'Skype-Defender' Steals Rather Than Defends - InformationWeek
IoT
IoT
Software // Enterprise Applications
News
10/17/2007
06:12 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%
RELATED EVENTS
Dun & Bradstreet CAO Discusses Her Roll & The Skills Needed to Do the Job
Jul 26, 2017
LWhat does a chief analytics officer do each day? To help us answer that question we welcome Dun & ...Read More>>

'Skype-Defender' Steals Rather Than Defends

Pretending to be the plug-in, the PWS-Pykse Trojan is similar to the 32/Pykse.worm in that it depends on tricking victims into executing the malicious code.

Skype once again is being targeted by malware authors aiming to steal information from Skype users.

"Today we came across a new Trojan, PWS-Pykse, which attempts to steal Skype usernames and passwords," McAfee security researcher Pradeep Govindaraju said in a blog post on Wednesday. "This Trojan purports itself as a 'Skype-Defender' plug-in for Skype. It displays a fake login window to trick the user into entering the login credentials."

Last month, Govindaraju detailed the 32/Pykse.worm, which uses Skype and social engineering techniques to spread.

The PWS-Pykse Trojan is similar to the 32/Pykse.worm in that it depends on tricking victims into executing the malicious code. Once activated, the Trojan kills the Skype program and displays a fake Skype login window, aiming to capture personal information.

"When the user enters the Skype username and password, the malware displays a message saying that the name and password were unrecognized," explained Skype spokesperson Villu Arak in a blog post. "The malware collects the entered Skype username and password, as well as all usernames and passwords saved in Internet Explorer, and sends them over to a Web site that collects this stolen data."

Arak said that F-Secure, FaceTime Security Labs, Symantec, TrendMicro, and WebSense have been notified. Presumably, up-to-date security software from these companies will block or remove the Trojan. Those wanting to remove the file manually should look for a file named "65404-SkypeDefenderSetup.exe."

If it's any consolation, the fake Skype interface should be easy to spot. "An alert Skype user would notice that it looks very different from the normal Skype login window -- especially since none of the hyperlinks or options displayed are functional!" said Govindaraju.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
[Interop ITX 2017] State Of DevOps Report
[Interop ITX 2017] State Of DevOps Report
The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll