Cybersecurity's Legal Challenges
Cybersecurity's Legal Challenges
MALCHO
definitions and best practices in the debate surrounding days before a good reason for detection is found. That’s
spyware and other potentially unwanted technologies. And where the AV companies expend a lot of resources nowadays.
finally, AMTSO [3] was founded in May 2008 as an It is beyond the scope of this article to talk in detail about the
international non-profit association that focuses on addressing ASC rules and best practices: the relevant documents are
the global need for improvement in objectivity, quality and available on the ASC website. In the following text we will
relevance of anti-malware testing methodologies. More focus on several concrete examples from history, through
information about these organizations and initiatives can be which we will illustrate the problems that AV companies
found on their web pages. encounter every day in regard to grey zone software.
legitimate application into an unwanted one. Basically we We are eMediaCodec support team. we would like to
know why your software
have two reasons to flag an application as potentially unsafe
NOD32 detects our codec as virus “Win32/
or unwanted: the application is being misused by some TrojanDownloader.Zlob.II”.
malware, or the distribution model constitutes direct Our emediacodec is provided with Terms and
incitements to illegal profit. In the first case you could think Conditions located at
of countless system tools that are often misused by malware http://www.emediacodec.com/terms.html where we
to enhance its features. Some examples are the system tools describe in details what is
the codec itself. We do tell surfers about what
from SysInternals/Microsoft, various password crackers/ being installed on their computers.
password recovery tools, using remote administrator tools to
We would very appreciate if you remove our
implement backdoors, and so on. In the second case (the use eMediaCodec from your virus list.
of dubious distribution channels) we’re talking about a pay- Thanks
per-install business model where the distributor earns a small
cut of the profit for every successful installation of the Figure 1: emediacodec.com complaint.
software. This effectively means that the software is often
Of course, however unprofessional this letter might look, it
spread by malware and automatically installed on a victim’s
raises doubts and some uncertainty and forces one to verify
PC, or offered in spam campaigns.
the issue. There’s a curious link to their website where you
A very important piece of information is the incentive for can, allegedly, find all the information about the codec. Well,
detection itself. Often it comes in the form of a request from as far as I remember, apart from installing other malware and
the customers who notice strange and unexpected behaviour advertisement delivery there was never any real all-playing
on the part of their PCs. Rogue companies and their products codec functionality. More complaints followed and were
(rogue anti-virus, rogue anti-spyware) have their fraud repeated a few times, but eventually the group behind Zlob
fine-tuned to every little detail – the product and their website started generating such massive new waves of these trojans
has a professional look, and often they are inspired by real that they realized there wasn’t the slightest chance of success
anti-virus software. The websites are full of fake FAQ lists, in this direction. The number of files belonging to the Zlob
along with lots of forged positive reactions and testimonies family reached the thousands, endless numbers of computers
from non-existent users, etc. Even if we base our decisions on have been infected to date, and the trojan itself has undergone
relatively clear rules and recommendations such as those a turbulent evolution. Nowadays, a PC infected with the Zlob
made by the ASC, the decision is difficult and time trojan will end up with a rogue anti-virus or spyware on the
consuming to make. An in-depth analysis can take hours and system (among other things). Despite all the troubles, good
news arrived from the malware authors in January 2009 when But this isn’t true of the software that actually gets
they left a message for Microsoft employees in one of their downloaded by the trojan downloader – this one is classified
most recent trojans (Figure 2): as adware, spyware or an unwanted application. Why?
Because even though its installation is forced, usually there is
For Windows Defender’s Team:
an End-User Licence Agreement (EULA) which explains all
I saw your post in the blog (10-Oct-2008) about my aspects regarding the rogue software, and to which the user
previous message.
actually confirms his agreement. So the software has actually
Just want to say ‘Hello’ from Russia. been installed with the user’s consent. Of course, the EULA
You are really good guys. It was a surprise for me says nothing about the means of distribution and the software
that Microsoft can respond on threats so fast.
vendors themselves disclaim involvement with the
I can’t sign here now (he-he, sorry), how it was distribution channels. They are more or less successful in this,
some years ago for more seriously vulnerability for
all Windows ;)
depending on the case. Anyway, this is the time when it’s
necessary to investigate any subtle features and details about
Happy New Year, guys, and good luck!
the software, for example those mentioned in the ASC
P.S. BTW, we are closing soon. Not because of your documents. The most important attributes are its invasiveness,
work. :-))
its impact on system stability, security and integrity, the
So, you will not see some of my great ;) ideas in
extent to which the authors are trying to obfuscate the code
that family of software.
and evade detection and so on. These days we register
Try to search in exploits/shellcodes and rootkits.
hundreds of families of such rogue applications, and the level
Also, it is funny (probably for you), but Microsoft of pretended legitimacy and their quality varies from childish
offered me a job to help improve some of Vista’s
protection. It’s not interesting for me, just a
trivial attempts to solutions that look seriously professional.
life’s irony. The birth and first indications of the spreading of these
Figure 2: Message from Zlob author(s) to Microsoft. applications date back to 2005, when families like
WinAntivirus1 appeared. Again, the first steps in its evolution
It seems that at least the original authors of the trojan plan to were very similar to the case of Zlob, and even here we
abandon the project. However, this family is already so full- received complaints (Figure 3) about detecting this incredibly
blown and developed that we cannot say for certain that this useful software.
will be the final end of Zlob. On the contrary, it’s very likely
some other group will continue to operate and improve it. Subject: NOD32 detects our products as malware
Date: 21 Aug 2006 10:21:51 -0500
From: xxx@winsoftware.com
To: xxx
ROGUE ANTI-VIRUS/ANTI-SPYWARE.
I am contacting you on behalf of WinSoftware
THINGS GET TRICKY… Company.
Recently our Quality Assurance Department discovered
The topic of fake/rogue anti-virus or anti-spyware products that parts of our product,
has been touched upon already in the section on Zlob. Briefly WinAntiVirus Pro 2006, were added to your anti-
summarized, this is software that pretends to be a legitimate malware database, and are currently being detected
as malware.
anti-virus solution, fools users into believing that non-existent WinSoftware believes this may have been done
malware was found on the system, and usually also offers the inadvertently; nevertheless this has a big impact
possibility of removal of the imaginary infiltrations. The goal on our Company’s reputation and on customer
satisfaction level. WinSoftware, therefore, requests
of this fraudulent theatre is to force the user to buy the full
that you remove these product from your base no
product that allegedly removes the malware even more later than fourteen (14) days from receipt of this
effectively than the evaluation version, which itself got notification.
installed onto the PC via illegitimate channels. The victim, in Please confirm receipt of this message.
fact, pays for a graphical bubble, which is sitting on the system Best regards,
tray, consumes the system resources and, what’s more, risks xxx
having his/her payment card details compromised or stolen. Senior Vice-President, Legal Compliance
WinSoftware Ltd.
This category of potentially unwanted software or spyware is
a good candidate for close examination of the means of Figure 3: winsoftware.com complaint.
distribution and for demonstrating the differences in
classification of the various software components that partake It has to be noted that, compared to the Zlob complaints we
in the process of computer infection. It all usually starts in a received, this one looks immeasurably more professional and
pretty uncompromising manner, an unequivocal infection by a serious. We see a stronger choice of words, they mention
code that nobody would have a problem defining as malware. damage to the company’s reputation and the request to
The typical scenario involves a security vulnerability, usually remove the detection is followed by a 14-day deadline.
built into an automated exploit pack, hosted somewhere on Furthermore, during the installation the user agrees to a
the Internet. It’s not unusual to see legitimate websites being EULA, putting himself/herself fully into the hands of the
compromised, having iframe redirects inserted into their creators of this alleged anti-virus. Of course, for any serious
HTML code. The iframes point to an attacker’s server, which AV company such an application cannot be tolerated on the
serves the malicious code. The installers/downloaders have all customers’ PCs: therefore WinAntivirus, along with tens and
the typical features of trojans, so everything is pretty clear so hundreds of other families of rogue applications, stayed in the
far and there’s no need to spend too much time deciding about 1
The names of rogue applications (especially AVs) starting with the
the classification. Usually these codes fall into the trojan or words Win- or Antivirus- have, for obvious reasons, become very
trojan downloader categories. popular.
What’s interesting is the fact that these servers closely don’t have to, deliver advertisements. Quite often they evolve
monitor the quality of the software they provide and make over time from ad-delivering to non-ad-delivering. Their main
sure they don’t offer infected content. There are no noble or problem is that they often use the open distribution model of
altruistic reasons behind this – it’s only about money. If the affiliates who get their cut for every successful installation. In
site is safe and trusted it gets positive reviews, more page hits our current botnet era this model can be (and is) heavily
and more downloads are performed and thus they make more misused to gain quick and easy money, so it’s a common
money on the online advertisements they display. practice for these applications to be distributed by spam or
So why are we talking about this? As with the known Chinese even trojans. This results in more money being poured into
black-market ‘original’ CDs and DVDs, it is often very hard the pockets of the criminal groups, and the installation of
to distinguish between the original version and a hack coming these applications onto a large number of PCs without the
from a green site. Thus many people and businesses could users’ consent.
unknowingly run illegal software even though they are strictly Since these companies do business with online casinos, their
against it in principle. In such an environment the software relationship with money is very tight and they don’t hesitate
vendors are pushed to distribute their software for free but – to attack AV companies with requests to cease detection even
with some ads inside. And that’s how well-known legitimate at the price of a lawsuit. Thus the work of virus analysts
software vendors actually start to create adware – welcome to evolved into a new and unexpected dimension, and the
the Chinese software business model! resolution of these issues has become extremely time
Lots of people in China are well aware of the malware threat consuming.
and know they are surrounded with these password-stealing
trojans and other stuff. They actually feel that if they pay for THE COMPLAINTS TIMELINE
anti-virus it’s going to make them much safer. Having their Let’s have a look at what all this has meant to a specific AV
box protected, they can go on to use the green software which company – ESET. Over the last three and a half years we have
of course isn’t generally considered illegal. The AV that they come across over 20 cases where it was necessary to involve
paid for and trust is expected to protect them from possible the legal department. Roughly summarized and at a
threats that might be lurking at any of those green websites. conservative estimate, it cost us more than 1,150 man-hours
And of course, the AV definitely shouldn’t block all the good and involved at least 530 employee interactions (not counting
and useful software, green or not, which (even though full of our external consultants or partners). Some of the incidents
ads) is still considered to be standard and absolutely normal – have been successfully resolved and closed, while many of
for the Chinese. them are still open and have been causing trouble for months.
So what about the rest of the world? People are extremely Typically, the load is not balanced but rather comes in spikes.
allergic to even the slightest hint of advertising, having all Figure 5 displays the timeline of the number of employee
those neat ad-blockers and filters, demanding removal of any interactions involved in resolving detection complaints per
applications that would exhibit this behaviour. So what month.
exactly is adware? Does it really matter? To what extent are
common computer users able to distinguish between what is
and what is not good for them and make the right choice? Are
we going to end up with double standards?8 This issue really
causes heavy headaches in any virus lab around the world.