Business

Examples of spyware and what they are

Spyware is a general term used to describe software that performs certain behaviors, such as advertising, collecting personal information, or changing your computer’s settings, usually without properly obtaining your consent first.

Spyware is often associated with software that displays advertisements (called adware) or software that tracks personal or sensitive information.

That doesn’t mean that all software that serves ads or tracks your online activities is bad. For example, you can subscribe to a free music service, but “pay” for the service by agreeing to receive targeted ads. If you understand the terms and agree to them, you may have decided that this is fair compensation. You can also agree to allow the company to track your online activities to determine which ads to show you.

Other types of spyware make changes to your computer that can be annoying and can cause your computer to slow down or crash.

These programs may change your web browser’s home page or search page, or add additional components to your browser that you don’t need or want. These programs also make it very difficult for you to change your settings back to the way you originally had them.

The key in all cases is whether or not you (or someone using your computer) understand what the software will do and whether or not you have agreed to install it on your computer.

There are several ways that spyware or other unwanted software can get onto your computer. A common trick is to covertly install the software during the installation of other desired software, such as a music or video file sharing program.

Any software that covertly collects user information through the user’s Internet connection without their knowledge, usually for advertising purposes. Spyware applications are usually included as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that most shareware and freeware applications do not come bundled with SpyWare. Once installed, Spyware monitors the user’s Internet activity and transmits that information in the background to someone else. Spyware can also collect information about email addresses and even passwords and credit card numbers.

Aside from ethics and privacy issues, SpyWare steals from the user by using the computer’s memory resources and also by consuming bandwidth when it sends information to the spyware’s base of operations through the user’s Internet connection. Because SpyWare uses memory and system resources, applications running in the background can cause system crashes or general system instability.

Because SpyWare exists as stand-alone executable programs, they have the ability to monitor keystrokes, scan files on your hard drive, snoop on other applications such as chat programs or word processors, install other SpyWare programs, read cookies, change the default home page in the Web Browser, constantly transmitting this information to the author of SpyWare, who will use it for advertising/marketing purposes or sell the information to a third party.

License agreements that accompany software downloads sometimes warn the user that a SpyWare program will be installed along with the requested software, but license agreements may not always be read in their entirety because the notice of a SpyWare installation it is often obtusely worded and difficult to understand. read the legal notices.

Examples of spyware

These common SpyWare programs illustrate the diversity of behavior found in these attacks. Note that, as with computer viruses, researchers give names to SpyWare programs that cannot be used by their creators. Programs may be grouped into “families” based not on shared program code, but on common behaviors, or “following the money” of apparent financial or business connections. For example, various SpyWare programs distributed by Claria are collectively known as “Gator.” Also, programs that are installed together can often be described as part of the same SpyWare package, even if they function separately.

o CoolWebSearch, a group of programs, exploits vulnerabilities in Internet Explorer. The package drives traffic to advertisements on websites, including coolwebsearch.com. It displays pop-up ads, rewrites search engine results, and alters the infected computer’s hosts file to direct DNS lookups to these sites.

o Internet Optimizer, also known as DyFuCa, redirects Internet Explorer error pages to advertisements. When users follow a broken link or enter a wrong URL, they see an ad page. However, since password-protected websites (HTTP basic authentication) use the same mechanism as HTTP errors, Internet Optimizer makes it impossible for the user to access password-protected sites.

o Zango (formerly 180 Solutions) transmits detailed information to advertisers about the websites users visit. It also alters HTTP requests for linked affiliate ads from a website so that the ads generate unearned revenue for 180 Solutions Company. It opens pop-up ads that cover the websites of competing companies.

or HuntBar, also known as WinTools or Adware, WebSearch was installed via an ActiveX drive-by download on affiliated websites or through advertisements displayed by other SpyWare programs, an example of how SpyWare can install more SpyWare. These programs add toolbars to IE, track aggregated browsing behavior, redirect affiliate referrals, and display ads.

oZlob Trojan, or simply Zlob, downloads itself to your computer via ActiveX codec and sends information to the control server. Some of the information can be your search history, the websites you visited, and even your keystrokes.

Leave a Reply

Your email address will not be published. Required fields are marked *