Professional Documents
Culture Documents
A.Chaitanya(3/4 IT)
chaitanya_9arumalla@yahoo.co.in,
B.Gopi Prasad(3/4 IT)
Gopi_1270@yahoo.co.in,
Vignan’s Engineering College,
Vadlamudi.
Abstraction:
Millions of computer users are
being watched, not just by employers and
Organizations, but by the software that they use
frequently without their knowledge. This
spyware has become the center for collecting of
the private data and threatens the corporate
secured data. Even it can change computer
settings, resulting in slow connection speeds,
different home pages, and loss of Internet or
other programs.
Examples of spyware
These common
spyware programs illustrate the diversity of
behaviors found in these attacks. Note that as
with computer viruses, researchers give
names to spyware programs which may not be
used by their creators. Programs may be
grouped into "families" based not on shared
program code, but on common behaviors, or
by "following the money" of apparent
financial or business connections. For
instance, a number of the spyware programs
distributed by Claria are collectively known
as "Gator". Likewise, programs which are
The Federal Trade frequently installed together may be described
Commission estimates that 27.3 million as parts of the same spyware package, even if
Americans have been victims of identity theft, they function separately.
and that financial losses from identity theft
totaled nearly $48 billion for businesses and • CoolWebSearch, a group of
financial institutions and at least $5 billion in programs, takes advantage of Internet
out-of-pocket expenses for individuals. Explorer vulnerabilities. The package
directs traffic to advertisements on
Spyware-makers may commit Web sites including
wire fraud with dialer program spyware. These coolwebsearch.com. It displays pop-
can reset a modem to dial up a premium-rate up ads, rewrites search engine results,
telephone number instead of the usual ISP. and alters the infected computer's
Connecting to these suspicious numbers involves hosts file to direct DNS lookups to
long-distance or overseas charges which these sites.[23]
invariably result in high call costs. Dialers are
ineffective on computers that do not have a • Internet Optimizer, also known as
modem, or are not connected to a telephone line. DyFuCa, redirects Internet Explorer
error pages to advertising. When users
follow a broken link or enter an repeatedly opened oversized pop-up
erroneous URL, they see a page of windows that could not be closed or
advertisements. However, because minimized, accompanied by music
password-protected Web sites (HTTP that lasted nearly a minute, demanding
Basic authentication) use the same payment of at least $29.95 to end the
mechanism as HTTP errors, Internet pop-up cycle; and claiming that
Optimizer makes it impossible for the consumers had signed up for a three-
user to access password-protected sites. day free trial but did not cancel their
[23]
membership before the trial period
was over, and were thus obligated to
• Zango (formerly 180 Solutions) transmits pay.[27][28]
detailed information to advertisers about • Zlob trojan, or just Zlob, Downloads
the Web sites which users visit. It also itself to your computer via an ActiveX
alters HTTP requests for affiliate codec and reports information back to
advertisements linked from a Web site, so MotherShip Server. Some information
that the advertisements make unearned can be as your search history, the
profit for the 180 Solutions company. It Websites you visited, and even Key
opens pop-up ads that cover over the Strokes.
Web sites of competing companies.[11]
Legal issues related spyware
• HuntBar, aka WinTools or Adware.
Websearch, was installed by an ActiveX Criminal law
drive-by download at affiliate Web sites,
or by advertisements displayed by other Unauthorized access to a
spyware programs — an example of how computer is illegal under computer crime
spyware can install more spyware. These laws, such as the U.S. Computer Fraud and
programs add toolbars to IE, track Abuse Act, the U.K.'s Computer Misuse Act
aggregate browsing behavior, redirect and similar laws in other countries. Since the
affiliate references, and display owners of computers infected with spyware
[24][25]
advertisements. generally claim that they never authorized the
installation, a prima facie reading would
• Movieland, also known as Moviepass.tv suggest that the promulgation of spyware
or Popcorn.net, is a movie download would count as a criminal act. Law
service that has been the subject of enforcement has often pursued the authors of
thousands of complaints to the Federal other malware, particularly viruses.
Trade Commission (FTC), the
Washington State Attorney General's Spyware producers argue
Office, the Better Business Bureau, and that, contrary to the users' claims, users do in
others by consumers claiming they were fact give consent to installations. Spyware
held hostage by its repeated pop-up that comes bundled with shareware
windows and demands for payment.[26] applications may be described in the legalese
The FTC has filed a complaint against text of an end-user license agreement
Movieland.com and eleven other (EULA). Many users habitually ignore these
defendants (list), charging them with purported contracts, but spyware companies
having "engaged in a nationwide scheme such as Claria claim these demonstrate that
to use deception and coercion to extract users have consented.
payments from consumers." The
complaint alleges that the software
Despite the ubiquity of
EULAs and of "clickwrap" agreements, under
which a single click can be taken as consent to
the entire text, relatively little case law has
resulted from their use. It has been established in
most common law jurisdictions that a clickwrap
agreement can be a binding contract in certain
circumstances. This does not, however, mean
that every such agreement is a contract or that
every term in one is enforceable.
Civil law
Many programmers
and some commercial firms have released
products designed to remove or block
spyware. Steve Gibson's OptOut, mentioned
above, pioneered a growing category.
Programs such as Lavasoft's Ad-Aware SE
and Patrick Kolla's Spybot - Search &
Destroy rapidly gained popularity as effective
tools to remove, and in some cases intercept,
spyware programs.
Malicious programmers
have released a large number of fake anti-
spyware programs, and widely distributed Web On January 26, 2006,
banner ads now spuriously warn users that their Microsoft and the Washington state attorney
computers have been infected with spyware, general filed suit against Secure Computer for
directing them to purchase programs which do its Spyware Cleaner product.[43] On December
not actually remove spyware — or worse, may 4, 2006, the Washington attorney general
add more spyware of their own.[41][42] announced that Secure Computer had paid $1
million to settle with the state. As of that date,
The recent proliferation Microsoft's case against Secure Computer
of fake or spoofed antivirus products has remained pending.
occasioned some concern. Such products often
bill themselves as antispyware, antivirus, or
registry cleaners, and sometimes feature popups
prompting users to install them. They are called Security practices
rogue software.
To deter spyware,
Known offenders include: computer users have found several practices
useful in addition to installing anti-spyware
programs.