Forum for Science, Industry and Business

Sponsored by:     3M 
Search our Site:

 

Spyware poses a significant threat on the Net

07.02.2006


New UW study says amount of covert and sometimes malicious programs is ’extensive’ Spyware is alive and well on the Internet.

That’s the overall message of a new study by University of Washington computer scientists who sampled more than 20 million Internet addresses, looking for the programs that covertly enter the computers of unwitting Web surfers to perform tasks ranging from advertising products to gathering personal information, redirecting Web browsers, or even using a victim’s modem to call expensive toll numbers.

They examined sites in a set of popular Web categories, such as game sites, news sites and celebrity-oriented sites. Within these, they found that:

  • More than one in 20 executable files contained piggybacked spyware.
  • On average, one in 62 Internet domains performed drive-by download attacks – a method for forcing spyware on users who simply visit a Web site.
  • Game and celebrity Web sites appeared to pose the greatest risk for piggybacked spyware, while sites that offer pirated software topped the list for drive-by attacks.
  • The density of spyware seemed to drop from spring to fall of last year, but remained "substantial."

The research is being presented today as the opening paper for the 13th Annual Network and Distributed System Security Symposium in San Diego, Calif.



"For unsuspecting users, spyware has become the most ’popular’ download on the Internet," said Hank Levy, professor and holder of the Wissner/Slivka Chair in the UW’s Department of Computer Science & Engineering and one of the study’s authors. "We wanted to look at it from an Internet-wide perspective – what proportion of Web sites out there are trying to infect people? If our numbers are even close to representative for Web areas frequented by users, then the spyware threat is extensive."

The consequences of a spyware infection run the gamut from annoying to catastrophic.

On the annoying end, where most spyware falls, the stealthy programs can inundate a victim with pop-up advertisements. More malicious programs steal passwords and financial information. Some types of spyware, called Trojan downloaders, can download and install other programs chosen by the attacker. In a worst-case scenario, spyware could render a victim’s computer useless.

In conducting the study, the UW researchers – Levy, associate professor Steven Gribble and graduate students Alexander Moshchuk and Tanya Bragin – used a computer program called a Web crawler to scour the Internet, visiting sites to look for executable files with piggybacked spyware. The team conducted two searches, one in May and the other in October, examining more than 20 million Web address. They also did additional "crawls" of 45,000 Web addresses in eight subject categories, looking for drive-by download attacks.

In the first two crawls, the researchers found that approximately one in 20 executable files contained piggybacked spyware. While most of those were relatively benign "adware" programs, about 14 percent of the spyware contained potentially malicious functions.

In terms of drive-by download attacks, the researchers found a 93 percent reduction between May and October – a finding they say may in part be attributed to the wider adoption of anti-spyware tools, automated patch programs such as Windows Update and the recent spate of civil lawsuits brought against spyware distributors.

Despite that drop, the public should still be vigilant, they said.

"Plenty of software on the Web contains spyware, and many Web sites are infectious," Gribble said. "If your computer is unprotected, you’re quite likely to encounter it."

There are a few steps that people should take to protect themselves, according to Gribble.

"First, everybody should install one or more anti-spyware programs," he said. "There are several high-quality free or commercial software packages available."

It’s also important to keep those tools up-to-date so new threats can’t get around one’s cyber defenses.

Finally, Gribble said, people need to use common sense.

"You should download software only from reputable sources," he said. "And it’s a good idea to avoid the more shady areas of the Web."

Rob Harrill | EurekAlert!
Further information:
http://www.washington.edu
http://www.cs.washington.edu/homes/gribble/papers/spycrawler.pdf

More articles from Information Technology:

nachricht Underwater acoustic localization of marine mammals and vehicles
23.11.2017 | IMDEA Networks Institute

nachricht NASA CubeSat to test miniaturized weather satellite technology
10.11.2017 | NASA/Goddard Space Flight Center

All articles from Information Technology >>>

The most recent press releases about innovation >>>

Die letzten 5 Focus-News des innovations-reports im Überblick:

Im Focus: Frictional Heat Powers Hydrothermal Activity on Enceladus

Computer simulation shows how the icy moon heats water in a porous rock core

Heat from the friction of rocks caused by tidal forces could be the “engine” for the hydrothermal activity on Saturn's moon Enceladus. This presupposes that...

Im Focus: Nanoparticles help with malaria diagnosis – new rapid test in development

The WHO reports an estimated 429,000 malaria deaths each year. The disease mostly affects tropical and subtropical regions and in particular the African continent. The Fraunhofer Institute for Silicate Research ISC teamed up with the Fraunhofer Institute for Molecular Biology and Applied Ecology IME and the Institute of Tropical Medicine at the University of Tübingen for a new test method to detect malaria parasites in blood. The idea of the research project “NanoFRET” is to develop a highly sensitive and reliable rapid diagnostic test so that patient treatment can begin as early as possible.

Malaria is caused by parasites transmitted by mosquito bite. The most dangerous form of malaria is malaria tropica. Left untreated, it is fatal in most cases....

Im Focus: A “cosmic snake” reveals the structure of remote galaxies

The formation of stars in distant galaxies is still largely unexplored. For the first time, astron-omers at the University of Geneva have now been able to closely observe a star system six billion light-years away. In doing so, they are confirming earlier simulations made by the University of Zurich. One special effect is made possible by the multiple reflections of images that run through the cosmos like a snake.

Today, astronomers have a pretty accurate idea of how stars were formed in the recent cosmic past. But do these laws also apply to older galaxies? For around a...

Im Focus: Visual intelligence is not the same as IQ

Just because someone is smart and well-motivated doesn't mean he or she can learn the visual skills needed to excel at tasks like matching fingerprints, interpreting medical X-rays, keeping track of aircraft on radar displays or forensic face matching.

That is the implication of a new study which shows for the first time that there is a broad range of differences in people's visual ability and that these...

Im Focus: Novel Nano-CT device creates high-resolution 3D-X-rays of tiny velvet worm legs

Computer Tomography (CT) is a standard procedure in hospitals, but so far, the technology has not been suitable for imaging extremely small objects. In PNAS, a team from the Technical University of Munich (TUM) describes a Nano-CT device that creates three-dimensional x-ray images at resolutions up to 100 nanometers. The first test application: Together with colleagues from the University of Kassel and Helmholtz-Zentrum Geesthacht the researchers analyzed the locomotory system of a velvet worm.

During a CT analysis, the object under investigation is x-rayed and a detector measures the respective amount of radiation absorbed from various angles....

All Focus news of the innovation-report >>>

Anzeige

Anzeige

Event News

Ecology Across Borders: International conference brings together 1,500 ecologists

15.11.2017 | Event News

Road into laboratory: Users discuss biaxial fatigue-testing for car and truck wheel

15.11.2017 | Event News

#Berlin5GWeek: The right network for Industry 4.0

30.10.2017 | Event News

 
Latest News

Underwater acoustic localization of marine mammals and vehicles

23.11.2017 | Information Technology

Enhancing the quantum sensing capabilities of diamond

23.11.2017 | Physics and Astronomy

Meadows beat out shrubs when it comes to storing carbon

23.11.2017 | Life Sciences

VideoLinks
B2B-VideoLinks
More VideoLinks >>>