Home » Articole » EN » Computers » Computer security » Spyware » Typical examples of spyware

Typical examples of spyware

A few examples of common spyware programs may serve to illustrate the diversity of behaviors found in these attacks.

  • Caveat: As with computer viruses, researchers give names to spyware programs which frequently do not relate to any names that the spyware-writers use. Researchers may group programs into “families” based not on shared program code, but on common behaviors, or by “following the money” or apparent financial or business connections. For instance, a number of the spyware programs distributed by Claria are collectively known as “Gator”. Likewise, programs which are frequently installed together may be described as parts of the same spyware package, even if they function separately.
  • CoolWebSearch, a group of programs, installs through the exploitation of Internet Explorer vulnerabilities. The programs direct traffic to advertisements on Web sites including coolwebsearch.com. To this end, they display pop-up ads, rewrite search engine results, and alter the infected computer’s hosts file to direct DNS lookups to these sites. [1]
  • Internet Optimizer, also known as DyFuCa, redirects Internet Explorer error pages to advertising. When users follow a broken link or enter an erroneous URL, they see a page of advertisements. However, because password-protected Web sites (HTTP Basic authentication) use the same mechanism as HTTP errors, Internet Optimizer makes it impossible for the user to access password-protected sites. [1]
  • 180 Solutions transmits extensive information to advertisers about the Web sites which users visit. It also alters HTTP requests for affiliate advertisements linked from a Web site, so that the advertisements make unearned profit for the 180 Solutions company. It opens pop-up ads that cover over the Web sites of competing companies. [5]
  • HuntBar, aka WinTools or Adware.Websearch, is a small family of spyware programs distributed by Traffic Syndicate. [1] It is installed by ActiveX drive-by download at affiliate Web sites, or by advertisements displayed by other spyware programs—an example of how spyware can install more spyware. These programs add toolbars to Internet Explorer, track Web browsing behavior, redirect affiliate references, and display advertisements.

References

  1. a b cParasite information database“. Doxdesk.com. Retrieved July 10, 2005.

This guide is licensed under the GNU Free Documentation License. It uses material from the Wikipedia.

Web 2.0 / Social Media / Social Networks
Web 2.0 / Social Media / Social Networks

Web 2.0 is the evolution of the Web towards greater simplicity (requiring no technical knowledge or computer for users) and interactivity (allowing everyone, individually or collectively, to contribute, share and collaborate in various forms). The term “social media” is increasingly … Read More

not rated $2.99 Select options
Beginner’s Guide for Cybercrime Investigators
Beginner’s Guide for Cybercrime Investigators

In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and “steal” all your valuable data. Just as in the real world, … Read More

$2.99 Select options
Small Business Management for Online Business
Small Business Management for Online Business

Web Development, Internet Marketing, Social Networks A guide for home business and small business companies to develop online strategies for online presence, using the advantages of Web 2.0, web development, online promotion and social media. Web 2.0 is the evolution … Read More

$4.99 Select options

  1. Gui
    |

    who can efficiently investigate such a case and how to bring it to justice . i am a victim of identity thefth and spying and its impossible to end it from my power

Leave a Reply

Your email address will not be published. Required fields are marked *