Feeds

Malware ecosystem thrives thanks to pay-per-install fees

Booming economy

SANS - Survey on application security programs

A report published Wednesday exposes a growing ecosystem that combines the talents of software developers, web marketers, and ordinary grunts to infect millions of end users' machines.

Similar to the Amway, Shaklee, and other direct marketing businesses of yesteryear, the PPI, or pay-per-install, model relies on average joes as its foot soldiers. Once they sign on, they can avail themselves of a wide array of services offered by other businesses and earn a small fee for each computer they infect.

Once the business model of Adware purveyors such as 180solutions (which later changed its name to Zango), the affiliate system has been fully embraced by groups pushing some of the world's nastiest trojans, according to Kevin Stevens, a security researcher at SecureWorks' Counter Threat Unit.

"The PPI business has seen significant and malicious changes over the years," he wrote in the report. "This economy is so widespread that there is even a side business selling programs to make it more difficult for computer users to detect that they are installing something malicious."

The report coincides with the release of a separate study from security firm Finjan, which discovered a piece of malware called the URLZone trojan that's so advanced it rewrites online bank statements in real time to prevent victims from learning their accounts have been wiped out. During 22 days in August, the malware succeeded in stealing €300,000 from some 6,400 German bank accounts.

At the heart of the ecosystem making much of this possible is a series of sites that claim to pay as much as $140 for every 1,000 PCs a hired gun infects. They offer enterprising criminals everything they need to break into the world of malicious software installation.

A site called InstallsCash, for instance, supplied affiliates with a trojan called Piptea, which acts as a backdoor on infected PCs so that botmasters can regularly infuse it with updates and new offerings. The Piptea authors, in turn, receive fees from other malware vendors such as those behind Virut, a nasty trojan that plants yet another backdoor on victims' machines. (InstallsCash, which recently went dormant, appears to have changed its name to Earning4u.)

In addition to supplying the malware, the sites also sell software and services that help the affiliates. The PXCrypter, for example, costs $75 and cloaks malicious downloads so they're not detected by anti-virus software (additional "stubs," which must be updated regularly, sell for $25). A trojan download manager called SDdownloader, short for Silent Downloader, usually sells for $300 but is currently on sale for $225.

Other services offered include black hat search engine optimization to ensure malicious webpages are featured prominently in results by Google ad other search engines. Seedboxes for uploading and downloading digital files and propagating them onto BitTorrent and other peer-to-peer services is also available.

The glue holding much of this together is a series of forums where participants get together to share tips, ask questions, and advertise their offerings. Sites such as www.pay-per-install.org also list prices offered by various affiliate programs. Fees vary widely. Affiliates earn $6 per 1,000 infected computers located in Asia, $30 when they're in France, $60 in Italy, $110 in the UK and $140 in the US.

Interestingly, Earning4u.com refuses to pay for installation on PCs located in Russia or other members of the former Soviet Republic. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Arts and crafts store Michaels says 3 million credit cards exposed in breach
Meanwhile, Target investigators prepare for long process in nabbing hackers
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.