In 2011 the Code was first identified by the Danish cyber security company CSIS. The AV-company Sophos reported in November 2011 that this threat mainly spreads itself through malicious links through the social networkFacebook. In 2013, Bitdefender Labs caught and blocked the worm, which is capable of spying on users' browsing activities, meanwhile stealing their personal online/offline information and/or credentials, commonly known as cybercrime. The infection was originally flagged by the online backup serviceMediaFire, who detected that the worm was being distributed camouflaged as an image file. Despite the misleading extension, MediaFire successfully identified the malicious image as an.exe-file. The malicious Shikara Code poses as a.jpeg image but is indeed an executable file. As an IRC bot, the malware is simply integrated by the attackers from a control and command server. Besides stealing usernames and passwords, the bot herder may also order additional malware downloads. MediaFire has then taken steps to address incorrect and misleading file extensions in an update, which identifies and displays a short description by identifying specific file types. To help users for this specific threat, the file sharing service also blocks files with double extensions, such as.jpg.exe,.png.exe, or.bmp.exe. Just like usual malware, the Backdoor.IRCBot.Dorkbot can update itself once installed on the victim's computer or other related devices. The biggest risk is that someone's Facebook contacts may have had their account already compromised and that the account user has been allured by clicking on a link seemingly posted by one of their friends. Although the links pretend to point to an image, the truth is that a malicious screensaver is hidden behind an icon of two blonde women. After the code is launched it attempts to download further malicious software hosted on a specific compromised Israeli domain. The malware is currently not present on the Israeli website. All that remains is a message seemingly from the intruders, that says: It is likely that they are using additional or other websites in continuing spreading their cyber attack. Some other popular baits tricking users to click on malicious links include Rihanna or Taylor Swift sex tapes.