Feeds

Popular file-share utilities contain Trojans

The rising cost of free music

  • alert
  • submit to reddit

Website security in corporate America

Popular file-sharing software from Grokster and the Limewire Gnutella Client contain the W32.DlDer Trojan, Symantec revealed last week.

According to several Reg readers, the KaZaA utility also contains the same infection.

The Trojan here is a spyware application masquerading as a lottery game called ClickTilUWin. When installing the Grokster or Limewire software, and some versions of KaZaA, the user is given an option to enable the ClickTilUWin feature. Regardless of whether one accepts or declines, the Trojan is installed.

Grokster has offered an explanation of this embarrassing oversight on its Web site:

"Some of you may be wondering why this Trojan was in our installer at all," the company speculates wisely.

"We sometimes bundle advertiser applications with our installer in order to help pay for our costs here at Grokster. We are normally given an installer from the advertiser which we run during the installation of Grokster. We have no access to the source code of these third-party installers and so we rely on what our advertisers say these programs do. To the best of our knowledge, this particular advertiser simply placed a link to a free online lottery on the desktop. We were never informed that it installed or was a Trojan."

The company has released a utility which it says will remove the Trojan, and promises to have a clean version of its software available in a matter of days.

Those who prefer to see to their own Trojan removal need only search for a hidden directory under their \Windows directory called \Explorer. Simply delete the \Windows\Explorer directory, along with the companion file Dlder.exe in the \Windows directory.

The Trojan is not destructive, but does phone home to the ClickTilUWin Web site with user data which, presumably, is used for marketing purposes, or is perhaps forwarded to RIAA headquarters to assemble a database of copyright scofflaws.

We don't know which; but we do know better than to install software we know nothing about. ®

Related Stories

Recording industry exploits WTC tragedy to hack you
Recording industry 'copyright DoS attack' rumored

Choosing a cloud hosting partner with confidence

More from The Register

next story
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.