Spyware and closely related phenomena
Transcription
Spyware and closely related phenomena
DATE REPORT NUMBER 2005-04-08 PTS-ER-2005:15 ISSN 1650-9862 Spyware and closely related phenomena SPYWARE AND CLOSELY RELATED PHENOMENA Post- och telestyrelsen SPYWARE AND CLOSELY RELATED PHENOMENA Table of contents Summary ........................................................................................... 3 1 Background – PTS’s work within the privacy field....................... 5 1.1 The aim of the report and the role of PTS ........................... 5 2 Codes that violate privacy – concepts in this report .................... 7 3 Spyware and closely related phenomena .................................... 9 3.1 What is spyware? ................................................................ 9 3.2 Programs with an advertising and marketing function....... 10 3.3 Programs with an information compilation function .......... 11 3.4 Programs with remote access and monitoring functions .......................................................................... 13 3.5 The purpose of various forms of spyware in general .......... 14 4 Installation methods, how is the user infected? ........................ 17 4.1 Accompanying programs .................................................. 17 4.2 Plug-in programs in the web browser................................ 17 4.3 Trojans............................................................................. 17 4.4 ActiveX............................................................................. 18 5 How does spyware affect the user? ........................................... 19 5.1 Spyware – links to viruses and other malicious codes........ 19 6 How 6.1 6.2 6.3 6.4 7 What 7.1 7.2 7.3 7.4 7.5 7.6 7.7 can users protect themselves? .......................................... 21 Antivirus programs ........................................................... 21 Firewalls........................................................................... 21 Anti-spyware .................................................................... 21 General caution on the Internet ........................................ 21 is the legal position? ........................................................ 23 Introduction ..................................................................... 23 The provisions of EkomL on cookies, etc........................... 23 Further details on the provision on cookies, etc. and its applicability to spyware .................................................... 26 Prohibition against wiretapping ........................................ 30 Criminal law provisions .................................................... 31 Other integrity-related legislation...................................... 33 Some problems (providing information, etc.) .................... 34 Appendix Appendix 1 – Case studies................................................................ 35 Post- och telestyrelsen 0 SPYWARE AND CLOSELY RELATED PHENOMENA Summary In pace with society continuing to develop into an information society, where large sections of both business and government are to varying degrees dependent upon computers and communications networks, an increasing dependence arises on these computers and networks operating and being secure. For many years viruses and other harmful codes have constituted a much noted threat to such functions. However, there are also programs and technical systems that in ways other than by pure destruction may constitute a threat to both the functionality of the communications networks and the trust and confidence which users have in their use. This report is aimed at a group of such programs, that in various ways may constitute a threat in the form of functions that violate privacy, everything from more harmless storage of menu choices in cookie files to actual kidnapping of entire networks of computers. The programs and their functions can in individual cases entail serious violations of privacy for the individual user but may also in a broader perspective constitute a threat to public confidence and preparedness to utilise electronic communications services. A further problem is also that some of these programs facilitate malicious parties, via remotely controlled computers, creating platforms for further attacks of which the user is entirely unaware. The aim of this report is primarily to describe the occurrence and functions of the programs that under a collective name can be called ‘spyware’. This report contains first simple descriptions of the various kinds of spyware programs that occur, second a review of the ways in which users may be adversely affected by them. There is also a section of an analytic nature regarding particular problems with identifying what really are spyware programs that violate the privacy of the user and programs that can actually have beneficial aims and the areas of use. Besides these descriptions, there is also a legal analysis of the legislation that PTS is obliged to apply and its application to spyware and also a more general description of other legislation that may be of relevance to the field. The aim with the legal review is to express PTS’s opinion regarding the provisions of the Electronic Communications Act (EkomL) that can be used to counteract the potential threats to privacy that exist and also to conduct a reasoned discussion concerning problems with real powers to exercise supervision. The section regarding spyware is generally addressed to everyone who has an interest in knowing about these phenomena and who, on a less technicallyorientated level, wishes to obtain an overall awareness of their occurrence, potential threats and the possibilities of protecting oneself. The section regarding legal issues is mainly directed at lawyers or others who are interested in the legal issues that, primarily on the basis of EkomL, arise in conjunction with the occurrence of spyware. Finally, an Appendix has been compiled with some examples of spyware programs and how they are installed in authentic test situations on computers connected to networks and influence their functions. Post- och telestyrelsen 1 SPYWARE AND CLOSELY RELATED PHENOMENA Post- och telestyrelsen 2 SPYWARE AND CLOSELY RELATED PHENOMENA 1 Background – PTS’s work within the privacy field PTS exercises supervision in accordance with the Electronic Communications Act (EkomL). The legislator has chosen to emphasise privacy issues in EkomL by introducing a special privacy chapter (Chapter 6) into the Act. It is provided by Chapter 6, Section 18 of the Electronic Communications Act (EkomL) that: “Electronic communications networks may be used to store or gain access to information that is stored in a subscriber’s or user’s terminal equipment only if the subscriber or user receives information from the personal data controller about the purpose of the processing and is given an opportunity to prevent such processing. This does not prevent such storage or access that is necessary to perform or facilitate the transmission of an electronic message via an electronic communications network or which is necessary to provide a service that the user or subscriber has expressly requested.” When introducing the Act in July 2003, this provision attracted great attention as it relates, among other things, to the use of so-called cookies that are deployed by many websites. PTS had received many complaints about websites that use cookies inappropriately or did not provide information about their use. Today, there are few complaints and the general interest for the so-called ‘cookie provision’ has reduced slightly. However, this Section does not only regulate the use of cookies but also other kinds of software that are used to “store or gain access to information that is stored on a subscriber’s or user’s terminal equipment”, for example spyware. Spyware can gather more information about the user and can therefore violate privacy significantly more than the use of cookies. Today we have limited knowledge about how extensive the use of spyware is. PTS therefore considers that there is a great need to shed some light upon the use of spyware and closely related phenomena and also the consequences that these can have for the privacy of users when using electronic communications networks. 1.1 The aim of the report and the role of PTS The aim of this report is to provide an overall description of technical and legal aspects of spyware and closely related phenomena. It is important to emphasise that the focus of the report lies exclusively within what one in general terms can describe as various forms of functions that can be deemed to be of a nature that violate privacy. Other forms of malicious or destructive software with spreading mechanisms such as, for example, viruses and the like, are therefore not dealt with. For the sake of simplicity, those functions having a nature that potentially violates privacy have as an overall concept been termed ‘spyware’. However, it is appropriate here to point out that the aim is not to try to (re)define what is generally meant by this term nor should the report be viewed as an exhaustive list of what may be deemed to constitute functions of a nature that violate privacy. As stated in the report, the purpose of these spyware programs is not always malicious - most forms of program are based on functions that can be used to assist the user and enhance functionality. Post- och telestyrelsen 3 SPYWARE AND CLOSELY RELATED PHENOMENA The report does not only include phenomena that lie within the operational area of PTS. The use of spyware and closely related phenomena constitutes a threat to confidence in electronic communications and is regulated in some cases by Chapter 6, Section 18 of the Electronic Communications Act (see Chapter “What is the legal position?”). In this part, the problem lies within the operational area of PTS. However, there are other aspects of the phenomena, for example improper or unethical marketing, combating crime and processing of personal data, which lie within the operational fields of other authorities. Examples of other authorities who, besides PTS, have a role in the work with spyware and closely related phenomena include the Swedish Consumer Agency, the Police and the Data Inspection Board. PTS views this report as an introductory description of the current situation and considers it to be important that all authorities that have a responsibility within the field should collaborate in future work. Post- och telestyrelsen 4 SPYWARE AND CLOSELY RELATED PHENOMENA 2 Codes that violate privacy – concepts in this report The personal privacy of computer users can be violated in a number of ways. Personal privacy refers here to personal and private information (data) not being processed or disclosed to others without the knowledge and consent of the individual.1 Programs and the like that can violate personal privacy may be described from several perspectives. One point of departure for describing programs that violate privacy is the way in which they have an impact on the person affected, another is the manner in which the program enters the system. In this report the term function refers to what the programs do from a user perspective - what effect the programs have. Certain programs can gather information about what websites have been visited and thereby present advertising that may be deemed to be interesting for users. Other programs can affect the user’s resources for own purposes, for example a web browser can be controlled to show certain information. Another function may be that a program installs further programs without the knowledge of the user. The term installation method refers in this report to the way in which a program is installed on a computer. There are a number of installation methods for programs that violate privacy, for example they can be disseminated with viruses, worms or Trojans. The terms virus, worm and Trojan describe dissemination mechanisms with malicious codes. Viruses are malicious codes that copy themselves onto existing program files or start sectors on diskettes and hard discs. Worms are malicious codes that disseminate themselves between data in networks. Trojans, for example Trojan horses, are malicious codes that, besides apparent or actual desired operations, also perform undesired operations. The delimitation between these categories of malicious code is not clear. For instance, it is conceivable that a Trojan carries a worm as payload and it is conceivable that a worm can carry a virus. A further installation method is that the user actively installs the program in the same way as with other ordinary programs. The term technical platforms refers in this report to possible technical systems that are used specially by a program to achieve certain functions. SIS Handbook 550, Terminologi för informationssäkerhet [Terminology for information security], SIS Förlag AB. 2003 1 Post- och telestyrelsen 5 SPYWARE AND CLOSELY RELATED PHENOMENA Post- och telestyrelsen 6 SPYWARE AND CLOSELY RELATED PHENOMENA 3 Spyware and closely related phenomena 3.1 What is spyware? Normally the term spyware is used when programs that violate privacy are mentioned, though the term does not have any clear definition. In this report the term ‘spyware’ refers to programs that in concealment monitor a computer or network user’s activities, alternatively affect the system in a manner that is undesirable for the user, for example web browser hijacking. However, not all phenomena are programs, cookies can also be used so that the user’s personal privacy is violated. Spyware should probably be regarded as a malicious code, i.e. a code that when executed causes intentional disruption or damage. However, not all programs that violate privacy are malicious programs (malware). Programs that have legitimate areas of use, for example remote access programs, can also be used improperly and violate personal privacy. Spyware in this report thereby refers to programs that, without the knowledge of the user, install or are executed on the user’s computer and which in various ways gather or disseminate personal information about the user. Where the limit goes for the user being aware of the program being installed and what is personal information is discussed in the chapter “What is the legal position?”. Programs that violate the user’s privacy can be categorised on the basis of how they are used, disseminated and utilise the IT system or computer they attack. In this report spyware is divided into three categories, based on the program’s area of use, first programs that are used for advertising and marketing (advertising spyware), second programs that are used for information compilation and, third, programs that are used to remotely control and monitor the computer of the user affected (surveillance spyware). The first and second kinds of spyware are often combined and gather information about a group of individuals for marketing purposes and forward such selected marketing to them, while the third kind of program rather monitors specific selected persons, for example members of a family or employees of a business. In this report the various programs and phenomena are divided up on the basis of the function that the programs primarily have. It is actually appropriate to point out that individual programs often have several functions and that such a division is consequently not always completely correct. However, in the main, the separate programs may be said to have one function that to a predominant extent describes them. This division should primarily be viewed as a way of conducting a logical and comprehensible description for the reader of the report and not as such a definitive or exhaustive determination of what individual phenomena entail. A description is given below of various kinds of spyware for marketing, remote control and surveillance and closely related phenomena. Post- och telestyrelsen 7 SPYWARE AND CLOSELY RELATED PHENOMENA 3.2 Programs with an advertising and marketing function The purpose of programs that are used for advertising and marketing can first be to disseminate advertising, second to change the advertising that has already been disseminated. In order to direct such advertising, various forms of information collation are often used (see Section below on programs whose function is information compilation) to direct advertising that is considered to suit a certain profile of user. In this Section programs are presented that, with or without the knowledge of the user, are used for marketing purposes. Software manufacturers form one of the driving forces behind the dissemination of spyware. They often offer several versions of their application; free versions (freeware2 and shareware3) and complete versions that are not free. In order to earn money on the free versions, software manufacturers offer to provide advertising for other businesses in conjunction with the freeware. However, initially this advertising often proved too ineffective and in order to enhance the effect more efficient methods were required to be able to monitor user behaviour and in this way be able to create targeted advertising. The information that is gathered by spyware with an information compilation function (see Section below) is often used to enable the creation of targeted advertising, for example via spyware with a marketing function. 3.2.1 Advertising programs Advertising programs (known as adware) are software programs that show pop-up advertising as soon as the program is run. The installation of advertising software is often conducted by being included with other software that is free of charge. For example, freeware that is downloaded via the Internet may contain adware to finance the manufacture and dissemination of the program. Many of these programs are also available in versions that cost money but which then do not contain any advertising software. The function of the adware is to in various ways expose the user to marketing, for example by pop-up windows or because a certain part of the interface in a program contains marketing. Adware can, of course, also be independent from other programs and, for example, automatically generate pop-up windows with certain specific advertising every time the user opens their web browser. 3.2.2 Web browser hijacking Another example of programs that are used for marketing purposes are programs that in various ways change the local web browser’s settings in order to redirect traffic to other websites. The program may for example exchange the start and search pages that the user has chosen or ad links in the list with favourites without any special request by the user. This phenomenon is sometimes called web browser/page hijacking. The phenomenon of web browser hijacking can itself virtually be regarded as a technology, i.e. the software that the web browser Freeware, programs that may be disseminated freely and used without cost. Shareware are programs that may be disseminated freely but for which the user is expected to pay a charge upon repeated use or after a certain limited time (trial period). 2 3 Post- och telestyrelsen 8 SPYWARE AND CLOSELY RELATED PHENOMENA contains constitutes the basis for the program. The function of the phenomenon is to in various ways manipulate the web browser to direct the traffic being conducted via the web browser, i.e. to in various ways influence what websites the user visits or what websites it appears that the user has visited. The aim of this kind of program is often to direct several visitors to websites to which the traffic is redirected and in this way disseminate advertising. The aim may also be to in this way get it to appear as if the traffic comes from another website. For instance, it may be mentioned that if a website has an agreement for certain remuneration for all visitors that go from that website to another, it then has an interest in getting it to appear as if all visitors that reach the outside website actually come from its own site. This function can be achieved by some kind of web browser hijacking. Web browser hijacking programs can also redirect the user’s searches via another, invisible to the user, website that gathers information about the user activities (a feature that rather makes this web browser hijacking’s function that of information compilation, see Section 3.3 below). For the user the redirection is unnoticed, except that surfing can be slower. 3.2.3 Browser Helper Object Browser Helper Object (BHO) is a program that is activated each time the web browser is started. A BHO can virtually be described as a technology, i.e. a software that in different ways can affect how a web browser shows websites that the user visits. One function that a BHO can have is that the BHO searches through the sites that the user opens in the web browser and substitutes banners so that all banners contain, for example, certain predetermined advertising. 3.3 Programs with an information compilation function In this Section, programs are presented that compile information about the user without the user’s knowledge. The aim of programs that are used for information compilation is often to gather data about the Internet user’s behaviour. This may be their behaviour on a certain website or their general behaviour on the Internet. The programs may, for instance, compile information about what websites the user has visited on the Internet, log-on details that have been given to download programs (for example name, e-mail address, sex, age and country), the user’s IP address and what operative system and web browser is used. A further purpose of the information is often marketing (see above regarding programs whose function is marketing) and in order to target advertising that is deemed to suit the profile created by the user. In many cases the purpose of information compilation is therefore not directly malicious but to enhance the user’s benefit from the service. For example, a customer in an Internet bookshop may get book tips based on which books the customer has previously ordered. The problem from a privacy perspective is that the user may very well be unaware about the information compilation and what the information is used for. As mentioned in the previous section, one of the driving forces behind the dissemination of spyware was the software manufacturers who tried alternative routes for financing, for example through targeted advertising. The information Post- och telestyrelsen 9 SPYWARE AND CLOSELY RELATED PHENOMENA that spyware gathers in for information compilation is often used in particular to be able to create targeted advertising. It is worth pointing out that spyware often performs several different functions. Marketing programs, BHOs and web browser hijackers as described above can thereby contain functions that compile information. 3.3.1 Key loggers Software to log keystrokes has been available for a long time, but modern versions of key loggers can log a lot more than just keystrokes. They can save screen dumps based on selective key words that are typed on the keyboard or shown on the screen or be specially designed to find and save passwords. This kind of software can be simply downloaded from websites and sold commercially to monitor employees and to parents to check their children’s surfing. 3.3.2 Web bugs Web bugs are a further phenomenon that can virtually be described as a technology, i.e. a method to compile information about the user and their Internet activities. However, web bugs cannot be categorised as programs as they do not comprise any code that is executed. Web bugs instead constitute small graphic images that are placed on websites or in e-mail messages and which, when they are opened, are downloaded from another server than the website that is visited. A typical web bug has a size of 1x1 pixel, which means that it is invisible to the naked eye. When a user looks at a website or e-mail message that contains a web bug, this image is requested from a server belonging to the web bug’s owner and in this way the owner can trace the individual user and see whether they have seen an advertisement or opened an e-mail that contains a web bug. 3.3.3 Cookies Another phenomenon that is sometimes regarded to be spyware is cookies. Cookies are text files that are stored on the user’s computer and which websites can use to compile information about the user and their behaviour. It may be as simple as a marking of what the user has already looked at on the website, normally through changing the colour of a link on which the user has clicked, or remembering the user’s settings or user name. These cookies are only intended for the user and do not forward information to any external web server. However, there are businesses that exploit cookies to monitor what websites the user has visited and what the user has done there. Cookies were originally not designed to be used in this way but it was intended that the information should only be available for the website that placed the cookie. It should not be possible for an outsider to be able to use and read cookies that are intended for another website. However, cookies can be utilised in ways other than as originally intended. A business may, for example, include cookies in advertising that is shown on someone else’s website. This kind of cookie is sometimes known as a third-party cookie, as the information is sent to a third party and not to the person who provides the website that the user has chosen to visit. By showing advertising and placing cookies on a large number of different websites, the business can monitor which of these websites the user has visited and what the user has done Post- och telestyrelsen 10 SPYWARE AND CLOSELY RELATED PHENOMENA there and thereby gain a detailed profile of the user’s movement pattern on the Internet. 3.4 Programs with remote access and monitoring functions The category of programs for remote access and monitoring includes various kinds of violation tools and monitoring products that are often targeted at a specific computer or user. Many of these products have originally been produced as security tools for private people and businesses and are intended for instance to be used to monitor their children’s or employees’ surfing habits. Programs for remote control have areas of use such as, for example, when a support business should assist a customer without personally being with the customer. It may under these preconditions be very efficient to, at a distance, completely assume control of the customer’s computer. In the wrong hands, these applications may however be utilised for completely different purposes and used for violation and malicious use of the computers of unaware users. As the protection within a network is often aimed towards outside attacks, it is particularly sensitive for the network security if one of the computers in the network can be controlled from outside and thereby implement measures within the network as if it were a user at the terminal that implemented it. 3.4.1 Monitoring programs Monitoring programs can capture basically everything a user does on their computer, including all keystrokes, e-mail, chat conversation, websites visited and what programs are used. In principle, all activities that are conducted with the computer can be logged. The program is often run in the background and the user is not aware that they are being monitored. The information that is gathered by the program is either sent continuously to a third party or stored on the computer in a log file that is later communicated to a third party. In some cases the log file is encrypted, which makes it very difficult for the user to know what the log file contains. Certain programs also send such log files by e-mail to a predetermined destination. The major difference between monitoring programs compared with the category key loggers, which was described above, is that general monitoring programs have a significantly broader monitoring area and are not refined to monitor any particular function. 3.4.2 Remote access tools Remote access tools, also known as Remote Administration Tools, (RATs) are used to remotely access, monitor and record information from the computer where the program is installed. Certain RATs can also control the computer’s web camera and microphone and in this way capture both image and sound. Many RATs imitate the functionality of permitted remote access programs but are specifically designed to be installed and used without being detected. The user does not notice that the program has been installed until the intruder, via the program, takes over the machine and for example moves the curser or opens files. A great danger with RATs is that they completely control the accessed computer. This means that all the rights that the remotely controlled computer has, for Post- och telestyrelsen 11 SPYWARE AND CLOSELY RELATED PHENOMENA example access to internal networks, etc., also pass to the party who is remotely controlling the computer. It can also be very difficult to subsequently trace whether it is the user themselves who implemented the measures via the computer or whether these measures have been implemented at a distance via a RAT. RATs can also be used for so-called system hijacking. System hijacking means that a program utilises the infected terminal’s resources and capacity. Various kinds of program use the capacity in different ways. For example, a large number of infected computers’ accumulated processor capacity is utilised for demanding calculations; there are also cases where a large number of infected computers have in a coordinated way used their Internet connections to perform overload attacks against specified targets. Such large groups of infected computers that can in a coordinated manner be utilised are often called botnets. Spam is often sent from hijacked computers that, without the user’s knowledge, utilise the Internet connection to send large quantities of e-mail. 3.4.3 Modem hijacking Modem hijacking means that the user downloads a program to their computer, often without being aware of it, which discontinues the original modem connection to the Internet and links the user up to another connection via another telephone number. This telephone number is often a number to which a significantly greater call cost than normal is linked. The user is then invoiced for the calls made. A modem hijacking is a function that in practice changes the number specified in the computer’s remote connection and thereby changes the number the user normally calls to connect to their Internet provider. The effect of the function is thereby that the user connects to another Internet provider. Modem hijacking thereby does not as such involve any remote administration or other control of the user’s computer; however, it may mean that the user unconsciously generates very high telephone bills as the new number that is entered usually has a very high time tariff. 3.5 The purpose of various forms of spyware in general Something that complicates the description of spyware in their capacity of malicious codes is that most of the functions also exist and in many cases are also based on completely legitimate program functions that also have an important area or use. For example, most of the monitoring programs and methods for system hijacking and RATs are originally based on various tools to control a network or for system administrators to, remotely, assist individual users when they have problems with their systems. Programs for advertising and marketing have in many cases a fully legitimate purpose of obtaining financing for software or other products through targeted marketing being integrated in the product. It is thus very difficult in a general way to clearly delineate between what is directly malicious and what is acceptable. This situation may be compared with, for example, viruses and similar programs that exclusively have functions of a destructive nature or replicating nature and which can generally be said to Post- och telestyrelsen 12 SPYWARE AND CLOSELY RELATED PHENOMENA constitute programs whose only purpose is destruction and for which there is therefore no legitimate area of use. As regards spyware, these functions are used in many cases by software companies as usable and efficient methods to, for example, automatically analyse and update software (for example, Microsoft Update). Many programs transfer information to analyse and add functions to the programs that are run on the computer (for example, the majority of music players that send out information about what music is being played to another server and in this way can reproduce information about what music group it is, song texts, album covers, etc.). Many of the functions are also utilised commercially to be able to generate income for software that is distributed ‘free’ over the Internet (for example, freeware that automatically downloads advertising and marketing, which at the same time shows that the program is being run). It is thereby not possible to say that a particular type of program or function generally viewed can be said to be malicious or performs unpermitted aims. This fact has also contributed to antivirus programs and similar security functions having certain legal difficulties in relation to attacks by spyware. If an antivirus program automatically impedes functions from legitimate spyware, it is very possible that a creator of legitimate spyware may successfully be able to bring an action for damages against the creator of the antivirus program that prevents its opportunities to generate revenue, for example antivirus programs that prevent marketing as a source of revenue.4 From the privacy aspect it is probably most important that the user is aware of the way in which the information about the user is stored or disseminated. That spyware programs will be installed and what type of information they gather is often described in the licence conditions5, which the user should read through before downloading of the program. However, in many cases these licence conditions are very extensive and sometimes directly misleading. This makes it difficult for the user to make use of the information. It is not unusual for contracts also to contain extensive powers for software manufacturers to automatically install new software, which makes it in principle impossible for the user to understand the scope of the consent given. Legal aspects of such consents are referred to below in Section 8.7.1. The spyware programs and their functions as described in this report refer to those who do not have a legitimate purpose, that is to say those that in the individual case are used by malicious persons or organisations to in different ways infiltrate or violate the privacy of the user. However, it is important to be aware that the assessment in the individual case is not black or white; there is a large grey The company Gator (now under the name Claria) has, for example, instituted legal proceedings against anti-spyware programs that have cited Gator’s software as constituting spyware. See http://news.com.com/2100-1032_3-5095051.html There are also other examples of spyware with marketing functions whose creators have sued regarding other similar programs, as these programs in various ways counteract the functions in the former program. See http://arstechnica.com/news.ars/post/20041208-4447.html 4 5 Also known as EULA (End User Licence Agreement). Post- och telestyrelsen 13 SPYWARE AND CLOSELY RELATED PHENOMENA zone concerning what can be regarded as legitimate or not. It is also worth noting that many of the spyware programs whose aim is in a rather grey zone often contain contractual clauses that are more or less concealed or cryptically formulated in order to ensure that the creator shall in any event subsequently be considered not to have done anything that was unpermitted and that the user may be deemed to have accepted or consented to the function implemented. This makes it even more problematic from a legal respect to regulate what can be deemed to be a permitted or directly unlawful activity. Post- och telestyrelsen 14 SPYWARE AND CLOSELY RELATED PHENOMENA 4 Installation methods, how is the user infected? 4.1 Accompanying programs Today, many freeware and shareware programs that can be downloaded from the Internet contain spyware. When the user installs the downloaded program, for example file-sharing programs, games, chat programs, media players and download manager, spyware is installed at the same time. In certain cases the user more or less unconsciously approves the installation of the spyware through accepting the conditions accompanying the freeware or shareware (see more regarding this in Section 7.7.1). File-sharing programs are often pointed out as a major source of dissemination. The method of installing spyware in conjunction with another program is sometimes called ‘piggybacking’ and can be difficult for an ordinary user to detect As the user himself allows the program to be installed, nor is this form of installation particularly easy to detect by an antivirus program. 4.2 Plug-in programs in the web browser Spyware can also be hidden in html links in e-mail messages or on websites. When the user clicks on a link, a download of the spyware is started automatically, which is a plug-in or supplementary program to the web browser. Usually the user is actually asked about whether he really wishes to install this plug-in or supplementary program, but this information can in most cases be formulated in a tricky or unclear way, which makes it difficult for the user to know what really will be installed. 4.3 Trojans Trojans are programs that are run on the user’s computer but which, without the user’s knowledge, are designed to install or run other programs on the user’s computer. A Trojan is really a program that pretends to be a certain kind of program but in reality hides something else. In contrast to viruses and worms, Trojans are not self-replicating, i.e. they do not make copies of themselves. Trojans are usually disseminated as appendices to e-mail letters or together with other software. There are several different kinds of Trojans, of which some of the most usual are described below. In principle, a Trojan may contain any kind of additional software possible. Nor does the Trojan need to directly contain the further software, but the Trojan’s function may be to open a way into the infected computer in order to remotely install further programs or in another way take control. These kinds of Trojan’s are often called ‘backdoor Trojans’, as they open a backdoor into the computer. With the assistance of a Trojan, an intruder can for example search through the computer for passwords and other secret information. The intruder can also place files in the computer, for example to spread viruses or place different forms of spyware such as remote access programs (RATs), etc. Post- och telestyrelsen 15 SPYWARE AND CLOSELY RELATED PHENOMENA 4.4 ActiveX ActiveX is a part of the Windows operative system and can be used to gain full access to a user’s operative system. In this way ActiveX, through so-called ActiveX controls, may be used to remove or add files on the user’s computer. Windows update is one example of an ActiveX control that searches for relevant files on a computer and updates them with new ones. The purpose of the ActiveX technology is of course not to install spyware and the like or that the ActiveX technology should actually be used in a manner resembling spyware, but as the technology gives such rather extensive control of the user’s computer, it can also be exploited for such purposes. A website can gather information from a user’s computer via ActiveX controls. JavaScript and VBscript are also technical platforms that can be used to gather information from a user’s web browser in a similar way as ActiveX, but the latter is significantly more powerful. In order to prevent ActiveX from being misused, ActiveX controls can be signed by the creator. If the ActiveX control is signed, the developer can be traced, subject to the precondition that the certificate issuer is reliable. Post- och telestyrelsen 16 SPYWARE AND CLOSELY RELATED PHENOMENA 5 How does spyware affect the user? It is difficult to generally describe how spyware affects the user, as various kinds of programs have different functions. In those cases where spyware comprises information gathering, the information gathered is often sent either directly or after a while to the creator’s server where the information can be stored and processed. In those cases where spyware comprises remote access or monitoring, the program is either activated from the beginning, which means that a substantial quantity of traffic is sent over the user’s communications service. In the second case, the spyware quite simply notifies the creator that it is installed and waits for his command to initiate the remote access. Regardless of the function, the spyware programs use the user’s computer capacity (processor and memory) when they are activated and the user’s Internet connection in order to communicate the information that is gathered in or the capacity that is required to remotely control the computer, i.e. it is the user that has to bear the costs of the operation of the program. A user who is affected by a number of spyware programs may notice that the capacity of his computer and the Internet connection are significantly impaired. The problem becomes particularly clear if the spyware program does not succeed in contacting its server and makes several repeated attempts after each other. In networks, the deterioration of transmission capacity becomes even clearer, as the problem is multiplied by the number of computers that are infected by the software. Spyware can also more or less intentionally create security loopholes in the computer and/or the network in which the program is installed. Many spyware programs contain functions to be able to update themselves automatically and can thereby create security loopholes that can be exploited by other malicious programs to install themselves on the computer. Besides the above-mentioned general effects, spyware programs may entail a number of negative effects for the user in each individual case, depending on what the program in practice has as a function. For instance, mention may be made of personal and sensitive information being disseminated to others without the user’s knowledge, that bank certificates, passwords and the like are stolen, that the user’s terminal and Internet connection are used as a platform for criminal activities. 5.1 Spyware – links to viruses and other malicious codes Spyware programs can and should not be viewed as individual phenomena. Spyware is spread via other forms of malicious code such as, for instance via worms, and can be installed maliciously through other programs, for example Trojans, or in conjunction with other, in the user’s eyes, legitimate programs (socalled ‘piggybacking’). The kinds of spyware that gather information can be used to gather information about users such as for example their own and their contacts’ e-mail addresses. Email addresses can in their turn be used to send undesired mass-mailings via email, so-called ‘spam’. Moreover, spyware that can remotely control computers is used in order to use the computers and connections of unaware users as Post- och telestyrelsen 17 SPYWARE AND CLOSELY RELATED PHENOMENA platforms for further attacks, such as for example targeted overload attacks against a certain target or as a base for sending out spam. It is consequently difficult to say where one kind of program or phenomenon ends and where the other begins and which depends upon which. These phenomena often thrive in an intricate context. Post- och telestyrelsen 18 SPYWARE AND CLOSELY RELATED PHENOMENA 6 How can users protect themselves? The basis of the user’s Internet security is safe habits in combination with an updated antivirus program and an updated firewall. In order to protect against spyware in particular, the user should also use an anti-spyware program. 6.1 Antivirus programs An antivirus program searches for viruses in the files that come to the user’s computer. The program should also be set so that it automatically and at regular intervals checks the entire hard disk. Common antivirus programs often do not trace spyware and those that do so do not catch all forms of spyware. In some cases, protection against spyware is included, but this protection must be activated upon installation to also include so-called ‘extended threats’. one explanation for this is provided in the reasons reported above in Section 4.5, The purpose of various forms of spyware in general, that it quite simply is not so simple to generally determine what spyware programs have a legitimate purpose and which do not have such a purpose. This fact makes it complicated to develop general protective methods against certain forms of functions. In certain cases the only thing that differentiates a legitimate spyware compared with a malicious one is the manner in which the user is informed and consents to the program’s functions. Another reason that manufacturers of antivirus programs are not targeting spyware is that spyware as such does not have any independent dissemination function such as for example a virus. However, it may be noted that virus programs to an increasing extent also include various kinds of security management regarding both spyware and firewall functions. 6.2 Firewalls A firewall examines all electronic traffic to and from the user’s computer and informs the user if something appears suspicious. A firewall can provide certain protection against spyware, but as the programs are often bundled together with files that it is permitted to download, it may be difficult to avoid the programs passing through the firewalls without being stopped. However, firewalls can warn the user about unexpected outgoing traffic, which may be a sign that spyware is sending information to an external server. 6.3 Anti-spyware Spyware programs are often specially designed to be kept secret, which makes it difficult to detect them. However, there are several products that are orientated towards preventing installation or to find and remove spyware, for example the free versions of Ad-Aware and Spybot Search and Destroy. The user should run the anti-spyware regularly and update it continuously. 6.4 General caution on the Internet Besides updated antivirus programs, firewalls and anti-spyware, there are other things that the user should consider in order to be more secure on the Internet. Post- och telestyrelsen 19 SPYWARE AND CLOSELY RELATED PHENOMENA The programs on the user’s computer that make use of and communicate with the Internet, for example the web browser, should also be updated regularly. These programs sometimes have weaknesses, so-called ‘security loopholes’, that can be used for intrusion or installation of undesired programs. When these weaknesses are identified, they are rectified by the program manufacturer. In order to close security loopholes on the user’s computer, it is therefore very important that the programs are regularly updated. The same also applies to the computer’s operative system, as this can also contain security loopholes that new updates will close. The user should also be cautious when downloading files from the Internet, as the files can contain a harmful code or spyware. It is important that the user thinks about whether the source is credible or if the file appears safe before any download is conducted. The user should also be careful about unknown attached files that arrive with e-mail. Never click on such a file if the content is unknown or if the sender is not known. When a user is connected to the Internet, files on the computer should not be unnecessarily shared with just anyone. This also applies if a file-sharing program is installed on the computer. To avoid undesired intrusion the user should set the folder or folders that shall be available for other users on the Internet and not distribute more than is necessary. It is also possible to set the computer so that the user only downloads and does not distribute files. Moreover, as a user one should be careful about what ActiveX components one accepts. This may be a more secure method of setting the web browser so that the user is informed when an ActiveX component is activated or alternatively completely close ActiveX. However, it should be mentioned that many websites make use of various kinds of ActiveX components to work, for which reason the user may have problems in utilising these websites if ActiveX is turned off. Users should also be very careful when they use public computers, for example at Internet cafés. One ought to assume that these have key loggers or other spyware installed and therefore not conduct sensitive transactions from there, such as for example bank transactions. More information about how users can protect themselves on the Internet is available on http://www.pts.se/internetsakerhet . Post- och telestyrelsen 20 SPYWARE AND CLOSELY RELATED PHENOMENA 7 What is the legal position? 7.1 Introduction There are a number of different points of departure when conducting a legal assessment of the extent to which various forms of spyware may be deemed to comply with the current legislation or not. There are private law rules governing criteria for conclusion of valid contracts, the provisions in the law of torts about damage that may be compensated, the provisions of the Swedish Penal Code on various kinds of intrusion and fraud offences and also special legislation within the field. This chapter does not aim to provide a comprehensive analysis of the entire legal situation, but primarily a report on the legislation that PTS must apply, that is to say special legislation found in the field. In order to achieve any kind of more comprehensive description, a short description will also be provided of the criminal law legislation that may apply. However, the report should be read with the knowledge that other legal opinions, such as the extent to which actions for damages might successfully be brought regarding damage caused, are intentionally not dealt with. 7.2 The provisions of EkomL on cookies, etc. A provision was introduced though EkomL (Chapter 6, Section 18) which imposes conditions on the storage and use of stored information on a user’s computer. This provision had no equivalent in previous legislation. The provision means that an electronic communications network may be used to store information, or to gain access to information that is stored in a subscriber’s or a user’s terminal equipment only if the subscriber or the user is provided by the personal data controller with information about the purpose of the processing and is given an opportunity of preventing such processing. When this provision was introduced it attracted great attention as, according to its wording, it covered the management of cookies and this kind of technology, which is very usual when developing websites, thereby suddenly became subject to a statutory information requirement. However, one aspect that did not attract attention on a broad front was that the provision is applicable to all kinds forms of management whereby information is saved or stored in a user’s terminal equipment and thereby covers certain types of technology such as, for example, spyware. A brief explanation is given below of the provision in general terms; a number of potential particularly problematical aspects will be examined and, finally, the types of spyware referred to above will be described and commented on in the light of this provision.6 7.2.1 What does the provision mean? This provision means that electronic communications networks may only be used to load or store information on a user’s terminal equipment if the user is informed of what the purpose is and is given an opportunity to prevent the use. This For a more thorough review of the provision and exemptions from the provision, see the report “The Internet and the Electronic Communications Act”, 1 October 2003, PTS-ER-2003:36 6 Post- och telestyrelsen 21 SPYWARE AND CLOSELY RELATED PHENOMENA provision thus does not constitute a prohibition against performing download or storage of information or any requirement that there must be consent; however, it does constitute a requirement on informing the user about the activity. This information must not necessarily be made before, but in certain cases be given in conjunction with the activity. This provision is subject to penal sanctions according to Chapter 7, Section 15, second paragraph, where it is stated that a breach of the provision intentionally or negligently may entail fines, subject to the precondition that the offence cannot be deemed to be of a minor level. A schematic profile of the various requisites of the provision is given below. What does the provision cover? When information is stored or gathered – i.e. transmissions of information to or from the terminal equipment. Which transmissions are covered? What liability does the provision entail Everything that occurs over electronic Information requirement – no communications networks Must be made to a subscriber or user – What does the information requirement entail? The definition subscriber and user means that it should be That the technology is used public networks – What the purpose of the consequently intranets and use is other private networks are not covered. An opportunity for users to prevent processing • • • Chpt. 6, Sect. 18 EkomL Electronic communications networks may be used to store of gain access to information that is stored in a subscriber’s or user’s terminal equipment only if the subscriber or user receives information from the personal data controller about the purpose of the processing and is given an opportunity to prevent such processing. This does not prevent such storage of access that is necessary to perform or facilitate the transmission of an electronic message via an electronic communications network or which is necessary to provide such a service that the user or subscriber has expressly requested. Exceptions Technology exception Storage or access that is necessary to perform or facilitate the transmission of an electronic message via electronic communications network, for example caching Requested service Who is responsible • • Active management, in any event the mere arrival at a certain website is probably not sufficient. Necessary, the technology must be necessary to provide the service. 7.2.2 Personal data controller The person who alone or together with others decides on the purpose and means of processing The travaux préparatoires states that who is responsible should be assessed from case to case How should the information be provided How the information about storage or access should be given to the user is not governed in detail. It is said in the travaux préparatoires that the information does not necessarily need to be given before a session has been started, but that it is sufficient with the information and the opportunity to refuse the use being given during the session.7 This is subject to the precondition that ‘normal routines’ are used so that the user can set his web browser to prevent such use. It is probably a reasonable conclusion that the legislator only meant by this that the ordinary technology that is called cookie - which a web browser can recognise and if it is correctly set give a warning about - is used, then it is not required that the user should first approve the measure. It is instead sufficient that information about cookies and the opportunities to prevent these being used can be given at some time during the visit to the website. This could in such a case result in the conclusion that if it does not involve such a technology for which the web browser 7 Government Bill.: 2002/03:110, p. 396 Post- och telestyrelsen 22 SPYWARE AND CLOSELY RELATED PHENOMENA can be set to automatically avoid or warn about, then it is not sufficient to provide the information at some time during the session, but it must be given before the storage or access is performed. This conclusion does not appear to be particularly far-fetched; it is probably natural that regular and integrated technical solutions should not have information requirements that are quite as extensive as other forms of potential privacyviolating programs or technologies. However, it does appear to be directly inappropriate that this difference is only indicated by the legislator’s commentary on the provision in the travaux préparatoires and is not prescribed directly by the provision. It is reasonable that the information provided must be clearly apparent and plain and not be hidden in such a way that the user is in practice not provided with this information. It is not sufficient that a particular terminal has just once given the prescribed information (for example by a pop-up box which gives the information once and then never turns up again, regardless of information being stored or downloaded). Information about the use of for example cookies or other technologies such as spyware which downloads information and their purpose and also how a user can proceed in order to refuse the use should actually always be available on the website. The reason for this is that it is the individual user who is the object to be protected and not the terminal. Terminal equipment can in most cases have several different users and it is thereby not sufficient that only one of them has been informed. This probably means that software programs that are installed on a terminal should not only once (when being installed) provide information about data being downloaded or stored on the user’s computer. The provision does not provide any direct guidance on how detailed the information that is to be provided to the user needs to be. In any event, it must be reasonably apparent what data is intended to be stored or downloaded from the user’s terminal and for what purpose this access/storing is conducted. Regarding the possibility of the user to prevent use, a fundamental description of what measures a user can implement to prevent the storage or access should be required. It may, when applying the law, be necessary to determine this in greater detail, a circumstance that may be deemed unfortunate considering that the provision is subject to penalties. 7.2.3 Supervision and penalties PTS exercises supervision of EkomL, including this provision. Breaches of the provision can result in compliance measures on the part of the authority, which may include the imposition of an order, subject to a default fine, requiring the operation to cease. Such a default fine can only become payable if the party responsible does not comply with an order by the authority. Besides this supervisory measure, the provision is also penalised according to Chapter 7, Section 15, EkomL, where it is provided that offences by intent or negligence that are not minor can lead to fines. It is also stated here that responsibility for such an offence can only be imposed if liability for the offence is not prescribed by the Swedish Penal Code. A breach of the provision concerning cookies, etc. is thus subsidiary to offences contained in the Swedish Penal Code, which means that an Post- och telestyrelsen 23 SPYWARE AND CLOSELY RELATED PHENOMENA act that constitutes an offence according to the Swedish Penal Code absorbs the offence according to EkomL. It is the police and public prosecutor who are responsible for administration of justice operations, for which reason PTS does not have any responsibility regarding this penal provision. A great difference between a prosecution on a penal act and a supervisory measure regarding an offence under EkomL, is that the supervision by PTS never entails any punishment for acts committed but only includes various means of inducing compliance to ensure that the party responsible does not continue breaching the provision. However, the authority responsible for the administration of justice prosecutes the party responsible for the offence committed. It is in these contexts basically of no interest whether or not the party responsible has ceased with the operation. This also means in its turn that one thing does not exclude the other; supervisory measures by a supervisory authority can be run in parallel with a crime investigation by the police and public prosecutor. 7.3 Further details on the provision on cookies, etc. and its applicability to spyware In the Privacy and Electronic Communications Directive8, which forms the basis of the provision on cookies, etc., it is stated in the Preamble that all information that is stored in a user’s terminal is part of the user’s personal sphere and that they as such require protection according to the European Convention for the Protection of Human Rights and Fundamental Freedoms. Such devices that are used to gain access to the users’ terminals, or information stored therein, can seriously violate the users’ liberty and should therefore only be allowed for legitimate purposes with the knowledge of the users affected. “Spyware” and “web bugs” are referred to as examples of such devices. Article 5, item 3 of the Directive has more or less been incorporated into Swedish law word for word, for which reason the purpose of the Preamble and background should also be applicable to the Swedish provision. It is thereby manifest that in any event one of the purposes of the provision - which in practice has mostly come to relate to the technology cookies - was to address more complicated programs and technologies than cookies. However, the issue is the extent to which the provision really is applicable to these programs and systems. As described above, it is required that a number of criteria are satisfied for it to be possible to apply the provision. The most important aspect of these is that it involves a download or storage of information from a user’s or subscriber’s terminal equipment. However, it cannot only involve information that is being sent from one user to another being snapped up during the transport. This would indeed possibly constitute some form of wiretapping (which may also not be allowed or quite simply criminal, see the Section on breach of data secrecy, etc. below) but as no download or storage occurs from terminal equipment but signals are picked up on the way, the provision on cookies, etc. is in any event not applicable. Item 24 of the Preamble to Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002, 8 Post- och telestyrelsen 24 SPYWARE AND CLOSELY RELATED PHENOMENA Moreover, it appears reasonable that storage of information is covered. When a user surfs to a website, a substantial quantity of information is stored on his terminal equipment. First, information of a technical nature (the actual html code or corresponding), second the information that the user sees, i.e. text, images and other medial content that is found on the website. Is all this information covered by the provision and must the controller then inform the user of the purpose of this storage? It does not appear reasonable that this would be the case; however, it cannot be said that it is clearly indicated that the provision on storage is not covered. To the extent that the storage is of a technical nature, it is actually exempted; storage in cache spaces and storage of html codes or the corresponding is thereby probably exempted. As regards the media that the user actually sees and assimilates, this storage is actually rather obvious for the user. However, there ought to be a difference between such obvious information storage and information storage that is not visible to the user, such as for example cookies or spyware. However, it cannot be said that it is clearly indicated by the formulation of the provision that this distinction is made; the provision rather gives the impression of being extremely broad and covering all downloads and storage except pure caching. It could possibly be argued that the controller hardly needs to provide information about obvious facts; what then really remains to provide information about? An advertising banner that pops up on a website or in a box in a program? When interpreting the provision it may be appropriate to reflect on its overall purpose; the user’s terminal equipment and the information that is available there is the user’s personal property and should not be surreptitiously violated. A description is given below of the extent to which spyware or closely related phenomena could possibly be deemed to be embraced by the provision on cookies, etc., contained in Chapter 6, Section 18, EkomL. It should be pointed out that this explanation is only based on the current provision on cookies, etc. In several cases, the use of the program may be subject to other legislation such as the Personal Data Act or different kinds of provisions regarding offences contained in the Swedish Penal Code. 7.3.1 Adware To the extent that adware only provides banners or other advertisement to the user, it may be questioned whether the program is subject to the provision. Indeed a banner that is downloaded to the user’s computer is within the ambit of the term ‘information that is stored on the user’s terminal’. But actually all content on, for example, a website (including banners found there) that the user surfs to, is also; what is the difference between a banner on a website (which certain adware effects, i.e. integrates “its” banners on the websites the user visits) and a banner that turns up in a box on a program? As argued above, a distinction should be made between obvious information storage, such as banners that are found on a website or on a box in a program, and information storage that is not visible to the user such as, for example cookies or spyware. However, it cannot be said that it is clearly shown by the formulation of the provision that this distinction is made. It may possibly be argued that the controller hardly needs to provide information about obvious facts; as previously mentioned what remains? Post- och telestyrelsen 25 SPYWARE AND CLOSELY RELATED PHENOMENA For example, to provide information about an advertising banner that turns up on a website or in a box in a program? However, to the extent that adware in a first phase sends information from the user’s computer to a third party in order to there, for example, be analysed in order to tailor-make marketing in relation to the user, then such transmission is probably subject to the information obligation. To the extent that adware logs keystrokes or otherwise forwards information from the terminal equipment, this program function is then not covered by the provision and the user must thereby be informed of these transmissions. 7.3.2 Web browser hijacking To the extent that programs for web browser hijacking write over the user’s links or in another way manipulate information on the user’s terminal equipment, they are subject to the provision. To the extent that the program manipulates the transfer, ensures that a call is not made to point A directly, but to point A via point B (in order to, for example, log information that is sent to point A), the extent to which the provision becomes applicable is more doubtful. It is not obvious that this kind of manipulation can be deemed to constitute downloading or storage of information, as the user has himself sent the information away. This rather resembles wiretapping of information in the course of its transport. 7.3.3 Browser Helper Object (BHO) To the extent that a program for a BHO logs use of terminal equipment and then sends on this log, it is covered by this provision. To the extent the program sends marketing, such as, for example banners that are exchanged on websites, the same issue as under Adware above shall be considered. 7.3.4 Web bugs Web bugs mean that an image, all be it for the user hardly a visible image, is requested from the web bug’s server where the image is stored and downloaded to the user’s computer. The provider of the image can then draw the conclusion that the user has visited a certain website, opened a particular e-mail message, etc., depending on where the web bug is placed. This technology means that information is downloaded and stored on the user’s terminal equipment; the provision on cookies can thereby be applicable. However, similar reasoning as above under Adware ought to be applied. The information obligation probably, for instance, hardly applies to a website regarding those images that are available and shown on the website. The difference between these and a web bug is only that the web bug is so small that it cannot be seen. However, there is not reference in the provision that directly deals with whether the storage/downloading is visible to the user or not. 7.3.5 Programs for remote access and monitoring Key loggers that are installed on terminal equipment and log keystrokes, etc. and also send these on via an electronic communications network are subject to the Post- och telestyrelsen 26 SPYWARE AND CLOSELY RELATED PHENOMENA provision and thereby information must be provided about what the program does and the purpose with the information. Other systems that in various ways secretly take over parts of the terminal or allow it to be remotely controlled by an outsider are all probably covered by the provision, as in all cases it involves a program that is installed on the infected computer and thereby constitutes information that is stored on the terminal equipment. However, as with the Section on Adware above, it is questioned whether such, for the user obvious information, that is stored such as a program that is installed following the user’s active choice, does really to any great extent need to provide further information about what is being installed. However, as the information is stored in secret, for example in the form of hidden programs that are installed in secret, this installation (i.e. storage of information) is probably not in accordance with the provision unless more detailed information about its purpose is provided. However, the criteria is also that the storage of the information should take place via an electronic communications network, for which reason it should be required that the program is installed via Internet or some other communications network. It should be observed particularly here that other provisions, primarily offences under the Swedish Penal Code may also be applicable, such as breach of data secrecy. 7.3.6 Cookies Use of the technology known as cookies is subject to the provision, as it constitutes storage of information on the user’s terminal equipment. For a more extensive concerning cookies, see PTS’s report on the Internet and the Electronic Communications Act.9 7.3.7 Modem hijacking To the extent that modem hijacking involves a program being downloaded and installed on a terminal, it could probably be covered by the provision. If modem hijacking comprises the telephone numbers to a certain modem pool found on the terminal being changed to another, the conclusion is not as obvious. The issue is here whether a change of information found such as a saved number to a modem pool constitutes a storage of information in the sense provided for by the provision. Considering the broad formulation of the provision and that there is nothing said in the travaux préparatoires about any restrictions being imposed on the provision regarding its scope, it is probably possible to view this as a storage of information. However, in the event that the user has himself requested the change, for example because he wishes to utilise a particular service, the storage is probably covered by the exemption contained in the provision, provided the storage is necessary for the service. 7.3.8 ActiveX ActiveX is a technology platform that forms part of certain operative systems. It may contain security loopholes that can be utilised. The program itself or the tool ActiveX cannot be deemed to be subject to the provision. However, the “Internet och lagen om elektronisk kommunikation”, PTS ER-2003:36. Available in English and Swedish. 9 Post- och telestyrelsen 27 SPYWARE AND CLOSELY RELATED PHENOMENA management of information, i.e. through utilising a security loophole in ActiveX gain access to information stored on terminal equipment via the Internet or another electronic communications network, may be deemed to be covered by the provision. 7.4 Prohibition against wiretapping Chapter 6, Section 17 of the Electronic Communications Act (EkomL) contains provisions on a prohibition against wiretapping. This provision basically entails a total prohibition against gaining access to, or in any other way processing data in an electronic message that is transmitted in a public communications network or with a public electronic communications service, or traffic data that are associated with the message, unless at least one of the users affected has consented to the processing. The term ‘consent’ means that if one of the participants in the electronic exchange records or in another way saves the electronic message, this does not constitute a breach of the provision regardless of whether the other participant has consented or not.10 The prohibition only covers general services and networks; private networks, for example limited intranet, are thereby not covered. There are a number of explicit exceptions from the main rule regarding certain kinds of documents that are dealt with below. Other exceptions from the provision include provisions on the processing of traffic data (Sections 5 to 7) and such information as is subject to a duty of confidentiality according to Section 20. 7.4.1 Exemptions It is indicated by the travaux préparatoires that this provision is not intended to impede automatic, intermediate and temporary storage of information, subject to the precondition that the information is not stored longer than is necessary for the transmission and that confidentiality remains guaranteed during the storage period.11 Set against the background of this, the two first exemptions cover different forms of information being saved in order to improve the efficiency of the communication, so-called ‘caching’. The third item exempted relates to, through a radio receiver, wiretapping a radiotransmitted electronic message that is not intended for the party that is wiretapping or the public. This exemption is justified by it being the right of every individual to possess a radio receiver and that it would not be advisable to sanction the wiretapping itself. It has been considered in the travaux préparatoires to earlier legislation that the ether should be deemed to be free and that every individual can thereby wiretap what is being transported by radio transmission. However, it should be added that the forwarding of wiretapped messages is prohibited according to the provisions of Chapter 6, Section 23. This means that even if it is allowed to wiretap a radio-transmitted message, it is prohibited to unlawfully forward such a message. This exemption means that a user of a wireless network, so-called W-LAN, cannot be deemed to be allowed to wiretap another wireless network to which he has been automatically given access. However, it should in this connection be noted that the user, if the wiretapper actively obtains access to someone else’s network, may commit an offence against 10 11 Government Bill 2002/2003, p. 255 Government Bill 2002/2003:110, p. 253 Post- och telestyrelsen 28 SPYWARE AND CLOSELY RELATED PHENOMENA other provisions, for example in the Swedish Penal Code. In the event that the network is completely open, there will probably from the criminal law perspective be problems in proving that an intrusion in the network is unlawful. 7.4.2 The prohibition against wiretapping’s application to spyware The prohibition against wiretapping means that the use of spyware, which in various ways wiretaps an ongoing communication is prohibited. However, spyware which entails that the party making use of the spyware personally participates in the communication, can hardly be deemed to be covered by the prohibition. If, for instance, a key logger passes on information about what keystrokes the user makes on their computer, this does not constitute a breach of the wiretapping prohibition as the information that is forwarded is not information that is captured during communication, the creator of the key logger participates rather in the communication. However, if the use of a monitoring program that copies and forwards all e-mail letters that the user sends constitutes a breach of the provision, as in this case it involves information that is captured during an ongoing communication. 7.5 Criminal law provisions Besides the special legal provisions contained in the Electronic Communications Act, other legislation may also apply to the management of spyware and closely related phenomena. A short description is given in this Section of the legal provisions that may come into question. 7.5.1 Breach of postal or telecommunication secrecy according to Chapter 4, Section 8, Swedish Penal Code (BrB) and breach of data secrecy, Chapter 4, Section 9c BrB As regards the protection against another party unlawfully obtaining access to information in digital form that is stored or is under transport, it is primarily the provisions contained in Chapter 4, Section 8, BrB on the prohibition against breach of postal and telecommunication secrecy and the provision on breach of data secrecy in Chapter 4, Section 9c, BrB that are of interest. Breach of postal or telecommunication secrecy applies to telecommunications message that are delivered or transmitted by a telecommunications firm. In this context, telecommunications firm means an undertaking that on a commercial basis primarily delivers or transmits various forms of telecommunications messages that others deliver to them for distribution.12 This protection only applies during the delivery or transmission itself and thereby no longer when the message has arrived at its final destination. The criminal act comprises the actual breach, that is to say that the perpetrator obtains access to the message. There is no requirement that the perpetrator also actually becomes cognizant of the content of the message. A further protection against unauthorised access of information stored as data is provided by the provision on breach of data secrecy contained in Chapter 4, Section 9c, BrB. This provision means that a person who unlawfully obtains 12 See Government Bill 1992/93:200, p. 161 f Post- och telestyrelsen 29 SPYWARE AND CLOSELY RELATED PHENOMENA access to a recording for automatic data processing or unlawfully alters or erases or inserts such a recording in a register may be sentenced for breach of data secrecy to a fine or imprisonment for at most two years. The protected object of the provision is the recording for ADP, by which is meant the actual information content.13 Anyone who unlawfully obtains access to information stored on a computer thereby commits the offence. According to this provision, ‘recording’ also means data that is being conveyed via electronic or other similar aids to be used for automatic data processing. What this means is that such documents whereby someone through various methods wiretaps what is being communicated in a data network, so-called ‘wiretapping’, is also punishable.14 As an offence consequently exists both if the attack is made against information that is stored and information that is being conveyed, the provision thus covers in many cases the dissemination of computer viruses. This provision is secondary to the prohibition against breach of postal or telecommunication secrecy, which means that an act that only constitutes such a breach does not also entail breach of data secrecy. Besides the prohibition against unlawfully obtaining access, the provision also contains a prohibition against unlawfully altering or erasing or inserting something in a register for automatic data processing. This means that it is not only the obtaining of access to information in a computer but also an unlawful change (whether it comprises eradication, altering or addition) of the content is prohibited. ‘Information’ refers only to structured data in contrast to running text. ‘Altering’ refers to both a temporary and more permanent change. When content is eradicated or in another way changed, so that it is destroyed, the act can also be regarded as malicious damage (see Section 7.5.2 below). As a short summary it can be concluded that a person who, without permission obtains access to both data that is communicated and data which is saved, commits a punishable act. The dissemination of malicious viruses is thereby normally criminal according to BrB, Chapter 4, Section 9 c (the actual dissemination itself is not unpermitted, but the unpermitted change or erasure of data that occurs when the virus is executed is). However, as this involves punishable provisions the actual act itself must also be embraced by an intent. This means that the perpetrator must have a wish and a plan to commit the criminal act. It may in practice be very difficult to find the person who originally created a malicious virus, and also to prove that the person who released the virus also intended to commit a criminal act. A further problem is determining how long the perpetrator’s liability extends. The creator of a virus personally infects only a few computers, and the dissemination then takes place outside the creator’s control. It is unclear how long the perpetrator’s liability can be deemed to extend regarding this, for him (although actually consciously) uncontrolled, course of events that occurs in a later phase. 13 Government Bill 1973:33 with proposal for amendments to the Freedom of the Press Act, etc., p. 74 f 14 See Government Bill 1985/86:65 p. 39 ff.; it should be pointed out that this only covers wiretapping of fixed or dial-up connections. Post- och telestyrelsen 30 SPYWARE AND CLOSELY RELATED PHENOMENA 7.5.2 Damages according to BrB, Chapter 12, Section 1 The protection against inflicting damage involves an offence against property. This limitation means that the object of the measure must be a material object. However, it is rare that physical damage is caused by the bearer of data in the case of a virus attack, that is to say that the computer’s hardware is rarely destroyed upon a virus attack. However, the destruction of information can in practice also result in real damage arising, such a system and network no longer functioning. If can be shown that the dissemination of a computer virus results in more extensive erasure so that large and permanent damage arises to the computer or the network for those affected, it is therefore possible, but not obvious, that the act is regarded as a form of malicious infliction of damage. However, if the change is only temporary or transient, such as when the data attacked can be reinstated to its original condition with the assistance of a backup copy, it is considered that damage or destruction has not arisen. Intent to disseminate a virus is a prerequisite for liability but as such not intent that the offence be committed with a malicious aim to cause damage or a direct aim to cause damage.15 Negligence is not punishable. The scale of penalties comprises fines or imprisonment of at most six months. 7.6 Other integrity-related legislation Of course, the Personal Data Act, as regards privacy, is a central piece of legislation aimed at protecting persons against violations and providing them an opportunity to know about and influence the records in which they are found. This section will briefly describe the Personal Data Act and how this legislation can be applied to spyware and closely related phenomena. 7.6.1 The Personal Data Act The Personal Data Act (PuL) contains restrictions on how parties may process personal data. In very simple terms, it can be said that if personal data is to be processed, then the consent of the person to whom the data refers is required. Personal data means all information that can be traced to a physical person. This information does not need to be directly traceable to the person, but it is sufficient that the information in combination with other data (for example civil registration (ID) number in combination with population records or telephone numbers in combination with telephone directories) can be traced to the person. The term processing of personal data is very broad and basically comprises all ADPrelated measures conceivable. The main rule for processing of personal data is that the consent of the person registered is required. However, there are situations that are exempted and where consent is not required. For instance, reference may be made to consent not being required if the processing is necessary in order to be able to perform a contract with the person registered. There is also a more general exemption stating that consent is not required, among other things, if the processing is necessary for a purpose relating to a justifiable interest, if this interest weighs more heavily than Holmberg and others, Kommentar till Brottsbalken [Commentary on the Swedish Penal Code], 6th Edition, p. 633 15 Post- och telestyrelsen 31 SPYWARE AND CLOSELY RELATED PHENOMENA the interest of the person registered in the protection against the violation of personal integrity. Here, the various interests must be balanced. There is no formal requirement that consent should be in writing. But it must be active. It is consequently not sufficient with a passive consent, i.e. that the person has been informed about the processing and has not opposed it. However, consent can be deemed to have been given by conduct. If someone is informed that the information shall be registered and then attaches the information, this would probably consequently be regarded to be conduct implying consent.16 However, silent consent is not sufficient, i.e. when the person registered is informed that the information will be registered and is given a fixed time within which to protest against it. 7.6.2 Delineation between EkomL and PUL For the uninitiated it may be complicated to grasp when PuL is applicable and when EkomL is applicable instead, as the two statutes in certain cases apply to the same circumstances. In very simple terms it can be stated that EkomL regulates various forms of communication but not what is communicated. As long as the message is in the process of transport, EkomL may be applicable regarding the prohibition against wiretapping, regulation of cookies, etc., while PuL applies when the content of the communication is in various ways processed, for example storage of the messages. Moreover, it can be said that EkomL is special legislation while PuL is general legislation. This means that in the event that a procedure is regulated particularly in EkomL, this legislation applies. However, if the procedure cannot be deemed to be covered by EkomL, PuL applies. 7.7 Some problems (providing information, etc.) 7.7.1 How the information is formulated, circumvention of the provision on cookies, etc. through hidden information As mentioned earlier, the provision on cookies, etc. does not involve any prohibition against the use of a technology that gathers or stores information but only a requirement that information about the gathering or storing that occurs and also provides the user with the opportunity to prevent this. The information about such should be clear and plain, but there is no detailed description of how the information should be formulated or how the information should be notified to the user. The malicious programs whose actual purpose is to perform things in concealment probably do not constitute a problem as these programs or technologies never display or inform about what their real purpose is. However, what is more complicated are the programs that to some extent store or gather information from the user’s terminal. This may involve anything from rather benign functions, such as that the program checks on whether some newer Kommentaren till personuppgiftslagen [Commentary on the Personal Data Act], Öhman/Lindblom, p. 37 16 Post- och telestyrelsen 32 SPYWARE AND CLOSELY RELATED PHENOMENA version exists for downloading, to the more refined marketing programs that exist to log and analyse potential customers’ Internet habits. Most of these programs doubtless report the means by which they download or store information; the problem is only that the information may sometimes be found in a contract text together with hundreds of other exemptions or information. There is some difference compared with the system with consent found in the Personal Data Act (PuL) and other legislation. Consent according to PuL must always be informed and clear. It is not sufficient in such a case to merely provide information hidden among a mass of other information and then consider that the user, by using the product, can be deemed to have consented to the processing. It is the personal data controller who is also responsible for being able to show that each individual user has actively consented. As regards the issue of whether an information requirement such as that found in the provision on cookies, etc., the requirement that the information has truly been received by the user can hardly be placed as high as with consent under PuL. The provision actually imposes a requirement that the controller should inform, in contrast to only provide information, and there is naturally a limit somewhere for how difficult it may be to gain access to the information for the controller to be deemed to have informed the user. However, is cannot be said to be particularly clear where this limit lies and there is an immediate risk that the information about documents that potentially violate privacy that a program implements become merely a further item in a 15-page information letter/contract that pops up in passing when the program is installed in the terminal. On the other hand, a system with consent or a far too stringently interpreted information requirement would entail a significantly greater administrative burden for the businesses that produce and use there programs/technologies. The purpose of the provision is not to prohibit these technologies, which can naturally also be used to make matters easier for the user17, but only make the user aware of the threats to privacy that potentially exist. 7.7.2 Supervision of the provision on cookies, etc., international aspects One practical problem is that the provision per definition relates to phenomena that occur over communications networks. In most cases of the phenomena that are described in this report, the actual storage or downloading of information itself occurs over the Internet and the party responsible is in the majority of cases in some other entirely different country. This of course makes it very difficult to in any effective way conduct supervision of compliance with the provision. EkomL applies within Sweden; such processing of information that occurs on a Swedish user’s terminal equipment is probably subject to the provision regardless of whether the party responsible is not located in Sweden. The fact that the Act as such is applicable and that it is practically applicable are however two quite different things; it is extremely difficult for a national supervisory authority to successfully direct any demands against foreign parties if the foreign parties do not have any desire to comply with the legislation (which they would probably have if they conduced serious operations orientated towards Sweden, but hardly if For example, such functions that keep track of what types of searches or products a user was interested in previously and, based on this, can recommend similar products or services. 17 Post- och telestyrelsen 33 SPYWARE AND CLOSELY RELATED PHENOMENA they conduct a shady operation and do not have any interest in being an active stakeholder in the Swedish market). It can also once again be pointed out that it is not the development of programs that are used as spyware that are subject to the provision, but the actual processing of information. In certain cases, this processing accompanies the use of the program (for example when spyware is, without the knowledge of the user, installed on their terminal) in various other cases, the processing occurs first when information leaves the user’s terminal (for example when a security loophole in existing software is used to be able to download information or software that is installed with the user’s approval but the software gathers information from the terminal in a way in which information has not been provided). It is conceivable that it is in many cases difficult to localise who it actually is that uses the software, even if one knows who has manufactured it. However, it would be possible to apply the provision when the gathering or storage is conducted on a large scale by a reputable, or in any event not a completely disreputable, party. One example of a reputable use may be that of a marketing operation which utilises various software to be able to survey the surfing habits of individuals in order to then be able to use this information for marketing purposes. Post- och telestyrelsen 34 SPYWARE AND CLOSELY RELATED PHENOMENA - APPENDIX 1 Appendix 1 – Case studies PTS has arranged a survey of how a number of software that violate privacy affect users’ computers. A selection of this software is presented in this Appendix. Summary The case studies suggest that malicious programs (malware) are installed in phases. This means that the first program that is installed also facilitates the automatic installation of other programs; these programs in their turn facilitate further programs being installed automatically, and so on. The programs that are installed tend to have increasingly suspicious aims and behaviour the further down the chain they lie. In the first phase, a program is often actively installed by the user which, in many cases without the knowledge of the user, operates as a bearer for further programs. A contributing factor to programs tending to be more suspicious at later phases may be that the level of control over the total installation reduced with the number of installation phases, which makes it possible for really dangerous programs to be included in secondary or even later phases. The actual behaviour of the tested programs has in the majority of cases been significantly more amenable than what is technically possible. As a guess, this is the result of the underlying purpose in the majority of cases being advertising and marketing rather than theft or vandalism. One phenomenon that has been observed in many of the case studies is that data streams in communication between malicious programs and their servers are often difficult to discern. Much suggests that the in recent times increasing attention given to businesses behind these programs has made them increasingly cautious, and the encryption of data a phase in this development. Post- och telestyrelsen 35 SPYWARE AND CLOSELY RELATED PHENOMENA - APPENDIX 1 Delimitation and testing environment The survey aimed at showing how individual users - persons who use a computer at home or at work - are affected. Therefore, a rather typical computer configuration was created. The system in which the tests were implemented was equipped with the operative system Microsoft XP Professional with Service Pack 2 together with all other security updates recommended by Microsoft. However, in the Study of Iframe, Service Pack 2 was not used, as the IFrame-weakness only affects Windows XP without it. The antivirus program Norton Antivirus 2004 was used in all tests. This antivirus program has been specially developed to identify and remove viruses, worms and Trojans. The firewall Kerio Personal Firewall was used in all tests. Kerio gives a clear notification and information each time a process tries to start another process or communicate via a network. Cookies intended for tracing Internet activity have been detected with the tools Ad-Aware and SpyBot. Monitoring of processes has been conducted through the operative system command tasklist.exe. This command generates a list of all processes that are at the moment being run on the computer. These lists have been saved for each case study and then compared with a list representing the processes that run in the pure basic configuration. The tools Ad-Aware and SpyBot have also been used with the aim of identifying and analysing processes; these are specially developed to recognise a large number of processes among known malicious programs. All network traffic from the test system has been monitored and logged. However, it has not been possible to check exactly what information was communicated during installation and use of the programs tested. The analysis of network traffic has been performed with the tool Ethereal. Among the selection criteria for which phenomena that should be studied, mention may be primarily made to them being amongst the most extensive malicious programs today and together demonstrate the breadth of the phenomenon. Post- och telestyrelsen 36 SPYWARE AND CLOSELY RELATED PHENOMENA - APPENDIX 1 Case study 1 – Grokster Grokster is a file-sharing program that, upon installation of the program, allows the user to choose whether he wishes to pay for the program and thereby avoid advertising and adware, or if he wishes to use the free version. This test relates to the free version. In the test, Grokster 2.6 was downloaded from www.download.com. The file grokstersetup.exe was saved and executed. The first installation window told the user that there is a version available to buy that does not contain advertising or adware, see Figure 1. Figure 1 – Installation window number 1 from Grokster A window was thereafter shown offering the user the provision of a version without advertisements or adware for free by buying something via one of several offers that were presented on a website. Here again it was chosen to install the free version, i.e. to ignore these offers. The next window shows a licence agreement for GAIN Publishing, see Figure 2. Post- och telestyrelsen 37 SPYWARE AND CLOSELY RELATED PHENOMENA - APPENDIX 1 Figure 2 – Information about GAIN when installing Grokster The agreement from GAIN was 6652 words, which probably would cover approximately 10 A4 pages of text. The agreement must be accepted for the installation to proceed, and this was done. Thereafter the user must accept the licence agreement for Grokster, see Figure 3. This agreement was marked 2.6.2.0 License Agreement. Figure 3 – License Agreement for Grokster Post- och telestyrelsen 38 SPYWARE AND CLOSELY RELATED PHENOMENA - APPENDIX 1 It can be pointed out here that this window was implemented in such a way that the text could not be copied. The printout alternative must be chosen if a user wishes to familiarise himself with the entire licence agreement separately. However the Print button was probably not correctly implemented as it was not possible to print the licence agreement; nothing happened when this button was chosen. Nor was it possible to make the window larger in order, for example, to take screen dumps of large text segments. On the website there was a version of the licence agreement to read. However, this version differed from that in the installation window. The agreement was very long. It is estimated that it comprised approximately 10 000 words. Some interesting extracts from this agreement are presented below. To begin with it was declared that the user approves three explicitly named programs being installed and also other programs from a third party if these are included in the licence agreement. Legal Notice and Terms of Service for Grokster By Clicking “I Agree” below and installing Grokster, you are agreeing to also install the following applications a) Cydoor b) MySearch c) Qtech and d) other third party software subject to the terms and conditions contained in the End User License Agreements appended below. Once again the agreement declared that the user approves the downloading of software from a third party if this is included in the licence agreement. 12. Third Party Software During the process of installing Grokster, i) you are agreeing to install third party software as per the various End User License Agreements contained herein and ii) you may also be offered the possibility to download or install software from third party software vendors pursuant to license agreements or other arrangements between such vendors and yourself (“Third Party Software”). Grokster may provide the information that it receives from you to vendors whose THIRD PARTY SOFTWARE you have accepted. Use of this information would be restricted to that which is described in the applicable THIRD PARTY SOFTWARE End User License Agreement. In the event that you do not want this THIRD PARTY SOFTWARE, please do not accept this Agreement. Please note that the THIRD PARTY SOFTWARE is subject to different license agreements or other arrangements, which you should read carefully, compared to the Terms of Service of Grokster. By downloading and using this THIRD PARTY SOFTWARE you accept these THIRD PARTY SOFTWARE license agreements or other arrangements and acknowledge that you have read them and understand them. Grokster does not sell, resell, or license any of this THIRD PARTY SOFTWARE, and Grokster disclaims to the maximum extent permitted by applicable law, any responsibility for or liability related to the THIRD PARTY SOFTWARE. Any questions, complaints or claims related to the THIRD PARTY SOFTWARE should be directed to the appropriate vendor. ---- In the agreement, separate agreements follow for Altnet, QTech, My Search Bar, BroadcastPC, Delfin, Cydoor (The Coupons Bar Software) and Total Velocity (TV Media). Post- och telestyrelsen 39 SPYWARE AND CLOSELY RELATED PHENOMENA - APPENDIX 1 The agreement from Grokster must be accepted for the installation to be able to proceed, and this was done. A number of programs were installed in conjunction with the installation of Grokster. Some of these programs constitute own test instances, which will be described later in this case study. The installed programs were: • Gator/GAIN/Claria • VX2 Transponder • MyWay Speedbar and 411 Ferret/Active Search • FlashenhancerBHO / FlashTrack • BroadcastPC and DelFin • Brilliant Digital • TopMoxie / Web_CPR • TVMedia Display, se kap • Webrebates / Toprebates • Altnet/BDE The constellation of malicious programs (malware) that were installed on the computer during these tests had a great impact on the system. The new programs occupied internal memory and processor power, which meant that the system felt slow. Several browser helper objects (BHO), i.e. programs that add functionality to a web browser, also meant that Internet Explorer was felt to be very slow, sometimes the web browser crashed completely and could only be closed down through killing the process in the activity manager. Furthermore, the operative system crashed a number of times, particularly when the anti-spyware Ad-Aware was run, see below. When the program Ad-Aware was started in order to identify which malicious programs were being installed during the test, it was observed that the process webcpr1 started the process webcpr0. These belong to the program TopMoxie18. Upon running Ad-Aware, the operative system (Windows XP, SP2) stopped the process Windows Explorer from continuing to run, see Figure 4. 18 http://www.spynet.com/spyware/spyware-TopMoxie.aspx, 9 December 2004 Post- och telestyrelsen 40 SPYWARE AND CLOSELY RELATED PHENOMENA - APPENDIX 1 Figure 4 – Examples of messages concerning data execution protection in Windows XP SP2 This was conducted by the inbuilt mechanism for data execution protection, which is a security function incorporated into Windows XP SP2. Data execution protection is a processor function that prevents codes running in the memory areas that are marked as data storage areas. The function is also called ‘runtime protection’. Upon an attempt to run codes from a marked data page an exemption immediately occurred to prevent the code from running. In this way the attacker was prevented from exceeding a data buffer with a code and then running the code. The operative system thus prevented a malicious code from executing when Ad-Aware was being run. It is worth noting here that the program operated faultlessly before the installation of Grokster. After having closed this message, the operative system crashed and the computer was restarted. However, it was possible to complete the run of Ad-Aware by not closing this window. The program SpyBot, which has a similar function as Ad-Aware, could not implement a complete search as it was affected by a fault; the origin of the fault was difficult to identify on the basis of the information provided by the program. These events suggest that one or more of the programs that were installed by Grokster actively tried to prevent the anti-spyware Ad-Aware and Spybot from searching for malicious programs. Claria/Gator/GAIN Gator Advertising Information Network (GAIN) is a network of companies that release advertising through Gator’s adware. Gator changed name to Claria a year ago. GAIN states that their adware is permission-based19, which means that in conjunction with the downloading of free programs the user has given permission to receive periodical advertising. The name Gator is often used as a composite name for a number of programs that come from the company; the interesting aspect from this report’s perspective is the advertising program. Gator offers a number of useful software programs on its website, for example Precision Time and Weatherscope. The advertising program Gator is installed together with these programs, but it is more usual that the program is installed through ActiveX 19 http://www.claria.com/advertise/audience/, 17 March 2005 Post- och telestyrelsen 41 SPYWARE AND CLOSELY RELATED PHENOMENA - APPENDIX 1 components on websites or through piggybacking on a file-sharing program such as Grokster, which was also the case in the tests conducted. The advertising program gathers and sends off information about the user’s habits on the Internet. This information is compiled as a profile, which is then utilised to send targeted advertising. During the tests, Gator was installed in two ways; together with the program Precision Time Tool which was downloaded on the website www.gainpublishing.com, and with the file-sharing program Grokster. In the first case, the main component was installed through an ActiveX component. This installation provided a possibility of seeing a licence agreement; an extract of this agreement is shown below. GAIN declares which type of information is gathered about the user. Here's what we do know... While we don't know the identity of Subscribers, the GAIN AdServer and GP collect the following kinds of anonymous information: - Some of the Web pages viewed - The amount of time spent at some Websites - Some click history, including responses to some online ads - Standard web log information and system settings (except that IP addresses are not stored) - What software is on the personal computer (but no information from those programs) - First name, country, city, and five digit ZIP code/postal code - Non-personally identifiable information on Web pages and forms - Software usage characteristics and preferences - For Gator(r) eWallet users, your master password, if you choose to create one It is worth noting that GAIN prohibits the user from listening to network traffic containing communication between software from the company and the companies’ servers. You acknowledge and agree that any and all communications between GP and the Licensed Materials and the content stored on GP's computer servers and in its software includes confidential information of GP and you may not access, publish, transmit, display, create derivative works of, store, or otherwise exploit any such confidential information except as such functions are performed by the Licensed Materials in the ordinary course of operation. Any use of a packet sniffer or other device to intercept or access communications between GP and the Licensed Materials is strictly prohibited. Gator continuously shows advertising in the form of pop-up ads when the user surfs on the Internet. These advertisements are based on the user’s habits such as which websites have been visited, which search words have been stated in search engines, etc. During these tests, advertisements turned up approximately 5 times in a period of 30 minutes. Figure 5 shows how these pop-up ads look. Post- och telestyrelsen 42 SPYWARE AND CLOSELY RELATED PHENOMENA - APPENDIX 1 Figure 5 – Example of pop-up ads from GAIN Gator monitors words that are filled in by the user in standard forms on websites. If a user makes a search with a search engine, for example Altavista, the program opens a new result page with hits. Figure 6 below shows an example of a page from Search Scout; this page was opened in conjunction with a search of “designer clothes” being made in the search engine Altavista. Post- och telestyrelsen 43 SPYWARE AND CLOSELY RELATED PHENOMENA - APPENDIX 1 Figure 6 – Example of Gator Search Scout Gator communicates continuously with its servers. Earlier versions of the program were implemented in such a way that the information that was sent between the client and its server could be discerned simply. The extract below shows how a HTTP POST call might look20. POST /bannerserver/bannerserver.dll?GetBannerList MachineID=RTJCNzI4QjktRkU4MS00RjIzLUE2REQtNzZEM0M2MThG OTA4&MachineInt=103900267&Banner-Version=3%2e0&Product Version=4%2e1%2e2%2e6&OEMID=0&Locale=0409&ZipCode=2&Us erID=OTNBMEFDNDMxOUE5NDJDM0E0REFBQTA3M0JFQUY1RDk%3d%3d %3d&UserInt=146699728&LocalTime=04%2f19%2f2003+01%3a26 %3a18+%2d0500&GMTTime=04%2f19%2f2003+05%3a26%3a18+%2b0 000&BnrTypes=7df&AIC-0=gator%5faic&Site=yale%2eedu&Def Browser=1&InstDate=04%2f18%2f2003+09%3a00%3a18+%2d0500 >RGF=0%2c0&PA=0& The extract below shows a TCP stream captured with Ethereal. It can be seen here how Gator sends information in Field1 (bold) to the server gi.gator.com/emachine.asp. However, the information is difficult to discern directly. POST /emachine.asp HTTP/1.1 Accept: */* Content-Type: application/x-www-form-urlencoded X-UA: WinInet 6.0.2900.2518, 1.1, 1.0 User-Agent: Gator/5.0 RequestMachineInt Host: gi.gator.com Content-Length: 86 Connection: Keep-Alive Cache-Control: no-cache Field1=Q0RvJ3TaJAAAAP2lUv2cqGa80C4P6eL5fq56oaiTL4%2bzVYSNv1vcrx8vu7D0VkesBn8 %3d%3d%3d& HTTP/1.1 100 Continue Server: Microsoft-IIS/5.0 Date: Tue, 30 Nov 2004 15:10:39 GMT VX2 Transponder VX2 Transponder is a browser helper object and adware. The program monitors and logs user habits such as websites visited and information entered in search forms on web pages. This information is then sent on to a server, probably with 20 http://www.benedelman.org/spyware/ftc-031904.pdf, 8 December 2004 Post- och telestyrelsen 44 SPYWARE AND CLOSELY RELATED PHENOMENA - APPENDIX 1 the aim of showing pop-up ads when the user surfs. The program’s algorithm for the selection of ads is structured so that advertisements are selected depending on what kind of website the user is visiting at the moment.21 The algorithm adapts the intensity of advertisement shown depending on the user’s activity; if no new websites are visited nor are any new ads shown. In Figure 7 below an example is shown of a pop-up ad that offers the user free smileys. Figure 7 – Pop-up ads from VX2 Transponder On the first time that the program is executed it looks for the file oeminfo.ini in the user’s computer. If this file exists, it contains the information about the computer such as from whom it was bought, serial number, processor and configuration, and perhaps also the user’s name. This information can be seen if one in Windows XP selects Start Æ Inställningar Æ Kontrollpanelen Æ System [Start Æ Settings Æ Control Panel Æ System], first flap. The program gathers information about websites visited and information entered into forms; this is then communicated to a third party. Long-lived third party cookies are also stored on the computer with the aim of identifying the user over several sessions. The VX2 Transponder also searches the user’s computer for files used by the email program Microsoft Outlook; doing so to find a full name and e-mail address. This kind of activity was however not observed during the tests; the reason may be that the test system did not have the e-mail program installed. The program also has an update function which it can utilise to update itself or download new malicious programs from a third party. The program then contacts a server that can indicate new software from a third party that should be downloaded and installed. BroadcastPC and DelFin Media Viewer BroadcastPC is adware that shows multimedia advertising on the user’s computer. The program monitors the user’s habits on the Internet and delivers 21 http://www.spynet.com/spyware/spyware-VX2.Transponder.aspx, 8 December 2004 Post- och telestyrelsen 45 SPYWARE AND CLOSELY RELATED PHENOMENA - APPENDIX 1 advertisements on the basis of this. The advertisement comprises large video clips that are downloaded to the user’s computer in the background. BroadcastPC makes use of DelFin Media Viewer, also known as PromulGate, which is a media player and adware. According to the creator’s website, the product provides the marketer with the possibility of sending targeted ads to millions of users daily through the Internet. DelFin Media Viewer uses unique identification numbers for each user.22 The program registers information about the user and communicates this together with the unique id-number and postcode to its marketing customers. In the tested case, a large video clip was downloaded by BroadcastPC. After a while Windows Media Player started automatically and showed a full screen trailer for Buffy the Vampire Slayer. After the video clip had been finished playing, DelFin Media Viewer started, see Figure 8. This contained advertising and linked to a website where purchasing could be conducted. Figure 8 – DelFin Media Viewer with advertising for Buffy the Vampire Slayer 22 http://www.spynet.com/spyware/spyware-DelFin-Media-Viewer.aspx, 8 December 2004 Post- och telestyrelsen 46 SPYWARE AND CLOSELY RELATED PHENOMENA - APPENDIX 1 Case study 2 – Kazaa and PerfectNav The main program in this case study is the program Kazaa. This program also installed a number of malicious programs (malware), and of these the program PerfectNav constitutes a test instance in this case study. Kazaa is probably one of the world’s most spread file-sharing programs. Precisely as the file-sharing program Grokster, see Case study 1 – Grokster, Kazaa is adware and also known for including malicious programs. The constellation here has also changed over time, it usually involves adware and browser helper objects.23 The user often accepts installation of these programs onto his computer by accepting long and complicated licence agreements where this is declared. In the test case, a number of programs were installed together with Kazaa; these are presented below. One of these programs, Perfect Nav, constitutes its own test instance, which is described below. In the test case, Kazaa was installed by the downloading and execution of an installation file which was taken from the website www.kazaa.com. The installation process for Kazaa was similar to that for Grokster. However, Kazaa was somewhat clearer about the fact that several programs from a third party were being installed at the same time, as early in the installation a number of programs that accompany the product are presented: BullGard Virus Protection, Altnet Topsearch, PerfectNav, Cydoor, GAIN, Altnet Peer Points Components, My Search Toolbar, and Joltid P2P Networking. Thereafter, the user must approve a number of licence agreements for the installation to continue. These agreements contained information about the programs from a third party. PerfectNav PerfectNav has been created by the company eUniverse and is a browser helper object which manipulates the page for search errors in the web browser. The program redirects incorrectly entered addresses into its own start page. This behaviour is also found with the program NaviSearch which among others was installed together with the adware BargainBuddy. Figure 9 below shows an example of how PerfectNav affects the web browser when the incorrect address www.aftonnbladet.se was entered for Aftonbladet’s website. 23 http://www.cs.washington.edu/homes/gribble/papers/spyware.pdf, 17 March 2005 Post- och telestyrelsen 47 SPYWARE AND CLOSELY RELATED PHENOMENA - APPENDIX 1 Figure 9 – Start page for PerfectNav, which is shown in the event of incorrectly entered addresses Post- och telestyrelsen 48 SPYWARE AND CLOSELY RELATED PHENOMENA - APPENDIX 1 Case study 3 – IFrame IFrame is not spyware but a function in the Page Description Language (PDL), HTML. During October 2004 a weakness was discovered in the web browser Internet Explorer 6.0. All versions of the operative system Windows except Windows XP with Service Pack 2 run the risk of being affected if this weakness is exploited. Through buffer overflowing, an arbitrary code can be executed with the same privileges on the computer as Internet Explorer. The weakness comprises how Internet Explorer deals with SRC and NAME attributes belonging to HTML elements such as <FRAME> and <IFRAME>. Many known security companies have found codes circulating on the Internet which make use of JavaScript to allocate a memory capacity (buffer) where the attacker places, among other things, machine codes. Through entering very long SRC and NAME attributes in an IFRAME element on an HTML page, Internet Explorer can be redirected to indicate the new memory capacity, and in this way be redirected to execute the new code. There are also other technologies that can be used to allocate the memory capacity that the dangerous code is placed in. By clicking on ads on regularly visited websites, the user has in recent times been redirected to websites that exploit the weakness and install an arbitrary code on the user’s computer. The most common way of being harmed from a user perspective is that the user clicks on an ad on a website (large well-known and regularly visited websites have been affected)24 or that the user clicks on a link in an e-mail message they have received from a person they know (as the worms often send e-mails to all items in the address book of the infected computer). As Windows XP with Service Pack 2 is protected from this weakness, Windows XP with Service Pack 1 was used in this test case. In the test case, a code was tested that is written in order to exploit this weakness. This was found on the page http://singe/rucus.net/exploit/11337. The same page also includes the actual code, see the second extract below. This code, which is commented on by the creator, opens a command window (cmd shell) on port 28876 when a link is clicked. By opening the command window a perpetrator can obtain total control of the computer. In the first case, the link was tested with a firewall and antivirus program shut down, and after this with both turned on. In the latter case, Norton Antivirus realtime protection discovered that the weakness in IFRAME was being exploited and warned the user. Norton calls the threat a virus of the name Bloodhound.Exploit.18. By exploiting this weakness, the perpetrator can install an arbitrary code on the user’s computer, and thus there are many behaviours that the user can encounter 24 http://news.netcraft.com/archives/2004/11/21/iframe_exploit_spreading_through_banner_ads. html, 13 December 2004 Post- och telestyrelsen 49 SPYWARE AND CLOSELY RELATED PHENOMENA - APPENDIX 1 arbitrarily. Those that have been most common in recent months include the installation of worms that spread themselves via mass-mailing, installation of programs for remote control and monitoring programs, together with the installation of advertisement-showing programs. Post- och telestyrelsen 50 SPYWARE AND CLOSELY RELATED PHENOMENA - APPENDIX 1 Case study 4 – TrueActive TrueActive is a program for monitoring. The program is a further development of the program WinWhatWhere and can be said to represent the new generation’s monitoring tools. In contrast to the more simple variants, for example Keylogger Pro, which only registers keystrokes, TrueActive can also monitor, for example, Internet traffic in the form of web addresses visited, file management in terms of moving, modification, renaming, removal; information given in forms on websites; entire conversations in many known programs for e-mail and chat; what is shown on the screen and recorded with the web camera; the passwords of various kinds of content in the operative system’s clipboard manager.25 In the test case a test version was downloaded from the company’s web page. This was activated by a licence key that was sent from the company after information had been provided about the downloader. The logs of the monitoring can be sent via e-mail. The program can be set so that it operates completely in the background; the icon in the tool field can be removed and the reports via e-mail can be made via so-called ‘stealth e-mail’, which means that the program uses its own e-mail server. Figure 10 and Figure 11 below show examples of how a report may look. In this case the monitoring was running when the web browser was used to search for “alfa romeo 147” on www.google.com and then enter on the upper most hit. The report shows in the left column the screen dumps captured of the websites that had been visited, under the column “Formatted” it can be seen what has been entered using the keyboard. Figure 10 – Report on monitoring in TrueActive 25 http://www.trueactive.com/features/features.asp, 2004-12-13 Post- och telestyrelsen 51 SPYWARE AND CLOSELY RELATED PHENOMENA - APPENDIX 1 Figure 11 – Report on monitoring in TrueActive Post- och telestyrelsen 52 SPYWARE AND CLOSELY RELATED PHENOMENA - APPENDIX 1 Post- och telestyrelsen 53