What should I do if my computer is infected with an instant messaging (IM) Trojan?

Important:
To avoid viruses spread via instant messaging (IM), think before you click; if you receive a message out of the blue, with nothing more than a link and/or general text, do not click it. For more, see Tips for staying safe online.

If your computer is infected with an instant messaging (IM) Trojan, the remote attacker can, among other things, control chat sessions, send the Trojan to people on your buddy list, and perform Denial of Service (DoS) attacks using your computer.

If you're notified that your computer is sending a virus or participating in DoS attacks, immediately unplug the network cable and reformat and reinstall your operating system. Additionally, if you were running IM software while logged into your computer with administrative rights, any infection contracted through that software will have administrative rights also, and you will have to reformat and reinstall the operating system. It is not sufficient to simply remove the infection, because doing so will not remove any programs that may have been installed with administrative rights while the computer was compromised. For help reformatting and reinstalling your system, see:

It is safest to run IM software without administrative rights, as outlined in About the principle of least privilege If you were following the principle of least privilege at the time of infection, University Information Security Office (UISO) at Indiana University may consider using a cleaning tool or deleting your profile instead of wiping your computer.

Following are examples of infections that can be spread via IM applications:

Note:
For recommendations about antivirus software, see Recommended antivirus software at IU.

This is document aqhm in the Knowledge Base.
Last modified on 2015-07-08 00:00:00.

Contact us

For help or to comment, email the UITS Support Center.