Spyware Software Dubbed 'Ransom-ware'
2005-05-31 09:34:00
An apparently bogus anti-spyware tool is the newest addition to the expanding "ransom-ware" category of malware, Panda Software said Tuesday.
Ransom-ware, the term some have slapped on malicious code that infects a PC, then demands money in return for cleaning up the machine or unlocking suddenly-encrypted documents, is just another example of how hackers are increasingly driven by greed, Luis Corrons, the director of Panda's research lab, said in a press release. Now, said, Corrons, a purported anti-spyware product, SpywareNo, joins the list of ransom-ware.
Surreptitiously downloaded when users visit certain porn or pirate Web sites, SpywareNo exploits vulnerabilities in Microsoft's Internet Explorer to get onto a PC. Once it installs itself, it creates an icon on the desktop and displays a bogus warning that the system's infected with spyware, Corrons said. (It also modifies the Windows Registry to guarantee it runs every time the PC is started, even after the user thinks he's managed to manually delete the program.)
The warnings are as fake as a $3 bill.
The on-screen alert invites users to purchase the full version ($20 for a month's subscription, $60 for an annual plan); only those who pay the ransom see the "threats" disappear.
"If users fail to register, this commercial software will 'detect' threats that don't actually exist on the computer, and which will 'disappear' as soon as users pay for the product," said Panda in its own warning.
In a release posted to the Spyware Warrior anti-spyware message forum, someone claiming to be the public relations manager for SpywareNo took exception with the ransom-ware categorization, and blamed the drive-by-installs on out-of-control affiliates.
"The spyware removal software market is so overcrowded," wrote someone identifying herself as Jessica Simmons. "The competition is very very hard. That is why we direct all our efforts to development itself and have no time and power to advertise our products effectively. We use affiliated advertisers to do this. This is an easy way for us. This way is a very dangerous though. It is a shame that some of our advertisers do not respect the law, but unfortunately we are unable to check them all at the initial stage."
The poster went on to say that SpywareNo "does not install silently or without permission," and that any such instance is due to "those unprincipled advertisers."
End-users commenting to the dslreports.com message forum, however, say different. One said SpywareNo got installed "out of nowhere," while Eric Howes, a graduate student at the University of Illinois, a contributor to the Spyware Warrior site and list, noted "the [SpywareNo] scanner turned up eight listed spyware programs, all 'high risk' in just two seconds. Even a scan of the processes [running in Windows] takes five or six seconds. That's a big red flag," he said. "SpywareNo wasn't actually scanning anything at all.
"Within 48 hours of the first report we had of SpywareNo, we had reports from all over the place," said Howes. "The fact that the reports came from a number of different sources, at about the same time" indicate that it had been seeded on multiple Web sites.
Phony spyware detection isn't a new tactic, said Howes, who compared SpywareNo's approach to others, such as Spywiper and SpyWareAssassin, two products which have been investigated by the Federal Trade Commission.
"They're guilty of unfair practices, just as was SpyWareAssassin," Howes alleges. "But I think Panda is on to something by classifying it as 'ransom-ware.'
"SpywareNo has been irresponsible at best," he added. "I've stopped listening to that 'our affiliates did it' excuse years ago. Even if its' true, they're still responsible."
Attempts to contact SpywareNo, which according to the alleged public relations spokeswoman, is based in Istanbul, were unsuccessful.
|
|
Habeas SafeList Adopted For Hotmail And MSN Mail Microsoft will support the sender accreditation system as part of its layered security technology regimen. Firms Form Alliance To Bring Powerline Nets To Homes A group of large Japanese electronics firms has established an alliance to promote the establishment of home powerline networks. The networks would connect consumer devices in the home including DVD players, PCs, digital cameras, televisions, and IP phones. The alliance intends to use existing electrical wiring in homes. Hackers, Spammers Partner Up To Wreak Havoc A one-two-three assault of disparate spammer and hacker groups in the last 24 hours bodes nothing but ill for users, a security expert said Thursday. McAfee Acquires Wireless Security McAfee Inc. on Thursday said it has acquired Wireless Security Corp., a move that's expected to boost McAfee's products for protecting mobile computers accessing the Internet over Wi-Fi networks.
Demand For Online Healthcare Information Increases
Consumers in significant numbers are using the Internet to research doctor-patient issues, a survey said Thursday. Broadband Adoption Chugging Along Eighty-eight million American households will be Internet-connected by the year 2010, and 78 percent of those households will have broadband access, according to a report issued Thursday from Darien, Conn.-based Jupiter Research. Dial-ups may soon be a thing of the past. AOL Jumpstarts High-Speed Push America Online Inc. on Thursday tried to energize its push into the broadband market, offering high-speed Internet access for $29.95 a month through Covad Communications Group. Publisher To Provide Free Hotspots In Bookstores Publishing company HarperCollins said Thursday that it will create wireless hotspots in bookstores that don't already have access for use by customers. Mozilla Moves Thunderbird E-mailer Into Alpha The Mozilla Foundation Thursday posted the first preview of Thunderbird 1.1, the upcoming update to its stand-alone e-mail client that will feature anti-phishing tools and support for podcasts, the audio broadcasts-turned-MP3 files. 'Osama Captured' E-mail Trojan Infected Osama bin Laden has not been captured, contrary to what millions of e-mails carrying a Trojan horse are saying, security firms said Friday as they warned users not to open the attachments bundled with the bogus message.
|