He???s also seen cases in which attackers will intercept IMs to break into other companies or other parts of an enterprise. ???They???ll use contacts on MSN Messenger, then jump into a conversation that people are having??? and add a malicious link, he says.