Skip to main content

Instant Messaging - new threat for a changeable communications scene

Instant Messaging (IM) has emerged as of the most successful and widely deployed applications on the Internet. Unfortunately, this success has come at a heavy price, with IT attackers shifting their attention to IM, propagating IM-born viruses, worms, spam over IM (SPIM), malware and phishing.

Alarmingly, despite its wide adoption and equally impressive security onslaughts, IM still remains generally unprotected in both consumer and enterprise environments, leaving it exceedingly vulnerable to attacks and exploits.

Gartner experts take it one step further stating that IM has become an e-mail alternative for distributing viruses and other malware. At the same time, only 10% of organisations have formal IM policies in place, according to a 2007 Burton Group survey. And of those, only half secure the application. Many don’t even know whether employees are using IM.

Looking purely from an enterprise perspective, IM poses the two key threats: it opens new vulnerabilities through which information can leak or be leaked, leading to user privacy concerns and the potential loss of intellectual property; and it creates invisible communications channels that operate below the radar of conventional information security measures, exposing the organisation to regulatory compliance breaches.

The reality is that IM has become a severe threat and requires considerable user awareness coupled with security solutions, both in the consumer and enterprise spaces, to ensure that it does not turn into a monster that we cannot control.

Here are just some examples of just how sophisticated IM threats have become. We are now faced with threats such as a talking worm, which essentially imitates an IM user by engaging the end-user in a dialogue. Even more shockingly is that many of these threats are even multilingual, talking to the end-user in his or her native tongue.

Threats have also become more agile and are able to cross from one network to another and cross from public IM networks to internal IM servers. This is particularly relevant given the trend toward IM interoperability.

Also, threats are increasingly avoiding anti-virus identification through the rapid multiplication of their payload signature. Attackers are also using root kit software to hide the process, files, and registry keys for the software used in their attacks. The impact will not be detected as quickly by the end-user, which makes it even more dangerous.

The bottom line is, while organisations have invested significant resources and time in protecting e-mail and Web communications, they have failed to recognise that IM represents a new wave of security onslaughts that not only harms end-users but also impacts company intellectual property.

In order to put a stop to IM attacks, organisations and users have to implement appropriate security precautions and technology to secure their messaging communications.

In the enterprise space, these solutions should address the threats posed by phishing, malware and blended attacks, since IM is particularly susceptible to social engineering tricks. Additionally, IM’s real-time nature causes malware to spread rapidly.

Plus, in order to stop the leakage of intellectual property, companies should invest in tools that track, audit and even block certain IM conversations, while enforcing acceptable-use policies and comply with regulations and legal restrictions.

There are currently a number of comprehensive security options available catering to both individual users and enterprises. High-end products offer comprehensive solutions that address and mitigate the potential risks associated with the use of IM in the enterprise while for individual users or smaller organisations anti-virus and Internet security software suite includes integrated IM security features.

IM security must enjoy the same priority as e-mail and Internet; it is a real threat that is creating a playground for attackers to exploit us when we are at our most vulnerable. Invest in a reputable security solution and apply due diligence, enforcing same measures as you would in the case of suspicious-looking e-mails, attachments and Web sites.

Author: Tich Mugwara, Symantec security product manager at DCC
Source: http://www.computingsa.co.za/article.aspx?id=841434

Comments

Popular posts from this blog

Want To Get Answering Machine For Your IM?

Computer's personal often face problems when they have to take a break from their PC for some time and can’t answer to emails and instant messages. Actually, for email you can set up an autoresponder if you use Outlook software, and there’s a way out for gmail, too. But what can you do with your instant messenger? I have a lot of IM accounts for any purposes with different people in each account. So what utility can tell these people that I am out on a vacation or down with fever? Answer.im comes to the rescue by setting up an automated web based answering machine for your instant messenger. It works with MSN, ICQ, AIM, Yahoo and Google Talk as of now. How it Works Setting it up is very simple. First, hop over to http://answer.im/. Then, select your IM network (like GTalk, Yahoo, etc). Fill in your username and password and hit Login. Features Now, you can customize your automated reply and select the status you would like your account to remain at. Since the service is web based, ...

Durov: The phone of the richest man in the world was hacked through WhatsApp.

The founder of "VKontakte" and Telegram Pavel Durov said that back in November 2019 he warned about the vulnerability of the WhatsApp application, through which hackers hacked the smartphone of the richest man on the planet Jeff Bezos. Durov wrote about it in his Telegram-channel. Earlier, the company Facebook, which owns WhatsApp, noted that the businessman's mobile phone was hacked because of vulnerabilities in the operating system from Apple. At the same time, Durov is convinced that the problem is not iOS. " WhatsApp in its marketing campaign uses the words 'end-to-end encryption' as a magic spell, which itself should ensure the security of all communications. But this technology alone cannot guarantee absolute confidentiality," says the founder of Telegram. One of the drawbacks of end-to-end encryption, he says, is that backups of transmitted data are often not encrypted. In addition, says Durov, each application has "ways around...

Primus to Provide VoIP for MSN Messenger

Primus Telecommunications Group, Inc. has entered into an agreement with Microsoft Corp. to provide Voice-over-Internet Protocol (VoIP) services for MSN Messenger Service customers. Marketed as "PrimusTalk," once a user has logged into MSN Messenger Service, calls can be made by clicking on the "Make a Phone Call" link. A phone dialer will appear where a call can be made to any number -- national, international or mobile. The McLean, Va.-based Primus will provide PrimusTalk service as an Internet telephony application that can be accessed by any user accessing MSN Messenger Service. Specifically, the PC-to-phone service will be integrated with the MSN Messenger Service as an option that may be accessed by users of Microsoft client software programs. "Primus is leading the way to a carrier class era of converged communications solutions," said John Melick, co-president of Primus and one of the principal developers and implementers of the company's VoIP ...