Malicious Mobile Code: Virus Protection for Windows By Roger A. Grimes Slots : 1
Table of Contents
Chapter 7. Instant Messaging Attacks
Typically, IM programs are used to install normal (non-IM) Trojans or viruses, and if so, they follow the removal instructions of those chapters. If, however, your IM software has been maliciously modified, follow these instructions:
Use an antivirus scanner.
If the antivirus scanner recognizes the IM malicious code, let the scanner attempt to remove it.
Delete IM software.
If you believe that IM client software has been compromised, delete the entire program. There is no easy way, without checking everything to know what has been compromised and how. Search for and clean up any other system manipulations by following the steps recommended in the chapters on viruses and worms. Restore the IM program or the entire system from backup, if needed. Only reinstall the IM software if you absolutely need to.