Spyware Software Dubbed 'Ransom-Ware' - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News
News
5/31/2005
02:26 PM
50%
50%

Spyware Software Dubbed 'Ransom-Ware'

An apparently bogus anti-spyware tool is the newest addition to the expanding "ransom-ware" category of malware, Panda Software says.

An apparently bogus anti-spyware tool is the newest addition to the expanding "ransom-ware" category of malware, Panda Software said Tuesday.

Ransom-ware, the term some have slapped on malicious code that infects a PC, then demands money in return for cleaning up the machine or unlocking suddenly-encrypted documents, is just another example of how hackers are increasingly driven by greed, Luis Corrons, the director of Panda's research lab, said in a press release. Now, said, Corrons, a purported anti-spyware product, SpywareNo, joins the list of ransom-ware.

Surreptitiously downloaded when users visit certain porn or pirate Web sites, SpywareNo exploits vulnerabilities in Microsoft's Internet Explorer to get onto a PC. Once it installs itself, it creates an icon on the desktop and displays a bogus warning that the system's infected with spyware, Corrons said. (It also modifies the Windows Registry to guarantee it runs every time the PC is started, even after the user thinks he's managed to manually delete the program.)

The warnings are as fake as a $3 bill.

The on-screen alert invites users to purchase the full version ($20 for a month's subscription, $60 for an annual plan); only those who pay the ransom see the "threats" disappear.

"If users fail to register, this commercial software will 'detect' threats that don't actually exist on the computer, and which will 'disappear' as soon as users pay for the product," said Panda in its own warning.

In a release posted to the Spyware Warrior anti-spyware message forum, someone claiming to be the public relations manager for SpywareNo took exception with the ransom-ware categorization, and blamed the drive-by-installs on out-of-control affiliates.

"The spyware removal software market is so overcrowded," wrote someone identifying herself as Jessica Simmons. "The competition is very very hard. That is why we direct all our efforts to development itself and have no time and power to advertise our products effectively. We use affiliated advertisers to do this. This is an easy way for us. This way is a very dangerous though. It is a shame that some of our advertisers do not respect the law, but unfortunately we are unable to check them all at the initial stage."

The poster went on to say that SpywareNo "does not install silently or without permission," and that any such instance is due to "those unprincipled advertisers."

End-users commenting to the dslreports.com message forum, however, say different. One said SpywareNo got installed "out of nowhere," while Eric Howes, a graduate student at the University of Illinois, a contributor to the Spyware Warrior site and list, noted "the [SpywareNo] scanner turned up eight listed spyware programs, all 'high risk' in just two seconds. Even a scan of the processes [running in Windows] takes five or six seconds. That's a big red flag," he said. "SpywareNo wasn't actually scanning anything at all.

"Within 48 hours of the first report we had of SpywareNo, we had reports from all over the place," said Howes. "The fact that the reports came from a number of different sources, at about the same time" indicate that it had been seeded on multiple Web sites.

Phony spyware detection isn't a new tactic, said Howes, who compared SpywareNo's approach to others, such as Spywiper and SpyWareAssassin, two products which have been investigated by the Federal Trade Commission.

"They're guilty of unfair practices, just as was SpyWareAssassin," Howes alleges. "But I think Panda is on to something by classifying it as 'ransom-ware.'

"SpywareNo has been irresponsible at best," he added. "I've stopped listening to that 'our affiliates did it' excuse years ago. Even if its' true, they're still responsible."

Attempts to contact SpywareNo, which according to the alleged public relations spokeswoman, is based in Istanbul, were unsuccessful.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
2020 State of DevOps Report
2020 State of DevOps Report
Download this report today to learn more about the key tools and technologies being utilized, and how organizations deal with the cultural and process changes that DevOps brings. The report also examines the barriers organizations face, as well as the rewards from DevOps including faster application delivery, higher quality products, and quicker recovery from errors in production.
Slideshows
10 Top Cloud Computing Startups
Cynthia Harvey, Freelance Journalist, InformationWeek,  8/3/2020
Commentary
How Enterprises Can Adopt Video Game Cloud Strategy
Joao-Pierre S. Ruth, Senior Writer,  7/28/2020
Commentary
Conversational AI Comes of Age
Guest Commentary, Guest Commentary,  8/7/2020
Register for InformationWeek Newsletters
Video
Current Issue
Special Report: Why Performance Testing is Crucial Today
This special report will help enterprises determine what they should expect from performance testing solutions and how to put them to work most efficiently. Get it today!
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll