Feeds

Malware ecosystem thrives thanks to pay-per-install fees

Booming economy

Website security in corporate America

A report published Wednesday exposes a growing ecosystem that combines the talents of software developers, web marketers, and ordinary grunts to infect millions of end users' machines.

Similar to the Amway, Shaklee, and other direct marketing businesses of yesteryear, the PPI, or pay-per-install, model relies on average joes as its foot soldiers. Once they sign on, they can avail themselves of a wide array of services offered by other businesses and earn a small fee for each computer they infect.

Once the business model of Adware purveyors such as 180solutions (which later changed its name to Zango), the affiliate system has been fully embraced by groups pushing some of the world's nastiest trojans, according to Kevin Stevens, a security researcher at SecureWorks' Counter Threat Unit.

"The PPI business has seen significant and malicious changes over the years," he wrote in the report. "This economy is so widespread that there is even a side business selling programs to make it more difficult for computer users to detect that they are installing something malicious."

The report coincides with the release of a separate study from security firm Finjan, which discovered a piece of malware called the URLZone trojan that's so advanced it rewrites online bank statements in real time to prevent victims from learning their accounts have been wiped out. During 22 days in August, the malware succeeded in stealing €300,000 from some 6,400 German bank accounts.

At the heart of the ecosystem making much of this possible is a series of sites that claim to pay as much as $140 for every 1,000 PCs a hired gun infects. They offer enterprising criminals everything they need to break into the world of malicious software installation.

A site called InstallsCash, for instance, supplied affiliates with a trojan called Piptea, which acts as a backdoor on infected PCs so that botmasters can regularly infuse it with updates and new offerings. The Piptea authors, in turn, receive fees from other malware vendors such as those behind Virut, a nasty trojan that plants yet another backdoor on victims' machines. (InstallsCash, which recently went dormant, appears to have changed its name to Earning4u.)

In addition to supplying the malware, the sites also sell software and services that help the affiliates. The PXCrypter, for example, costs $75 and cloaks malicious downloads so they're not detected by anti-virus software (additional "stubs," which must be updated regularly, sell for $25). A trojan download manager called SDdownloader, short for Silent Downloader, usually sells for $300 but is currently on sale for $225.

Other services offered include black hat search engine optimization to ensure malicious webpages are featured prominently in results by Google ad other search engines. Seedboxes for uploading and downloading digital files and propagating them onto BitTorrent and other peer-to-peer services is also available.

The glue holding much of this together is a series of forums where participants get together to share tips, ask questions, and advertise their offerings. Sites such as www.pay-per-install.org also list prices offered by various affiliate programs. Fees vary widely. Affiliates earn $6 per 1,000 infected computers located in Asia, $30 when they're in France, $60 in Italy, $110 in the UK and $140 in the US.

Interestingly, Earning4u.com refuses to pay for installation on PCs located in Russia or other members of the former Soviet Republic. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Blood-crazed Microsoft axes Trustworthy Computing Group
Security be not a dirty word, me Satya. But crevice, bigod...
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.