List Of Spyware Programs
   HOME

TheInfoList



OR:

This is a list of
spyware Spyware (a portmanteau for spying software) is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privac ...
programs. These common spyware programs illustrate the diversity of behaviours found in these attacks. Note that as with computer viruses, researchers give names to spyware programs which may not be used by their creators. Programs may be grouped into "families" based not on shared program code, but on common behaviors, or by "following the money" of apparent financial or business connections. For instance, a number of the spyware programs distributed by
Claria Claria Corporation (formerly Gator Corporation) was a software company based in Redwood City, California that invented “Behavioral Marketing”, a highly effective but controversial new form of online advertising. It was founded in 1998 by D ...
are collectively known as "Gator". Likewise, programs that are frequently installed together may be described as parts of the same spyware package, even if they function separately.


Spyware programs

*
CoolWebSearch CoolWebSearch (also known as CoolWWWSearch or abbreviated as CWS) is a spyware or Computer virus, virus program that installs itself on Microsoft Windows based computers. It first appeared in May 2003. Effects CoolWebSearch has numerous capabi ...
, a group of programs, takes advantage of Internet Explorer vulnerabilities. The package directs traffic to advertisements on Web sites including ''coolwebsearch.com''. It displays pop-up ads, rewrites
search engine A search engine is a software system designed to carry out web searches. They search the World Wide Web in a systematic way for particular information specified in a textual web search query. The search results are generally presented in a ...
results, and alters the infected computer's
hosts file The computer file hosts is an operating system file that maps hostnames to IP addresses. It is a plain text file. Originally a file named HOSTS.TXT was manually maintained and made available via file sharing by Stanford Research Institute for the ...
to direct
DNS The Domain Name System (DNS) is a hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol (IP) networks. It associates various information with domain names assigned to ...
lookups to these sites." * FinFisher, sometimes called FinSpy is a high-end surveillance suite sold to law enforcement and intelligence agencies. Support services such as training and technology updates are part of the package. *GO Keyboard, virtual Android keyboard apps (GO Keyboard - Emoji keyboard and GO Keyboard - Emoticon keyboard), transmit personal information to its remote servers without explicit users' consent. This information includes user's Google account email, language, IMSI, location, network type, Android version and build, and device's model and screen size. The apps also download and execute a code from a remote server, breaching the Malicious Behavior section of the Google Play privacy policies. Some of these plugins are detected as
Adware Adware, often called advertising-supported software by its developers, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the ...
or PUP by many Anti-Virus engines, while the developer, a Chinese company GOMO Dev Team, claims in the apps' description that they will never collect personal data including credit card information. The apps with about 2 million users in total were caught spying in September 2017 by security researchers from
AdGuard Developed by AdGuard Software Limited, AdGuard offers open-source, free, and shareware products. AdGuard's DNS app supports Microsoft Windows, Linux, macOS, Android and iOS. AdGuard is also available as a browser extension. AdGuard Soft ...
who then reported their findings to Google. *
Hermit A hermit, also known as an eremite (adjectival form: hermitic or eremitic) or solitary, is a person who lives in seclusion. Eremitism plays a role in a variety of religions. Description In Christianity, the term was originally applied to a Ch ...
is a toolkit developed by RCS Lab for government agencies to spy on iOS and Android mobile phones. * HuntBar, aka WinTools or Adware.Websearch, was installed by an ActiveX
drive-by download Drive-by download is of two types, each concerning the unintended download of computer software from the Internet: # Authorized drive-by downloads are downloads which a person has authorized but without understanding the consequences (e.g. down ...
at affiliate Web sites, or by advertisements displayed by other spyware programs—an example of how spyware can install more spyware. These programs add toolbars to IE, track aggregate browsing behavior, redirect affiliate references, and display advertisements. * Internet Optimizer, also known as DyFuCa, redirects Internet Explorer error pages to advertising. When users follow a broken link or enter an erroneous URL, they see a page of advertisements. However, because password-protected Web sites (HTTP Basic authentication) use the same mechanism as HTTP errors, Internet Optimizer makes it impossible for the user to access password-protected sites." *Spyware such as Look2Me hides inside system-critical processes and start up even in safe mode. With no process to terminate they are harder to detect and remove, which is a combination of both spyware and a rootkit. Rootkit technology is also seeing increasing use,Roberts, Paul F.
Spyware meets Rootkit Stealth
. ''eweek.com''. June 20, 2005.
as newer spyware programs also have specific countermeasures against well known anti-malware products and may prevent them from running or being installed, or even uninstall them. * Movieland, also known as Moviepass.tv and Popcorn.net, is a movie download service that has been the subject of thousands of complaints to the
Federal Trade Commission The Federal Trade Commission (FTC) is an independent agency of the United States government whose principal mission is the enforcement of civil (non-criminal) antitrust law and the promotion of consumer protection. The FTC shares jurisdiction ov ...
(FTC), the
Washington Washington commonly refers to: * Washington (state), United States * Washington, D.C., the capital of the United States ** A metonym for the federal government of the United States ** Washington metropolitan area, the metropolitan area centered on ...
State Attorney General's Office, the Better Business Bureau, and other agencies. Consumers complained they were held hostage by a cycle of oversized
pop-up window Pop-up ads or pop-ups are forms of online advertising on the World Wide Web. A pop-up is a graphical user interface (GUI) display area, usually a small window, that suddenly appears ("pops up") in the foreground of the visual interface. The pop-u ...
s demanding payment of at least $29.95, claiming that they had signed up for a three-day free trial but had not cancelled before the trial period was over, and were thus obligated to pay. The FTC filed a
complaint In legal terminology, a complaint is any formal legal document that sets out the facts and legal reasons (see: cause of action) that the filing party or parties (the plaintiff(s)) believes are sufficient to support a claim against the party ...
, since
settled A settler is a person who has migrated to an area and established a permanent residence there, often to colonize the area. A settler who migrates to an area previously uninhabited or sparsely inhabited may be described as a pioneer. Settle ...
, against Movieland and eleven other defendants charging them with having "engaged in a nationwide scheme to use
deception Deception or falsehood is an act or statement that misleads, hides the truth, or promotes a belief, concept, or idea that is not true. It is often done for personal gain or advantage. Deception can involve dissimulation, propaganda and sleight o ...
and
coercion Coercion () is compelling a party to act in an involuntary manner by the use of threats, including threats to use force against a party. It involves a set of forceful actions which violate the free will of an individual in order to induce a desi ...
to extract payments from consumers." *
Onavo Onavo was an Israeli mobile web analytics company owned by Meta Platforms. The company primarily performed its activities via consumer mobile apps, including the virtual private network (VPN) service Onavo Protect, which analysed web traffic s ...
Protect is used by Facebook to monetize usage habits within a privacy-focused environment, and was criticized because the app listing did not contain a prominent disclosure of Facebook's ownership. The app was removed from the Apple iOS App Store Apple deemed it a violation of guidelines barring apps from harvesting data from other apps on a user's device. *
Pegasus Pegasus ( grc-gre, Πήγασος, Pḗgasos; la, Pegasus, Pegasos) is one of the best known creatures in Greek mythology. He is a winged divine stallion usually depicted as pure white in color. He was sired by Poseidon, in his role as hor ...
is spyware for iOS and Android mobile phones developed by
NSO Group NSO Group Technologies (NSO standing for Niv, Shalev and Omri, the names of the company's founders) is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click surveillance o ...
which received widespread publicity for its use by government agencies. * Zwangi redirects URLs typed into the browser's address bar to a search page at www.zwangi.com, and may also take screenshots without permission.


Programs distributed with spyware

* Kazaa * MorpheusEdelman, Ben (2005).
Comparison of Unwanted Software Installed by P2P Programs
. Retrieved July 27, 2005.
*
WeatherBug WeatherBug is a brand owned bGroundTruth based in New York City, that provides location-based advertising solutions to businesses. WeatherBug consists of a mobile app reporting live and forecast data on hyperlocal weather to consumer users. Hist ...
" * WildTangent


Programs formerly distributed with spyware

* AOL Instant Messenger (AOL Instant Messenger still packages Viewpoint Media Player, and WildTangent) * DivX * FlashGet *
magicJack MagicJack is an Internet-based telephone service (VoIP) provider in the United States and Canada. It offers nationwide VoIP and cellphone services. MagicJack VOIP service is a computer peripheral that, in combination with telephony service ...


References

{{reflist Spyware
Spyware Spyware (a portmanteau for spying software) is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privac ...
Types of malware Rogue software Computer network security Online advertising Espionage techniques Espionage devices Identity theft Security breaches Deception