Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Privacy Operating Systems Software Windows Your Rights Online

Analysis of Spyware 246

scubacuda writes "What actually happens when you install adware/spyware/malware? Follow the Bouncing Malware examines what's downloaded, redirected, and obfuscated. A fascinating read. (Part two was postponed in order to cover a new My Doom variant.)"
This discussion has been archived. No new comments can be posted.

Analysis of Spyware

Comments Filter:
  • Even Sevens (Score:5, Interesting)

    by mfh ( 56 ) on Saturday August 07, 2004 @11:41AM (#9908610) Homepage Journal
    > And that's were I'm going to end it for today. In the next part, I'll take a look at what happens as this chain of malware continues on it's merry way, and I'll also investigate what happens when I fire up IE the next time and visit my new home page.

    Personally, I think you should examine ways to get even. Even-Stevens.

    Up until this point, I've seen lots of anti-spyware put out that blocks spyware and protects your system from unjustified Reg entries etc., but it generally stops there. It's a shield when what we need is a shield and a sword.

    Covenants, without the sword, are but words, and of no strength to secure a man at all -Hobbes

    What I would like to see is anti-malware that bites back, hard.

    We had this site going a while back that was going to test anti-trolling methods, like by taking a troll user and stuffing them in their own world. All their posts would be modded up and their view of the site was totally different than the users who were not trolls. Of course in tests it was easy enough for them to spoof their IP to get past this, but many of them didn't realize how to do it.

    But for malware sites, what if we came up with a solution that would detect it and let it believe it was working, but generated the data needed to put these goofs in jail. I think the SETI distributed computing model could be slightly altered to work to this end.

    Then we could get Even-Stevens.
  • malware honeypot? (Score:5, Interesting)

    by TheHawke ( 237817 ) <rchapin@nOSpam.stx.rr.com> on Saturday August 07, 2004 @11:47AM (#9908649)
    I wonder if someone can whip up a honeypot that'll reverse-engineer some of the malware out there, munge all the URLS down and give proof that someone is doing this on purpose.

    Then maybe the state DA's will jump in and make a lesson of a malware producer or two. That is, if they are local. IF not, LART until their router is unplugged.

    This 'ware business is seriously getting out of hand and MUST be dealt with, one way or another. IF we have to force these jokers to go overseas, fine, then we'll do so and isolate their domains at root DNS.
  • by TheHawke ( 237817 ) <rchapin@nOSpam.stx.rr.com> on Saturday August 07, 2004 @11:51AM (#9908659)
    Oh Mod this parent up!
    You hit the nail on the head several times with firefox's security. It does seem to have marked improvements over IE in security, blocking 'wares from going off in your system, to barring banners from starting up, ever!

    Of course I maintain a hosts file that pretty much keeps them at bay.

    http://www.pelicancoast.net/~nighthawke/hosts.zi p
  • by Gigantic1 ( 630697 ) on Saturday August 07, 2004 @11:56AM (#9908668)
    Those poor soles running Internet Explorer (like ME until recently) don't know what they are missing by not switching to Firefox, Opera, and some of the other fine browsers out there.

    Usually, I skeptical about "Freeware", but Mozilla's Firefox has been a glorious exception. Not only is it faster, more intuitive, and easier to use than IE, it is also MORE SECURE. Unlike IE, Firefox does not allow ActiveX and VBScripts to run - and this is a blessing.

    Please consider giving it a try.

    Happy surfing.

  • by Tuxedo Jack ( 648130 ) on Saturday August 07, 2004 @11:58AM (#9908680) Homepage
    How about the bastards who make browser hijackers? Removing CoolWebSearch's affiliates wastes so much goddamn time at my office, it's literally taking nearly three hours a week.

    And don't deny it - their affiliates DDoSed SpywareInfo because it told people how to remove their bastardly malware and provided CWShredder.

    I say we go after them, drain their coffers dry, and donate the funds to the Mozilla Foundation or something.
  • by Gigantic1 ( 630697 ) on Saturday August 07, 2004 @12:06PM (#9908710)
    Nooooooo. Sorry about the confusion. "ME" referes to myself, not "Windows Millineum Edition" (Yuck)

    Currently, I'm running Mozilla Firefox on Windows 2000, and I have no complaints. In fact, I'm happier about surfing the web than I've been in years!

    For reference, Firefox may be downloaded at http://texturizer.net/firefox/index.html.

    Happy Surfing.

  • by Gigantic1 ( 630697 ) on Saturday August 07, 2004 @12:13PM (#9908736)
    Nooooooo. Sorry about the confusion. "ME" referes to myself, not "Windows Millineum Edition" (Yuck) Have you ever heard the word "dense"?

    And for your "snit fit" concerning semantics, you mod my parent post as a "Troll". Or was it something else?

    Anyways...Grow up.

  • Re:malware honeypot? (Score:2, Interesting)

    by Anonymous Coward on Saturday August 07, 2004 @12:25PM (#9908796)
    Let's give credit where credit is due!

    Did you RTFA? The spyware he mentioned all loaded automatically using exploits that are only available in IE and Windows! This is all courtesy of Microsoft!

    Face it: these people would not be able to do these things without Microsoft's brain-dead approach to secure design. If you wanna sic DA's on somebody, point them at Microsoft!
  • by . visplek . ( 788207 ) on Saturday August 07, 2004 @12:26PM (#9908801)
    Funny thing is that a lot of people just don't care. I remember that visual plugin for Winamp: Wild Tangent Valentine Dancer. It turned out to be spyware (and so did the rest of Wild Tangent's plugins and apps) but a lot of people just wanted to see a girl dancing on their screen. They just don't care. Not aware of the results of a spyware infested computer and blinded by some digital hottie. The result is over 3,707,559 downloads.
  • pollution (Score:4, Interesting)

    by wobblie ( 191824 ) on Saturday August 07, 2004 @12:28PM (#9908812)
    the only effective way to combat this is to pollute/crapflood their databases, in a massive sustained effort. A DDos they they are just begging for.

    Just how that's done is another matter; but how long will it be before some enterprising young soul comes up with a daemon that generates false information and does nothing but pollute spyware databases? If it can be done with SETI, it can be done here ... the caveat is that the machine would have to be "infected" to do this ...
  • make it fun (Score:3, Interesting)

    by zogger ( 617870 ) on Saturday August 07, 2004 @12:37PM (#9908853) Homepage Journal
    it's weird but it's hard to get people to download and run antimalware stuff. But they WILL download and run other things, so, I got an idea, code one of those anti virus anti malware things so it works like a video game, you hunt and destroy the individual malware doodads graphically.
  • by gone.fishing ( 213219 ) on Saturday August 07, 2004 @12:53PM (#9908938) Journal
    I hate spyware. It is much worse than most of the viruses I've dealt with. As a support technician in a large corporation I deal with it every single day. Some days, all day.

    I'd love to see a tool that would deal with all security threats to the desktop. A single tool that would protect against viruses, malware and would act as a smart desktop firewall. We already use an anti-span service but I think the tool should do that too. In the workplace it should be centrally controlled and updated automatically. It should report on attemts and allow the networking folks to use this data to stop stuff at the corporate firewall.

    While I am dreaming, I think I'd even like to tool to provide a transparent, managable method of deploying service packs and patches to the desktop (although that is I admit probably better seperately with software deployment tools).

    I suppose the server boys would probably need a tool to keep those back-room boxes squeeky clean too. Maybe a special server version of the same software could be slapped on those bad-boys.

    I understand why companies are reluctant to share data but in the case of "common security threats" I think that an exception should be made and an automated but monitorable system of threat identification and reporting should be built into the software so as soon as a new threat is identified it can be made available to everyone using the software.

    Then we can all cooperativly figure out who is doing this and we can publish that information somewere (like slashdot?) and we can provide them with a little justice!
  • Re:Even Sevens (Score:3, Interesting)

    by Anonymous Coward on Saturday August 07, 2004 @01:22PM (#9909084)
    Perhaps you can convince the authorities to subpeona the ISP for the owners of those addresses, but I doubt it.

    Why is it that "the authorities" are interested in subpoenaing the addresses of filesharers, but not illegal malware scammers?
  • by localhost00 ( 742440 ) on Saturday August 07, 2004 @02:00PM (#9909273) Journal
    I think the integrated tool you're looking for is called "properly configured Linux".

    I am not trying to be anti-Linux here, since I am booted into it anyway, but I tend to believe that there is a "properly configured Windows XP" too.

    It includes:

    All users use a Limited account
    The is ONE admin account, to be configured with a red desktop and boring scheme as to place zero doubt that no one is supposed to be there to do anything except to install software.
    Except for Windows Update, no user under any circumstance whatsoever should use Internet Explorer in the Admin account.
    Zone Alarm
    Ad-Aware
    XP installed on 4-8GB partition
    Documents and Settings redirected to another partition (yes, it is possible with a single reg hack)
    Norton Ghost (on a FAT32 partition)
    Good copy of System partition image on the FAT32 partition
    Any suggestions?

    I have a theory that the scumware threat in Internet Explorer becomes extremely inert when someone browses the Internet while logged into a limited account. Can't write to HKEY_CLASSES_ROOT or HKEY_LOCAL_MACHINE. Heck, can't write anywhere on the system partition. Can anyone confirm this theory?

  • by Anonymous Coward on Saturday August 07, 2004 @03:04PM (#9909558)
    validated hosts [hostsfile.mine.nu]
  • Re:Even Sevens (Score:5, Interesting)

    by Crizp ( 216129 ) <chris@eveley.net> on Saturday August 07, 2004 @03:09PM (#9909573) Homepage
    I got a cousin whose Windows XP would display 31 (he counted them) popups (a new, different one after the previous had been closed), when he logged on his user profile.

    After I reinstalled XP for him, I installed Firefox and ordered him to use that and forget about IE unless he wanted to be hit upside the head with my cluestick. He doesn't know much about the underlying technology of computers and recent software but everyone in the family understands when I say "use that and evil stuff might be installed on the PC even if you're only surfing around". They take my word for it as I'm the resident geek.

    I did the same with his family's computer. Now I just have to explain stuff to the youngest son who insists on using BearShare, Kazaa (even if I've said NOOOO!) and such stuff. He downloads and installs small programs. Once, the family computer was infected with over 150 viruses.

    My cousin is extremely happy with Firefox, once I've shown him the concenpt of tabbed browsing, he's never looked back. And the computer don't get as much spyware installed now. The younger brother screws that up a bit 'cause he won't listen. Damn nu-metal ignoramus :)
  • by djhankb ( 254226 ) on Saturday August 07, 2004 @04:26PM (#9909878) Homepage
    For my clients, many of them have spent 1000's in my time repairing these issues. I can't say that it's bad for *my* business, but for them... Many are tired of paying for me to be the network Janitor. And I am with them.... Being the Network Janitor isnt much fun.

    On the flipside, a simple solution that I've been implementing, is a simple linux box, setup as a transparent proxy, using Squid, with DansGuardian (a pay-for product) doing content filtration, as well as stopping Active-X controls dead in their tracks.

    This has proved to be very cost effective, around $300-400 in my time to setup, and stops the junk dead.

    Perhaps some other IT managers can put this software to use.

    -H
  • by jmenon ( 576558 ) on Saturday August 07, 2004 @05:30PM (#9910178) Homepage

    I moved to Opera three days ago after finally getting cheesed off with having IE launch spyware apps and then crash virtually every time I opened it.

    I have the free version right now, in which I can even choose whether I prefer Google ads or big, noisy banners. I went with Google, since I am a Gmail fan anyway. One of my friends thinks I am a wuss for thinking this, but I actually like the text ads by Google. They are becoming familiar, and they virtually disappear on the Opera interface unless I need them, and then they are actually relevant!

    What I like best about Opera is, well, many things:

    1. Never had a popup since I have used it.

    2. Easy to read RSS feeds, including a customized Opera newsfeed that brings Slashdot, Salon and some other feeds together as one.

    3. Easy password fill-in (I know IE has something like this too, but I just never trusted it, given all the security holes.)

    4. Easy, comprehensive toolbar customization. You can also customize your menus and toolbars with single-click "Setups". The toolbars are also far more intelligent than IE. You can set them to appear only when you need them, like the download status bar, which disappears as soon as your page is completed.

    5. I imagine the mail and newsgroup features of Opera are also excellent, although I am married to Outlook and don't intend to switch.

    6. Not the least important thing is that the design of the interface shows some visual design sensibility; a trained graphic designer of two must have actually designed it!

    Basically, it feels like a much more sophisticated, softer Internet experience. I have Firefox installed as well, but mainly for testing my Web pages. It seems too simplified for me. I like complex but well-designed interfaces.

    Are there rumours about Opera selling out? If so, I hope Google buys them (and then makes Gmail Opera-compatible.)

  • by Anonymous Coward on Saturday August 07, 2004 @05:46PM (#9910276)
    Where to draw the line ?, The Opera webbrowser sends all your browsing requests straight to Google !, so does the Google task bar !, it's stated fair and square right there in the ClickWrap Terms, but do people really know ?
  • by TheHawke ( 237817 ) <rchapin@nOSpam.stx.rr.com> on Saturday August 07, 2004 @06:18PM (#9910446)
    Heheh, nice one Len!
    Actually, i've put a IPblock in my hosts file by entering the IP address into it and referring it to loopback. (I know, it goes agianst the RFC for DNS, but it works!)
    I've dogfarted on gator/claria with this action and they are pretty much torqued off at me for that. Of course, i've made it rather difficult for them to get in touch with me without sending a message thru a lawyer by blocklisting their domain in our POP3, hee hee hee hee.

    This way it keeps'em honest and let's them know that they are not welcome in any way, shape or form
  • by Anonymous Coward on Saturday August 07, 2004 @07:00PM (#9910649)
    I removed 15 spyware apps from 1 computer yesterday. This poor souls computer was his payroll, accounting, business documents machine for his business. He ran some no name spyware remove tool and it shredded his machine so bad that every time you start IE. The IE would generate a runtime error before the user interface was shown. His machine also had 2 976 dial programs attempting to dial asian countries. At home he had the same happen to his home computer that was connected to a telephone modem. This machine actually did dial out and ran up a $2000 US phone bill. I Cleaned his machine with SpyBot Search and Destroy, installed SpyBlaster to shield future attacks, and installed Firefox.
  • Re:Even Sevens (Score:4, Interesting)

    by ScrewMaster ( 602015 ) on Saturday August 07, 2004 @10:56PM (#9911506)
    Actually, no. The vast majority of mal-ware is installed via drive-by downloads using Internet Exploited^H^H^H^Hrer. The only reason people see a click-through is because they're lucky enough to install an application that happens to ask for permission ... and I've seen a number of these things that go ahead and install themselves even if you click No. Once you've run the setup program you're probably screwed.

    I did something similar to the article's author some time ago, although I wasn't particularly detailed in my "analysis." I set up a dummy XP Pro machine (unpatched, since that's how Joe Average's machine will likely be even if he does have broadband and knows how to use WindowsUpdate) and started browsing around for a couple of days as I normally would. I installed no applications other than those that came with XP. At the end of my test period, I had a couple of dozen different unauthorized apps running that entered the system solely through the browser. No warnings, no click-throughs ... just stealth downloads. The test machine was a reasonably fast 1.4GHz Athlon but it was decidedly sluggish at the end. I did have to get rid of a couple of browser hijackers along the way just so I could continue the test. I used Spybot and Ad-Aware to get some idea of the actual programs that were installed: the list was pretty extensive but I have no idea if I found them all. The network it was attached to is otherwise pretty thoroughly firewalled and anyway these weren't worms.

    And I wouldn't be so sure these jerks aren't breaking any laws. Regardless of the privacy implications, spyware causes damage. Trashed systems, lost data, personnel time spent cleaning infestations and so forth. I've seen corporate workstations with thirty or forty spyware applications running simultaneously, causing major performance loss and instabilities. It wouldn't be hard for a corporation with a few hundred workstations to get the FBI interested with a legitimate damage claim of a few hundred grand in losses.

    Spyware, malware, adware, spam ... all of these are parasitical activities on the part of a diseased few. And they have been greatly aided and abetted in their behavior by the likes of Microsoft, who either by design or by incompetence made such things trivial to implement on a vast scale. My feeling is that, given the relative importance of the Internet to all of the world's largest economies (and to the developing nations that would like to use it to improve their own lot) some kind of immune system will have to be developed to deal with these parasites. That may involve gunshot wounds to the head, I don't know.
  • Re:Even Sevens (Score:3, Interesting)

    by bhtooefr ( 649901 ) <[gro.rfeoothb] [ta] [rfeoothb]> on Sunday August 08, 2004 @12:39AM (#9911863) Homepage Journal
    You could say that your Internet browsing patterns, or things you entered into forms, were copyrighted (say that you were attempting to create a geographic art form by traveling the Internet, and use that as the thing that they broke copyright on), and get them with 512(h) of the DMCA (all you need is a "good faith belief that someone violated your copyright", after all)...

Those who can, do; those who can't, write. Those who can't write work for the Bell Labs Record.

Working...