Vulnerabilities are plaguing self-publishing Web tools, exposing bloggers to attacks.
Bloggers who use infected tools could unwittingly turn their sites into a delivery platform for spyware, security experts warn.
"It is one more link in the commerce chain of illicit adware," said Richard Stiennon, chief of technology at, a maker of anti-spyware technology.
Spyware has plagued Web surfers and companies in recent years. Creators of malicious code take advantage of security vulnerabilities in e-mail software, Web browsers and desktop applications to spread code used to siphon personal information or litter a PC with advertisements. Now such rogue outfits are using blogs as a tool to increase their number of installations.
The problem only affects Web surfers using Microsoft's Internet Explorer who fail to choose the highest IE browser security settings, security experts said.
The blog vulnerability has cropped up most visibly in Google's Blogger, the most widely used blog-publishing tool. But it could affect other services as well.
Visitors to Blogger's Blogspot.com network have complained that they were exposed to infected sites when they used the "Next Blog" link. The feature was designed to help people discover new journals and takes Web surfers to a random Blogspot site.
"They left the back door wide open," said Ben Edelman, a Harvard University researcher who has documented the vulnerability on his site, referring to Blogger.
A Google representative responded by saying the company is "aware of this issue and we are looking into it."
Visitors to Blogger sites at Blogspot.com say they have been targeted with pop-up ads seeking to deliver malicious code to their computers. One ad erroneously warns people that their computers are vulnerable to spyware and prompts them to click the ad to protect themselves. Clicking the ad launches a download that infects a machine with spyware.
At least one Blogger visitor has charged that his computer was hit by an automatic download that did not require him to click on anything to become infected.
The alleged victim, an attorney at Mallory & Tsibouris, has published a cautionary note on the company's Web site: We do "not endorse the use of the 'Next Blog' at the upper right hand corner of this blog."
iWebtunes will likely get a fee each time it spreads the spyware or it might benefit from the sale of advertising. The bloggers, on the other hand, will get nothing.
Attempts to contact iWebtunes were unsuccessful. The company does not publish contact information on its Web site and uses a third party to protect its identity in the Whois database, the public registry of Web site owners. The company provided a phone number in its Whois registration, but the number was busy for several hours on Wednesday morning.
Google is hardly the only one to blame in this scenario.has long been criticized for security weaknesses that let code writers take advantage of its Internet Explorer, the most widely used Web browser.
"You could blame users for clicking on the pop-up, blame Microsoft for designing the insecure software installation system, blame iWebtunes for delivering the pop-ups, or you could blame the blog's author for embedding iWebtunes," Edelman said.