The way of spreading of adware
There are two main ways by which adware sneaks onto your system.
In the first one, you download a program—usually freeware or
shareware—and it quietly installs adware without your knowledge,
or permission. That’s because the program’s author signed up with
the adware vendor. Why? Because the revenue generated by the
advertisements enables the program to be offered gratis (although
even paid software from an untrustworthy source can deliver an adware
payload). Then the adware launches its mischief, and the user learns
there’s a price to pay for “free.”
The two most common ways that malware accesses your system are the
Internet and email. So basically, anytime you’re connected online,
you’re vulnerable.
Malware can penetrate your computer when (deep breath now)
you surf through hacked websites, view a legitimate site serving
malicious ads, download infected files, install programs or apps
from unfamiliar provide, open a malicious email attachment (malspam),
or pretty much everything else you download from the web on to a
device that lacks a quality anti-malware security application.
Malicious apps can hide in seemingly legitimate applications,
especially when they are downloaded from websites or direct links
(in an email, text, or chat message) instead of an official app store.
Here it’s important to look at the warning messages when installing
applications, especially if they seek permission to access your
email or other personal information.
Bottom line, it’s best to stick to trusted sources for mobile apps,
only installing reputable third-party apps, and always downloading
those apps directly from the vendor—and never from any other site.
All in all, there is a world of bad actors out there, throwing tainted
bait at you with an offer for an Internet accelerator, new download
manager, hard disk drive cleaner, or an alternative web search service.
Malware attacks would not work without the most important ingredient:
you. That is, a gullible version of you, willing to open up an email
attachment you don’t recognize, or to click and install something
from an untrustworthy source. And don’t take this as “click-shaming,”
because even very experienced people have been tricked into installing
malware.
Even if you install something from a credible source, if you don’t pay
attention to the permission request to install other bundled software
at the same time, you could be installing software you don’t want.
This extra software, also known as a potentially unwanted program (PUP),
is often presented as a necessary component, but it often isn’t.
Another wrinkle is a bit of social engineering that a Malwarebytes
expert observed in the UK. The scam hit mobile users by taking
advantage of a common mobile direct-to-bill payment option. Users
visited mobile sites, unwittingly tripping invisible buttons that
charge them via their mobile numbers, directly billing the victims’
networks, which pass the cost onto their bill.
|