Christopher Boyd (IT Security)
   HOME

TheInfoList



OR:

Christopher Boyd, also known by his online
pseudonym A pseudonym (; ) or alias () is a fictitious name that a person or group assumes for a particular purpose, which differs from their original or true name (orthonym). This also differs from a new name that entirely or legally replaces an individua ...
Paperghost, is a
computer security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
researcher. Boyd was Director of
Malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depri ...
Research for security company FaceTime, before becoming a Senior Threat Researcher at
Sunbelt Software VIPRE Security Group, (also known as VIPRE or VIPRE Security) a brand of Ziff Davis, is a privately held cybersecurity company headquartered in New York. VIPRE develops cybersecurity products focused on endpoint and email security along with ad ...
(later known as GFI Software). In December 2013
Malwarebytes Malwarebytes Inc. is an American Internet security company that specializes in protecting home computers, smartphones, and companies from malware and other threats. It has offices in Santa Clara, California; Clearwater, Florida; Tallinn, Estonia ...
announced Boyd had joined their Malware Intelligence team to research new threats.


Computer security

In July 2004, Boyd launched Vitalsecurity.org, a website bringing to the public attention issues of
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
and spyware. In November 2004, a modular hacking technique was employed to compromise Windows end-users by hacking Apache servers. When hacked, the servers would redirect a user on any of the server's websites, leading them to a set of ever-changing infection pages. These pages employed recoded viruses, trojans, malware and spyware. This technique is used heavily today by the groups behind the spyware
CoolWebSearch CoolWebSearch (also known as CoolWWWSearch or abbreviated as CWS) is a spyware or Computer virus, virus program that installs itself on Microsoft Windows based computers. It first appeared in May 2003. Effects CoolWebSearch has numerous capabi ...
(CWS). The idea that alternative browsers such as
Opera Opera is a form of theatre in which music is a fundamental component and dramatic roles are taken by singers. Such a "work" (the literal translation of the Italian word "opera") is typically a collaboration between a composer and a librett ...
and
Firefox Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements current and ...
could somehow enhance end-user security was cut down in March 2005 with the discovery of a Java applet that, if agreed to, would install a large (and varied) adware bundle onto the end-user's PC. It was found that having the "rogue" site in the user's
blocklist In computing, a blacklist, disallowlist, blocklist, or denylist is a basic access control mechanism that allows through all elements (email addresses, users, passwords, URLs, IP addresses, domain names, file hashes, etc.), except those explicitl ...
s and security tools would do nothing, the install bypassing these tactics completely if the end-user clicked "Yes". An updated Firefox .XPI installer (which infected Internet Explorer) was also deployed in some of these installs.


BitTorrent controversy

In June 2005, it was discovered that more and more Adware makers were turning to alternative sources for their installs, as more end-users become aware of the more common install tactics. A reliance on crude social engineering and
P2P P2P may refer to: * Pay to play, where money is exchanged for services * Peer-to-peer, a distributed application architecture in computing or networking ** List of P2P protocols * Phenylacetone, an organic compound commonly known as P2P * Poin ...
systems that were previously clean was now on the rise. Boyd discovered that BitTorrent forums and file-sharing sites were used as a major source of distribution for Aurora (a program produced by Direct Revenue) and a number of other major adware programs, wrapped up in bundles produced by Metrix Marketing Group (MMG), a company who lost control of their own network. Potentially copyright infringing files, illegal pornography and incorrect / absent disclosure was exposed on such a scale as to cause the companies involved ( Direct Revenue, 180solutions and others) to publicly declare their discontinuation of these methods. This story caused such an uproar that numerous media pundits weighed in, and (in some cases) made a delicate situation worse. An article by
John C. Dvorak John C. Dvorak (; born 1952) is an American columnist and broadcaster in the areas of technology and computing. His writing extends back to the 1980s, when he was a regular columnist in a variety of magazines. He was vice president of Mevio ...
of ''
PC Magazine ''PC Magazine'' (shortened as ''PCMag'') is an American computer magazine published by Ziff Davis. A print edition was published from 1982 to January 2009. Publication of online editions started in late 1994 and have continued to the present d ...
'' alleged Boyd was part of some "Grand Microsoft Conspiracy" to bad-mouth BitTorrent to the benefit of their planned P2P tool, Avalanche. Furious P2P users (who were not familiar with the backstory of the investigation) even went as far to say Boyd was in league with the
RIAA The Recording Industry Association of America (RIAA) is a trade organization that represents the music recording industry in the United States. Its members consist of record labels and distributors that the RIAA says "create, manufacture, and/o ...
, out to create further problems for file-sharers by bringing these bundles to light. However - Dvorak's piece caused something approaching outrage on the other side of the fence, leading a fellow
Ziff Davis Media Ziff Davis, Inc. is an American digital media and internet company. First founded in 1927 by William Bernard Ziff Sr. and Bernard George Davis, the company primarily owns technology-oriented media websites, online shopping-related services, a ...
publication to go head to head with Dvorak. Dave Methvin of PC Pitstop followed up the investigation with his findings. He alleges that some of the films distributed contained potentially illegal underage pornography, and not long after, MMG went offline and the Adware companies all pulled out of this particular distribution.


Fake Google toolbar

In October 2005, Boyd discovered a "fake" Google Toolbar which was being distributed via
Instant Messaging Instant messaging (IM) technology is a type of online chat allowing real-time text transmission over the Internet or another computer network. Messages are typically transmitted between two or more parties, when each user inputs text and trigge ...
. The toolbar allowed the user to store credit card details, and also opened up a fake
Google Google LLC () is an American multinational technology company focusing on search engine technology, online advertising, cloud computing, computer software, quantum computing, e-commerce, artificial intelligence, and consumer electronics. ...
search page. Boyd also tracked the toolbar back to 2003, through three different versions, each one exploiting vulnerabilities in the Windows operating system.


Instant messaging rootkit

In October / November 2005, Boyd discovered what is considered to be the first known instance of a
rootkit A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the exis ...
being distributed via
instant messaging Instant messaging (IM) technology is a type of online chat allowing real-time text transmission over the Internet or another computer network. Messages are typically transmitted between two or more parties, when each user inputs text and trigge ...
, hidden inside a large payload of
adware Adware, often called advertising-supported software by its developers, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the ...
and
spyware Spyware (a portmanteau for spying software) is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privac ...
. Over a period of months, the group behind the attacks distributed numerous inventive payloads (such as a forced install of BitTorrent to spread movie files) and were eventually traced back to the Middle-East.


Adware critic

Boyd is a notoriously fierce critic of adware companies, famously causing 180solutions to label him a "
fanatic FANatic is an American TV show created by Ed Connolly and produced by Executive Producers Deborah Norton and Ed Connolly of Norton Connolly Productions, that was shown on the MTV MTV (Originally an initialism of Music Television) is an Am ...
" on their Weblog, with bad feeling in evidence on both sides to this day. He is regularly referenced on other leading
antispyware Spyware (a portmanteau for spying software) is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privac ...
sites such as Sunbelt Blog, Suzi Turner's ZDNet blog and Ben Edelman's home page.


Security discoveries

In 2006, Boyd continued to make significant discoveries in the field of security, including * The discovery of a 150,000 strong
Botnet A botnet is a group of Internet-connected devices, each of which runs one or more bots. Botnets can be used to perform Distributed Denial-of-Service (DDoS) attacks, steal data, send spam, and allow the attacker to access the device and its conn ...
ring that used a custom-built
Perl Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages. "Perl" refers to Perl 5, but from 2000 to 2019 it also referred to its redesigned "sister language", Perl 6, before the latter's name was offici ...
script to steal payment data from third party shopping cart applications * An exposé of a web-browser that redirected end-users to potentially illegal pornography * An Instant Messaging Worm that installs its own web browser. * The discovery that Adware makers Zango were promoting their content on Myspace. * A modular, multi-chained string of infections dubbed the "Pipeline Worm". * An Instant Messaging infection that uses Botnet-style tactics to enable
click fraud Click, Klick and Klik may refer to: Airlines * Click Airways, a UAE airline * Clickair, a Spanish airline * MexicanaClick, a Mexican airline Art, entertainment, and media Fictional characters * Klick (fictional species), an alien race in the g ...
. * The discovery of a worm using
QuickTime QuickTime is an extensible multimedia framework developed by Apple Inc., capable of handling various formats of digital video, picture, sound, panoramic images, and interactivity. Created in 1991, the latest Mac version, QuickTime X, is avai ...
files to spread across MySpace with the intent of pushing Zango Adware.MySpace worm exploits QuickTime feature , InfoWorld , News , 2006-12-04 , By Jeremy Kirk, IDG News Service


References

{{DEFAULTSORT:Boyd, Christopher Living people Computer security specialists Year of birth missing (living people) Computer security academics