-Caveat Lector-

http://www.businessweek.com/print/bwdaily/dnflash/jan2002/nf2002013_56
27.htm?mainwindow

ANUARY 3, 2002

NEWS ANALYSIS


An Unwanted Gift for Free File-Swappers

A Trojan horse unknowingly tucked into software of peer-to-peer
services such as Grokster may now be on millions of hard drives
Like thousands of other music lovers, Scott Hurring recently
downloaded a Napster-like music file- sharing program called Grokster
to test drive for chasing tunes. A programmer at advertising services
agency Graphic Type and a Net veteran, Hurring disliked the program
and uninstalled it. Or so he thought.

On Dec. 27, he noticed a small program titled "DLDER.exe" on his hard
drive. Hurring studied the program and learned that it was associated
with a piece of software called "Clicktilluwin" that Grokster had
packaged with its basic installer. Trouble was, Clicktilluwin is
supposedly an optional piece of online-sweepstakes software. Hurring
had opted out, but the software had installed anyway against his
wishes.

That bothered him, as well it should have. Turns out that the
persistent piece of software was a Trojan horse -- that is, it
appeared to be one thing but in reality was another. In fact, it
placed software on Hurring's hard drive that recorded every URL he
visited, as well as some of the user IDs he employed on his Web
travels.

NOT ISOLATED. The software then may have broadcast this information
from his machine over the Internet to a still-unidentified Web
server. When he dissected the program, Hurring found that it was
designed to launch anytime he started his PC. His discovery has since
been corroborated by several antivirus companies.

Hurring's experience was no isolated case. The Trojan horse he
discovered appears to have been packaged in official download
versions of not only Grokster but other popular peer-to-peer (P2P)
products including LimeWire, KaZaa, and BearShare, according to
numerous postings spreading on bulletin boards across the Internet.
LimeWire alone recorded 150,000 downloads of the infected software.
KaZaa's client software is downloaded more than 1 million times each
week, according to Cnet's download.com. If you add in Grokster and
BearShare, the reach of this still-mysterious Trojan horse may be in
the millions -- representing more than 50% of the file-sharing market
for free music.

KaZaa and BearShare could not be reached for comment for this story.
But Grokster and LimeWire say they included the Clicktilluwin
software, thinking it was only an installer package and were unaware
that it harbored such secret behaviors. To date, no one seems to know
what entity is responsible. The maker of the Clicktilluwin software
is still unclear. Greg Bildson, chief technology officer of LimeWire,
says he believes it came from an I
sraeli online advertising software company called Cydoor. Repeated efforts to try to 
contact Cydoor were unsuccessful. LimeWire has since removed the Trojan Horse from its 
download package.

"NO CLUE." The Clicktilluwin incident comes at a bad time for the remaining free 
file-sharing vanguard. In December, the Big Five record labels launched their own paid 
music subscription services, Pressplay and MusicNet (
see BW Online, 12/28/01, "Pay-to-Play Music: Lots of Missed Notes"). These new 
services could provide the first legal competition to the remaining P2P networks. With 
threats of lawsuits from the Recording Industry Associa
tion of America already hanging over their heads, these fledglings could now face a 
backlash from angry users who may have downloaded a Trojan program. "I have no clue 
what this software is doing to my system," says Hurri
ng via e-mail.

Anytime software is compromised at the source, it's usually a indicator of larger 
problems. In this case, the problem is associated with so-called freeware downloads. 
Some big-name programs, such as the LINUX operating sy
stem, are freeware, but they receive intense scrutiny before release. Many 
lower-profile downloads, however, aren't tightly vetted.

That's because small freeware startups often rely on third parties to provide key 
pieces of their software and then bundle them into the package. In the case of the 
DLDER.exe Trojan, that software was an installer that co
nfigured the P2P program on the user's computer. "It seems that a huge amount of the 
P2P world was taken in by this bundle," says LimeWire's Bildson.

"NEFARIOUS STUFF." Small P2P file-sharing companies such as LimeWire, which has only a 
handful of programmers, just don't have the time or manpower to look through the code 
for themselves to vet it for any potential probl
ems. "We were paid to distribute a Clicktilluwin installer. All it was supposed to do 
was drop an icon and install. Apparently it was downloading some nefarious stuff in 
the background," says Bildson.

How serious a breach remains an open question. Antivirus companies are ho-hum about 
the threat, saying they haven't yet seen any direct harm. While the DLDER.exe Trojan 
may have recorded Web-surfing habits, no direct evid
ence has been found that it has broadcast this info to any specific cybersnoopers. Nor 
is there any evidence that the program has done something harmful, such as erase a 
hard drive. "This program is much more along the li
nes of 'spyware' than a 'virus.' Any likelihood of any damage to a user's computer 
files is remote," says a Grokster spokesperson via e- mail.

Tiny freeware companies aren't alone in running risks such as this one. Big commercial 
entities have gotten caught distributing malicious code in supposedly trusted 
downloads. Witness an embarrassing incident last April,
when Microsoft inadvertently distributed the "FunLove" virus from its own download 
servers when it contracted the pathogen after mistakenly leaving antivirus protection 
turned off.

BAD TASTE? Unfortunately, LimeWire and the other P2P companies don't record the e-mail 
addresses of downloaders so they have no way to warn them of the possible security 
risks. And they may not be able to get much help fr
om the smaller programming companies they rely on for support. "It is hard to monitor 
the behavior of bundled software over the life of that software. Changes can be made 
on the servers that interface with software which
allow the software to become dangerous," says Bildson.

At the least, the incident could leave a bad taste in the mouths of digital-music 
lovers used to getting a free ride with little to fear from rollicking P2P networks. 
One more sign that the happy times of unrestricted fil
e-sharing may be coming to an end, as the kind of threat security experts have long 
warned about may be coming true. The lesson? Be very careful what you download -- free 
software can give you more than you bargained for.




By Alex Salkever
Edited by Douglas Harbrecht


Copyright 2000-2001, by The McGraw-Hill Companies Inc. All rights
reserved.
Terms of Use  Privacy Policy
~~~~~~~~~~~~~~~
Forwarded as information only; no endorsement to be presumed
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
In accordance with Title 17 U.S.C. section 107, this material
is distributed without charge or profit to those who have
expressed a prior interest in receiving this type of information
for non-profit research and educational purposes only.
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + +
The only real voyage of discovery consists not in seeking
new landscapes but in having new eyes. -Marcel Proust
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
"Do not believe in anything simply because you have heard it. Do not believe
simply because it has been handed down for many generations. Do not
believe in anything simply because it is spoken and rumored by many. Do
not believe in anything simply because it is written in Holy Scriptures. Do not
believe in anything merely on the authority of Teachers, elders or wise men.
Believe only after careful observation and analysis, when you find that it
agrees with reason and is conducive to the good and benefit of one and all.
Then accept it and live up to it."
The Buddha on Belief, from the Kalama Sutta
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
A merely fallen enemy may rise again, but the reconciled
one is truly vanquished. -Johann Christoph Schiller,
                                     German Writer (1759-1805)
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
It is preoccupation with possessions, more than anything else, that
prevents us from living freely and nobly. -Bertrand Russell
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
"Everyone has the right...to seek, receive and impart
information and ideas through any media and regardless
of frontiers."
Universal Declaration of Human Rights
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
"Always do sober what you said you'd do drunk. That will
teach you to keep your mouth shut."
--- Ernest Hemingway

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to