Skip to main content

Worm Targets Skype VoIP Application

Remember back in the good old days when viruses floated around on floppy discs? Or, more recently, when your biggest threat of having a worm take over your computer was using Microsoft’s Internet Explorer or Outlook email program, knowing that even if you dutifully downloaded the latest updates, you could never quite be sure you were safe? Well, malware writers have been expanding their horizons, and any software application with a large user base is sure to be a target. Case and point, VoIP application Skype and its more than 170 million users.

According to antivirus and security vendor F-Secure, a new worm is targeting the Skype application for Windows, harvesting the machine for email addresses and directing users to a range of Web sites hosting malware. Once the worm has set itself up on a machine, it sends a malicious link to users in the infected machine’s Skype contact list via instant messaging; that link leads to a Trojan application which can download additional malicious software while showing an image of a “lightly dressed” woman…presumably to distract users. The worm also points users to a selection of sites about Africa; Sophos’ Graham Cluley speculates the links may be an attempt at click fraud, using the compromised PCs to “generate advertising revenue for them by increasing their number of ‘hits’.” It also sets a user’s status to Do Not Disturb, block inbound calls and messages.

The new worm—dubbed “Pykse A”—is not the first worm to target the Skype application’s instant messaging capability, although none of the previous efforts have been widespread in comparison to other malware targeting the Windows platform. At first glance, the Pykse worm doesn’t appear to be on track for wide propagation, but the increasing advent of Skype worms raises security concerns, and points to the potential risk of using VoIP and instant messaging software to both organizations and individuals. “Our advice would be for companies to audit the software that their users are running,” said Cluley, “not only to prevent potential malware security issues—but also because of the other risks that unauthorized software can bring to company data and networks.”

Geoff Duncan
Former Digital Trends Contributor
Geoff Duncan writes, programs, edits, plays music, and delights in making software misbehave. He's probably the only member…
A dangerous new jailbreak for AI chatbots was just discovered
the side of a Microsoft building

Microsoft has released more details about a troubling new generative AI jailbreak technique it has discovered, called "Skeleton Key." Using this prompt injection method, malicious users can effectively bypass a chatbot's safety guardrails, the security features that keeps ChatGPT from going full Taye.

Skeleton Key is an example of a prompt injection or prompt engineering attack. It's a multi-turn strategy designed to essentially convince an AI model to ignore its ingrained safety guardrails, "[causing] the system to violate its operators’ policies, make decisions unduly influenced by a user, or execute malicious instructions," Mark Russinovich, CTO of Microsoft Azure, wrote in the announcement.

Read more