{"id":15379,"date":"2019-05-23T12:10:03","date_gmt":"2019-05-23T20:10:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/05\/23\/news-9128\/"},"modified":"2019-05-23T12:10:03","modified_gmt":"2019-05-23T20:10:03","slug":"news-9128","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/05\/23\/news-9128\/","title":{"rendered":"Knowing when it\u2019s worth the risk: riskware explained"},"content":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Thu, 23 May 2019 19:22:47 +0000<\/strong><\/p>\n<p>If there\u2019s one thing I like more than trivia quizzes, it\u2019s quotes. Positive, inspirational, and motivational quotes. Quotes that impart a degree of ancient wisdom, or those that make you stop and consider. Reading them melts our fears, sorrows, and feelings of inadequacy away.<\/p>\n<p>Some of the most inspiring quotes urge us to take risks in order to find meaning. If you don\u2019t take risks, they say, you won\u2019t be able to achieve remarkable things. The biggest risk, they say, is not taking a risk at all.<\/p>\n<p>But when it comes to computer security, all that goes out the window. Taking risks on software you download onto your devices is not a recipe for success. Even if the programs are inherently benign, some may have features that can be used against you by those with malicious intent. No good can come of that. <\/p>\n<h3>What are these risky programs you\u2019re talking about?<\/h3>\n<p>Did I lose you at &#8220;quotes?&#8221; That&#8217;s alright. These software programs that contain features that can easily be abused are known as <a rel=\"noreferrer noopener\" aria-label=\"riskware (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/glossary\/riskware\/\" target=\"_blank\">riskware<\/a>. They may come pre-installed on your computing device or they are downloaded and installed by malware. <\/p>\n<h3>How can something legit be a risk?<\/h3>\n<p>Such software was designed to have powerful features so it can do what it was programmed to do. Unfortunately, those same features can be used and\/or abused by threat actors as part of a wider attack or campaign against a target. Riskware contains loopholes or vulnerabilities that can be exploited by cybercriminals and the threats they develop.<\/p>\n<p>For example, there are monitoring apps available in the market that private individuals, schools, and businesses use to look after their loved ones, watch what their students are doing, or check employee activities. Those with ill intent could take over these apps to stalk certain individuals or capture sensitive information via logging keystrokes.<\/p>\n<hr class=\"wp-block-separator is-style-wide\"\/>\n<p style=\"text-align:center\"><em>Read: <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/09\/when-spyware-goes-mainstream\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">When spyware goes mainstream<\/a><\/em><\/p>\n<hr class=\"wp-block-separator is-style-wide\"\/>\n<p>Riskware can be on mobile devices, too. On Android, there are apps created with an auto-install feature that have system-level rights and come pre-installed on devices; therefore, they cannot be removed (but can be disabled). The auto-installer we detect as <a href=\"https:\/\/blog.malwarebytes.com\/detections\/android-pup-riskware-autoins-fota\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Android\/PUP.Riskware.Autoins.Fota<\/a>, however, cannot be manually deactivated. Once exploited, it can be used to secretly auto-install malware onto susceptible devices.<\/p>\n<p>Note that if you install software that your <a href=\"http:\/\/www.malwarebytes.com\/pricing\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"anti-malware program (opens in a new tab)\">anti-malware program<\/a> detects as riskware, then you need only make sure your security program is updated to stay safe.<\/p>\n<h3>How can you tell which software is riskware?<\/h3>\n<p>There are varying levels of malicious intent and capabilities for all software. In fact, any program should be assumed to have potential flaws and vulnerabilities that can be exploited. However, there are criteria for determining what is considered malware vs. riskware, and which software is deemed &#8220;safe.&#8221;<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/interview-with-a-malware-hunter-pieter-arntz\/\">Pieter Arntz<\/a>, malware intelligence researcher and riskware expert, makes this clear when he said that riskware can be classified based on the risks to data and devices involved. <\/p>\n<p>\u201cIn my opinion, there are a few major categories of riskware, and you can split them up by type of risk they introduce,\u201d Arntz said. \u201cSome bring risk to the system because they introduce extra vulnerabilities, such as unlicensed Windows with updates disabled. Some bring risk to the user because having them is forbidden by law in some countries, such as hacking tools.\u201d<\/p>\n<p>Arntz continues: \u201cSome monitor user behavior. When this is by design, a software may be labelled as riskware rather than spyware. Some bring risk to the system because they are usually accompanied by real malware, and their presence can be indicative of an infection. [And] some bring risk to the user because their use is against the Terms of Service of other software on the system, such as cracks.\u201d<\/p>\n<h3>What&#8217;s the difference between riskware and PUPs?<\/h3>\n<p>Riskware and potentially unwanted programs (PUPs) are similar in that their mere presence could open systems up to exploitation. So, it\u2019s no surprise that users might liken one to the other. However, there are different criteria for classifying <a href=\"https:\/\/blog.malwarebytes.com\/detections\/riskware\/\">riskware<\/a> and <a href=\"https:\/\/blog.malwarebytes.com\/detections\/pup-optional\/\">PUPs<\/a>.<\/p>\n<p>Programs might be termed riskware because they put the user at risk in some way by:<\/p>\n<ul>\n<li>Violating the terms of service (ToS) of other software or a user platform on the device.<\/li>\n<li>Blocking another application or software from being updated and patched.<\/li>\n<li>Being illegal in the user&#8217;s country.<\/li>\n<li>Potentially being used as a backdoor for other malware.<\/li>\n<li>Being indicative of the presence of other malware.<\/li>\n<\/ul>\n<p>Whereas programs might be considered PUPs because:<\/p>\n<ul>\n<li>They may have been installed without the user\u2019s consent.<\/li>\n<li>They may be supported by aggressive advertisements.<\/li>\n<li>They may be\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/bundler\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">bundlers<\/a>\u00a0or part of a bundle.<\/li>\n<li>They may be misleading or offer a false sense of security.<\/li>\n<\/ul>\n<p>Regardless of whether a program is a PUP or riskware, it&#8217;s important to evaluate critically whether or not the software is as useful and relevant as it is a nuisance or a potential risk. <\/p>\n<h3>Should I keep quarantined riskware or remove it?<\/h3>\n<p>If your anti-malware program detects and quarantines riskware, you likely have a choice whether or not to keep it. Our advice is to make a decision based on whether or not you installed the riskware yourself and then, if you did, weighing the benefits of the app against the risks outlined in the detection.<\/p>\n<p>If riskware was installed without the user&#8217;s knowledge, it&#8217;s possible the software is part of an attack ensemble delivered by malware. I\u2019d be more worried about the presence of malware in this case, and would delete the offending riskware.<\/p>\n<p>If you want your anti-malware to stop detecting software you use that is classified as riskware, see if you can configure your security solution to exclude the file or whitelist it. That way, the software won\u2019t be detected in the future. Want to know how to do this with your Malwarebytes product? Go <a href=\"https:\/\/blog.malwarebytes.com\/detections\/riskware\/\">here<\/a>.<\/p>\n<p>Stay safe out there!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/05\/knowing-when-its-worth-the-risk-riskware-explained\/\">Knowing when it\u2019s worth the risk: riskware explained<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/05\/knowing-when-its-worth-the-risk-riskware-explained\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Thu, 23 May 2019 19:22:47 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/101\/2019\/05\/knowing-when-its-worth-the-risk-riskware-explained\/' title='Knowing when it\u2019s worth the risk: riskware explained'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/shutterstock_717229327.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Riskware is a type of software that, while considered legitimate, can still put users at risk in some way. Learn why anti-malware vendors detect it, and how to tell whether the apps you use are riskware or not.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/\" rel=\"category tag\">101<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/fyi\/\" rel=\"category tag\">FYI<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/blog-series\/\" rel=\"tag\">blog series<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/explained\/\" rel=\"tag\">Explained<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/potentially-unwanted-programs\/\" rel=\"tag\">potentially unwanted programs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pup\/\" rel=\"tag\">PUP<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/riskware\/\" rel=\"tag\">riskware<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/101\/2019\/05\/knowing-when-its-worth-the-risk-riskware-explained\/' title='Knowing when it\u2019s worth the risk: riskware explained'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/05\/knowing-when-its-worth-the-risk-riskware-explained\/\">Knowing when it\u2019s worth the risk: riskware explained<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10519,21850,10522,10520,11279,10566,13864],"class_list":["post-15379","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-10519","tag-blog-series","tag-explained","tag-fyi","tag-potentially-unwanted-programs","tag-pup","tag-riskware"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15379","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15379"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15379\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15379"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15379"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}