Spyware and Adware

31

description

Spyware and Adware. Rick Carback 9/18/2005 http://userpages.umbc.edu/~carback1/691i. What is Adware?. Advertising supported software Goes beyond the advertising found in shareware or freeware May run without user knowledge Shows unwanted advertisements Required by terms of use. - PowerPoint PPT Presentation

Transcript of Spyware and Adware

Page 1: Spyware and Adware
Page 2: Spyware and Adware

Spyware and Adware

Rick Carback

9/18/2005http://userpages.umbc.edu/~carback1/691i

Page 3: Spyware and Adware

What is Adware?

• Advertising supported software

• Goes beyond the advertising found in shareware or freeware

• May run without user knowledge

• Shows unwanted advertisements

• Required by terms of use

Page 4: Spyware and Adware

What is Spyware?

• May be bundled or included with other software or install itself through other means

• Sends information about host computer back to a remote system or user

• Runs without user knowledge

Page 5: Spyware and Adware

Adware vs. Spyware

• Adware typically only annoys the user while Spyware will annoy and collect information to be sent back to the creator.

• Generally speaking Spyware is seen as more invasive and subversive Adware.

• Not all Adware and Spyware can be considered bad.

Page 6: Spyware and Adware

Spyware and Adware that isn’t bad? What?

• Some desirable applications, like kazaa, require the bundled adware to be running in order to work

• Monitoring child internet access

• Some people like targeted advertising

Page 7: Spyware and Adware

Why Adware and Spyware?

• Keeping installed software up to date

• Preventing software piracy

• Preventing illegal or unacceptable use of installed software

• Gathering of Marketing Information

• Annoying Advertisement

• Complete Privacy Invasion

• Illegal or Unacceptable use of resources

• Password, e-mail, and username harvesting

Page 8: Spyware and Adware

How does it get there?

• Installation required by Terms of use for other software– Embedded– Bundled

• Exploitation of browser or operating system vulnerability

• Pure deception

Page 9: Spyware and Adware

What does Spyware do?

• Usually hides from user once installed

• Uses central server or acts as a central server to send the information gathered

• May install other software or remove competitors software

• Targeted popup ads from observed website visits

Page 10: Spyware and Adware

More Spyware Operations

• Removes advertisements and replaces them with its own

• Alters search engine results

• Sends user to advertisers page instead of that requested

Page 11: Spyware and Adware

Spyware Operations (cont.)

• May direct machine to participate in a coordinated DOS or other attack

• Any information entered may be tracked– Extortion– Identity Theft

Page 12: Spyware and Adware

Effects of Spyware

• Complete Security breach

• Abuse of computer resources– Computer becomes unreliable (slows down

or crashes)– Computational power may be sold by

spyware author– Download, store, and serve illegal or

unwanted content

Page 13: Spyware and Adware

Examples of Adware/Spyware

Page 14: Spyware and Adware
Page 15: Spyware and Adware
Page 16: Spyware and Adware
Page 17: Spyware and Adware
Page 18: Spyware and Adware
Page 19: Spyware and Adware

Security Implications of Adware/Spyware

• Insecurities in Adware/Spyware applications mean the user is at risk

• Spyware can give an attacker complete control

Page 20: Spyware and Adware

Symptoms of Infected machines

• Unusually long browser startup times• Reset homepage on browser• Computer and Internet response is sluggish• Unexplained popup messages• Ads of competitors on the visited website• System instability

Page 21: Spyware and Adware

Removing Spyware

• Clicking remove almost never works• Customized tools for specific spyware applications• More general Anti-spyware Tools are available that

work much like Anti-virus software.

Page 22: Spyware and Adware
Page 23: Spyware and Adware
Page 24: Spyware and Adware
Page 25: Spyware and Adware
Page 26: Spyware and Adware
Page 27: Spyware and Adware

Avoiding Adware and Spyware

• Purchasing Adware free version

• Using free software

• Use Anti-Virus, Anti-Spyware, and Firewall applications

Page 28: Spyware and Adware
Page 29: Spyware and Adware
Page 30: Spyware and Adware

Stopping Spyware

• Internet Service Provider monitoring and blocking tools (WebTap)

• Better Operating System Design– Mac OS X and Linux are mostly adware free– SE Linux could prevent it altogether (processes do

NOT have the same privileges as the user running them)

• Rise of the Internet generation

Page 31: Spyware and Adware

References

• Adware and Spyware: A growing privacy and security problem, David Saurino, SANS GSEC 2004.