186293 )

      Do we really need the title to say "Windows PCs"? I thought that was implied any time malware was concerned.

      Yes, we do. Because for a start, every time we don't, Linux/BSD/Mac/FreeDOS/Solaris-x86 fans complain that it's not "PCs" that are vulnerable, it's Windows. Which is true. Also, since the article says Windows PCs, the /. summary is just quoting that. It's also a good thing that the article states this, because the less technical crowd who might read it may notice that it's only Windows PCs that a

  • by OrangeTide ( 124937 ) on Tuesday September 11, 2007 @07:13PM (#20564279) Homepage Journal
    When will native Linux support for this worm/trojan become available?

    Also could you post the link so that I can try porting the .scr to .pl ?
  • Time to mention Ekiga [ekiga.org] (formerly GnomeMeeting) and OpenWengo [openwengo.org]. They suck, but there you go...
  • A serious question: how would Unix/Linux systems be immune to this kind of malware as they become more and more popular? Well, apart from lesser incidence of users running as "root" and more varied binary landscape (which would make it just a tad harder to spread executables, but still i386 exe linked against reasonably fresh glibc will run on majority of linux systems, right?), well, apart from that I don't see how one cannot make a linux spam-sending bot or whatever that would run every time a user logs i
    • Illiterate users will have no idea how to make chmod +x. Besides, it is possible to prevent execution of a file from any non-root-owned folder. But even without this measure the whole system is hardly to be compromised - only the users profile. And it's much easier to deal with than with an infected windows machine where only full reinstall helps.
  • ...you can hear the worm slithering into your ears when you use SKYPE.

"How do I love thee? My accumulator overflows."

Working...