The notorious Koobface malware has started using Google's Reader service to spread further.
Researchers say that the new attack uses spammed messages that send users to the compromised pages on the Reader service. When the user clicks on a fake video embedded in the page, traffic is diverted to another site that attempts to run a remote exploit and malware installation.
Trend Micro senior security adviser Rik Ferguson noted that the attacks provided a slight variation on the Koobface attacks that surfaced earlier this year. The company estimates that some 1,300 accounts have already been compromised.
"Cybercriminals are taking advantage of Google's credibility by hiding their malicious links behind Google Reader," said Ferguson.
"This is a new twist on the familiar Koobface infection routine, where victims are asked to install Adobe Flash updates in order to view a video that appears to be shared on the Google Reader website."
The Koobface worm and its associated botnet have gained notoriety in security circles for its longevity and history of targeting social networking sites. First surfacing in 2008 within MySpace and Facebook, the worm later resurfaced in 2009, this time targeting Twitter users.
Cotton seedling freezes to death as Chang'e-4 shuts down for the Moon's 14-day lunar night
Fortnite easily out-earns PUBG, Assassin's Creed Odyssey and Red Dead Redemption 2 in 2018
Meteor showers as a service will be visible for about 100 kilometres in all directions