Saturday, May 12, 2007

Nothing is Secret with Spyware Lurking in PCs

June 26, 2003By Sharon Gaudin
A company CFO sits alone in his office writing up a counter-offer for an acquisition he's trying to push through. Down the hall, a clerk in accounting goes onto the company intranet to check a few problematic direct deposit accounts. And a few floors below, a software engineer adds a few more lines of code to a new piece of software.
They all think they're alone. A security guard stands in the lobby. They all used ID badges to get into the building that morning. Their office doors are closed.
But they're not alone. Not really.
They're every keystroke is being tracked. Every open application is being viewed. Every password copied and stored.
Like many corporate employees, they're being plagued by spyware. And they're not even aware that the problem is out there.
Spyware bots are generally defined as software modules that are surreptitiously deposited on PCs. Much like a Trojan, the spyware allows unauthorized people to monitor Web surfing behavior, giving them information about what Web sites the user visits, what they view, and what they buy. Spyware also can track keystrokes, steal passwords, 'listen in' on instant messaging conversation, and spy on open applications. Some spyware even allows unauthorized users to take control of the PC.
''My bets are that every single PC in the world is infected,'' says Jim Hurley, vice president and managing director of security and privacy practice at the Aberdeen Group, a Boston-based analyst firm. ''It's embedded so deep in the software that most people never know it exists... There's nothing in the average environment to stop this stuff right now. People don't know it exists so they don't even know they're at risk.''
Some spyware is embedded in software -- mostly freeware -- downloaded from the Web. Other spyware bots can be installed directly on a corporate PC -- say, by a disgruntled employee looking to sell information, or a contractor working for a competitor.
And it's a hidden problem that is escalating in size.
Hurley says Aberdeen has been tracking spyware since 1999. Back then, there were probably five or 10 spyware bots. In January or Februrary of this year, they counted 5,800. Today, he says they've logged more than 7,000.
''We've dealt with several companies and some of them have figured that they've had losses in the millions,'' says Grey McKenzie, founder of Panama City, Fla.-based SpyCop Inc., a company with both freeware and commercial software to detect and delete spyware. ''One company found that employees put spyware on the system and used intelligence to make bids against them. They were always losing contracts and didn't understand why. You can't even imagine the damage that can be done. It's insidious.''
Firewalls and and anti-virus software, which IT managers use to keep worms and viruses at bay, do not catch spyware. Special spyware detection software needs to be used. SpyCop, Zone Labs, Inc., and PestPatrol Inc., are players in the market.
Analysts note the relationship between spyware and adware, which are definitely akin to each other. Adware, generally downloaded in freeware, software upgrades and even electronic cards, gets into a system and then monitors search terms, buying and surfing habits, and even shoots pop-up ads onto the screen.
Both forms are considered intrusive and problematic, though neither are illegal.
''You don't know what's going on but all of a sudden there's all this information about you going to a central server that analyzes you and learns about you,'' says Dan Woolley, a vice president at SilentRunner, a network security company. ''Once the information is harvested, it's very valuable and can easily be sold. It's dangerous technology.''
Woolley says spyware can steal a great deal of personal information, but it's dangerous from a corporate perspective, as well. Critical data could be flying out the door without anyone knowing about it.
''If a company was not being judicious about what they were doing, someone could glean quite a bit of information off of them,'' adds Woolley. ''Would you let a stranger come into your office and watch you and all your people? You wouldn't let them sit there and take notes about your business add day long, would you?''