The notorious Koobface malware has started using Google's Reader service to spread further.
Researchers say that the new attack uses spammed messages that send users to the compromised pages on the Reader service. When the user clicks on a fake video embedded in the page, traffic is diverted to another site that attempts to run a remote exploit and malware installation.
Trend Micro senior security adviser Rik Ferguson noted that the attacks provided a slight variation on the Koobface attacks that surfaced earlier this year. The company estimates that some 1,300 accounts have already been compromised.
"Cybercriminals are taking advantage of Google's credibility by hiding their malicious links behind Google Reader," said Ferguson.
"This is a new twist on the familiar Koobface infection routine, where victims are asked to install Adobe Flash updates in order to view a video that appears to be shared on the Google Reader website."
The Koobface worm and its associated botnet have gained notoriety in security circles for its longevity and history of targeting social networking sites. First surfacing in 2008 within MySpace and Facebook, the worm later resurfaced in 2009, this time targeting Twitter users.
Battery development could help boost performance of smartphones
Topological photonic chips promise a more robust option for scalable quantum computers
In quantum physics both the chicken and the egg can come first, claim University of Queensland researchers
Cause-and-effect is not always straightforward in quantum physics
Mark Carney said that about 10 per cent of UK jobs would be replaced by automation: lower than earlier estimates