Wireless adware threat uses "carrier" computer to spread

Powered by SC Magazine
 

Dubbed "typhoid adware".

Researchers at the University of Calgary are warning of a future threat that leverages a public wireless connection to bombard PCs with adware.

The risk involves using a "carrier" computer hooked up to an unencrypted wireless connection. That machine is able to convince other computers using the same connection to "communicate with it and not the legitimate access point". Then, it inserts adware onto these laptops, typically in the form of advertisements on videos and websites.

The researchers have dubbed the threat "typhoid adware" because it is transmitted through a seemingly healthy computer, much like Typhoid Mary experienced no symptoms of typhoid fever but was responsible for infecting scores of people.

"Typhoid adware is designed for public places where people bring their laptops," said associate professor John Aycock, who co-authored a paper on the threat and presented findings at a recent conference in Paris. "It's far more covert, displaying advertisements on computers that don't have the adware installed, not the ones that do."

So far, the risk is only proof of concept, but the researchers expect it to hit the wild sometime soon.

To prevent against such an attack, the researchers, who also included an assistant professor and two students, said machines must run software and settings that prevent communication with the carrier computers. In addition, users should avoid clicking on links from untrusted sources.

See original article on scmagazineus.com

Copyright © SC Magazine, US edition


 
 
 
Top Stories
Westpac committed to core banking plan
[Blog post] Now with leadership.
 
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Photos: Unboxing the Magnus supercomputer
Pawsey's biggest beast slots into place.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  30%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1171

Vote