1 / 31

Spyware and Adware

Spyware and Adware. Rick Carback 9/18/2005 http://userpages.umbc.edu/~carback1/691i. What is Adware?. Advertising supported software Goes beyond the advertising found in shareware or freeware May run without user knowledge Shows unwanted advertisements Required by terms of use.

shelly
Download Presentation

Spyware and Adware

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Spyware and Adware Rick Carback 9/18/2005 http://userpages.umbc.edu/~carback1/691i

  2. What is Adware? • Advertising supported software • Goes beyond the advertising found in shareware or freeware • May run without user knowledge • Shows unwanted advertisements • Required by terms of use

  3. What is Spyware? • May be bundled or included with other software or install itself through other means • Sends information about host computer back to a remote system or user • Runs without user knowledge

  4. Adware vs. Spyware • Adware typically only annoys the user while Spyware will annoy and collect information to be sent back to the creator. • Generally speaking Spyware is seen as more invasive and subversive Adware. • Not all Adware and Spyware can be considered bad.

  5. Spyware and Adware that isn’t bad? What? • Some desirable applications, like kazaa, require the bundled adware to be running in order to work • Monitoring child internet access • Some people like targeted advertising

  6. Keeping installed software up to date Preventing software piracy Preventing illegal or unacceptable use of installed software Gathering of Marketing Information Annoying Advertisement Complete Privacy Invasion Illegal or Unacceptable use of resources Password, e-mail, and username harvesting Why Adware and Spyware?

  7. How does it get there? • Installation required by Terms of use for other software • Embedded • Bundled • Exploitation of browser or operating system vulnerability • Pure deception

  8. What does Spyware do? • Usually hides from user once installed • Uses central server or acts as a central server to send the information gathered • May install other software or remove competitors software • Targeted popup ads from observed website visits

  9. More Spyware Operations • Removes advertisements and replaces them with its own • Alters search engine results • Sends user to advertisers page instead of that requested

  10. Spyware Operations (cont.) • May direct machine to participate in a coordinated DOS or other attack • Any information entered may be tracked • Extortion • Identity Theft

  11. Effects of Spyware • Complete Security breach • Abuse of computer resources • Computer becomes unreliable (slows down or crashes) • Computational power may be sold by spyware author • Download, store, and serve illegal or unwanted content

  12. Examples of Adware/Spyware

  13. Security Implications of Adware/Spyware • Insecurities in Adware/Spyware applications mean the user is at risk • Spyware can give an attacker complete control

  14. Symptoms of Infected machines • Unusually long browser startup times • Reset homepage on browser • Computer and Internet response is sluggish • Unexplained popup messages • Ads of competitors on the visited website • System instability

  15. Removing Spyware • Clicking remove almost never works • Customized tools for specific spyware applications • More general Anti-spyware Tools are available that work much like Anti-virus software.

  16. Avoiding Adware and Spyware • Purchasing Adware free version • Using free software • Use Anti-Virus, Anti-Spyware, and Firewall applications

  17. Stopping Spyware • Internet Service Provider monitoring and blocking tools (WebTap) • Better Operating System Design • Mac OS X and Linux are mostly adware free • SE Linux could prevent it altogether (processes do NOT have the same privileges as the user running them) • Rise of the Internet generation

  18. References • Adware and Spyware: A growing privacy and security problem, David Saurino, SANS GSEC 2004.

More Related