Feeds

Adware makers exploit BitTorrent

Sadly inevitable

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

A row has broken out after a marketing firm was caught hiding adware in files distributed on the BitTorrent file sharing network. P2P applications such as Kazaa have been bundled with various adware packages for some time, to say nothing of the increased use of P2P networks as a distribution network by virus writers, but BitTorrent has been a cleaner environment. Recent developments suggests that may be about to change.

Chris Boyd, a security researcher who runs VitalSecurity.org, discovered that (copyright infringing) music tracks, TV episodes and porn videos distributed on BitTorrent have been bundled with Direct Revenue's Aurora adware program. Direct Revenue said a "rogue affiliate" had used the distribution tactic without its permission. Boyd also shows that the same affiliate has been used to spread adware from 180 Solutions. 180 Solutions is yet to respond to this accusation. You can read more about the ongoing fallout from this security kerfuffle on Vital Security here. ®

Related stories

MP3 zapping malware worms onto P2P network
Trojans exploit Windows DRM loophole
Worm spreads through KaZaA network, again
KaZaA poisoned with salted files?
Altnet wakes up as worm spreads through KaZaA
US moves towards anti-spyware law

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New twist as rogue antivirus enters death throes
That's not the website you're looking for
ISIS terror fanatics invade Diaspora after Twitter blockade
Nothing we can do to stop them, says decentralized network
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.