Chapter 7. Instant Messaging Attacks
The world of Instant Messaging is full of warring bots, viruses, and Trojan attacks. Malicious hackers use instant messaging as a way to communicate with each other, as a way to compromise computers and networks, and as a way to allow their rogue creations to communicate with them. If this medium was able replace email as the default messaging model, antivirus companies would have a lot more work. Chapter 7 will explore the Instant Messaging medium.
Introduction to Instant Messaging
Instant Messaging
(IM) is
real-time communications and is popularly known as
chat
.
Instant Messaging allows a person to type a message, send it, and
have it viewed a second later by one person or thousands of people.
Most computer platforms contain some variation on the theme. The most
popular Internet chat program is AOL’s Instant
Messenger
™
(
AIM), which accounts for roughly
half of all IM traffic. Microsoft has nearly a half-dozen Windows
incarnations of IM, including MSN
Messenger
™,
NetMeeting
™
Chat
, VChat
™,
WinChat
™,
and WinPopUp
™ (for local
network use). Internet Explorer 6.0 comes integrated with MSN
Messenger. Yahoo! has Yahoo
Messenger
™. Unix has dozens of IM
programs. IBM’s Lotus division has Instant
Meeting
™ and
SameTime
™. Many email
systems are beginning to include some sort of IM client in response
to growing customer demand.
Some IM systems allow users to create lists of people who they would
like to chat with (often called buddy lists ...
Get Malicious Mobile Code now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.