Devious Chatbots - Interactive Malware with a Plot

  • Pan Juin Yang Jonathan
  • Chun Che Fung
  • Kok Wai Wong
Part of the Communications in Computer and Information Science book series (CCIS, volume 44)


Many social robots in the forms of conversation agents or Chatbots have been put to practical use in recent years. Their typical roles are online help or acting as a cyber agent representing an organisation. However, there exists a new form of devious chatbots lurking in the Internet. It is effectively an interactive malware seeking to lure its prey not through vicious assault, but with seductive conversation. It talks to its prey through the same channel that is normally used for human-to-human communication. These devious chatbots are using social engineering to attack the uninformed and unprepared victims. This type of attacks is becoming more pervasive with the advent of Web 2.0. This survey paper presents results from a research on how this breed of devious Malware is spreading, and what could be done to stop it.


Social Robot Instant Messaging Interactive Robot Social Engineering Conversation Agent 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Carr, N.: Slutbot aces Turing Test*, December 8 (2007), (Accessed January 30, 2009)
  2. 2.
    Naughton, P.: Flirty Chat-Room ‘Bot’ Out to Steal Your Identity. December 12 (2007),,2933,316473,00.html (Accessed January 30, 2009)
  3. 3.
    Ironport, 2008 Internet Malware Trends – Storm and the Future of Social Engineering, Ironport (2008), (accessed January 30, 2009)
  4. 4.
    F-Secure, Virus Descriptions: Kickin, F-Secure, May 7 (2003), (accessed January 30, 2009)
  5. 5.
    Baetiong, F.: ‘Classmates Reunion’ Used as Malware Ploy., Scientific American Mind, January 1 (2009), (accessed January 30, 2009)
  6. 6.
    Rossi, S.: Beware the CyberLover that Steals Personal Data. Computerworld Australia, December 15 (2007),,140507/printable.html (accessed January 30, 2009)
  7. 7.
    Schouwenberg, R.: Death of the IM-Worm?, July 13 (2006), (accessed January 30, 2009)
  8. 8.
    Websense, Google’s ‘Blogger’ under attack by streamlined Anti-CAPTCHA operations for spam, Websense, April 24 (2008), (accessed January 30, 2009)
  9. 9.
    Helft, M.: Facebook Gets Friended by Malware, The New York Times, August 26 (2008), (accessed Feburary 2, 2009)
  10. 10.
    Kaspersky Lab, Kaspersky Lab Detects New Worms Attacking MySpace and Facebook, Kaspersky Lab, July 31 (2008), (accessed Feburary 2, 2009)
  11. 11.
    Xie, M., Wu, Z., Wang, H.: HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-like Networks. In: Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp. 64–73. Acsac (2007)Google Scholar
  12. 12.
    Webb, S., Caverlee, J., Pu, C.: Social Honeypots: Making Friends With A Spammer Near You. In: Sixth Conference on Email and Anti-Spam (2008)Google Scholar
  13. 13.
    PandaLab, PandaLabs’ 2009 Predictions: Malware Will Increas. In: 2009, PandaLab, December 21 (2008), (accessed Feburary 2, 2009)
  14. 14.
    European Network and Information Security Agency (ENISA), Position Paper – Web 2.0 Security and Privacy. European Network and Information Security Agency (2008)Google Scholar
  15. 15.
    Hindocha, N., Chien, E.: Malicious Threats and Vulnerabilities in Instant Messaging. Symantec Security response (2003)Google Scholar
  16. 16.
    Allen, M.: Social Engineering: A Means To Violate A Computer System. SANS Institute, InfoSec Reading Room (2006)Google Scholar
  17. 17.
    National Infrastructure Security Coordination Centre (NISCC), Social engineering against information systems: what is it and how do you protect yourself?, National Infrastructure Security Coordination Centre (NISCC), NISCC Briefing 08a/2006 (2006)Google Scholar
  18. 18.
    Nichols, S.: Malware gets up close and personal. IT News Australia, Feburary 22 (2008),,malware-gets-up-close-and-personal.aspx (accessed Feburary 2, 2009)
  19. 19.
    Dirro, T., Kollberg, D.: Malware Learns The Language. Sage, Thousand Oaks (2008)Google Scholar
  20. 20.
    McAfee Avert Labs, Localized Malware Takes Root. McAfee Avert Labs (2008)Google Scholar
  21. 21.
    Greenberg, A.: Robots In Disguise., November 25 (2008), (accessed on Feburary 2 2009)
  22. 22.
    Naraine, R.: Microsoft Says Recovery from Malware Becoming Impossible. eWeek, April 4 (2006)Google Scholar
  23. 23.
    Strickland, J.: How Web 3.0 Will Work. HowStuffWorks, (accessed Feburary 4, 2009)
  24. 24.
    Nuttall, C.: The hidden flaws in Web 2.0., Global Technology Forum, Economist Intelligence Unit, The Economist, August 8 (2006), (accessed Feburary 4, 2009)
  25. 25.
    Thompson, B.: Malicious worm that talks back. BBC News, December 12 (2005), (accessed Feburary 4, 2009)
  26. 26.
    Finkle, J.: Destructive Koobface virus turns up on Facebook. Reuters, December 4 (2008), (accessed Feburary 4, 2009)
  27. 27.
    Muttik, I.: Securing Virtual Worlds Against Real Attacks. McAfee (2008)Google Scholar
  28. 28.
    Pan, J., Fung, C.C.: Artificial Intelligence in Malware – Cop or Culprit? In: The Ninth Postgraduate Electrical Engineering & Computing Symposium PEECS 2008. The University of Western Australia, Perth, Australia (2008)Google Scholar
  29. 29.
    Muncaster, P.: Firms must be alert to social engineering tricks. IT Week, September 26 (2007), (accessed Feburary 7, 2009)
  30. 30.
    Naraine, R.: Storm Worm botnet could be world’s most powerful supercomputer. ZDNet, September 6 (2007), (accessed Feburary 9, 2009)
  31. 31.
    Fong, T., Nourbakhsh, I., Dautenhahn, K.: A survey of socially interactive robots. Robotics and Autonomous Systems 42, 143–166 (2003)CrossRefzbMATHGoogle Scholar
  32. 32.
    Cohen, F.: Computer Viruses. PhD thesis, University of Southern California (1985)Google Scholar
  33. 33.
    Somayaji, A., Locasto, M., Feyereisl, J.: Panel: The Future of Biologically-Inspired Security: Is There Anything Left to Learn? In: The Proceedings of the 2007 New Security Paradigms WorkshopGoogle Scholar
  34. 34.
    Kienzle, D., Elder, M.: Recent Worms: A Survey and Trends. In: WORM 2003, Washington, DC, USA, October 27 (2003)Google Scholar
  35. 35.
    Evans-Pughe, C.: Natural Defenses. Engineering & Technology (September 2006),
  36. 36.
    Forrest, S., Hofmeyr, S.A., Somayaji, A.: Computer Immunology. Communications of the ACM 40(10) (October 1997)Google Scholar
  37. 37.
    Youansi, G.N.: Artificial Immune System. Communication and Operating Systems Group, Berlin University of Technology (2006)Google Scholar
  38. 38.
    Goh, O.S., Fung, C.C.: Intelligent Agent Technology in E-Commerce. In: Liu, J., Cheung, Y.-m., Yin, H. (eds.) IDEAL 2003. LNCS, vol. 2690. Springer, Heidelberg (2003)Google Scholar
  39. 39.
    Ward, M.: Has text-porn finally made computers human. BBC News, Feburary 20 (2004), (accessed January 30, 2009)
  40. 40.
    Epstein, R.: From Russia, with Love. Scientific American Mind (2007)Google Scholar
  41. 41.
    Angeli, A., Johnson, G.I., Coventry, L.: The unfriendly user: exploring social reactions to chatterbots. In: International Conference on Affective Human Factors Design, Asean. Academic Press, London (2001)Google Scholar
  42. 42.
    Goh, O.S., Fung, C.C., Depickere, A., Wong, K.W.: An Analysis of Man-machine Interaction in Instant Messenger. Advances in Communication Systems and Electrical Engineering (2008)Google Scholar
  43. 43.
    Fogg, B.J.: Persuasive Technologies. Communications of the ACM 42(5) (May 1999)Google Scholar
  44. 44.
    SpywareGuide, Kelvir.EB. FaceTime Security Labs, (accessed May 17, 2009)
  45. 45.
    Cyberlover, (accessed May 17, 2009)

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Pan Juin Yang Jonathan
    • 1
  • Chun Che Fung
    • 1
  • Kok Wai Wong
    • 1
  1. 1.School of Information TechnologyMurdoch UniversityMurdochWestern Australia

Personalised recommendations