Feeds

Firm gives P2P networks adware infection

Microsoft investigating DRM loophole

  • alert
  • submit to reddit

The essential guide to IT transformation

Not content with poisoning P2P networks with fake music files, an ally of the big media companies has decided to lob pop-ups and adware at users, according to research done by reporters at PC World.

Overpeer grabbed headlines in 2002 for its work infecting P2P networks with garbled music at the behest of some major music labels. It now looks like the company - a subsidiary of Loudeye - is sending out contaminated files that launch numerous ad-filled browser windows and that try to take over a user's homepage. Loudeye is standing by the practice, saying P2P users are getting what they deserve.

"Remember, the people who receive something like (the ad-laden media files), in some cases, were on P-to-P, and they were trying to get illicit files," Marc Morgenstern, a vice president at Loudeye told PC World.

Two US courts have ruled that decentralized P2P networks are legal and have blocked the major record labels from holding P2P software makers directly accountable for their users' actions. These legal decisions prompted the media giants to sue individuals suspected of trading copyrighted files. Now users must also face a type of PC ad assault.

"A reader initially alerted PC World to an ad-laden Windows Media Audio file, titled 'Alicia Keys Fallin' Songs In A Minor 4.wma,'" the magazine wrote. "We then found two other WMA files and two Windows Media Video files that had been similarly modified."

"Using a packet analysis tool called Etherpeek, we determined that each media file loaded a page served by a company called Overpeer (owned by Loudeye). That page set off a chain of events that led to the creation of several Internet Explorer windows, each containing a different ad or adware."

Ads from seven different ad-serving companies appeared when the magazine ran the supposed Alicia Keys file. Just one of these firms - Kanoodle - responded to PC World and said it would immediately remove its ads.

Microsoft also said it was investigating whether or not the adware violates Windows DRM (digital rights management) policies. Hackers could potentially mimic Overpeer and use the Windows Media DRM loophole to install more vicious malware on users' machines.

The full PC World report can be found here. ®

Related stories

Kazaa colleague sues RIAA
I poisoned P2P networks for the RIAA whistleblower
Porn filters ineffective against Tribbles
RIAA chief invokes Martin Luther King in pigopoly defense

5 things you didn’t know about cloud backup

More from The Register

next story
Microsoft exits climate denier lobby group
ALEC will have to do without Redmond, it seems
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
Barnes & Noble: Swallow a Samsung Nook tablet, please ... pretty please
Novelslab finally on sale with ($199 - $20) price tag
Ballmer leaves Microsoft board to spend more time with his b-balls
From Clippy to Clippers: Hi, I see you're running an NBA team now ...
Kate Bush: Don't make me HAVE CONTACT with your iPHONE
Can't face sea of wobbling fondle implements. What happened to lighters, eh?
Video of US journalist 'beheading' pulled from social media
Yanked footage featured British-accented attacker and US journo James Foley
Amazon takes swipe at PayPal, Square with card reader for mobes
Etailer plans to undercut rivals with low transaction fee offer
Assange™: Hey world, I'M STILL HERE, ignore that Snowden guy
Press conference: ME ME ME ME ME ME ME (cont'd pg 94)
Call of Duty daddy considers launching own movie studio
Activision Blizzard might like quality control of a CoD film
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?