Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Spyware Floods In Through BitTorrent

    By
    Ryan Naraine
    -
    June 15, 2005
    Share
    Facebook
    Twitter
    Linkedin

      BitTorrent, the beloved file-sharing client and protocol that provides a way around bandwidth bottlenecks, has become the newest distribution vehicle for adware/spyware bundles.

      Public peer-to-peer networks have always been associated with adware program distributions, but BitTorrent, the program created by Bram Cohen to offer a new approach to sharing digital files, has managed to avoid the stigma.

      Not any more, anti-spyware advocates warn.

      According to Chris Boyd, a renowned security researcher who runs the VitalSecurity.org nonprofit resource center, the warm and fuzzy world of BitTorrent has been invaded by a massive software distribution campaign linked to New York-based adware purveyor Direct Revenue LLC.

      “This is the marketing campaign to end all marketing campaigns,” said Boyd, the Microsoft Security MVP (most valuable professional) known throughout the security industry by the “Paperghost” moniker.

      /zimages/2/28571.gifTo read about spyware threats associated with file-sharing program Kazaa, click here.

      In an e-mail interview with Ziff Davis Internet News, Boyd said rogue files have popped up occasionally in BitTorrent land but those were usually just random executables. “This is the first time Ive seen a definite money-making campaign with affiliates, distributors and some pretty heavy-duty adware names,” he added.

      Boyd, widely known for chronicling spyware, hacking and malware exploits, has published details of the BitTorrent distributions and identified Direct Revenue and Marketing Metrix Group as the companies responsible for the rigged files.

      Boyd said he got the first inkling that BitTorrent was a major adware distribution vehicle while searching for the source of Direct Revenues Aurora, an adware program that includes the prevalent “nail.exe” component. Sifting through mountains of HijackThis logs posted on security forums, Boyd said the answer was staring him in the face. (HijackThis is a popular freeware spyware removal tool that keeps detailed logs of Windows PC scans).

      In the logs, he found that “nail.exe” and “aurora.exe” were always listed alongside “btdownloadgui.exe,” the user interface that downloads/uploads when using BitTorrent.

      “I checked hundreds of those logs, and more often than not, [btdownloadgui.exe] was chugging away in the background. No wonder none of the victims (or spyware experts) seemed to know what site Aurora was coming from—there was no site. It would have never occurred to the end users that it could have crept in by another means altogether,” he said.

      Because BitTorrent strips digital files into tiny shreds and reassembles them locally once a user completes a download, it has emerged as the perfect place to bundle adware programs among the bits, without the end user ever knowing.

      A BitTorrent user downloading a movie clip only becomes aware of the associated adware after the files are reassembled. At that stage, when the user attempts to load the reassembled file, he or she is greeted by an installation notice for an adware bundle distributed by MMG (Marketing Metrix Group), a Canadian company that specializes in P2P network marketing.

      Officials from MMG did not respond to queries for comment. On its Web site, the company lists BitTorrent as a lucrative adware distribution vehicle. “Although Bit Torrent is a file format and not a P2P Network … [it] is the fastest growing protocol for file sharing online. Many top Bit Torrent sites such as SuprNova, Lokitorren and Bit Tower support millions of downloads daily,” said MMG, which lists PartyPoker.com and Hotbar.com among other clients on its roster.

      /zimages/2/28571.gifSymantec strikes back at adware vendor Hotbar. Click here to read more.

      Boyd said his interest in Aurora increased because it “is absolutely everywhere at the moment, though no one could work out where the infections were coming from.”

      “I had heard rumors that there was something in peer-to-peer land, but I didnt expect it to be on the BitTorrent network, and finding these files has been surprisingly difficult,” he added.

      Boyd said BitTorrent was currently “overwhelmed” with multimedia files rigged with adware bundles, adding that the file sizes vary from 3MB to 175MB.

      “I expect well see more of this, and if the first ever 1GB malware/adware install has a chance of happening anywhere, it will be on file-sharing networks where programs are broken up into pieces. The problem is, you never know whats going to come out the other side,” he said.

      Next Page: Aurora is installed with full disclosure, the company says.

      Aurora Installed with Full

      Disclosure”>

      Direct Revenue admitted to using MMG to push Aurora distributions via BitTorrent, but insisted that the actual adware installation was done with adequate and up-front disclosure.

      In an interview, Direct Revenue chief technology officer Daniel Doman said MMG is “one of many affiliates” used to distribute Aurora. “They [MMG] specialize in doing content distribution on peer-to-peer channels, and we think they provide an easy mechanism for people like us who want to monetize software or content.”

      Doman, a former director of engineering at DoubleClick Inc., said the increased visibility of Aurora and the “nail.exe” component was not the result of new installations, pointing out that Direct Revenue is auto-updating its file-naming convention to address criticisms that the adware program was hidden on purpose.

      “We just recently launched a full awareness and campaign to the entire user base, and the fact that those files are showing up in logs shows that were having success,” he said. The campaign, announced on May 17, includes the placement of an uninstall facility within the add/remove panel on Windows for PCs that points users to the previously hard-to-find MyPCTuneUp Web site for adware program removal.

      “Weve taken pains to brand all of our windows so that the source and prominence of the advertising we serve are extremely clear,” Doman said. So far, about 90 percent of Direct Revenues user base has received the branding updates, which happen without any user action.

      Direct Revenue has been heavily criticized for forcing users to visit the MyPCTuneUp site to complete the program removal, but Doman defended that strategy, insisting the Web-based uninstall utility is the most efficient way to make sure the removal is properly done.

      He said the company was seeing increased traffic to the site since the launch of the campaign, adding that the daily uninstall count was “in the thousands.”

      Even so, he said, the thousands of daily uninstalls represent only a fraction of a percentage of the entire user count and are not materially affecting Direct Revenues business.

      Doman described Boyds posts on VitalSecurity.org as “misleading” and pointed out that the screenshots provided by the researcher “clearly show full disclosure” before the Aurora program is installed.

      He acknowledged that a “grey area” exists in the timing of the disclosure, but insisted that it was done in full compliance with existing laws. “We require all our distributors to fully inform end users about what is being installed. Its a clear opt-in procedure,” he said.

      “The user is downloading something through BitTorrent that is ad-supported and [Boyds screenshot] shows the disclosure that is provided. The idea that somehow the download is surreptitious is wrong. Its very apparent that if the BitTorrent user goes through with the MMG download, they agree to install the ad-supported software.”

      Doman added: “The notion that the user has accidentally found all this software on his machine is false. [MMG] is using a pull technology. Nothing is being snuck in the back door.”

      Check out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Ryan Naraine
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×