Yahoo Messenger bug allows status message hijacking
Posted on 02 December 2011.
Yahoo Messenger users are in danger of getting their status messages changed without their consent and finding themselves inadvertently peddling malware.

The zero-day exploit is present in versions 11.x of the Yahoo Messenger client - including the very last released version - and allows remote attackers to very easily hijack the victim's status.

"The status message change occurs when an attacker simulates sending a file to a user," explains BitDefender. "This action manipulates the $InlineAction parameter (responsible for the way the Messenger form displays the accept or deny the transfer) in order to load an iFrame which, when loaded, swaps the status message for the attacker's custom text."

The changed message can include links to malicious sites or - a lesser evil - affiliate links. And unfortunately, the attack is possible even if the attacker is not included in the victim's contact list.

Users can currently partly protect themselves from such an attack if they change their Yahoo Messenger settings so that anyone who is not already on their contact list is ignored. And they should, since the attack has been spotted in the wild. But that doesn't protect them if one of their contacts fell for the scheme and his/her account is now sporting a malicious message.

The researchers say that they have contacted Yahoo! and sent the proof-of-concept code and the documentation to them, so let's hope the bug will be fixed soon.






Spotlight

Fake "Online Ebola Alert Tool" delivers Trojan

Posted on 29 October 2014.  |  Cyber scammers continue to take advantage of the fear and apprehension surrounding the proliferation of the Ebola virus.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Oct 30th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //