Sponsored Content




Intermarkets' Privacy Policy
Support


Donate to Ace of Spades HQ!



Recent Entries
Absent Friends
Bandersnatch 2024
GnuBreed 2024
Captain Hate 2023
moon_over_vermont 2023
westminsterdogshow 2023
Ann Wilson(Empire1) 2022
Dave In Texas 2022
Jesse in D.C. 2022
OregonMuse 2022
redc1c4 2021
Tami 2021
Chavez the Hugo 2020
Ibguy 2020
Rickl 2019
Joffen 2014
AoSHQ Writers Group
A site for members of the Horde to post their stories seeking beta readers, editing help, brainstorming, and story ideas. Also to share links to potential publishing outlets, writing help sites, and videos posting tips to get published. Contact OrangeEnt for info:
maildrop62 at proton dot me
Cutting The Cord And Email Security
Moron Meet-Ups

NoVaMoMe 2024: 06/08/2024
Arlington, VA
Details to follow


Texas MoMe 2024: 10/18/2024-10/19/2024 Corsicana,TX
Contact Ben Had for info





















« Some Economists Say Greece Should Stay In the Euro -- But Germany Should Exit It | Main | Open Thread »
July 29, 2015

Cautionary Tale: Computer Hijacking, Extortion, and Sh*tware, Part 2

This is a follow-up to my computer post the other day. I received an email from fellow Moron "TheCoat" that was wonderfully informative, and I asked him if I could share it. He said okay, but he was worried about the curse words. I told him to think about that for a second: not a problem.

So yea, for many years now the most annoying malware has been software that masquerades as anti-virus/anti-malware software.

There are three general types of malware:

1.) Advertisement malware, which generally seeks to hijack your web browser. Basically it tends to load webpages you go to through their website, adding advertisements to each webpage you load. The key initial indicator that you’ve contracted something is when your browser homepage suddenly changes on you. To make matters worse they generally send you adds from less than reputable add services. Many sites use something like google adds, they put a google applet on their website that loads up adds out of a database when a visitor hits the site, and they get a small bit of revenue for each hit. Malware like this loads adds from someone else hence the creator/distributors financial incentive to do this. They endeavor to get their crap on as many systems as possible to cash in on advertisements, but these come from sources that are less than secure in who creates adds for them, and the content of said adds. Often times this means that the adds that get loaded have embedded exploit attempts, to load… you guessed it even more of this add crap. These exploits and pieces of software tend to be created by really shitty programmers, which means not only are they malicious but they tend to be buggy and do things that you shouldn’t be doing to a system in an attempt to hide themselves.

2.) What you seem to have gotten. Fake malware/spyware/virus protection and removal. These tend to be easier to track down and source simply because they give you a website to go buy their product, and often times their other product is what’s screwing up your system. The quickest way to tell you’ve gotten this tends to be a popup for security software you never loaded. Often times in an effort to hide it’s self from simple removal, and to change your system and cause problems, even if you do pay them they don’t get your system restored to the right state, because their programing is again done by crappy coders who don’t care.

3.) The latest is the cryptolocker series. What this little bag of hell does is scan your drives looking for any document types and then encrypts them. When it’s done it gives you instructions on how to go to their website pay them money and they’ll give you the key to unencrypt your files. Unlike the prior two, these are reputable scoundrels. If you pay them they will indeed give you the key and you can fully recover, however this funds them to keep spreading their ransomeware. I honestly think this one is based in an organized criminal racket. They make no bones about the fact that they are the ones screwing you over… but if you pay them they want to make good because that encourages others to do so.

I’m a developer for a software company, and we tend to see quite a bit of this stuff when we get calls about something with our software not working. Our support gets hooked up only to find that our software is having problems because they have infections of this nature messing things up. Although it’s technically not our problem we often times help people get this crap cleaned up, however in some cases the infections are so bad we have them call in someone local simply because to clean it up you either have to reload the system or do the clean ups outside the operating system, making it impossible for us to clean it up remotely. Sometimes people just get infected due to bad luck, more often we see repeated infections at the same clients… usually because they allow their employees to go to social and gaming sites at work, or whatever else they feel like. In one instance I got a maintenance guy fired because I tracked down the source of their infections and was able to piece together enough info to show them that the porn sites their computer was visiting late at night were the source of infection… this in an accounting office. They setup a sting and caught the guy sneaking in and surfing porn while he was supposed to be working.

Some of the things I’ve seen in the past few years make me think I really specialized in the wrong area. I’m no novice when it comes to computer and network security. I run my own firewalls and intrusion detection systems at home and do penetration testing on my home as well as our corporate network, and yet these last few years I’ve done more security related stuff to my home network out of fear than out of general playing around. Many years ago in the age of dialup I ran a full computer based firewall and dialup server for my home network… because I could 8). Now I run things like an intrusion detection system on the edge of my network because I feel I need the security. There has been a ton of security gains made since the early days of the internet revolution, however this has just made the crooks get smarter and more insidious. What bothers me is if I had steered less toward business software development and more toward network security which I pursued as more of a hobby I’d be in a better position to do what I really get a kick out of doing, and that is taking the fight to these assholes, not just cleaning up their messes. Eh it’s probably a good thing though, as much of what I’d like to do to them and their criminal enterprises would probably be legally grey at best even if it’s unquestionably morally white.

No, everyone hates computer pirates. Anything short of taking a Ghurka kukri knife to them is fine with me.

Thanks, "TheCoat," and thanks again to all others who helped.


digg this
posted by rdbrewer at 06:21 PM

| Access Comments




Recent Comments
Moron Robbie - If this is how Georgia hires attorneys, imagine how they manage elections: "I think it was grump928 who made an outstanding po ..."

Don Black: "is everyone over on the main page, slapping f5 lik ..."

JackStraw: ">>The long-shredded pretense to impartiality is su ..."

Moron Robbie - If this is how Georgia hires attorneys, imagine how they manage elections: "Wakandyass it is! ..."

Don Black: "NYR 0 COL 0 end 1st p 🏒 ..."

Alberta Oil Peon: "If the Wakandians hadn't been isolationists then t ..."

Puddleglum at work: "[i]173 167 I’ve often speculated that the re ..."

Moron Robbie - If this is how Georgia hires attorneys, imagine how they manage elections: "If the Wakandians hadn't been isolationists then t ..."

Ciampino - Bloody 'experts' again ...: "158 For being the alleged "birthplace of civilizat ..."

sock_rat_eez - these lying bastardi e stronzi have been lying to us for decades [/b][/u][/i][/s]: "got to have a spread of alternatives, amirite? ..."

Bulgaroctonus : "167 I’ve often speculated that the reason th ..."

Hairyback Guy: "Anita Bryant > All Other Female Crooners ..."

Recent Entries
Search


Polls! Polls! Polls!
Frequently Asked Questions
The (Almost) Complete Paul Anka Integrity Kick
Top Top Tens
Greatest Hitjobs

The Ace of Spades HQ Sex-for-Money Skankathon
A D&D Guide to the Democratic Candidates
Margaret Cho: Just Not Funny
More Margaret Cho Abuse
Margaret Cho: Still Not Funny
Iraqi Prisoner Claims He Was Raped... By Woman
Wonkette Announces "Morning Zoo" Format
John Kerry's "Plan" Causes Surrender of Moqtada al-Sadr's Militia
World Muslim Leaders Apologize for Nick Berg's Beheading
Michael Moore Goes on Lunchtime Manhattan Death-Spree
Milestone: Oliver Willis Posts 400th "Fake News Article" Referencing Britney Spears
Liberal Economists Rue a "New Decade of Greed"
Artificial Insouciance: Maureen Dowd's Word Processor Revolts Against Her Numbing Imbecility
Intelligence Officials Eye Blogs for Tips
They Done Found Us Out, Cletus: Intrepid Internet Detective Figures Out Our Master Plan
Shock: Josh Marshall Almost Mentions Sarin Discovery in Iraq
Leather-Clad Biker Freaks Terrorize Australian Town
When Clinton Was President, Torture Was Cool
What Wonkette Means When She Explains What Tina Brown Means
Wonkette's Stand-Up Act
Wankette HQ Gay-Rumors Du Jour
Here's What's Bugging Me: Goose and Slider
My Own Micah Wright Style Confession of Dishonesty
Outraged "Conservatives" React to the FMA
An On-Line Impression of Dennis Miller Having Sex with a Kodiak Bear
The Story the Rightwing Media Refuses to Report!
Our Lunch with David "Glengarry Glen Ross" Mamet
The House of Love: Paul Krugman
A Michael Moore Mystery (TM)
The Dowd-O-Matic!
Liberal Consistency and Other Myths
Kepler's Laws of Liberal Media Bias
John Kerry-- The Splunge! Candidate
"Divisive" Politics & "Attacks on Patriotism" (very long)
The Donkey ("The Raven" parody)
Powered by
Movable Type 2.64