Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Spam E-mail Reveals Internet Security Threat, Experts Warn
CNS News ^ | 9/29/03 | Marc Morano

Posted on 09/29/2003 5:34:01 AM PDT by truthandlife

Unsolicited e-mails with the subject line, "What does your Lover do on the Internet?" have been circulating recently, offering an $89 software program called LoverSpy. Computer experts warn the spyware program is for real and poses a serious threat to Internet security.

"Spy on Anyone by sending them an E-Greeting Card!" reads the spam.

However, unlike the many weight loss and organ enlargement ads or requests for assistance from the widows of deposed foreign dictators, this latest cyber mass mailing may actually be telling the truth.

"It actually does what's advertised," said Mike Cermak the owner of TechSupportGuy.com in an interview with CNSNews.com. TechSupportGuy.com is an Internet forum dedicated to addressing technical issues with computers.

"It does work, and from the couple [of] people I know who have had it, it works quite well," Cermak added.

The recipient of a LoverSpy E-Greeting Card would subsequently become vulnerable to having all of his or her computer activity - the visiting of websites, the opening of e-mails, the typing of passwords - monitored by the person who sent the E-greeting, and in real time, the software maker claims.

LoverSpy's website boasts that users of the software can monitor "every single Chat conversation [the targeted computer user has] on the Internet. In fact, every keystroke they type into the computer is recorded and sent to you in an organized report - every single web site they visit, whether using AOL, Internet Explorer, or Netscape."

CNSNews.com downloaded and tried the demo product, and it appeared to work as advertised. But several efforts to contact LoverSpy for comment were not successful. The website address of LoverSpy has been traced to a website in Moscow, according to the e-mail content filtering company, Clearswift, based in England.

According to Clearswift's Sept. 25 statement, a "careful analysis indicates that [LoverSpy] is, in fact, a repackaged version of well-known spyware named emailPI from a Washington, D.C.,-based company."

"Commercial spyware, such as this, is fast emerging as one of the more pernicious, generally undefended threats facing organizations. Anti-virus software offers little or no defense," the Clearswift statement added.

'A phenomenal concept'

Computer experts agree that the privacy threat posed by spy-ware programs like LoverSpy should not be underestimated.

"As paranoid as people already are about their privacy on the Internet, having the possibility of something like this should be quite a phenomenal concept," Cermak said.

Cermak said there is other spy-type software available, but LoverSpy may be the only one that remotely attaches itself to a person's computer via an E-Greeting Card.

"As far as I know, they are the only program that does that, which is a very unique way of doing it. Most of [the other spy programs] have to be installed just like any other program right on the computer itself, so you have to have physical access to the computer," Cermak explained.

Cermak believes LoverSpy's program should be classified as a virus.

"The only difference between this and a normal virus is the creator. It is really just selling the virus off to a third party," Cermak said.

"It's almost like a couple of Trojan horses and viruses that are already out there except [LoverSpy is] trying to put a half-legal front on it," Cermak added.

For people who think their computers are invulnerable to programs like LoverSpy because they have the latest in anti-virus program protection, Cermak says think again.

The overwhelming majority of home computers do not have any protection against programs like LoverSpy, according to Cermak. Installing a software firewall on your computer like those offered by Norton Internet Security or www.zonelabs.com is the best defense, Cermak said.

The producers of LoverSpy will also have access to any computer running the company's spyware program, according to Cermak.

"If you read through [LoverSpy's] legal agreement, they specifically say there that at any time, they are allowed to look through the files," Cermak said.

While noting he is no lawyer, Cermak speculated that the software could get users into legal trouble.

"If you are sending [spyware] to your friend and putting it on their computer without their knowledge, I would certainly think that would be a legal problem," Cermak said.

'Computer Fraud and Abuse Act'

An Internet legal scholar is also warning potential customers of software like LoverSpy.

"Installing spy software on a person's computer without that person's authorization implicates a number of legal causes of action, including trespass to chattels, intrusion upon seclusion, publication of private facts and violation of the federal Computer Fraud and Abuse Act and its various state counterparts," said cyberspace law expert Professor Tom W. Bell of the Chapman University School of Law in an interview with CNSNews.com.

Bell cautions that prospective computer spies don't need to have a legal degree to determine whether their use of spy software is illegal.

"The law in this area tracks common sense quite closely; if your gut tells you that someone has acted in the wrong, the law will probably agree," Bell explained.

Computer espionage is not unlike other types of spying, according to Bell.

"Sneaking spyware onto someone else's computer not only gives rise to the same legal claims that apply generically to spying on someone, but also gives rise to legal claims based on statutory language peculiar to computer use," Bell said.

"Add up all the causes of action, and a defendant accused of computer spying could face an injunction, civil damages, fines and even criminal sanctions," Bell warned.

As espionage programs like LoverSpy proliferate on the Internet, computer users will have more options available to protect their privacy, according to Cermak.

"This is just getting big now, and as soon as it starts spreading around and more people get it, there is going to be a lot of programs popping up to check for it," Cermak said.


TOPICS: Extended News; Technical
KEYWORDS: computersecurity; email; privacy; spam; spyware; warning

1 posted on 09/29/2003 5:34:01 AM PDT by truthandlife
[ Post Reply | Private Reply | View Replies]

To: truthandlife
I have gotten this thing about a dozen times in the last three days, all with a different "from" name. I was scared to click on the link. If any Freepers want to see it I will forward one of the messages. Freepmail me.
2 posted on 09/29/2003 5:44:00 AM PDT by Howie
[ Post Reply | Private Reply | To 1 | View Replies]

To: Howie
I have gotten this thing about a dozen times in the last three days...

I know you have...   ;-)

3 posted on 09/29/2003 5:52:29 AM PDT by jigsaw (Liberals: nature’s proof that maturity is not guaranteed.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: jigsaw
Try me.
4 posted on 09/29/2003 5:59:38 AM PDT by Howie
[ Post Reply | Private Reply | To 3 | View Replies]

To: Howie
Same here. I just hit "delete".
5 posted on 09/29/2003 6:20:12 AM PDT by Alia (California -- It's Groovy! Baby!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Alia
They came with an internet link as follows: gootle.us/index.php?afil=1027

I'm not a programmer but I have a feeling that if you go there it will install a program on your computer without further ado. Maybe not.

I predict the end of all those Digital Greeting Card sites when this gets around to the general public.
6 posted on 09/29/2003 9:21:59 AM PDT by Howie
[ Post Reply | Private Reply | To 5 | View Replies]

To: truthandlife; rdb3; Coral Snake; HAL9000; Salo; EchoLane; ShadowAce; Liberal Classic; ...
Yet another reason to ditch Windows and install Linux.

From the Tech FAQ:

3. What about FIREWALLS, such as ZoneAlarm? If the remote PC uses a Firewall, what happens?

A:

Currently, Lover Spy is designed to try to evade CERTAIN kinds of Firewalls.

When Lover Spy detects certain firewalls (we can't say which ones), Lover Spy will try to trick the firewall software into thinking that it is Windows itself trying to access the internet.

These features make Lover Spy work with most computers that use a Firewall, because the software will actually trick the user into thinking it is Windows itself trying to access the internet!


Stay tuned for a future version of the software that will be fully anti-firewall.


4. Does Lover Spy use lots of system resources? Does it SLOW DOWN the PC being monitored?

A:

No, Lover Spy does NOT use massive system resources.

This is another area where Lover Spy shines. While monitorign [sic] PC activity, Lover Spy gives NO indication of its presence because of the following:

Lover Spy does NOT slow down the computer being monitored. We have gone through great pains to make Lover Spy use as minimal system resources as possible at all times.

Memory-wise, Lover Spy will use not more an average of just 15 MB of system RAM and a maximum of about 25 MB ...

In comparison, ONE copy of IEXPLORE.exe (Microsoft Internet Explorer) can EASILY take up 25+ MB of memory while running! This goes to prove just how efficient Lover Spy is.

Processor usage is always near 4% to 0%, and all the program code has been meticulously designed to pause in run-time if needed, in order to NOT slow down the PC and therefore arise suspicion!

If you want optimum performance, Lover Spy works best on Windows 2000 and XP-based computers as they are more modern and efficient operating systems, and highly evolved past Windows 95 and 98 and even Windows Me.


It's interesting that the web site is actually hosted in China.

[tjy@Nancy tjy]$ host gokgle.us
gokgle.us has address 211.162.110.196

[tjy@Nancy tjy]$ whois 211.162.110.196@whois.apnic.net
[whois.apnic.net]
% [whois.apnic.net node-1]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

inetnum:      211.162.110.0 - 211.162.110.255
netname:      GWBN-ZQ-55SHEQU
descr:        FOR GWBN ZHAOQING 55SHEQU RESIDENTIAL
              COMMUNITY BROADBAND USERS' ACCESS
country:      CN
admin-c:      JM97-AP
tech-c:       JM97-AP
mnt-by:       MAINT-CNNIC-AP
changed:      xiaohua.chen@histrong.com 20020626
status:       ALLOCATED PORTABLE
source:       APNIC

person:       Jian Meng
address:      2nd Floor, Building A
address:      #9 Donghuan Plaza, Dong Zhong Street
address:      East District, Beijing, China (100027)
country:      CN
phone:        +86-10-6418-5885
fax-no:       +86-10-64182174
e-mail:       mengjian@gwbn.net.cn
nic-hdl:      JM97-AP
mnt-by:       MAINT-CNNIC-AP
changed:      mengjian@gwbn.net.cn 20020819
source:       APNIC

Since China (and Russia BTW) are participants in Microsoft's Government Security Program, they will learn all kinds of ways to perfect the anti-firewall stealth behavior in products like this. And they won't just be marketing to suspicious lovers.

7 posted on 09/29/2003 9:30:02 AM PDT by TechJunkYard
[ Post Reply | Private Reply | To 1 | View Replies]

To: truthandlife
For people who think their computers are invulnerable to programs like LoverSpy because they have the latest in anti-virus program protection, Cermak says think again.

How about people who think their computers are invulnerable to LoverSpy because they use Macs or Linux?

8 posted on 09/29/2003 9:44:29 AM PDT by Question_Assumptions
[ Post Reply | Private Reply | To 1 | View Replies]

To: John Robinson; B Knotts; stainlessbanner; TechJunkYard; ShadowAce; Knitebane; AppyPappy; jae471; ...
The Penguin Ping.

Wanna be Penguified? Just holla!

Got root?

9 posted on 09/29/2003 9:52:40 AM PDT by rdb3 (One shot is not enough. It takes an uzi to move me.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Howie
I agree with you on all your points made. I just have a habit of deleting spam. And yes, the viagra/penile implant ones are fairly "innocent" compared to the "graphic visuals" that sometimes arrive in email. Filters work, only to a point.
10 posted on 09/29/2003 11:44:01 AM PDT by Alia (California -- It's Groovy! Baby!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Alia
Sending graphics certainly gets you past spam-catchers. Can't read text in a picture file.
11 posted on 09/29/2003 11:55:11 AM PDT by johnb838 (Deconstruct the Left)
[ Post Reply | Private Reply | To 10 | View Replies]

To: truthandlife
The fact that the spam explictly recommends illegal use of the virus software makes the original distributor as liable as the end user. That's why (for example) bongs are sold as "water pipes" without any mention of The Demon Weed With Roots In Hell.
12 posted on 09/29/2003 12:18:32 PM PDT by steve-b
[ Post Reply | Private Reply | To 1 | View Replies]

To: johnb838
Some of these graphics are ultra explicit humdingers. Fascinating tho.. whenever a "user" of my puter visits "gaming" sites, I get hordes of these. But then, Larry Flynt, I believe is still publisher of many "gaming" magazines (nintendo, game-cube, etc.)-- these "gaming" magazines.

Fortunately those "ugly" graphics come to me, and not the under age user. Unfortunately, the graphics flash faster than I can hit delete. And "sender" continues to vary email names in sending.

On another note? Some of my political enemies, in past, found ways to sign me up for these hidious "spam" emails.

13 posted on 09/29/2003 2:06:40 PM PDT by Alia (California -- It's Groovy! Baby!)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Alia
My boss gets these "graphics" constantly. I've avoided it by using a public (hotmail type) email address for any site I'm not sure I trust, and scrupulously staying away from unscrupulous sites.
14 posted on 09/29/2003 2:27:01 PM PDT by johnb838 (Deconstruct the Left)
[ Post Reply | Private Reply | To 13 | View Replies]

To: johnb838
-- darned! good advice, Mr. John.
15 posted on 09/29/2003 2:54:50 PM PDT by Alia (California -- It's Groovy! Baby!)
[ Post Reply | Private Reply | To 14 | View Replies]

To: TechJunkYard
Thanks, TechJunkYard! Glad you installed Red Hat 9 on my computer!
16 posted on 09/29/2003 4:26:07 PM PDT by EchoLane
[ Post Reply | Private Reply | To 7 | View Replies]

To: TechJunkYard
Unsolicited e-mails with the subject line, "What does your Lover do on the Internet?" have been circulating recently...

Linux and Mac users are immune from this spyware because they have no ex-lovers (or lovers)... ;-)

17 posted on 09/29/2003 8:31:14 PM PDT by TheEngineer
[ Post Reply | Private Reply | To 7 | View Replies]

To: TheEngineer
Baloney. Everybody's got an ex.
18 posted on 09/29/2003 8:35:31 PM PDT by TechJunkYard
[ Post Reply | Private Reply | To 17 | View Replies]

bump
19 posted on 09/29/2003 8:40:06 PM PDT by RedWhiteBlue
[ Post Reply | Private Reply | To 18 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson