A worm targeting Skype is harvesting email addresses and directing users to a range of sites hosting other malicious software, according to security vendors.

Once a machine is infected, the worm sends a malicious link via IM to other users in that person's Skype contact list, said an entry on F-Secure's blog.

The link leads to an executable file that downloads a Trojan horse capable of downloading other malicious software, F-Secure said. It then shows a photo of a "lightly dressed" woman.

The link also directs users to at least eight websites with information about Africa. It's not clear what type of scam or harm those pages intend, but some of the sites have advertising on them, indicating that it might be a click-fraud scam, said Graham Cluley, senior technology consultant for Sophos. Click fraud refers to the various tricks used to get clicks on advertising banners, which generate revenue for web page owners.

Skype has been targeted by worms in the past, one as recently as last month, none of which have inflicted great damage, and this one may be no different. "I would think this thing isn't likely to spread terribly far and wide," Cluley said.

That's partly because malware spread via IM does not generally infect as many people as malware spread through more conventional routes, such as email, Cluley said. Also, users can reply to a suspicious IM and ask the sender about the link, and the lack of a response can tip off the user that something is awry.

Some sophisticated IM malware can generate an automated response to trick the user into clicking on the link, but this one does not appear to have that capability, Cluley said. However, it does set Skype to "do not disturb" status, which blocks incoming calls and other notifications, and also prevents a user from responding to an IM, Cluley said.

F-Secure calls the worm "IM-Worm:W32/Pykse.A," and Sophos named it "Mal/Pykse-A."