A record number of instant messaging worm mutations is undermining
network security, according to new analysis.
Security and IT administrators have been aware of IM worms and viruses
for some time now. How seriously they have been taking that threat just
might be another issue, according to some analysts.
And some say it’s time to pick up the vigilance.
”Administrators probably need to ratchet up their concern,” says
Patrick Hinojosa, CTO of Panda Software U.S., an anti-virus company. ”I
see some concern out there, but I don’t see probably as much attention on
it as there should be… It’s punching a hole through the front-end
defenses and then it goes directly back to the network.”
The IMLogic Threat Center, an arm of IMlogic Inc., an instant messaging
management and security company, reports that 88 percent of IM worms
tracked have mutated at least once in the last 11 months. They also
report that there have been a record number of IM threat mutations —
meaning the malware attacking instant messaging software is increasingly
producing variants.
Art Gilliland, vice president of products at IMLogic, says there are a
few IM worms that have produced more than 100 variants over the last 10
or 11 months. Kelvir is one of them, mutating 123 times this year.
In addition, traditional email worms have begun spreading through IM. For
example the email Rbot worm, which has produced more than 600 variants
since first being discovered in email, now has more than 13 mutations
using IM for distribution.
Gilliland says between October 2004 and the same month in 2005, IM
malware grew by 1,500 percent. And comparing all of 2004 to January
through mid-November of 2005, IM malware has jumped 2,200 percent. That
adds up to 2,002 unique viruses that have been identified so far this
year, compared to 134 that were identified last year.
Gilliland adds that IM viruses pose a unique threat because of how
quickly they can spread over this particular communication software.
Email sees slower distribution. An IM malware, according to Gilliland,
could spread as quickly as to 2,000 or 3,000 machines in 15 minutes.
”We’ve seen quite a bit of activity on the mutli-variant front with IM
worms, without a doubt,” says Ken Dunham, a senior engineer for VeriSign
iDefense Intelligence based in Mountain View, Calif. ”Hackers recognize
that it’s trivial to create multiple variants. It’s easy pickin’s for
people to pick off the low-hanging fruit in the IM environment. Low
hanging fruit is the consumer on their home computer… and companies
allowing for non-compliant installation of software. They’re definitely
more at risk. If you allow people to do what they want on their computer,
then you’re at a much higher risk than admin who lock down the desktop.”
But Dunham points out that millions more people use email compared to
those using instant messaging. And since people also use a variety of IM
software — AIM, Yahoo, MSN — that also makes it harder for a hacker to
target a wide swath of IM users.
But Panda’s Hinojosa says as IM usage increases, so will the threats.
”As IM usage increases, it will continue to be more dangerous,
especially on the corporate side because it’s largely an uncontrolled
means of communication,” he says.
Ethics and Artificial Intelligence: Driving Greater Equality
FEATURE | By James Maguire,
December 16, 2020
AI vs. Machine Learning vs. Deep Learning
FEATURE | By Cynthia Harvey,
December 11, 2020
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2021
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.