B2B Marketers » Reach Pre-Qualified IT Decision Makers with a Custom Lead Gen Program » Get Details
Welcome Guest | Sign In
TechNewsWorld.com
Women in Tech

Typhoid Adware: Coming From a Laptop Near You

By Jack M. Germain
Jul 12, 2010 6:00 AM PT

A yet-unseen malware variant dubbed "Typhoid adware" could allow cyberattackers to prey on portable computer users tethered to unsecured WiFi connections at Internet cafes and other public places.

Typhoid Adware: Coming From a Laptop Near You

This potential threat is lurking wherever consumers gather to use free Internet access points. The hidden new threat has none of the telltale symptoms of traditional infections, and it functions as a twist on the notorius "Man-in-the-middle" vulnerability, according to a team of computer science researchers at Canada's University of Calgary.

These researchers named this potential threat after Typhoid Mary. The malware resembles the typhoid fever carrier who spread the disease to dozens of people in the New York area in the early 1900s.

Adware is software code that users inadvertantly allow into their computers when they download infected files like fancy toolbars or free screen savers, or when they visit infected Web sites. Typhoid adware needs a wireless Internet cafe or other area where users share a non-encrypted wireless connection.

"We've not yet seen it in the wild. But it is something we are expecting to see. The reason is so many people bring their computers to centralized wireless locations. The bad guys are interested in making money, so centralized locations are a great opportunity for them," John Aycock, associate professor in the computer science deptartment at the University of Calgary, told TechNewsWorld.

Speculative Origins

His research team devised the concept behind the Typhoid adware attack as part of a proactive computer security study, said Aycock. See the paper on Typhoid adware here.

"We try to figure out what the bad guys are going to do before we see it in the wild," he said. It is a proof of concept malware that has not yet been found in the wild. But the potential for use is very likely.

Aycock coauthored a paper on the so-called Typhoid adware threat with assistant professor Mea Wang and students Daniel Medeiros Nunes de Castro and Eric Lin. The paper demonstrates how Typhoid adware works as well as presents solutions on how to defend against such attacks. In May, De Castro presented it at the EICAR conference in Paris, a conference devoted to IT security.

What It Does

Typhoid adware tricks nearby computers into accepting an unknown host computer nearby as a legitimate WiFi connection. The host computer then delivers annoying ads to the phoney network of victim laptops.

Typically, adware authors install their software on as many machines as possible. But Typhoid adware comes from another person's computer and convinces other laptops to communicate with it and not the legitimate access point, Aycock explained.

Then the Typhoid adware automatically inserts advertisements in videos and Web pages on the other computers. Meanwhile, the owner of the infected host computer does not see any of the ads and thus does not know the computer is infected.

Why worry about ads sent from one laptop to another? Ads are annoying, but they can also advertise rogue antivirus software that is harmful to the user's computer. That makes ads the tip of the iceberg, Aycock warned.

Not So Fast

Not all security researchers are convinced that Aycock's fears about an imminent Typhoid adware outbreak are justified.

"About 90 percent of viruses, worms and malware were proof of concept and never made it into the wild," Tracy Hulver, executive vice president for products and marketing at netForensics, told TechNewsWorld.

While not a new concept, the premise behind the Typhoid adware attack gives us a good reason not to use public WiFi connections, noted Catalin Cosoi, lead online researcher for Bit Defender.

"There probably will be some attempt by hackers to use Typhoid. But as it is now, I don't see any big threats from it," Cosoi told TechNewsWorld.

Linux Users Beware

If attackers took advantage of the Typhoid adware's potential, they could blur the line between Linux security and Windows vulnerability. The tools used to develop the proof of concept are part of an open source Linux package called "Dsniff," according to Chet Wisniewski, senior security advisor at Sophos.

"The concept is interesting. If it were developed a bit more it could pose a nasty threat," Wisniewski told TechNewsWorld.

The Dsniff package, written by Dug Song, is a packet sniffer and set of traffic analysis tools. The tool decodes passwords sent in cleartext across a switched or unswitched Ethernet network. See details here.

Similar tools are not available to make a Windows host, so the attacker would have to be a Linux user. But Windows boxes nearby would be at risk to receive ads, said Wisniewski, an avid Linux user.

Tricky Typhoid

The Typhoid adware threat, if it becomes one, presents a different situation for defenders. It also gives attackers a different business model.

"Protecting against Typhoid is a bit tricky because of the way it works. Normally if you have an adware infection you would see a bunch of ads popping up, and you would know something is there. Typhoid adware is different and a lot sneakier," said Aycock.

Instead of showing ads on the computer where it is installed, Typhoid shows ads on computers that are around it by hijacking their Internet connections, he explained. That makes it challenging to convince computer users they have a problem.

If you are seeing the ads, you don't have anything to detect. If you are not seeing any ads, you might find it hard to believe that you have something on your computer.

Typhoid Defenses

Typhoid adware is designed for public places where people bring their laptops, noted Aycock. It is far more covert and displays advertisements on computers that do not have the adware installed, not the ones that do.

"No good defensive solutions have been proposed. Each suggested solution has a down side," warned Cosoi.

Laziness could work against Typhoid -- having to sit near other computer users to push the infection may limit the need for defenses, he suggested. Other kinds of attacks are available that provide far greater results a lot easier.

Proactive Fighting

Aycock and his fellow researchers have devised a few defenses against Typhoid adware. One way is to protect the content of videos to ensure that what users see comes from the original source. Another way is to make laptops recognize that they are at an Internet cafe so they will be more suspicious of contact from other computers.

A proactive approach to security involves having the laptop look for signs of a hijack in a public location, according to Aycock. An analogy is that when you are home you know you are safe. If you go outside you know you have to be more cautious. But computers don't have that same sense.

Another approach is to target computers that might have something like Typhoid on them. That goes back to protections like traditional antivirus software, he noted.

Switchable Options

So far Aycock's researchers succeeded in implementing a type of software switch. It warns a laptop with an active WiFi connection to be less trusting of what other computers connected to its Internet connection are telling it.

"This is something that we've been able to do in the lab. This isn't something for regular users at this point," said Aycock.

The defensive switch has to be incorporated into regular antivirus software protections. It could also be integrated into the laptop's firewall software, he said.

Much of the process for getting a Typhoid defensive into play is a wait-and-see process. It starts with getting the vendors interested.

"That's one reason we did the paper and presented it at the conference. The audience was a mix of academia and industry. So it is a good venue to advertise this work to those people," said Aycock.


Women in Tech
Which tech fields currently offer the best job opportunities in light of the pandemic?
Call Centers
Contact Tracing
E-Commerce
Online Learning
Telemedicine
Video Event Planning
Virtual Reality Development
download NICE inContact Remote Agent Checklist
Women in Tech