Skype Worm in the Wild – W32.Chatosky


A new worm is spreading fast on the Skype network, it’s activated by a malicious Skype Chat link and it has been seen in the wild in numerous places.

Apparently the dangerous link starts with “Check this!” pointing to a .org/.biz address, if you click the link you’ll become infected.

There have been no reports of unpatched issues with Skype so the vector for the attack at present is unknown, after discussion with the Skype developers it’s found the Trojan is using features from the Skype API to propogate, so there is no flaw in Skype.

The end-user who is running Skype does get notified that a program is attempting to access it and must acknowledge it.

From Websense the details we have are:

  • The filename is sp.exe
  • Assuming the file is run it appears to drop and run a password stealing Trojan Horse
  • The file also appears to run another set of code that uses Skype to propagate the original file
  • The file is packed and has anti-debugging routines (NTKrnl Secure Suite packer)
  • The file connects to a remote server for additional code
  • The original site has been black holed and is not serving the code anymore
  • The original infections appear to be in APAC region (Korea in particular)

It appears that Symantec uses name W32.Chatosky when they released a description document about the worm.

The malware queries Skype for random users every three minutes and an error message is being displayed if there is no Skype installed to the system.

As always be wary :)

Posted in: Malware, Networking Hacking

, , ,


Latest Posts:


RandIP - Network Mapper To Find Servers RandIP – Network Mapper To Find Servers
RandIP is a nim-based network mapper application that generates random IP addresses and uses sockets to test whether the connection is valid or not with additional tests for Telnet and SSH.
Nipe - Make Tor Default Gateway For Network Nipe – Make Tor Default Gateway For Network
Nipe is a Perl script to make Tor default gateway for network, this script enables you to directly route all your traffic from your computer to the Tor network.
Mosca - Manual Static Analysis Tool To Find Bugs Mosca – Manual Static Analysis Tool To Find Bugs
Mosca is a manual static analysis tool written in C designed to find bugs in the code before it is compiled, much like a grep unix command.
Slurp - Amazon AWS S3 Bucket Enumerator Slurp – Amazon AWS S3 Bucket Enumerator
Slurp is a blackbox/whitebox S3 bucket enumerator written in Go that can use a permutations list to scan externally or an AWS API to scan internally.
US Government Cyber Security Still Inadequate US Government Cyber Security Still Inadequate
Surprise, surprise, surprise - an internal audit of the US Government cyber security situation has uncovered widespread weaknesses, legacy systems and poor adoption of cyber controls and tooling.
BloodHound - Hacking Active Directory Trust Relationships BloodHound – Hacking Active Directory Trust Relationships
BloodHound is for hacking active directory trust relationships and it uses graph theory to reveal the hidden and often unintended relationships within an AD environment.


Comments are closed.