You may not care where you download software from, but malware … – We Live Security
Why do people still download files from sketchy places and get compromised as a result?
One of the pieces of advice that security practitioners have been giving out for the past couple of decades, if not longer, is that you should only download software from reputable sites. As far as computer security advice goes, this seems like it should be fairly simple to practice.
But even when such advice is widely shared, people still download files from distinctly nonreputable places and get compromised as a result. I have been a reader of Neowin for over a couple of decades now, and a member of its forum for almost that long. But that is not the only place I participate online: for a little over three years, I have been volunteering my time to moderate a couple of Reddits forums (subreddits) that provide both general computing support as well as more specific advice on removing malware. In those subreddits, I have helped people over and over again as they attempted to recover from the fallout of compromised computers. Attacks these days are usually financially motivated, but there are other unanticipated consequences as well. I should state this is not something unique to Reddits users. These types of questions also come up in online chats on various Discord servers where I volunteer my time as well.
One thing I should point out is that both the Discord and Reddit services skew to a younger demographic than social media sites such as Twitter and Facebook. I also suspect they are younger than the average WeLiveSecurity reader. These people grew up digitally literate and have had access to advice and discussions about safe computing practices available since pre-school.
Despite having the advantage of having grown up with computers and information on securing them, how is it that these people have fallen victim to certain patterns of attacks? And from the information security practitioners side, where exactly is the disconnect occurring between what were telling people to do (or not do, as the case may be), and what they are doing (or, again, not doing)?
Sometimes, people will openly admit that they knew better but just did a dumb thing, trusting the source of the software when they knew it was not trustworthy. Sometimes, though, it appeared trustworthy, but was not. And at other times, they had very clearly designated the source of the malware as trustworthy even when it was inherently untrustworthy. Let us take a look at the most common scenarios that lead to their computers being compromised:
I would point out that these are not the only means by which people were tricked into running malware. WeLiveSecurity has reported on several notable cases recently that involved deceiving the user:
Do any of these scenarios seem similar to each other in any way? Despite the various means of receiving the file (seeking out versus being asked, using a search engine, video site or piracy site, etc.) they all have one thing in common: they exploited trust.
When security practitioners talk about downloading files only from reputable websites, it seems that we are often only doing half of the job of educating the public about them, or maybe even a little less, for that matter: weve done a far better job of telling people what kind of sites to go to (reputable ones, obviously) without explaining what makes a site safe to download from in the first place. So, without any fanfare, here is what makes a site reputable to download software from:
And thats it! In todays world of software, the publishers site could be a bit more flexible than what it historically has been. Yes, it could be a site with the same domain name as the publishers site, but it could also be that the files are located on GitHub, SourceForge, hosted on a content delivery network (CDN) operated by a third party, and so forth. That is still the publishers site, as it was explicitly uploaded by them. Sometimes, publishers provide additional links to additional download sites, too. This is done for a variety of reasons, such as to defray hosting costs, to provide faster downloads in different regions, to promote the software in other parts of the world, and so forth. These, too, are official download sites because they are specifically authorized by the author or publisher.
There are also sites and services that act as software repositories. SourceForge and GitHub are popular sites for hosting open-source projects. For shareware and trial versions of commercial software, there are numerous sites that specialize in listing their latest versions for downloading. These download sites function as curators for finding software in one place, which makes it easy to search and discover new software. In some instances, however, they also can have a darker side: Some of these sites place software wrappers around files downloaded from them that can prompt to install additional software besides the program you were looking for. These program bundlers may do things completely unrelated to the software they are attached to and may, in fact, install potentially unwanted applications (PUAs) on to your computer.
Other types of sites to be aware of are file locker services such as Box, Dropbox, and WeTransfer. While these are all very legitimate file sharing services, they can be abused by a threat actor: people may assume that because the service is trusted, programs downloaded from them are safe. Conversely, IT departments checking for the exfiltration of data may ignore uploads of files containing personal information and credentials because they are known to be legitimate services.
When it comes to search engines, interpreting their results can be tricky for the uninitiated, or people who are just plain impatient. While the goal of any search enginewhether it is Bing, DuckDuckGo, Google, Yahoo, or another is to provide the best and most accurate results, their core businesses often revolve around advertising. This means that the results at the top of the page in the search engine results are often not the best and most accurate results, but paid advertising. Many people do not notice the difference between advertising and search engine results, and criminals will take advantage of this through malvertising campaigns where they buy advertising space to redirect people to websites used for phishing and other undesirable activities, and malware. In some instances, criminals may register a domain name using typosquatting or a similar-looking top-level domain to that of the software publisher in order to make their website address less noticeable at first glance, such as example.com versus examp1e.com (note how the letter l has been released by the number 1 in the second domain).
I will point out that there are many legitimate, safe places to go on the internet to download free and trial versions of software, because they link to the publishers own downloads. An example of this is Neowin, for whom the original version of this article was written. Neowins Software download section does not engage in any type of disingenuous behavior. All download links either go directly to the publishers own files or to their web page, making Neowin a reliable source for finding new software. Another reputable site that links directly to software publishers downloads is MajorGeeks, which has been listing them on a near-daily basis for over two decades.
While direct downloading ensures that you get software from the company (or individual) that wrote it, that does not necessarily mean it is free of malware: there have been instances where malicious software was included in a software package, unintentionally or otherwise. Likewise, if a software publisher bundles potentially unwanted applications or adware with their software, then you will still receive that with a direct download from their site.
Special consideration should be applied to the various application software stores run by operating system vendors, such as the Apple App Store, the Google Play store, Microsofts Windows App stores, and so forth. One might assume these sites to be reputable download sites, and for the most part they are exactly that, but there is no 100% guarantee: Unscrupulous software authors have circumvented app stores vetting processes to distribute software that invade peoples privacy with spyware, display egregious advertisements with adware, and engage in other unwanted behaviors. These app stores do have the ability to de-list such software from their stores as well as remotely uninstall it from afflicted devices, which offers some remedy; however, this could be days or weeks (or more) after the software has been made available. Even if you only download apps from the official store, having security software on your device to protect it is a must.
Device manufacturers, retailers, and service providers may add their own app stores to devices; however, these may not have the ability to uninstall apps remotely.
With all of that in mind, you are probably wondering exactly what the malware did on the affected computers. While there were different families of malware involved, each of which having its own set of actions and behaviors, there were two that basically stood out because they were repeat offenders, which generated many requests for assistance.
And just in case you were wondering: I have never heard of anyone successfully decrypting their files after paying the ransom to the STOP/DJVU criminals. Your best bet at decrypting your files is to back them up in case a decryptor is ever released.
As far as its functionality goes, Redline Stealer performs some fairly common activities for information-stealing malware, such as collecting information about the version of Windows the PC is running, username, and time zone. It also collects some information about the environment where it is running, such as display size, the processor, RAM, video card, and a list of programs and processes on the computer. This may be to help determine if it is running in an emulator, virtual machine, or a sandbox, which could be a warning sign to the malware that it is being monitored or reverse engineered. And like other programs of its ilk, it can search for files on the PC and upload them to a remote server (useful for stealing private keys and cryptocurrency wallets), as well as download files and run them.
But the primary function of an information stealer is to steal information, so with that mind, what exactly does the Redline Stealer go after? It steals credentials from many programs including Discord, FileZilla, Steam, Telegram, various VPN clients such as OpenVPN and ProtonVPN), as well as cookies and credentials from web browsers such as Google Chrome, Mozilla Firefox, and their derivatives. Since modern web browsers do not just store accounts and passwords, but credit card info as well, this can pose a significant threat.
Since this malware is used by different criminal gangs, each of them might focus on something slightly different. In these instances, though, the targets were most often Discord, Google, and Steam accounts. The compromised Discord accounts were used to spread the malware to friends. The Google accounts were used to access YouTube and inflate views for certain videos, as well as to upload videos advertising various fraudulent schemes, causing the account to be banned. The Steam accounts were checked for games that had in-game currencies or items which could be stolen and used or resold by the attacker. These might seem like odd choices given all the things which can be done with compromised accounts, but for teenagers, these might be the most valuable online assets they possess.
To summarize, here we have two different types of malware that are sold as services for use by other criminals. In these instances, those criminals seemed to target victims in their teens and early twenties. In one case, extorting victims for an amount proportional to what sort of funds they might have; in the other case, targeting their Discord, YouTube (Google), and online games (Steam). Given the victimology, one has to wonder whether these criminal gangs are composed of people in similar age ranges, and if so, chose specific targeting and enticement methods they know would be highly effective against their peers.
Security practitioners advise people to keep their computers operating systems and applications up to date, to only use their latest versions, and to run security software from established vendors. And, for the most part: people do that, and it protects them from a wide variety of threats.
But when you start looking for sketchy sources to download from, things can take a turn for the worse. Security software does try to account for human behavior, but so do criminals who exploit concepts such as reputation and trust. When a close friend on Discord asks you to look at a program and warns that your antivirus software may incorrectly detect it as a threat, who are you going to believe, your security software or your friend? Programmatically responding to and defending against attacks on trust, which are essentially types of social engineering, can be difficult. In the type of scenarios explained here, it is user education and not computer code that may be the ultimate defense, but that is only if the security practitioners get the right messaging across.
The author would like to thank his colleagues Bruce P. Burrell, Alexandre Ct Cyr, Nick FitzGerald, Tom Foltn, Luk tefanko, and Righard Zwienenberg for their assistance with this article, as well as Neowin for publishing the original version of it.
Aryeh GoretskyDistinguished Researcher, ESET
Note: An earlier version of this article was published on tech news site Neowin.
View original post here:
You may not care where you download software from, but malware ... - We Live Security
- A teenager redrew the Alabama voting map and its now state law - The Guardian - December 2nd, 2025 [December 2nd, 2025]
- The new Debian Libre Live is all about free software, but I need my proprietary apps - ZDNET - December 2nd, 2025 [December 2nd, 2025]
- Full Bucket Music FB-02, free Synthesizer plugin is a Yamaha FB-01 FM synth emulation and editor - synth anatomy - December 2nd, 2025 [December 2nd, 2025]
- We've tested the best antivirus software to protect your computer and these are the 6 we recommend - Tom's Guide - November 28th, 2025 [November 28th, 2025]
- Chrystalleni Loizidou on meaningful participation in a free/libre technology funding programme - Association for Progressive Communications - November 28th, 2025 [November 28th, 2025]
- Why open source isnt free (and never was) - How-To Geek - November 18th, 2025 [November 18th, 2025]
- Affinity by Canva review: free is the magic number - Creative Bloq - November 18th, 2025 [November 18th, 2025]
- Trump administration ended free tax filing program. Heres where Oregonians can go instead - Oregon Capital Chronicle - November 18th, 2025 [November 18th, 2025]
- A lot of free PC software is risky. Use these alternatives instead - PCWorld - November 5th, 2025 [November 5th, 2025]
- Mega recall in the U.S. is official. - Toyota confirms free ECU software update for cameras not displaying image when reverse gear is engaged - Unin... - November 5th, 2025 [November 5th, 2025]
- Is Affinity's free Photoshop rival too good to be true? - Creative Bloq - November 3rd, 2025 [November 3rd, 2025]
- New features are coming to Pikmin 4! - Nintendo - November 3rd, 2025 [November 3rd, 2025]
- Avoid Purging Thousands of Emails With This Gmail Trick to Free Up Space - CNET - November 3rd, 2025 [November 3rd, 2025]
- 3,000+ YouTube videos deliver malware disguised as free software - Kurt the CyberGuy - October 31st, 2025 [October 31st, 2025]
- Affinity, the new version of the creative software, is now free of charge - PrintIndustry.news - October 31st, 2025 [October 31st, 2025]
- Affinity's creative software is free for everyone now - and I think that could be bad news for Adobe - TechRadar - October 31st, 2025 [October 31st, 2025]
- Affinitys new design platform combines everything into one app - The Verge - October 31st, 2025 [October 31st, 2025]
- Coros watches just got a major upgrade for free but I still want them to bring in this killer Garmin feature - Tom's Guide - October 31st, 2025 [October 31st, 2025]
- Still Using Windows 10? These Free Updates Will Help Keep Your PC Secure - CNET - October 28th, 2025 [October 28th, 2025]
- Whats Really Hiding Behind That Free Tutorial? Unlocking YouTube Ghost Network - The420.in - October 26th, 2025 [October 26th, 2025]
- Article | At least 25 states plan to cut off food aid benefits in November - POLITICO Pro - October 26th, 2025 [October 26th, 2025]
- Benghazi hosts intelligence chiefs and an interesting guest from South Africa - The Africa Report.com - October 26th, 2025 [October 26th, 2025]
- Hundreds of Syrians line up in Tripoli for free repatriation flights to Syria - The Arab Weekly - October 26th, 2025 [October 26th, 2025]
- Gulf of Sirte International Airport Reopens: A New Era for Libyan Tourism - Travel And Tour World - October 26th, 2025 [October 26th, 2025]
- The Attorney General Is A Defendant In A Torture Claim From A Libyan Military Commander That He Drafted - Politics Home - October 26th, 2025 [October 26th, 2025]
- Agreement signed to hold the First Libyan Conference for Laboratories and Radiology - libyaupdate.com - October 26th, 2025 [October 26th, 2025]
- EU reaffirms support for Libyan people in pursuit of peace, national unity - APAnews - Agence de Presse Africaine - October 26th, 2025 [October 26th, 2025]
- Commander-in-Chief Receives Elders and Notables from the Central Region, Affirms: "The Armed Forces Will Guarantee Any Agreement That Unites... - October 26th, 2025 [October 26th, 2025]
- Elforjani: Sirte is a symbol of liberation from terrorism and the General Command's support enhances the path of development - libyaupdate.com - October 26th, 2025 [October 26th, 2025]
- Voices from the sea, part three: how do exiled people experience their moment of rescue? - The Conversation - October 26th, 2025 [October 26th, 2025]
- Free access to Laba7 Shock Dyno Software announced - Automotive Powertrain Technology International - October 24th, 2025 [October 24th, 2025]
- Unleash Your Voice: The Best Free Text-To-Audio Software For 2025 - Harlem World Magazine - October 24th, 2025 [October 24th, 2025]
- How to Scan, Edit and Sign PDF Files on Your Phone or Tablet - The New York Times - October 23rd, 2025 [October 23rd, 2025]
- Unintended Acceleration Is The Last Thing A Supercharged Ford Mustang Needs - Yahoo! Autos - October 21st, 2025 [October 21st, 2025]
- Top Password Recovery Software for 2025: All the Best Services Picked by the Experts - TechRadar - October 19th, 2025 [October 19th, 2025]
- Windows 10 PC can't be upgraded? You have 5 options - and must act now - ZDNET - October 19th, 2025 [October 19th, 2025]
- Free Software Foundation Is Serious About The Librephone Project [To Bring Mobile Freedom To The Masses] - It's FOSS News - October 17th, 2025 [October 17th, 2025]
- FSF Librephone battles the proprietary binary blob - theregister.com - October 17th, 2025 [October 17th, 2025]
- World's first truly free software phone? That's the FSF's new 'long game' - ZDNET - October 17th, 2025 [October 17th, 2025]
- Belarusian authorities bought trace-free tracking software, an investigation finds - - October 17th, 2025 [October 17th, 2025]
- First convictions linked to Post Office Capture software referred for appeal - Free Press Series - October 17th, 2025 [October 17th, 2025]
- 10 open-source Windows apps I can't live without - and they're all free - ZDNET - October 15th, 2025 [October 15th, 2025]
- Borderlands 4: Gearbox Software Reveals Upcoming Content for the Game Including a DLC, a Free Event and More - IGN India - October 15th, 2025 [October 15th, 2025]
- Triple-zero software 'hanging by a thread' - Kyabram Free Press - October 15th, 2025 [October 15th, 2025]
- Free Up More Google Drive Space at No Cost With These Hacks - CNET - October 13th, 2025 [October 13th, 2025]
- 8 free Linux apps that make tricky tasks surprisingly easy - no command line required - ZDNET - October 13th, 2025 [October 13th, 2025]
- Running Out of Space on Your iPhone? Before You Delete Anything Try This - CNET - October 11th, 2025 [October 11th, 2025]
- 4 free video editors that make me question why I ever paid for Adobe software - XDA - October 9th, 2025 [October 9th, 2025]
- A 2TB PCIe 5.0 SSD for less than $140? This Crucial P510 Prime Big Deals Day discount with free Acronis software is exactly why I'm putting it... - October 9th, 2025 [October 9th, 2025]
- At 40 Years, Free Software Foundation Now Wants to 'Free Your Phone' - It's FOSS News - October 9th, 2025 [October 9th, 2025]
- 8 free Linux apps that are surprisingly useful - no command line required - ZDNET - October 4th, 2025 [October 4th, 2025]
- We Finally Have Free Anti-Robocall Tools That Work - The New York Times - October 4th, 2025 [October 4th, 2025]
- Illinois State Bar Association Offering Free Trust Accounting & Billing Software to All Members With Smokeball Bill - Illinois State Bar... - October 2nd, 2025 [October 2nd, 2025]
- Suffolk tech giant pledges $10m to give charities free software for life - Ipswich.co.uk - October 2nd, 2025 [October 2nd, 2025]
- Eventide Temperance Lite, "the world's first musical reverb plugin": free download for a limited time - synth anatomy - October 2nd, 2025 [October 2nd, 2025]
- Windows 10 extended support is now free, but only in Europe Microsoft capitulates on controversial $30 ESU price tag which remains firmly in place... - September 30th, 2025 [September 30th, 2025]
- You can now install iOS 26 on your iPhone: Everything to know about the free software update - Engadget - September 30th, 2025 [September 30th, 2025]
- Turns out, Microsoft will offer Windows 10 security updates for free until 2026but unfortunately not in the US or the UK - PC Gamer - September 30th, 2025 [September 30th, 2025]
- Free Alternatives to Photoshop and Word: How to Save on Software - 112.ua - September 30th, 2025 [September 30th, 2025]
- Delete those pricey programs with our four tips to help you find the best bargain software solutions - The Sun - September 30th, 2025 [September 30th, 2025]
- BlueCruise is Getting Better for Current Truck Owners - Ford From the Road - September 28th, 2025 [September 28th, 2025]
- Best typing tutor software of 2025 - TechRadar - September 25th, 2025 [September 25th, 2025]
- You can update your iPhone to iOS 26 for free right now - here's which models support it - ZDNET - September 25th, 2025 [September 25th, 2025]
- This is the best photo editing software to use in 2025 - Amateur Photographer - September 25th, 2025 [September 25th, 2025]
- From Abuse to Alignment: Why We Need Sustainable Open Source Infrastructure - Sonatype - September 25th, 2025 [September 25th, 2025]
- Think you've seen the weirdest place to play DOOM? Think again - Creative Bloq - September 23rd, 2025 [September 23rd, 2025]
- OpenSSF to freeloaders: Open source infra isn't free - theregister.com - September 23rd, 2025 [September 23rd, 2025]
- I transformed our LAN gaming setup with a mini PC and free software - XDA - September 21st, 2025 [September 21st, 2025]
- iOS 26 is ready to download: Everything to know about the free iPhone software update - Engadget - September 21st, 2025 [September 21st, 2025]
- Filmmakers - you can now storyboard your next movie totally free with this software - Yahoo! Tech - September 21st, 2025 [September 21st, 2025]
- Oak Creek Police Crime Analyst Wins Top International Award with Innovative Free Software Dashboard - Hoodline - September 21st, 2025 [September 21st, 2025]
- Molecularbytes Atomicreverbfree, a free algorithmic reverb for macOS and Windows - synth anatomy - September 19th, 2025 [September 19th, 2025]
- Meadows Introduces Free Imposition Software for Adobe InDesign - PRWeb - September 19th, 2025 [September 19th, 2025]
- Lucid just gave its EV owners a free dash cam mode and Tesla-style parking monitor all from a software update - TechRadar - September 19th, 2025 [September 19th, 2025]
- My Google Pixel just updated and is better than ever get your free software upgrade now - T3 - September 19th, 2025 [September 19th, 2025]
- NLSIU study hails Keralas KITE as key model for implementing Free and Open Source Software (FOSS) - The Times of India - September 19th, 2025 [September 19th, 2025]
- These are the top free Windows tools that I use on a daily basis to boost my productivity - Tom's Hardware - September 17th, 2025 [September 17th, 2025]
- iOS 26 is finally here: Everything to know about the free iPhone software update - Engadget - September 17th, 2025 [September 17th, 2025]
- When does iOS 26 come out? Date and time you can download the new iPhone operating system around the world - Fast Company - September 17th, 2025 [September 17th, 2025]
- Why Pie Is Becoming the UKs Go-To Free Tax Software in 2025 - The Globe and Mail - September 13th, 2025 [September 13th, 2025]