Examples Of Spyware And What They Are

August 6, 2018

CRC Health - Recovery Takes Flight 2011

Spyware is a general term used to describe software that performs certain behaviors such as advertising, collecting personal information, or changing the configuration of your computer, generally without appropriately obtaining your consent first.

Spyware is often associated with software that displays advertisements (called adware) or software that tracks personal or sensitive information.

That does not mean all software that provides ads or tracks your online activities is bad. For example, you might sign up for a free music service, but you “pay” for the service by agreeing to receive targeted ads. If you understand the terms and agree to them, you may have decided that it is a fair tradeoff. You might also agree to let the company track your online activities to determine which ads to show you.

Other kinds of Spyware make changes to your computer that can be annoying and can cause your computer slow down or crash.

These programs can change your Web browsers home page or search page, or add additional components to your browser you don’t need or want. These programs also make it very difficult for you to change your settings back to the way you originally had them.

The key in all cases is whether or not you (or someone who uses your computer) understand what the software will do and have agreed to install the software on your computer.

There are a number of ways Spyware or other unwanted software can get on your computer. A common trick is to covertly install the software during the installation of other software you want such as a music or video file sharing program.

Any software that covertly gathers user information through the user’s Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with SpyWare. Once installed, the Spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers

Aside from the questions of ethics and privacy, SpyWare steals from the user by using the computer’s memory resources and also by eating bandwidth as it sends information back to the spy ware’s home base via the user’s Internet connection. Because SpyWare is using memory and system resources, the applications running in the background can lead to system crashes or general system instability.

Because SpyWare exists as independent executable programs, they have the ability to monitor keystrokes, scan files on the hard drive, snoop other applications, such as chat programs or word processors, install other SpyWare programs, read cookies, change the default home page on the Web browser, consistently relaying this information back to the SpyWare author who will either use it for advertising/marketing purposes or sell the information to another party.

Licensing agreements that accompany software downloads sometimes warn the user that a SpyWare program will be installed along with the requested software, but the licensing agreements may not always be read completely because the notice of a SpyWare installation is often couched in obtuse, hard-to-read legal disclaimers.

Examples of SpyWare

These common SpyWare programs illustrate the diversity of behaviors found in these attacks. Note that as with computer viruses, researchers give names to SpyWare programs which may not be used by their creators. Programs may be grouped into “families” based not on shared program code, but on common behaviors, or by “following the money” of apparent financial or business connections. For instance, a number of the SpyWare programs distributed by Claria are collectively known as “Gator”. Likewise, programs which are frequently installed together may be described as parts of the same SpyWare package, even if they function separately.

o CoolWebSearch, a group of programs, takes advantage of Internet Explorer vulnerabilities. The package directs traffic to advertisements on Web sites including coolwebsearch.com. It displays pop-up ads, rewrites search engine results, and alters the infected computer’s hosts file to direct DNS lookups to these sites.

o Internet Optimizer, also known as DyFuCa, redirects Internet Explorer error pages to advertising. When users follow a broken link or enter an erroneous URL, they see a page of advertisements. However, because password-protected Web sites (HTTP Basic authentication) use the same mechanism as HTTP errors, Internet Optimizer makes it impossible for the user to access password-protected sites.

o Zango (formerly 180 Solutions) transmits detailed information to advertisers about the Web sites which users visit. It also alters HTTP requests for affiliate advertisements linked from a Web site, so that the advertisements make unearned profit for the 180 Solutions Company. It opens pop-up ads that cover over the Web sites of competing companies.

o HuntBar, aka WinTools or Adware,WebSearch was installed by an ActiveX drive-by download at affiliate Web sites, or by advertisements displayed by other SpyWare programs-an example of how SpyWare can install more SpyWare. These programs add toolbars to IE, track aggregate browsing behavior, redirect affiliate references, and display advertisements.

oZlob Trojan or just Zlob, Downloads itself to your computer via ActiveX codec and reports information back to Control Server. Some information can be as your search history, the Websites you visited, and even Key Strokes.

11 Comments

  • Precision Repair August 6, 2018 at 9:31 pm

    Never fail to impress, Good job !! Question: Is this phone given back to customer as a data only or can the phone be used again ?

  • Lamont Stewart August 6, 2018 at 9:31 pm

    Great video where does everyone source there phones to repair from?

    Thanks

  • Marek Jaszczyszyn August 6, 2018 at 9:31 pm

    Well done Rico !

  • W⃣I⃣L⃣L⃣Z⃣E⃣ August 6, 2018 at 9:31 pm

    Amazing work mate 😎👍

  • Danny Santos August 6, 2018 at 9:31 pm

    for those wondering, how do you knock off those caps without pulling pads?

  • Daniel FJ August 6, 2018 at 9:31 pm

    Quick question, is there any reason you didnt just heat the board and take off the caps without risking ripping the pads for the caps if they needed to be replaced?
    Also, do you use ZXW or something else?

  • Studio August 6, 2018 at 9:31 pm

    Hi Frederico!
    O have dead LG G4 .. How canal i send ir to you?
    Thanks

  • I OnLyGaMe August 6, 2018 at 9:31 pm

    I want to send in a iPhone 6 plus some say IC is not working some say logicboard is faulty but the phone turns on fine. Is there any solutions? The touch screen won’t i tried everything if i send the phone to you could you possibly fix it ?

  • EverythingiPhonezSudan August 6, 2018 at 9:31 pm

    Good stuff !!!

  • salem treki August 6, 2018 at 9:31 pm

    I have a mobile repair center .. What is the best buying microscope, give me the link from where to buy it

  • Lisa Forbes August 6, 2018 at 9:31 pm

    Great video. FYI – MI is the state of Michigan. Minnesota is MN.

Leave a Reply

Your email address will not be published. Required fields are marked *