Potentially unwanted program

From Infogalactic: the planetary knowledge core
(Redirected from Unwanted software bundling)
Jump to: navigation, search

Unwanted software bundling is bundled software which computer users are fooled into installing along with a wanted program.

Such software can compromise privacy or weaken the computer's security. Companies often bundle a wanted program download with a wrapper application. This may install an unwanted application, without providing a clear opt-out method.[1][2] Unwanted programs often include no sign that they are installed, and no uninstall or opt-out instructions.[3]

Antivirus companies define the software bundled as potentially unwanted programs (PUP)[3][4] which can include software that displays intrusive advertising, or tracks the user's Internet usage to sell information to advertisers, injects its own advertising into web pages that a user looks at, or uses premium SMS services to rack up charges for the user.[5][6] The practice is widely considered unethical because it violates the security interests of users without their informed consent.

Some unwanted software bundles install a root certificate on a user's device, which allows hackers to intercept private data such as banking details, without a browser giving security warnings. The United States Department of Homeland Security has advised removing an insecure root certificate, because they make computers vulnerable to serious cyberattacks.[7]

A growing number of open-source software projects have expressed dismay at third-party websites wrapping their downloads with unwanted bundles, without the project's knowledge or consent. Nearly every third-party free download site bundles their downloads with potentially unwanted software.[8]

Software developers and security experts recommend that people always download the latest version from the official project website, or a trusted package manager or app store.

Origins

Historically, the first big companies working with Potentially Unwanted Programs for creating revenue, came up in the USA in the mid-2000s, such as Zango. These activities have declined, after the companies were tackled by authorities for invasive and harmful installs.[9]

Download Valley

A major industry, dedicated to creating revenue by foisting potentially unwanted programs, has grown among the Israeli software industry and is frequently referred to as Download Valley. These companies are responsible for a large part of the download and install tools,[10] which place unwanted, additional software on users' systems. These companies have faced little to no disturbance by authorities.

Unwanted programs

Unwanted programs have increased in recent years, and one study in 2014 classified unwanted programs as comprising 24.77% of total malware infections.[11]

Many programs include unwanted browser add-ons that track which websites a user goes to in order to sell this information to advertisers, or add advertising into web pages.[3] Five percent of computer browser visits to Google owned websites are altered by computer programs that inject their own ads into pages.[12][13][14] Researchers have identified 50,870 Google Chrome extensions and 34,407 programs that injected ads. Thirty-eight percent of extensions and 17 percent of programs were catalogued as malicious software, the rest being potentially unwanted adware-type applications. Some Google Chrome extension developers have sold extensions they made to third-party companies who silently push unwanted updates that incorporate previously non-existent adware into the extensions.[15][16][17]

Local proxies

Spyware programs install a proxy server on a person's computer that monitors all web traffic passing though it, tracking user interests to build up a profile and sell that profile to advertisers.

Superfish

Superfish is an advertising injector that creates its own root certificate in a computer operating system, allowing the tool to inject advertising into encrypted Google search pages and track the history of a user's search queries.

In February 2015, the United States Department of Homeland Security advised uninstalling Superfish and its associated root certificate, because they make computers vulnerable to serious cyberattacks, including interception of passwords and sensitive data being transmitted through browsers.[7][18] Heise Security has revealed that the Superfish certificate is included in bundled downloads with a number of applications from companies including SAY Media and Lavasoft's Ad-Aware Web Companion.[19]

Browser hijacking

Many companies use browser hijacking to modify a user's home page and search page, to force Internet hits to a particular website and make money from advertisers.[20] Some companies steal the cookies in a user's browser, hijacking their connections to websites they are logged into, and performing actions using their account, without the user's knowledge or consent (like installing Android apps).

Fraudulent dialer

Some users with dial-up Internet access use modems in their computer to connect to the Internet, and these have been targeted by fraudulent applications that used security holes in the operating system to dial up premium numbers.

Many Android devices are targeted by malware that use premium SMS services to rack up charges for users.[21][22][23]

Third party websites

In 2015, research by EMSISOFT suggested that all free download providers bundled their downloads with potentially unwanted software, and that Download.com was the worst offender.[8] Lowell Heddings has expressed dismay that "Sadly, even on Google all the top results for most open source and freeware are just ads for really terrible sites that are bundling crapware, adware, and malware on top of the installer."[24]

Download.com

In December 2011 Gordon Lyon published his strong dislike of the way Download.com has started bundling grayware with their installation managers and concerns over the bundled software, causing many people to spread the post on social networks, and a few dozen media reports. The main problem is the confusion between Download.com-offered content[25][26] and software offered by original authors; the accusations included deception as well as copyright and trademark violation.[26]

In 2014, The Register and US-CERT warned that via download.com's "foistware", an "attacker may be able to download and execute arbitrary code".[27]

Sourceforge

Many open-source software developers have expressed frustration and dismay that their work is being packaged by companies that profit from their work by using search advertising to occupy the first result on a search page. Increasingly, these pages are offering bundled installers that include unwanted software, and confuse users by presenting the bundled software as an official download page endorsed by the open source project.

GIMP

In November 2013, GIMP, a free image manipulation program, removed its download from SourceForge, citing misleading download buttons that can potentially confuse customers, as well as SourceForge's own Windows installer, which bundles third-party offers. In a statement, GIMP called SourceForge a once "useful and trustworthy place to develop and host FLOSS applications" that now faces "a problem with the ads they allow on their sites ..."[28] In May 2015, the GIMP for Windows SourceForge project was transferred to the ownership of the "SourceForge Editorial Staff" account and adware downloads were re-enabled.[29] The same happened to the developers of nmap.[30][31]

In May 2015 SourceForge took control of projects which had migrated to other hosting sites and replaced the project downloads with adware-laden downloads.[32]

Nmap

Gordon Lyon has lost control of the Nmap SourceForge page, with SourceForge taking over the project's page. Lyon stated "So far they seem to be providing just the official Nmap files (as long as you don't click on the fake download buttons) and we haven't caught them trojaning Nmap the way they did with GIMP. But we certainly don't trust them one bit! Sourceforge is pulling the same scheme that CNet Download.com tried back when they started circling the drain".[30][31]

VLC Media player

VideoLAN has expressed dismay that users searching for their product see search advertising from websites that offer "bundled" downloads that include unwanted programs, while VideoLAN lacks resources to sue the many companies abusing their trademarks.[24][33][34][35][36]

See also

References

  1. Lua error in package.lua at line 80: module 'strict' not found.
  2. Lua error in package.lua at line 80: module 'strict' not found.
  3. 3.0 3.1 3.2 Lua error in package.lua at line 80: module 'strict' not found.
  4. Lua error in package.lua at line 80: module 'strict' not found.
  5. Lua error in package.lua at line 80: module 'strict' not found.
  6. Lua error in package.lua at line 80: module 'strict' not found.
  7. 7.0 7.1 Lua error in package.lua at line 80: module 'strict' not found.
  8. 8.0 8.1 Lua error in package.lua at line 80: module 'strict' not found.
  9. CDT Files Complaints Against Major Adware Distributor (archived) January 27, 2006
  10. 3. IronSource, Downloads Ltd Calcalist, Assaf Gilad. April 15, 2013
  11. Lua error in package.lua at line 80: module 'strict' not found.
  12. Lua error in package.lua at line 80: module 'strict' not found.
  13. http://www.pcworld.com/article/2920012/superfish-injects-ads-in-one-in-25-google-page-views.html
  14. http://www.cio.com.au/article/574450/superfish-injects-ads-one-25-google-page-views/
  15. Lua error in package.lua at line 80: module 'strict' not found.
  16. Lua error in package.lua at line 80: module 'strict' not found.
  17. Lua error in package.lua at line 80: module 'strict' not found.
  18. Lua error in package.lua at line 80: module 'strict' not found.
  19. Lua error in package.lua at line 80: module 'strict' not found.
  20. Lua error in package.lua at line 80: module 'strict' not found.
  21. Lua error in package.lua at line 80: module 'strict' not found.
  22. Lua error in package.lua at line 80: module 'strict' not found.
  23. Lua error in package.lua at line 80: module 'strict' not found.
  24. 24.0 24.1 Lua error in package.lua at line 80: module 'strict' not found.
  25. Lua error in package.lua at line 80: module 'strict' not found.
  26. 26.0 26.1 Lua error in package.lua at line 80: module 'strict' not found.
  27. Lua error in package.lua at line 80: module 'strict' not found.
  28. Lua error in package.lua at line 80: module 'strict' not found.
  29. Lua error in package.lua at line 80: module 'strict' not found.
  30. 30.0 30.1 Lua error in package.lua at line 80: module 'strict' not found.
  31. 31.0 31.1 Lua error in package.lua at line 80: module 'strict' not found.
  32. Lua error in package.lua at line 80: module 'strict' not found.
  33. Lua error in package.lua at line 80: module 'strict' not found.
  34. Lua error in package.lua at line 80: module 'strict' not found.
  35. Lua error in package.lua at line 80: module 'strict' not found.
  36. Lua error in package.lua at line 80: module 'strict' not found.