You are on page 1of 13

SPYWARE

A.Chaitanya(3/4 IT)
chaitanya_9arumalla@yahoo.co.in,
B.Gopi Prasad(3/4 IT)
Gopi_1270@yahoo.co.in,
Vignan’s Engineering College,
Vadlamudi.

Abstraction:
Millions of computer users are
being watched, not just by employers and
Organizations, but by the software that they use
frequently without their knowledge. This
spyware has become the center for collecting of
the private data and threatens the corporate
secured data. Even it can change computer
settings, resulting in slow connection speeds,
different home pages, and loss of Internet or
other programs.

In an attempt to increase the


understanding of spyware,we have to understand
the “What exactly is spyware? How does it
work? What is its impact on users and the
businesses that employ them?How to prevent
them?are discussed. .

What is a spyware History and development


The first recorded use of the term
Spyware is software designed to spyware occurred on October 16, 1995 in a
collect information from computer system users Usenet post that poked fun at Microsoft's
without their knowledge. Typically, spyware can business model. However, in early 2000 the
be classifiedas a type of trojan horse, which is a founder of Zone Labs, Gregor Freund, used
type of technology-based security incident, the term in a press release for the ZoneAlarm
allowing for information security policy Personal Firewall. Since then, "spyware" has
violation. taken on its present sense. According to a
It can be termed also as 2005 study by AOL and the National Cyber-
computer software that is installed Security Alliance, 61 percent of surveyed
surreptitiously on a personal computer to users' computers had some form of spyware.
intercept or take partial control over the user's 92 percent of surveyed users with spyware
interaction with the computer, without the user's reported that they did not know of its
informed consent.
presence, and 91 percent reported that they had dollars of adware-generating revenues.
not given permission for the installation of the Adware and spyware are similar to viruses in
spyware.] As of 2006, spyware has become one that they can be malicious in nature, however,
of the preeminent security threats to computer people are now profitting from these threats
systems running Microsoft Windows operating making them more and more popular.
systems.
Spyware, virus and worm
Comparison
Unlike viruses and worms,
Spyware, adware and tracking spyware does not usually self-replicate. Like
many recent viruses, however, spyware by
The term adware frequently design exploits infected computers for
refers to any software which displays commercial gain. Typical tactics furthering
advertisements, whether or not the user has this goal include delivery of unsolicited pop-
consented. Programs such as the Eudora mail up advertisements; theft of personal
client display advertisements as an alternative to information (including financial information
shareware registration fees. These classify as such as credit card numbers); monitoring of
"adware" in the sense of advertising-supported Web-browsing activity for marketing
software, but not as spyware. Adware in this purposes; or routing of HTTP requests to
form does not operate surreptitiously or mislead advertising sites.
the user, and provides the user with a specific
service.

Although most adware is


spyware in a different sense for a different
reason: it displays advertisements related to what
it finds from spying on you. Claria Corporation's
Gator Software and Exact Advertising's
BargainBuddy are examples. Visited Web sites
frequently install Gator on client machines in a
surreptitious manner, and it directs revenue to
the installing site and to Claria by displaying
advertisements to the user. The user receives
many pop-up advertisements.

Other spyware behavior, such as


reporting on websites the user visits, occurs in
the background. The data is used for "targeted"
advertisement impressions. The prevalence of
spyware has cast suspicion upon other programs
that track Web browsing, even for statistical or
research purposes. Some observers describe the
Alexa Toolbar, an Internet Explorer plug-in
published by Amazon.com, as spyware, and
some anti-spyware programs such as AdAware Routes of infection
report it as such. Many of these adware
distributing companies are backed by millions of Spyware does not directly
spread in the manner of a computer virus or
worm: generally, an infected system does not attackers used the Spybot worm to install
attempt to transmit the infection to other spyware that put pornographic pop-ups on the
computers. Instead, spyware gets on a system infected system's screen.[9] By directing traffic
through deception of the user or through to ads set up to channel funds to the spyware
exploitation of software vulnerabilities. authors, they profit personally.

Most spyware is installed


without users' knowledge. Since they tend not to
install software if they know that it will disrupt Effects and behaviors
their working environment and compromise their
privacy, spyware deceives users, either by A spyware program is rarely
piggybacking on a piece of desirable software alone on a computer: an affected machine can
such as Kazaa or Limewire, tricking them into rapidly be infected by many other
installing it (the Trojan horse method). Some components. Users frequently notice
"rogue" anti-spyware programs masquerade as unwanted behavior and degradation of system
security software, while being spyware performance. A spyware infestation can
themselves. create significant unwanted CPU activity,
disk usage, and network traffic, all of which
slow the computer down. Stability issues,

Some other types of spyware


(for example, Targetsoft) modify system files
so they will be harder to remove. Targetsoft
modifies the "Winsock" Windows Sockets
files. The deletion of the spyware-infected file
"inetadpt.dll" will interrupt normal
networking usage. Unlike users of many other
operating systems, a typical Windows user
has administrative privileges, mostly for
convenience. Because of this, any program
the user runs (intentionally or not) has
unrestricted access to the system too.
Spyware, along with other threats, has led
some Windows users to move to other
The installation of spyware
platforms such as Linux or Apple Macintosh,
frequently involves Internet Explorer. Its
which are significantly less susceptible to
popularity and history of security issues have
malware. This is because these programs are
made it the most frequent target. Its deep
not granted unrestricted access to the
integration with the Windows environment and
operating system by default. As with other
scriptability make it an obvious point of attack
operating systems, Windows users too are
into Windows. Internet Explorer also serves as a
able to follow the principle of least privilege
point of attachment for spyware in the form of
and use non-administrator least user access
Browser Helper Objects, which modify the
accounts, or to reduce the privileges of
browser's behaviour to add toolbars or to redirect
specific vulnerable Internet-facing proceses
traffic.
such as Internet Explorer (through the use of
tools such as DropMyRights). However as
In a few cases, a worm or
this is not a default configuration, few users
virus has delivered a spyware payload. Some
do this. Advertisements
advertisements that instead fund the spyware
operator. This cuts into the margins of
advertising-funded Web sites.

"Stealware" and affiliate fraud


A few spyware vendors,
notably 180 Solutions, have written what the
New York Times has dubbed "stealware", and
what spyware researcher Ben Edelman terms
affiliate fraud, a form of click fraud.
Stealware diverts the payment of affiliate
marketing revenues from the legitimate
affiliate to the spyware vendor.
Many spyware programs
display advertisements. Some programs simply Spyware which attacks
display pop-up ads on a regular basis; for affiliate networks places the spyware
instance, one every several minutes, or one when operator's affiliate tag on the user's activity —
the user opens a new browser window. Others replacing any other tag, if there is one. The
display ads in response to specific sites that the spyware operator is the only party that gains
user visits. Spyware operators present this from this. The user has their choices thwarted,
feature as desirable to advertisers, who may buy a legitimate affiliate loses revenue, networks'
ad placement in pop-ups displayed when the user reputations are injured, and vendors are
visits a particular site. It is also one of the harmed by having to pay out affiliate
purposes for which spyware programs gather revenues to an "affiliate" who is not party to a
information on user behavior. contract.[11]

Many users complain Affiliate fraud is a


about irritating or offensive advertisements as violation of the terms of service of most
well. As with many banner ads, many spyware affiliate marketing networks. As a result,
advertisements use animation or flickering spyware operators such as 180 Solutions have
banners which can be visually distracting and been terminated from affiliate networks
annoying to users. Pop-up ads for pornography including LinkShare and ShareSale.[citation needed]
often display indiscriminately. Links to these
sites may be added to the browser window,
history or search function. When children are the
users, this could possibly violate anti-
pornography laws in some jurisdictions.

A further issue in the case


Identity theft and fraud
of some spyware programs has to do with the
replacement of banner ads on viewed web sites. In one case, spyware has
Spyware that acts as a web proxy or a Browser been closely associated with identity theft.[12]
Helper Object can replace references to a site's In August 2005, researchers from security
own advertisements (which fund the site) with software firm Sunbelt Software believed that
the makers of the common CoolWebSearch
spyware had used it to transmit "chat sessions,
user names, passwords, bank information, etc.",
[13]
but it turned out that "it actually (was) its own Spyware and cookies
sophisticated criminal little trojan that's
independent of CWS."[14] This case is currently Anti-spyware programs
under investigation by the FBI. often report Web advertisers' HTTP cookies,
the small text files that track browsing
activity, as spyware. While they are not
always inherently malicious, many users
object to third parties using space on their
personal computers for their business
purposes, and many anti-spyware programs
offer to remove them.

Examples of spyware
These common
spyware programs illustrate the diversity of
behaviors found in these attacks. Note that as
with computer viruses, researchers give
names to spyware programs which may not be
used by their creators. Programs may be
grouped into "families" based not on shared
program code, but on common behaviors, or
by "following the money" of apparent
financial or business connections. For
instance, a number of the spyware programs
distributed by Claria are collectively known
as "Gator". Likewise, programs which are
The Federal Trade frequently installed together may be described
Commission estimates that 27.3 million as parts of the same spyware package, even if
Americans have been victims of identity theft, they function separately.
and that financial losses from identity theft
totaled nearly $48 billion for businesses and • CoolWebSearch, a group of
financial institutions and at least $5 billion in programs, takes advantage of Internet
out-of-pocket expenses for individuals. Explorer vulnerabilities. The package
directs traffic to advertisements on
Spyware-makers may commit Web sites including
wire fraud with dialer program spyware. These coolwebsearch.com. It displays pop-
can reset a modem to dial up a premium-rate up ads, rewrites search engine results,
telephone number instead of the usual ISP. and alters the infected computer's
Connecting to these suspicious numbers involves hosts file to direct DNS lookups to
long-distance or overseas charges which these sites.[23]
invariably result in high call costs. Dialers are
ineffective on computers that do not have a • Internet Optimizer, also known as
modem, or are not connected to a telephone line. DyFuCa, redirects Internet Explorer
error pages to advertising. When users
follow a broken link or enter an repeatedly opened oversized pop-up
erroneous URL, they see a page of windows that could not be closed or
advertisements. However, because minimized, accompanied by music
password-protected Web sites (HTTP that lasted nearly a minute, demanding
Basic authentication) use the same payment of at least $29.95 to end the
mechanism as HTTP errors, Internet pop-up cycle; and claiming that
Optimizer makes it impossible for the consumers had signed up for a three-
user to access password-protected sites. day free trial but did not cancel their
[23]
membership before the trial period
was over, and were thus obligated to
• Zango (formerly 180 Solutions) transmits pay.[27][28]
detailed information to advertisers about • Zlob trojan, or just Zlob, Downloads
the Web sites which users visit. It also itself to your computer via an ActiveX
alters HTTP requests for affiliate codec and reports information back to
advertisements linked from a Web site, so MotherShip Server. Some information
that the advertisements make unearned can be as your search history, the
profit for the 180 Solutions company. It Websites you visited, and even Key
opens pop-up ads that cover over the Strokes.
Web sites of competing companies.[11]
Legal issues related spyware
• HuntBar, aka WinTools or Adware.
Websearch, was installed by an ActiveX Criminal law
drive-by download at affiliate Web sites,
or by advertisements displayed by other Unauthorized access to a
spyware programs — an example of how computer is illegal under computer crime
spyware can install more spyware. These laws, such as the U.S. Computer Fraud and
programs add toolbars to IE, track Abuse Act, the U.K.'s Computer Misuse Act
aggregate browsing behavior, redirect and similar laws in other countries. Since the
affiliate references, and display owners of computers infected with spyware
[24][25]
advertisements. generally claim that they never authorized the
installation, a prima facie reading would
• Movieland, also known as Moviepass.tv suggest that the promulgation of spyware
or Popcorn.net, is a movie download would count as a criminal act. Law
service that has been the subject of enforcement has often pursued the authors of
thousands of complaints to the Federal other malware, particularly viruses.
Trade Commission (FTC), the
Washington State Attorney General's Spyware producers argue
Office, the Better Business Bureau, and that, contrary to the users' claims, users do in
others by consumers claiming they were fact give consent to installations. Spyware
held hostage by its repeated pop-up that comes bundled with shareware
windows and demands for payment.[26] applications may be described in the legalese
The FTC has filed a complaint against text of an end-user license agreement
Movieland.com and eleven other (EULA). Many users habitually ignore these
defendants (list), charging them with purported contracts, but spyware companies
having "engaged in a nationwide scheme such as Claria claim these demonstrate that
to use deception and coercion to extract users have consented.
payments from consumers." The
complaint alleges that the software
Despite the ubiquity of
EULAs and of "clickwrap" agreements, under
which a single click can be taken as consent to
the entire text, relatively little case law has
resulted from their use. It has been established in
most common law jurisdictions that a clickwrap
agreement can be a binding contract in certain
circumstances. This does not, however, mean
that every such agreement is a contract or that
every term in one is enforceable.

Some jurisdictions, including


the U.S. states of Iowa and Washington, have
passed laws criminalizing some forms of
spyware. Such laws make it illegal for anyone
other than the owner or operator of a computer to
install software that alters Web-browser settings,
monitors keystrokes, or disables computer-
security software.

In the United States,


lawmakers introduced a bill in 2005 entitled the
Internet Spyware Prevention Act, which would
imprison creators of spyware.

Civil law

Former New York State


The hijacking of Web
Attorney General and now current Governor
advertisements has also led to litigation. In
Eliot Spitzer has pursued spyware companies for
June 2002, a number of large Web publishers
fraudulent installation of software.[35] In a suit
sued Claria for replacing advertisements, but
brought in 2005 by Spitzer, the California firm
settled out of court.
Intermix Media, Inc. ended up settling by
agreeing to pay US$7.5 million and to stop
distributing spyware.[36]

Libel suits by spyware


developers
Litigation has gone
both ways. Since "spyware" has become a
common pejorative, some makers have filed
libel and defamation actions when their
products have been so described. In 2003,
Gator (now known as Claria) filed suit against
the website PC Pitstop for describing its
program as "spyware".[38] PC Pitstop settled, Anti-spyware programs
agreeing not to use the word "spyware", but
continues to describe harm caused by the
Gator/Claria software.[39] As a result, other
antispyware and antivirus companies have also
used other terms such as "potentially unwanted
programs" or greyware to denote these products.

Remedies and prevention

Lavasoft's Ad-Aware 2007

Many programmers
and some commercial firms have released
products designed to remove or block
spyware. Steve Gibson's OptOut, mentioned
above, pioneered a growing category.
Programs such as Lavasoft's Ad-Aware SE
and Patrick Kolla's Spybot - Search &
Destroy rapidly gained popularity as effective
tools to remove, and in some cases intercept,
spyware programs.

As the spyware threat has More recently


worsened, a number of techniques have emerged Microsoft acquired the GIANT AntiSpyware
to counteract it. These include programs software, rebranding it as Windows
designed to remove or to block spyware, as well AntiSpyware beta and releasing it as a free
as various user practices which reduce the download for Genuine Windows XP and
chance of getting spyware on a system. Windows 2003 users. In early spring, 2006,
Microsoft renamed the beta software to
Windows Defender, and it was released as a
free download in October 2006. Microsoft
currently ships the product for free with
Windows Vista. Other well-known anti-spyware
products include:

• PC Tools's Spyware Doctor


• Sunbelt Software's Counterspy
• Trend Micro's HijackThis
• Webroot Software's Spy Sweeper
• ParetoLogic's Anti-Spyware and XoftSpy
SE

Major anti-virus firms


such as Symantec, McAfee and Sophos have
come later to the table, adding anti-spyware
features to their existing anti-virus products.
Early on, anti-virus firms expressed reluctance to
add anti-spyware functions, citing lawsuits
brought by spyware authors against the authors
of web sites and programs which described their
Anti-spyware programs can combat spyware
products as "spyware". However, recent versions
in two ways:
of these major firms' home and business anti-
virus products do include anti-spyware functions,
albeit treated differently from viruses. Symantec • 1. They can provide real time
Anti-Virus, for instance, categorizes spyware protection against the installation of
programs as "extended threats" and now offers spyware software on your computer.
real-time protection from them (as it does for This type of spyware protection works
viruses). the same way as that of anti-virus
protection in that the anti-spyware
software scans all incoming network
Recently, the anti-virus
data for spyware software and blocks
company Grisoft, creator of AVG Anti-Virus,
any threats it comes across.
acquired anti-spyware firm Ewido Networks, re-
labeling their Ewido anti-spyware program as
AVG Anti-Spyware Professional Edition. AVG • 2. Anti-spyware software programs
also used this product to add an integrated anti- can be used solely for detection and
spyware solution to some versions of the AVG removal of spyware software that has
Anti-Virus family of products, plus made a already been installed onto your
freeware AVG Anti-Spyware Free Edition computer. This type of spyware
available for private and non-commercial use. protection is normally much easier to
This shows a trend by anti virus companies to use and more popular. With this
launch a dedicated solution to spyware and spyware protection software you can
malware. Zone Labs, creator of Zone Alarm schedule weekly, daily, or monthly
firewall have also released an anti-spyware scans of your computer to detect and
program.Microsoft Anti-Spyware, in real-time remove any spyware software that has
protection blocks an instance of the been installed on your computer. This
AlwaysUpdateNews from being installed. type of anti-spyware software scans
the contents of the windows registry,
operating system files, and installed
programs on your computer and will
provide a list of any threats found,
allowing you to choose what you want to class of Hips such as BillP's WinPatrol) on
delete and what you want to keep. historical observation. They watch certain
configuration parameters (such as certain
Such programs inspect the portions of the Windows registry or browser
contents of the Windows registry, the operating configuration) and report any change to the
system files, and installed programs, and remove user, without judgment or recommendation.
files and entries which match a list of known While they do not rely on updated definitions,
spyware components. Real-time protection from which may allow them to spot newer
spyware works identically to real-time anti-virus spyware, they can offer no guidance. The user
protection: the software scans disk files at is left to determine "what did I just do, and is
download time, and blocks the activity of this configuration change appropriate?"
components known to represent spyware. In
some cases, it may also intercept attempts to Windows
install start-up items or to modify browser Defender's Spynet attempts to alleviate this
settings. Because many spyware and adware are through offering a community to share
installed as a result of browser exploits or user information, which helps guide both users,
error, using security software (some of which are who can look at decisions made by others,
antispyware, though many are not) to sandbox and analysts, who can spot fast-spreading
browsers can also be effective to help restrict any spyware. A popular generic spyware removal
damage done. tool used by those with a certain degree of
expertise is HijackThis, which scans certain
Earlier versions of anti- areas of the Windows OS where spyware
spyware programs focused chiefly on detection often resides and presents a list with items to
and removal. Javacool Software's delete manually. As most of the items are
SpywareBlaster, one of the first to offer real-time legitimate windows files/registry entries it is
protection, blocked the installation of ActiveX- advised for those who are less knowledgeable
based and other spyware programs. on this subject to post a HijackThis log on the
numerous antispyware sites and let the
Like most anti-virus experts decide what to delete.
software, many anti-spyware/adware tools
require a frequently-updated database of threats. If a spyware program
As new spyware programs are released, anti- is not blocked and manages to get itself
spyware developers discover and evaluate them, installed, it may resist attempts to terminate or
making "signatures" or "definitions" which allow uninstall it. Some programs work in pairs:
the software to detect and remove the spyware. when an anti-spyware scanner (or the user)
As a result, anti-spyware software is of limited terminates one running process, the other one
usefulness without a regular source of updates. respawns the killed program. Likewise, some
Some vendors provide a subscription-based spyware will detect attempts to remove
update service, while others provide updates registry keys and immediately add them
free. Updates may be installed automatically on a again. Usually, booting the infected computer
schedule or before doing a scan, or may be done in safe mode allows an anti-spyware program
manually. a better chance of removing persistent
spyware. Killing the process tree can also
Not all programs rely on work.
updated definitions. Some programs rely partly
(for instance many antispyware programs such as A new breed of
Windows Defender, Spybot's TeaTimer and spyware (Look2Me spyware by
Spysweeper) or fully (programs falling under the NicTechNetworks is a good example) is
starting to hide inside system-critical processes • AntiVirus Gold • Spyware
and start up even in safe mode. With no process • AV System Quake
to terminate they are harder to detect and Care • Spydawn
remove. Sometimes they do not even leave any • ContraVirus • Spylocked
on-disk signatures. Rootkit technology is also • errorsafe • SpyShredder
seeing increasing use,[40] as is the use of NTFS (AKA system • SysProtect
alternate data streams. Newer spyware programs doctor) • Spy Sheriff
also have specific countermeasures against well • Malware • Spy Wiper
known anti-malware products and may prevent • MagicAntiSpy • Registryclean
them from running or being installed, or even • PAL Spyware erxp.com
uninstall them. An example of one that uses all Remover • UltimateClea
three methods is Gromozon, a new breed of • PCSecuresyste ner
malware. It uses alternate data streams to hide. A m • WinAntiViru
rootkit hides it even from alternate data streams • Pest Trap s Pro 2006
scanners and actively stops popular rootkit • PSGuard • WinFixer
scanners from running. • SecurePCclean • WorldAntiSp
er y
• SpyAxe
• Your Privacy
Fake anti-spyware programs • SpywareStrike Guard

Malicious programmers
have released a large number of fake anti-
spyware programs, and widely distributed Web On January 26, 2006,
banner ads now spuriously warn users that their Microsoft and the Washington state attorney
computers have been infected with spyware, general filed suit against Secure Computer for
directing them to purchase programs which do its Spyware Cleaner product.[43] On December
not actually remove spyware — or worse, may 4, 2006, the Washington attorney general
add more spyware of their own.[41][42] announced that Secure Computer had paid $1
million to settle with the state. As of that date,
The recent proliferation Microsoft's case against Secure Computer
of fake or spoofed antivirus products has remained pending.
occasioned some concern. Such products often
bill themselves as antispyware, antivirus, or
registry cleaners, and sometimes feature popups
prompting users to install them. They are called Security practices
rogue software.
To deter spyware,
Known offenders include: computer users have found several practices
useful in addition to installing anti-spyware
programs.

Many system operators


install a web browser other than IE, such as
Opera or Mozilla Firefox.Though no browser
is completely safe, Internet Explorer is at a
greater risk for spyware infection due to its
large user base as well as vulnerabilities such as Spyware, though not a
ActiveX. particularly new problem when de¯ned
generally, remains a
Some ISPs particularly problem that is di±cult to manage. While
colleges and universities have taken a different there is no silver bullet to solve all ofthese
approach to blocking spyware: they use their problems, there is hope. Like other security
network firewalls and web proxies to block incidents, the problem can bemanaged
access to Web sites known to install spyware. On e®ectively with a comprehensive de¯nition of
March 31, 2005, Cornell University's the trusted computing baseand a program to
Information Technology department released a maintain it. With the right support from
report detailing the behavior of one particular policy and technology,malware, including
piece of proxy-based spyware, Marketscore, and spyware, can be defeated.
the steps the university took to intercept it.[45]
Many other educational institutions have taken In response to the emergence of
similar steps. Spyware programs which redirect spyware, a small industry has sprung up
network traffic cause greater technical-support dealing in anti-spyware software. Running
problems than programs which merely display anti-spyware software has become a widely
ads or monitor users' behavior, and so may more recognized element of computer security best
readily attract institutional attention.[citation needed] practices for Microsoft Windows desktop
computers. A number of jurisdictions have
Some users install a large passed anti-spyware laws, which usually
hosts file which prevents the user's computer target any software that is surreptitiously
from connecting to known spyware related web installed to control a user's computer.
addresses. However, by connecting to the
numeric IP address, rather than the domain References:
name, spyware may bypass this sort of
protection. • http://spywarewarrior.com
http://spywarewarrior.com/asw-
Spyware may get features.htm
installed via certain shareware programs offered •http://www.microsoft.com/athome/
for download. Downloading programs only from security/spyware/software/defaultmspx
reputable sources can provide some protection • http://www.lavasoft.de/
from this source of attack. Recently, CNet • http://spybot.safer-
revamped its download directory: it has stated networking.de/en/index.html
that it will only keep files that pass inspection by • http://www.virustotal.com
Ad-Aware and Spyware Doctor. • http://isc.sans.org/contact.php
•http://www.qwest.com/about/protection/in
Conclusion dex.html

Security has become one


of the primary concerns when an organization
connects its private Network to the Internet.
Regardless of the business, an increasing
number of users on private networks are demand
access to Internet services such as the World
Wide Web (WWW), Internet mail, Telnet, and
File Transfer Protocol.

You might also like