Techniques of adware and spyware

Eric Chien Symantec

A whole class of threats commonly known as adware and spyware has proliferated over the last few years with very few impediments. These programs are security risks that are typically used to gather marketing information or display advertisements in order to generate revenue.

Not only are these threats far more widespread than traditional malware, but they also utilize techniques that are far more advanced than those used in traditional threats. No doubt this is because adware and spyware programs are being created by registered corporations with professional developers rather than by some hobbyist virus writer.

This paper will examine the techniques used by adware and spyware in their attempts to remain resident on the system and examine the types of data being extracted from the user’s system. These techniques will be compared to similar techniques being used by traditional malicious software and speculate at what point adware and spyware becomes more akin to a Trojan horse.

Solutions will be discussed including exploring the necessity of full system repair including repairing the registry, process scanning, and address the removal of other advanced hooking concepts such as Winsock Layered Service Providers.



twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.