Home / Unlabelled / Who's Seeding the Net With Spyware?
Saturday, September 19, 2015
Who's Seeding the Net With Spyware?
Young surfers pick up paychecks for posting misleading pitches armed with invasive programs.
It's tough enough sometimes to figure out where you picked up that spyware, but have you ever wondered who planted that digital parasite?
It's likely a young man, maybe a college student, just making a few bucks spreading pop-up ads that contain a package unwelcome by many. And it's a growing cottage industry.
How It Works
Spyware follows your Internet surfing habits and serves up advertisements. You typically pick up spyware by clicking on links, which may not make it clear that you're downloading a "bonus" program when you read an ad or download a program you want.
The Federal Trade Commission defines spyware as "software that aids in gathering information about a person or organization without their knowledge and which may send such information to another entity without the consumer's consent, or asserts control over a computer without the consumer's knowledge." The federal government and several states are considering antispyware laws, and Utah recently enacted one.
FTC and industry leaders have urged Congress to resist spyware legislation, instead pushing for the industry to adopt self-regulatory practices. They fear that proposed laws define the practice too vaguely, and would prohibit other marketing practices that benefit consumers. But some lawmakers worry that the tech industry will not regulate spyware aggressively enough to protect consumers.
Meanwhile, computer users continue to face the side effects of spyware on their systems: bogged-down Internet connections, identity theft, lost documents, system problems, and potential loss of privacy.
Who's Behind It
The people distributing the links for spyware downloads are paid about 15 cents every time an unsuspecting surfer clicks on their misleading bait.
"Friends signed me up one night, after we'd been drinking," says one twenty-something man, who plants spyware for pay. "They said it was an easy way to make some money."
"All I had to do was sign up and post fake ads, saying things like 'to see my picture click here.' Then when they clicked, it told them they had to download software to see the pictures."
But the user downloaded no pictures; instead, they got the greeting, "Come back later to see my photo." The ad is bogus, but the contamination of the computer is real.
He says open forums and other unregulated sites are the best places to post ads, because large numbers of people are likely to click on the phony links.
"You have to move around," he says, noting that if users complain, he'll be kicked off a site, or a section of a site. For example, he will just move to a different part of a classified advertisement site, he says. "It's really easy, so reposting your ad is not a big deal."
At 15 cents per hit, he got checks every two weeks for a few hundred dollars each.
"I could have made a lot more," he says, adding that he really isn't doing it anymore. "All I had to do was put more ads up and I would have doubled or tripled my profits."
What's the Risk?
The foot soldiers who spread spyware may also become victims of the companies behind the software.
Many companies paying individuals to spread spyware post a disclaimer on their own Web site. It often contains a clause telling readers that if they commit fraud the company has the right to pull their paycheck.
However, the new Utah Spyware Control Act and other privacy laws sometimes invoked to combat spyware consider posting spyware to be fraud.
The spyware spreaders may not be reading the disclaimer themselves. But they do understand the company is paying them to trick people into downloading software, the young man says.
Does he feel any remorse for contaminating the computers of naive users? "Look, they're perverts if they click on my ads," he says, noting that the ads imply pornographic pictures await. "I say some nasty stuff, so, no, I don't feel bad." Anyone online should have a spyware blocker, spam blocker, and a firewall anyway, he said. "If they don't, they're just stupid."
A Challenging Battle
Placing ads online can be a tempting and easy way to make money from home, notes Ray Everette-Church, chief privacy officer for antispam product vendor Turn Tide.
"It is very successful," Everette-Church says. "Hundreds of thousands of dollars a month is generated in this tiered structural referral." He is serving as an expert witness for the plaintiffs in an ongoing adware case arguing against pop-up ads.
Millions of Americans online haven't protected their PCs, and pursuing perpetrators of spyware is more complicated than in other criminal investigations, according to Mozelle Thompson, an FTC commissioner.
"It's hard to identify how many companies are engaged in dangerous spyware, or spyware in general," Thompson says. "The definition of spyware is too broad."
The surreptitious nature of spyware makes it more difficult to track who, where, and how the spyware is disseminated, Thompson told a House subcommittee at a recent hearing.
"Consumer complaints, for instance, are less likely to lead directly to targets than in other law enforcement investigations, because consumers often do not know that spyware has caused the problems or, even if they do, they may not know the source of the spyware," he said at the April hearing.
Related Articles :
- Accessories ( 19 )
- ACER ( 11 )
- AMD ( 2 )
- ANDROID 2015 ( 1 )
- ASUS ( 6 )
- BLOGGER ( 37 )
- CANON PRINTER ( 1 )
- CD DVD RW ( 23 )
- CMD ( 18 )
- DOWNLOAD ( 24 )
- EPSON PRINTER ( 2 )
- FTP Server Linux ( 6 )
- GAMES ( 11 )
- HACK ( 46 )
- HARD DRIVE ( 22 )
- Hardwaer ( 76 )
- HOME ( 6 )
- HOW TO WORKIN ( 84 )
- HP ( 1 )
- HP PRINTER ( 1 )
- INTEL ( 8 )
- INTERNET ( 63 )
- INTERNET CAFE ( 4 )
- IP-ADDRESS ( 11 )
- LAPTOP ( 27 )
- LINUX ( 45 )
- Linux as a Router ( 2 )
- LINUX LAB ( 14 )
- MICROSOFT ( 14 )
- Mobile ( 421 )
- MOTHERBOARD ( 52 )
- MOTHERBOARD DELL ( 3 )
- MOTHERBOARD GIGABYTE ( 23 )
- NETWORKING ( 31 )
- NEWS ( 453 )
- PC Support ( 13 )
- PCI CARD ( 1 )
- Printer ( 6 )
- QUESTION AND ANSWER ( 12 )
- REDHAT 5 ( 16 )
- REGISTRY EDTOR ( 20 )
- RESET Bios Password ( 1 )
- SAMBA-SERVER ( 4 )
- Samsung ( 26 )
- SERVER ( 14 )
- SERVER CONFIG ( 17 )
- SERVICE MANUAL ( 40 )
- Snapdragon ( 1 )
- SOFTWAER ( 23 )
- Softwaer exporla ( 6 )
- squid proxy server Linux ( 3 )
- TUTORIALS ( 24 )
- USB ( 3 )
- VIDEO ( 3 )
- VNC server Linux ( 2 )
- Window 10 ( 17 )
- Window XP ( 135 )
- Windows 8.1 ( 9 )
- Windows Shortcuts ( 26 )
- Windows XP ( 2 )
- YouTube ( 1 )
- Yum Server Linux ( 5 )
How to configure the front panel. the cabniet has the following pin 1. GND 2, MIC in 3 Mic power 4 R-out R-r...
Apple K94 chopin 820-3069-a_ra_schematics Apple k94 chopin Apple Ipad 2 (K94 Chopin MLB 820-3069-A) Free Download Laptop Mother...
SOCKET LGA 775 PIN REPAIR METHOD. SOCKET 775 DAMAGED PIN REPAIR METHOD. Tools: 1 pair of angle point tweezers - others work but I ...
Like the BrTurbo links... there's a little bit to know what the links from Yahoo/Geocities do... or how they work... Maybe this...
Additional configuration for Samba Server Creating & Managing Users & Groups: Step-1: Create A Group Named “ sam...
Here you can find how to set up your Outpost firewall. Most of this rules I found on the internet, but some of them are mine. I...
If you wish to install php and mysql to run a phpBB installation on your computer, first you will need installers. Most of you have window...
1-10 minute guide to lotus notes mail 4.5 http://www.parsian.net/set1252/pages/books.htm 2 -10 minute guide to Microsoft exchange 5.0 h...
DELL 1545 LAPTOP BIOS PASSWORD RESET STEPS DELL INSPIRON 1545 LAPTOP BIOS RESET. PASSWORD RES...
WELL KNOWN PORT NUMBERS The Well Known Ports are assigned by the IANA and on most systems can only be used by system (or root) proc...