Spyware Based ID Theft Ring Uncovered 143
phaedo00 wrote to mention an Ars Technica article discussing a massive identity theft ring uncovered by security software firm Sunbelt. From the article:"According to one of their employees, Alex Eckelberry, during the course of one of their recent investigations into a particular Spyware application--rumored to be called CoolWebSearch--they've discovered that the personal information of those 'infected' was being captured and uploaded to a server."
Bound to happen eventually (Score:1, Insightful)
Re:Bound to happen eventually (Score:1)
Re:Bound to happen eventually (Score:2)
That said, we brits have a reputation for being heavily infected, as our ISPs don't do what a lot of US ISPs consider standard practice, and either issue a router or block RPC ports 135-139 and 593
I'm surprised that so common an infection could be linked to organised crime and nobody realised until now though. I think i'll go and hit all my MSN communities with a warning about this...
Re:Bound to happen eventually (Score:1, Troll)
Not as much as Africa. Oh wait, what infection are we talking about here?
Re:Bound to happen eventually (Score:1)
Re:Bound to happen eventually (Score:1, Troll)
Re:Bound to happen eventually (Score:1)
Re:Bound to happen eventually (Score:5, Informative)
It is funny how many people run anti virus and anti spyware software to clean up the mess while viruses and spyware might be still running on their machines.
The only correct procedure is to boot from CD (or other read-only media (or perhaps move the disk to another machine and being very careful not to run anything from it).
Then you verify hashes of all non-data files with known good values (easier said than done).
Handling messy file formats where code and data are mixed (word, excel and to some extent html) is problematic too.
Of course, an OS that can be actually booted from CD and has a real packaging system makes this much easier.
Re:Bound to happen eventually (Score:2)
also most of the problems on windows are well known viruses. cleaning up what you belive is a deliberate attack on YOUR system would obviously justify far more care.
Re:Bound to happen eventually (Score:3, Interesting)
I thought the whole point of the article was that the common malware may be being used for uncommonly nefarious purpose. Just because 10,000 people got hit by the same malware doesn't make it any less specific a threat to you. The "My city got hit by a nuke, so it is okay as they weren't targeting me personally" logic.
People have to learn that
You make it sound more complicated then it is.. (Score:2)
I'm assuming you're trying to be silly even mentioning hash checking, because that would be overkill for the average desktop users (but certainly something you'd have already done on a production system, and there are plenty of tools for that already).
Just the boot disk should do fine for most peoples needs: from it run your AV (its always a good idea to run a sec
Re:Bound to happen eventually (Score:3, Interesting)
The only problem is when the client machine is so hosed you can't run anything without booting from a CD using Bart's PE or Windoes Ultimate Boot CD. I usually have to try that first, running Ad-Aware from Bart's to get enough spyware off that I can then boot the machine and install the rest of the anti-spyware stuff and run it.
If necessary, I boot into Safe Mode as well and run a scan.
Neither of those catches running processes, though,
Re:Bound to happen eventually (Score:2)
What is amazing is that people accept that as being ok.
Re:Bound to happen eventually (Score:2)
If you happen to be in the unfortunate majority infected by it, download CWShredder [intermute.com] (free) to get rid of it, then get something like Ad-Aware [lavasoft.de] to get rid of anything else you might have gotten along with it (as spyware often gets installed in packs, so to
You don't have to be an "idiot" for IE vulns (Score:3)
There's been so many dozens of IE vulnerabilties that allow software to be installed with *zero* user interaction that it doesn't take a security "idiot" to get smacked by these things.
Re: (Score:2)
CoolWeb Search? (Score:1)
Dude, that is so not cool.
Re:CoolWeb Search? (Score:2)
Is that 0 times today so far?
Re:CoolWeb Search? (Score:1)
Re:CoolWeb Search? (Score:3, Insightful)
CWS (Score:2, Interesting)
Re:CWS (Score:2)
Re:CWS (Score:1, Insightful)
If I didnt know any better I think that MS leaves things like that unpatched to force you to upgrade to the latest and greatest.
Re:CWS (Score:2)
Speaking of which, does anyone know of a good tracker (modern, full-featured, MIDI, arbitrary channels, like Renoise) for linux?
Re:CWS (Score:2)
Oh Really? (Score:2)
That's about as dumb a statement as I can expect to see in print this week. We know why someone would do it. Information is valuable in many different ways. Get a clue!
Really (Score:1, Flamebait)
And it sounded like it came from the pompous ass of Comic Book Man. Some people just need to get over themselves.
Wow... (Score:1, Funny)
Re:Wow... (Score:1)
Give a man a fish, and he eats for a day, teach a man to fish, and he eats for a lifetime.
Re:Wow... (Score:1)
And I thought it was. . . (Score:2)
And I thought it was:
Give a man a fish, feed him for a day. Teach a man to fish, he's gone every weekend.
Or, maybe:
Give a man a fish, feed him for a day. Teach a man to fish, you've lost your fish monopoly.
Re:And I thought it was. . . (Score:1)
I'd like to set a few spyware writers on fire.
been around for years... (Score:1)
Re:been around for years... (Score:1)
Man, ever since Braga and Berman got their hands on the franchise it's been nothing but downhill!
Now they've got the borg stealing peoples personal information.
Re:been around for years... (Score:2)
Re:been around for years... (Score:2)
I think there were even an/some court case(s), and IIRC it was decided that since they run a private forum they can edit any content they want to, and your "speech" there is not 1st Amendment protected. That was about the same time it started to dawn on most people that email and such on other people systems o
Re:been around for years... (Score:1)
strike
as intended (Score:2, Insightful)
hence the name "spyware"
It does WHAT? (Score:4, Interesting)
Re:It does WHAT? (Score:2)
Re:It does WHAT? (Score:2)
How is this news? (Score:2, Informative)
You can download the original removal tool here (no longer updated): http://www.majorgeeks.com/download4086.html [majorgeeks.com]
You can download the currently maintained removal tool here, as intermute took over development from merjin and was aquired by trend micro: http://www.majorgeeks.com/Trend_Micro_CWShredder_d 3019.html [majorgeeks.com]
"removal" tools (Score:2)
Re:"removal" tools (Score:2, Insightful)
Misinformation? (Score:5, Informative)
I did some research on CoolWebSearch (or "CWS") which is a pretty common spyware app, and it seems there are tons of variants. The majority of these apps are designed to get you to coolwebsearch.com in order to create affiliate money for the variant's creator - or at least that was the original idea. My guess is that only some of these variants capture privacy information.
More information on CWS is available from:
http://en.wikipedia.org/wiki/CoolWebSearch [wikipedia.org]
http://www.google.com/search?q=CoolWebSearch [google.com]
Re:Misinformation? (Score:2, Interesting)
I very much disagree with the statment at the end: "Microsoft Windows' System Restore, which is a Windows utility that restores some registry keys and some settings in Windows, can remove some, but not all, variants of CoolWebSearch, if there is still a restoration point. To be safe, use System Restore as a last resort as some files will remain if you use that utility."
I posted this in the discussion section:
"Notes from a traveling computer tec
Re:Misinformation? (Score:2)
And if they fail, the ones responsible for finding the ones responsible will be sacked. And if the ones responsible for getting the ones responsible for finding the ones responsible sacked fail, they will be sacked. And the new write-up on CWS will be completed at great expenses and in a completely different style.
CWS claimed "affiliates" do it... (Score:5, Informative)
Also, if you've not read up on CWS and what they do - and how they do it - read this:
http://merijn.org/cwschronicles.html [merijn.org]
Merijn's the original developer of CWShredder, and while his recording of CWS stops at the original about:blank strain, that's enough to tell you what kind of scum pull this.
Disclaimer: I use CWShredder in my work on SpywareInfo's antispyware boards.
Re:CWS claimed "affiliates" do it... (Score:2)
Re:CWS didn't do it... (Score:2)
It took this long why? (Score:1)
Re:It took this long why? (Score:1)
Pedantic comment (Score:1, Funny)
Re:Pedantic comment (Score:5, Funny)
You're right. It sounds more like ID Piracy arr arr...! That's good, everyone knows the penalties for piracy are much steeper than those for theft...(ducking).
Re:Pedantic comment (Score:2)
And pirates are very easy to detect! [badum-ching]
Re:Pedantic comment was not a troll. (Score:2)
Parent post is not a troll; it identifies the main error in the article.
What happened is that some spyware harvested very personal info about some people. That's bad, possibly criminal. But it's not identity theft.
Identity theft occurs whebn somebody takes the personal information and uses it to pose as you, draining your bank account, sleeping with your girlfriend, or in some way abusing the illicit information. There's no direct e
Re:Pedantic comment was not a troll. (Score:1)
The word identity is a relative term, and since the point of view from which the theft occurred (could be from the POV of a electronic business transaction that exists for milliseconds in which posession is determined once and never considered again) it is a waste of time to question the author's grammar when there are much more important issues in question.
Re:Pedantic comment was not a troll. (Score:2)
This is just a pathetically lame attempt to confuse the issue. It doesn't matter that "the original owner still has it" since a liability has been associated with it and its owner may even wish he didn't "still have it". This isn't like stealing software or music.
What happened is that some spyware harvested very personal info about some people. That's bad, possibly criminal. But it's not identity theft.
Identity theft occurs whebn
Re:Pedantic comment (Score:2)
CoolWebSearch is nasty (Score:2)
Duh... it's spyware (Score:1)
spyware = criminals
Hang them from lamp posts (Score:4, Interesting)
Not only were most people infected via a security exploit in MS Java, they constantly release updates that break or modify spyware removal programs, windows utilities such as MSconfig, regedit as well as blocking the sites on which the removal tools are hosted.
I have no problem with the book being thrown at these punks.
It's unbelievable at times (Score:3, Informative)
Re:It's unbelievable at times (Score:3, Funny)
Re:It's unbelievable at times (Score:5, Interesting)
Re:It's unbelievable at times (Score:2)
Re:It's unbelievable at times (Score:2)
Re:It's unbelievable at times (Score:1)
Re:It's unbelievable at times (Score:1)
you havent owned a windows machine in 10 years and when you finally use one you have a hard time with it. It's not so bad
now do tell us how you downloaded that software before connecting to the internet.
One of the very worst.. (Score:5, Interesting)
Quite apart from the issue of identity theft.. the installation of the software itself is done illegally according to the laws of most countries. Silent drive-by downloads constitute unauthorised access.
HOWEVER.. CoolWebSearch have claimed in the past that these silent drive-by installations were the work of "affiliates" and not CoolWebSearch itself. Personally, I have always suspected that the affiliates were working in this way with the tacit approval of CoolWebSearch.
It's about time somebody got sent to jail for a LONG time for this kind of crap.
Update your webfilter or /etc/hosts (Score:3, Informative)
Add these hosts to your webfilter/proxy blocking list:
coolwebsearch.com, webcoolsearch.com, 193.125.201.50, 1stpagehere.com, 66.250.130.194, adulthyperlinks.com, allhyperlinks.com, approvedlinks.com, bestcrawler.com, cantfind.com, carsands.com, cool-web-search.com, coolfreepage.com, coolwwwsearch.com, couldnotfind.com, defaultsearch.net, dev.ntcor.com, ewebsearch.net, findloss.com, findwhat.com, firstbookmark.net, freebookmark.net, freebookmarks.net, global-finder.com, itseasy.us, jethomepage.com, jetseeker.com, kazaa-lite.ws, martfinder.com, mommykiss.com, mywebsearch.net, noblindlinks.com, ok-search.com, pedo.ws, runsearch.com, search-2003.com, search.xrenoder.com, searchdesire.com, searchv.com, searchxp.com, sharempeg.com, slawsearch.com, slotch.com, stopxxxpics.com, super-spider.com, super-websearch.com, the-exit.com, the-huns-yellow-pages.com, topsearcher.com, unipages.cc, web-search.tk, white-pages.ws, youfindall.com, youfindall.net, yourbookmarks.info, yourbookmarks.ws
And/or add 127.0.0.1 before each host, and add those to your
Re:Update your webfilter or /etc/hosts (Score:1)
(as CWS doesn't run in Linux)
I saw that connection a year ago (Score:5, Interesting)
Re:I saw that connection a year ago (Score:1)
Both Sunbelt and Scientology are headquartered here in Clearwater (I live within walking distance of the Scientology complex), and the IT community isn't so huge that there isn't more than a few degrees of seperation between everyone. The Sunbelt researcher very well could have been tipped off.
Re:I saw that connection a year ago (Score:2, Interesting)
Sunbelt Software and Linux/Windows TCO (Score:3, Interesting)
Related post a year ago (Score:1)
my thoughts on this (Score:1)
oh wait.. previous slashdot article.. people with spyware infected machines think that their computer is just running slow and it's just time for a new one.
probably in 5 or so years, spyware and virus will usually be
Let me get this straight (Score:1)
Main Entry: spyware
Part of Speech: noun
Definition: any software that covertly gathers information about a user while he/she navigates the Internet and transmits the information to an individual or company that uses it for marketing or ot
Re:Let me get this straight (Score:1)
Sunbelt's blog [blogspot.com] entries [blogspot.com] are, in my opinion, better than the ars article.
Re:Let me get this straight (Score:3, Informative)
I work for Sunbelt Software as VP of Research & Development. While one of my spyware researchers was tracking down new variants of CoolWebSearch he came a cross a payload of crap that was downloaded to his VMware. This payload included a program that monitored the user internet traffic, chat activity and Windows protected storage store. When using Internet Explorer with autocomplete turned on, your autocomplete info gets stored in protected storage. Th
Re:Let me get this straight (Score:1)
With all those IDs in their hands.... (Score:2)
Then when they get out on bail, skip town.
Then the police would find themselves starting all over again?
I guess the only way that might not work is if the police already have their prints and true identity on file.
But then, the other ID on file might be false too.
Updated information from Sunbelt (Score:4, Interesting)
Hi, I'm the author of the Ars article and the submitter of this story, Alex from sunbelt got back to me with a bit more information:
Basically, it went like this:
Patrick Jordan, our CoolWebSearch expert, was doing research on a CWS exploit. During the course of the research, he disovered that a) the machine he was testing became a spam zombie and b) it send a call back to a remote server. He traced back the remote server and found what you have heard about.
The scale is unimaginable. There are thousands of machines pinging back in a day. There is a keylogger file that grows and grows, and then is zipped off and then the cycle continues again.
It is sophisticated. There are nifty little PHP scripts that help the criminals get reports. There is a special upload area.
It's really quite sucktastic.
The inside info (Score:2, Informative)
I work for Sunbelt Software as VP of Research & Development. While one of my spyware researchers was tracking down new variants of CoolWebSearch he came a cross a payload of crap that was downloaded to his VMware. This payload included a program that monitored the user internet traffic, chat activity and Windows protected storage store. When using Internet Explorer with autocomplete turned on, your autocomplete info gets stored in protected storage. T
This may sound silly... (Score:2)
I run Linux for my primary desktop -- have for 5 years. I run WinXP in VMWare, with snapshots enabled. So when I wish to experiment with questionable sites and programs, I roll back when I'm done.
That said, if CWS is as nasty as every says, I'd *love* to let it loose in a sterile VM and try my hand at removing it manually (mainly using the Sysinternals suite of programs to find the
a major nuisance (Score:1, Interesting)
Cringe (Score:2)
Now that story is out there, hopefully people will realize that spyware writers are no better than virus writers, and should be put into jail.
So, I'm supposed to trust what a spammer says... (Score:2, Interesting)
about spyware? Let's face it, Sunbelt Software has a long [google.com] history [google.com] of spamming [google.com]...
Not to mention the entire Clearwater [sptimes.com]/$cientology [xenu.net] thing...
Then again, who better to look into the entire spam/spyware connection. They're simply vetting out the competition, right? What a world.
Find those responsible... (Score:3, Interesting)
Another nice tactic would be if virus writers would release other malicious viruses using the CWS name and website, set CWS up for a nice fall and huge legal action.
You can always follow the money. Heck, offer to pay CWS to run banner ads on their hijack search engine then go rm the people accepting the money.
Re:Once again we can thank Microsoft... (Score:1)
Re:Windoze (Score:2)
Re:Windoze (Score:1)
Re:Windoze (Score:3, Informative)
OK, OK, calm down. Let me just say that there are many good pieces of software on other platforms. In my line of work, the selection of technical software available for Linux can't be beaten. But there are also a lot of folks out there who like Windows, and its software satisfies their needs. And that's all good.
Now:
Re:Windoze (Score:2)
Running from a limited user account coupled with using a non-IE browser removes nearly every (current) major malware attack vector. Running under a limited user account can be a pain in the ass, but there are a few things to remember to help improve the experience:
1. Some programs/shortcuts will not show "Run As..." in the context menu (for example: Control Panels). Try holding the shift key down when you right click. Viola! "Run As..." now show in the context menu.
2. If you
Re:Sunbelt Software connected to Scientology? (Score:2)
I can't keep thinking "how convenient." Especially since adware/spyware is coming increasingly under the gaze of the Federal Trade Comission and the Justice Department.
Re:Sunbelt Software connected to Scientology? (Score:1)
There's nothing visibly connecting that Hubbard management company to that spyware operation other than a lot of their old sites were harvested. And there's nothing showing that the operation that I saw a year ago is the same one as Sunbelt found. And I never disected the spyware to
Re:Sunbelt Software connected to Scientology? (Score:2)
Re:Sunbelt Software connected to Scientology? (Score:2, Informative)
Re:Sunbelt Software connected to Scientology? (Score:2)
"Region
British Columbia
Cities
Boston Bar
Chilliwack
Hope
Pemberton
Powell River
Vancouver "
A search on the Canadian number just returns...
"We're sorry. We did not find a listing for the phone number you entered.