There are many ways that spyware deceives computer users, and these tactics have rapidly increased with the rise of spyware. However, we will highlight the 9 most common methods used by spyware in 2005.
These nine methods are also associated with several notable events this year related to these spy programs.
1. Spyware spreads by exploiting vulnerabilities found in widely used programs, such as Windows Media Player (an issue that occurred in January 2005 and has since been patched by Microsoft).
2. Spyware conceals its installation activities by using rootkits (tools developed by hackers to evade detection by installed security tools). Of course, if you are well-prepared and careful while operating your screen, there should be nothing to worry about. Examples include the programs Enternet Media’s Elitetoolbar and ContextPlus’ Apropos and PeopleonPage.
3. A Java code segment can infect Internet Explorer if a machine runs both Firefox and Internet Explorer simultaneously. This vulnerability has also been patched.
4. Programs such as spam, adware, and keyloggers connect to advertising websites and sites with explicit content. If you accidentally get infected with these, it can be quite troublesome. Examples include 180solutions, Direct Revenue, SurfSidekick, BullsEye Network, and ShopAtHomeSelect.
5. Spyware programs can spread through “chat” applications. You can refer to the lists on websites like SunbeltBLOG and Spyware Warrior. The characteristic of these programs is their continuous advertising dissemination via IRC.
6. Anti-spyware programs installed by Trojans and other spyware include PSGuard, Razespyware, SpySheriff, Spy Trooper, WorldAntiSpy, and most recently, SpyAxe, which we have previously mentioned. These are fraudulent anti-spyware programs.
7. “Returns” from advertisements you encounter while using BitTorrent and Aurora. These are services that have a significant online draw, accompanied by spyware as the “returns” you must deal with.
8. AIM worms bring along tools aiding in attacks that primarily originate from the Middle East.
9. Perhaps the most notorious incident was Sony’s recall of over 2.1 million music discs due to them containing DRM that tracked customers without permission. This infection method can be described as sophisticated and formal.
In conclusion, spyware is not easily contracted. If you are cautious while using your computer and carefully install protective programs, any spyware attempting installation will show warning signs, allowing you to avoid them. A second hope is the new antivirus technology, Rudra, which has just emerged in India.