{"id":7453,"date":"2017-04-26T08:10:32","date_gmt":"2017-04-26T16:10:32","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/26\/news-1244\/"},"modified":"2017-04-26T08:10:32","modified_gmt":"2017-04-26T16:10:32","slug":"news-1244","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/04\/26\/news-1244\/","title":{"rendered":"Adware the series, part 1"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Wed, 26 Apr 2017 15:00:50 +0000<\/strong><\/p>\n<p>In this series, we will be using the flowchart below to follow the process of determining which <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/adware\/\" target=\"_blank\">adware<\/a> we are dealing with. Our objective is to give you an idea of how many different types of adware are around for Windows systems. Though most adware will be classified as <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/pup\/\" target=\"_blank\">PUPs<\/a>, you will also see the occasional <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/trojan\/\" target=\"_blank\">Trojan<\/a> or <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/rootkit\/\" target=\"_blank\">rootkit<\/a>, especially in the types of adware that are harder to detect and remove.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-17668\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/flowchart.png\" alt=\"\" width=\"609\" height=\"686\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/flowchart.png 609w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/flowchart-266x300.png 266w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/flowchart-533x600.png 533w\" sizes=\"auto, (max-width: 609px) 100vw, 609px\" \/><\/p>\n<h3>Advertisements<\/h3>\n<p>It all starts with advertising.<\/p>\n<p>To give you an idea how much money goes around in this industry, the <a href=\"http:\/\/www.go-gulf.com\/blog\/online-ad-spending\/\" target=\"_blank\">US online ad spending for 2016 was estimated at $ 62 Billion<\/a>. Anyone that is able to grab a chunk of that will be very happy to do so, even if the methods are considered iffy. Some will not shy away from criminal behavior when that kind of money is involved. Two of the fraudulent methods to grab some of that money are called <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/adfraud\/\" target=\"_blank\">ad fraud<\/a> and adware. If you want to learn the difference between these two please read my blog post, <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/03\/adware-vs-ad-fraud\/\" target=\"_blank\">Adware vs Ad fraud<\/a>. In this post, we will concentrate on adware, which basically boils down to some program on your computer showing you advertisements that do not come from the websites you are visiting.<\/p>\n<h3>Identify the source<\/h3>\n<p>We will use <a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/05\/process-explorer-an-introduction\/\" target=\"_blank\">Process Explorer<\/a> to identify the process that is behind an advertisement. Usually, this will be a browser and you will recognize it as such. But sometimes, these advertisements pop up as windows without title bars. In cases like these, you can use the cross-hairs in the Process Explorer menu, as shown below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-17662\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/crosshairs.png\" alt=\"\" width=\"313\" height=\"61\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/crosshairs.png 313w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/crosshairs-300x58.png 300w\" sizes=\"auto, (max-width: 313px) 100vw, 313px\" \/><\/p>\n<p>Drag and drop the cross-hairs on the window you are curious about and in the Process Explorer list of running processes the process responsible for the window will be selected (showing in blue).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-17667\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/SelectedProcess.png\" alt=\"process highlighted\" width=\"715\" height=\"44\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/SelectedProcess.png 715w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/SelectedProcess-300x18.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/SelectedProcess-600x37.png 600w\" sizes=\"auto, (max-width: 715px) 100vw, 715px\" \/><\/p>\n<p>You now have the name of the process and, in case there are more instances of that process, the Process Identification (PID) associated with it.<\/p>\n<h3>Check where the process is connecting to<\/h3>\n<p>This is optional since it almost never provides any information that is useful in the removal process. Extra research, however, could tell us what family the adware belongs to and what characteristics you may expect as a result.<\/p>\n<p>So, if you like, you can use the Windows built-in (after XP) tool Resource Monitor (resmon). To start Resource Monitor, you can use Windows Key + \u201cR\u201d, type \u201cresmon\u201d in the \u201cRun\u201d box and click OK.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-17666\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/resmon.png\" alt=\"resmon\" width=\"797\" height=\"237\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/resmon.png 797w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/resmon-300x89.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/resmon-600x178.png 600w\" sizes=\"auto, (max-width: 797px) 100vw, 797px\" \/><\/p>\n<p>Under the Network tab &gt; Network activity, you will find the most specific information for any connected process.<\/p>\n<p>If one process has several open connections you can click the \u201cImage\u201d column header to sort the processes alphabetically, which provides a better overview of what a given process might be doing. Also, check if the PID listed in Process Explorer matches the one in Resource Monitor. This should be done to make sure that you are looking at the process that is showing the advertisement.<\/p>\n<h3>Browsers first<\/h3>\n<p>As this will be the most common case, let\u2019s deal with it first. The window showing the advertisement is a window or new tab of your default browser. Some adware authors find it easier or more effective to open the Microsoft browser that came with the <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/os\/\" target=\"_blank\">OS<\/a>, so they will open Edge for Windows 10 and Internet Explorer (IE) for earlier versions.<\/p>\n<h4>Clear your browser&#8217;s cache<\/h4>\n<p>In Edge, the procedure is:<\/p>\n<ol>\n<li>Click the Hub icon, click \u201cClear History\u201d<\/li>\n<li>Select the appropriate options. Note that clearing the \u201cCookies and saved website data\u201d will result in you having to login at every site again.<\/li>\n<li>Click the \u201cClear\u201d button.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-17663\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/EdgeClearCache.png\" alt=\"edge\" width=\"315\" height=\"494\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/EdgeClearCache.png 315w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/EdgeClearCache-191x300.png 191w\" sizes=\"auto, (max-width: 315px) 100vw, 315px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>For Internet Explorer:<\/p>\n<ul>\n<li>Click the gearbox icon<\/li>\n<li>Select Internet Options<\/li>\n<li>On the General tab click on the Delete button under Browsing history<\/li>\n<li>Select the appropriate categories. Note that clearing the \u201cCookies and website data\u201d will result in you having to login at every site again.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-17664\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/IEClearCache.png\" alt=\"\" width=\"468\" height=\"673\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/IEClearCache.png 468w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/IEClearCache-209x300.png 209w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/IEClearCache-417x600.png 417w\" sizes=\"auto, (max-width: 468px) 100vw, 468px\" \/><\/p>\n<ul>\n<li>Click the Delete button if you are happy with your choices.<\/li>\n<\/ul>\n<p>For Firefox:<\/p>\n<ol>\n<li>Click the menu button and choose Options.<\/li>\n<li>Select the Advanced panel.<\/li>\n<li>Click on the Network tab.<\/li>\n<li>In the Cached Web Content section, click Clear Now.<\/li>\n<\/ol>\n<p>For Chrome:<\/p>\n<ol>\n<li>On your browser toolbar, click More (3 dots)<\/li>\n<li>Point to More tools, and then click Clear browsing data.<\/li>\n<li>Select the items that you want to clear.<\/li>\n<li>Click the Clear browsing data button.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-17661\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ChromeClearCache.png\" alt=\"chrome\" width=\"621\" height=\"641\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ChromeClearCache.png 621w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ChromeClearCache-291x300.png 291w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ChromeClearCache-581x600.png 581w\" sizes=\"auto, (max-width: 621px) 100vw, 621px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>For Opera:<\/p>\n<ol>\n<li>In the Opera Menu choose Settings<\/li>\n<li>Select Privacy and Security<\/li>\n<li>Under Privacy click the Clear browsing data&#8230; button<\/li>\n<li>Delete the items you wish to delete<\/li>\n<li>And click on the Clear browsing data button<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-17665\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/OperaClearCache.png\" alt=\"\" width=\"624\" height=\"456\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/OperaClearCache.png 624w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/OperaClearCache-300x219.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/OperaClearCache-600x438.png 600w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/p>\n<h3><strong>Removing extensions and toolbars<\/strong><\/h3>\n<p>Extensions and toolbars are so closely related that removing the extension will usually take the toolbar out as well.<\/p>\n<p>Internet Explorer:\u00a0 Tools (gear icon) &gt; Manage add-ons &gt; Toolbars and Extensions &gt; Select the one(s) you don\u2019t trust one by one and click \u201cDisable\u201d<\/p>\n<p>Firefox:\u00a0 Menu (horizontal stripes) &gt; Add-ons &gt; click on \u201cDisable\u201d behind the ones you don\u2019t trust or don\u2019t recall installing.<\/p>\n<p>Chrome: Menu (horizontal stripes) &gt; Settings &gt; Extensions &gt; Uncheck \u201cEnabled\u201d behind the ones you don\u2019t trust or don\u2019t recall installing.<\/p>\n<p>Opera: click the Opera icon &gt; Extensions &gt; Extension Manager &gt; click on Disable below the ones you don\u2019t trust or don\u2019t recall installing.<\/p>\n<h3><strong>Index<\/strong><\/h3>\n<p>Part 1:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-17660\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/part1.png\" alt=\"\" width=\"391\" height=\"284\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/part1.png 391w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/part1-300x218.png 300w\" sizes=\"auto, (max-width: 391px) 100vw, 391px\" \/><\/p>\n<ul>\n<li>Identify the process<\/li>\n<li>Clear browser caches<\/li>\n<li>Remove browser extensions and toolbars<\/li>\n<\/ul>\n<p>Up next, part 2<\/p>\n<ul>\n<li>Proxies<\/li>\n<li>Winsock hijackers<\/li>\n<li>DNS hijackers<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em>Pieter Arntz<\/em><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/04\/adware-the-series-part-1\/\">Adware the series, part 1<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/04\/adware-the-series-part-1\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Wed, 26 Apr 2017 15:00:50 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/puppum\/2017\/04\/adware-the-series-part-1\/' title='Adware the series, part 1'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/shutterstock_471848861.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>In this series, we will be using the below flowchart to follow the process of determining which adware we are dealing with. The idea is to give you an idea of how many different types of adware are around for Windows systems. <\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/puppum\/\" rel=\"category tag\">PUP<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/ad-fraud\/\" rel=\"tag\">ad fraud<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/adware\/\" rel=\"tag\">adware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cache\/\" rel=\"tag\">cache<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/extensions\/\" rel=\"tag\">extensions<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/potentially-unwanted-programs\/\" rel=\"tag\">potentially unwanted programs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pup\/\" rel=\"tag\">PUP<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/puppum\/2017\/04\/adware-the-series-part-1\/' title='Adware the series, part 1'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/04\/adware-the-series-part-1\/\">Adware the series, part 1<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10499,10468,12103,11058,11279,10566],"class_list":["post-7453","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-ad-fraud","tag-adware","tag-cache","tag-extensions","tag-potentially-unwanted-programs","tag-pup"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7453"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7453\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7453"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}