You may not care where you download software from, but malware … – We Live Security
Why do people still download files from sketchy places and get compromised as a result?
One of the pieces of advice that security practitioners have been giving out for the past couple of decades, if not longer, is that you should only download software from reputable sites. As far as computer security advice goes, this seems like it should be fairly simple to practice.
But even when such advice is widely shared, people still download files from distinctly nonreputable places and get compromised as a result. I have been a reader of Neowin for over a couple of decades now, and a member of its forum for almost that long. But that is not the only place I participate online: for a little over three years, I have been volunteering my time to moderate a couple of Reddits forums (subreddits) that provide both general computing support as well as more specific advice on removing malware. In those subreddits, I have helped people over and over again as they attempted to recover from the fallout of compromised computers. Attacks these days are usually financially motivated, but there are other unanticipated consequences as well. I should state this is not something unique to Reddits users. These types of questions also come up in online chats on various Discord servers where I volunteer my time as well.
One thing I should point out is that both the Discord and Reddit services skew to a younger demographic than social media sites such as Twitter and Facebook. I also suspect they are younger than the average WeLiveSecurity reader. These people grew up digitally literate and have had access to advice and discussions about safe computing practices available since pre-school.
Despite having the advantage of having grown up with computers and information on securing them, how is it that these people have fallen victim to certain patterns of attacks? And from the information security practitioners side, where exactly is the disconnect occurring between what were telling people to do (or not do, as the case may be), and what they are doing (or, again, not doing)?
Sometimes, people will openly admit that they knew better but just did a dumb thing, trusting the source of the software when they knew it was not trustworthy. Sometimes, though, it appeared trustworthy, but was not. And at other times, they had very clearly designated the source of the malware as trustworthy even when it was inherently untrustworthy. Let us take a look at the most common scenarios that lead to their computers being compromised:
I would point out that these are not the only means by which people were tricked into running malware. WeLiveSecurity has reported on several notable cases recently that involved deceiving the user:
Do any of these scenarios seem similar to each other in any way? Despite the various means of receiving the file (seeking out versus being asked, using a search engine, video site or piracy site, etc.) they all have one thing in common: they exploited trust.
When security practitioners talk about downloading files only from reputable websites, it seems that we are often only doing half of the job of educating the public about them, or maybe even a little less, for that matter: weve done a far better job of telling people what kind of sites to go to (reputable ones, obviously) without explaining what makes a site safe to download from in the first place. So, without any fanfare, here is what makes a site reputable to download software from:
And thats it! In todays world of software, the publishers site could be a bit more flexible than what it historically has been. Yes, it could be a site with the same domain name as the publishers site, but it could also be that the files are located on GitHub, SourceForge, hosted on a content delivery network (CDN) operated by a third party, and so forth. That is still the publishers site, as it was explicitly uploaded by them. Sometimes, publishers provide additional links to additional download sites, too. This is done for a variety of reasons, such as to defray hosting costs, to provide faster downloads in different regions, to promote the software in other parts of the world, and so forth. These, too, are official download sites because they are specifically authorized by the author or publisher.
There are also sites and services that act as software repositories. SourceForge and GitHub are popular sites for hosting open-source projects. For shareware and trial versions of commercial software, there are numerous sites that specialize in listing their latest versions for downloading. These download sites function as curators for finding software in one place, which makes it easy to search and discover new software. In some instances, however, they also can have a darker side: Some of these sites place software wrappers around files downloaded from them that can prompt to install additional software besides the program you were looking for. These program bundlers may do things completely unrelated to the software they are attached to and may, in fact, install potentially unwanted applications (PUAs) on to your computer.
Other types of sites to be aware of are file locker services such as Box, Dropbox, and WeTransfer. While these are all very legitimate file sharing services, they can be abused by a threat actor: people may assume that because the service is trusted, programs downloaded from them are safe. Conversely, IT departments checking for the exfiltration of data may ignore uploads of files containing personal information and credentials because they are known to be legitimate services.
When it comes to search engines, interpreting their results can be tricky for the uninitiated, or people who are just plain impatient. While the goal of any search enginewhether it is Bing, DuckDuckGo, Google, Yahoo, or another is to provide the best and most accurate results, their core businesses often revolve around advertising. This means that the results at the top of the page in the search engine results are often not the best and most accurate results, but paid advertising. Many people do not notice the difference between advertising and search engine results, and criminals will take advantage of this through malvertising campaigns where they buy advertising space to redirect people to websites used for phishing and other undesirable activities, and malware. In some instances, criminals may register a domain name using typosquatting or a similar-looking top-level domain to that of the software publisher in order to make their website address less noticeable at first glance, such as example.com versus examp1e.com (note how the letter l has been released by the number 1 in the second domain).
I will point out that there are many legitimate, safe places to go on the internet to download free and trial versions of software, because they link to the publishers own downloads. An example of this is Neowin, for whom the original version of this article was written. Neowins Software download section does not engage in any type of disingenuous behavior. All download links either go directly to the publishers own files or to their web page, making Neowin a reliable source for finding new software. Another reputable site that links directly to software publishers downloads is MajorGeeks, which has been listing them on a near-daily basis for over two decades.
While direct downloading ensures that you get software from the company (or individual) that wrote it, that does not necessarily mean it is free of malware: there have been instances where malicious software was included in a software package, unintentionally or otherwise. Likewise, if a software publisher bundles potentially unwanted applications or adware with their software, then you will still receive that with a direct download from their site.
Special consideration should be applied to the various application software stores run by operating system vendors, such as the Apple App Store, the Google Play store, Microsofts Windows App stores, and so forth. One might assume these sites to be reputable download sites, and for the most part they are exactly that, but there is no 100% guarantee: Unscrupulous software authors have circumvented app stores vetting processes to distribute software that invade peoples privacy with spyware, display egregious advertisements with adware, and engage in other unwanted behaviors. These app stores do have the ability to de-list such software from their stores as well as remotely uninstall it from afflicted devices, which offers some remedy; however, this could be days or weeks (or more) after the software has been made available. Even if you only download apps from the official store, having security software on your device to protect it is a must.
Device manufacturers, retailers, and service providers may add their own app stores to devices; however, these may not have the ability to uninstall apps remotely.
With all of that in mind, you are probably wondering exactly what the malware did on the affected computers. While there were different families of malware involved, each of which having its own set of actions and behaviors, there were two that basically stood out because they were repeat offenders, which generated many requests for assistance.
And just in case you were wondering: I have never heard of anyone successfully decrypting their files after paying the ransom to the STOP/DJVU criminals. Your best bet at decrypting your files is to back them up in case a decryptor is ever released.
As far as its functionality goes, Redline Stealer performs some fairly common activities for information-stealing malware, such as collecting information about the version of Windows the PC is running, username, and time zone. It also collects some information about the environment where it is running, such as display size, the processor, RAM, video card, and a list of programs and processes on the computer. This may be to help determine if it is running in an emulator, virtual machine, or a sandbox, which could be a warning sign to the malware that it is being monitored or reverse engineered. And like other programs of its ilk, it can search for files on the PC and upload them to a remote server (useful for stealing private keys and cryptocurrency wallets), as well as download files and run them.
But the primary function of an information stealer is to steal information, so with that mind, what exactly does the Redline Stealer go after? It steals credentials from many programs including Discord, FileZilla, Steam, Telegram, various VPN clients such as OpenVPN and ProtonVPN), as well as cookies and credentials from web browsers such as Google Chrome, Mozilla Firefox, and their derivatives. Since modern web browsers do not just store accounts and passwords, but credit card info as well, this can pose a significant threat.
Since this malware is used by different criminal gangs, each of them might focus on something slightly different. In these instances, though, the targets were most often Discord, Google, and Steam accounts. The compromised Discord accounts were used to spread the malware to friends. The Google accounts were used to access YouTube and inflate views for certain videos, as well as to upload videos advertising various fraudulent schemes, causing the account to be banned. The Steam accounts were checked for games that had in-game currencies or items which could be stolen and used or resold by the attacker. These might seem like odd choices given all the things which can be done with compromised accounts, but for teenagers, these might be the most valuable online assets they possess.
To summarize, here we have two different types of malware that are sold as services for use by other criminals. In these instances, those criminals seemed to target victims in their teens and early twenties. In one case, extorting victims for an amount proportional to what sort of funds they might have; in the other case, targeting their Discord, YouTube (Google), and online games (Steam). Given the victimology, one has to wonder whether these criminal gangs are composed of people in similar age ranges, and if so, chose specific targeting and enticement methods they know would be highly effective against their peers.
Security practitioners advise people to keep their computers operating systems and applications up to date, to only use their latest versions, and to run security software from established vendors. And, for the most part: people do that, and it protects them from a wide variety of threats.
But when you start looking for sketchy sources to download from, things can take a turn for the worse. Security software does try to account for human behavior, but so do criminals who exploit concepts such as reputation and trust. When a close friend on Discord asks you to look at a program and warns that your antivirus software may incorrectly detect it as a threat, who are you going to believe, your security software or your friend? Programmatically responding to and defending against attacks on trust, which are essentially types of social engineering, can be difficult. In the type of scenarios explained here, it is user education and not computer code that may be the ultimate defense, but that is only if the security practitioners get the right messaging across.
The author would like to thank his colleagues Bruce P. Burrell, Alexandre Ct Cyr, Nick FitzGerald, Tom Foltn, Luk tefanko, and Righard Zwienenberg for their assistance with this article, as well as Neowin for publishing the original version of it.
Aryeh GoretskyDistinguished Researcher, ESET
Note: An earlier version of this article was published on tech news site Neowin.
View original post here:
You may not care where you download software from, but malware ... - We Live Security
- Why Pie Is Becoming the UKs Go-To Free Tax Software in 2025 - The Globe and Mail - September 13th, 2025 [September 13th, 2025]
- iOS 26: What to know about the free iPhone software update ahead of the Apple event today - Engadget - September 11th, 2025 [September 11th, 2025]
- I built a photo editing workflow with nothing but free and open-source tools - xda-developers.com - September 9th, 2025 [September 9th, 2025]
- TapeFi Stop, free vinyl stop simulator plugin for macOS and Windows - synth anatomy - September 9th, 2025 [September 9th, 2025]
- Farming Simulator 25 Releases Third Free Update - Bleeding Cool News - September 6th, 2025 [September 6th, 2025]
- One of the biggest names in video editing is coming to smartphones and it's free. Meet Premiere Pro for mobile - Digital Camera World - September 5th, 2025 [September 5th, 2025]
- Microsoft wants to give US government Copilot for free - theregister.com - September 3rd, 2025 [September 3rd, 2025]
- I Thought My Gmail Inbox Was Toast. Then I Got Back 15GB of Free Storage - CNET - September 3rd, 2025 [September 3rd, 2025]
- The Truth About KMSPico Downloads: Risks and Better Alternatives - inkl - September 3rd, 2025 [September 3rd, 2025]
- Artistapirata Download Free Programs, Games, and Software in 2026 - nerdbot - August 29th, 2025 [August 29th, 2025]
- Cognyte Software Ltd. stock prediction for this week - July 2025 Closing Moves & Free Low Drawdown Momentum Trade Ideas - Newser - August 29th, 2025 [August 29th, 2025]
- Analyzing Upland Software Inc. with multi timeframe charts - Forecast Cut & Free Growth Oriented Trading Recommendations - Newser - August 29th, 2025 [August 29th, 2025]
- Can Upland Software Inc. recover in the next quarter - Options Play & Free Growth Oriented Trading Recommendations - Newser - August 27th, 2025 [August 27th, 2025]
- Custom watchlist performance reports with Asure Software Inc. - Weekly Market Summary & Reliable Breakout Stock Forecasts - Newser - August 27th, 2025 [August 27th, 2025]
- Is Paycom Software Inc. forming a reversal pattern - Trend Reversal & Free Reliable Trade Execution Plans - Newser - August 27th, 2025 [August 27th, 2025]
- What the charts say about CyberArk Software Ltd. today - Weekly Volume Report & Free Reliable Trade Execution Plans - Newser - August 26th, 2025 [August 26th, 2025]
- Is this a good reentry point in Guidewire Software Inc. - 2025 Market Sentiment & Free AI Powered Buy and Sell Recommendations - Newser - August 26th, 2025 [August 26th, 2025]
- Trend analysis for OneStream Software LLC this week - Weekly Trend Summary & Free Expert Approved Momentum Trade Ideas - Newser - August 24th, 2025 [August 24th, 2025]
- Detecting price anomalies in Paycom Software Inc. with AI - July 2025 Volume & Free Community Supported Trade Ideas - Newser - August 24th, 2025 [August 24th, 2025]
- Using AI based signals to follow Unity Software Inc. - July 2025 Breakouts & Free Verified High Yield Trade Plans - Newser - August 24th, 2025 [August 24th, 2025]
- Best graphic design software of 2025: Top picks tested for creative professionals and beginners - TechRadar - August 22nd, 2025 [August 22nd, 2025]
- Garmin Fenix 8 and Venu X1 get free software update that includes top features for runners and triathletes - Tom's Guide - August 22nd, 2025 [August 22nd, 2025]
- 6 Free and Open-Source Software for Creating Stunning Presentations - How-To Geek - August 18th, 2025 [August 18th, 2025]
- "It's one of the most powerful software sound design tools on earth and it's free": Try out this modular audio processing playground used... - August 18th, 2025 [August 18th, 2025]
- BetBlocker and ROGA Partner to Expand Free Gambling Blocker Access in the U.S. - European Gaming Industry News - August 14th, 2025 [August 14th, 2025]
- Hyundai & Kia thefts are down, Camaro ZL1 thefts are up, and a software glitch may be to blame. - wfmynews2.com - August 14th, 2025 [August 14th, 2025]
- There Is No Such Thing as Free Technology Software Solutions - ICTworks - August 12th, 2025 [August 12th, 2025]
- UnplugRed ModMan, a free perlin noise modulation plugin for mac, Linux and Windows - synth anatomy - August 12th, 2025 [August 12th, 2025]
- HY-Plugins HY-MBMFX3, multiband multi-FX plugin with modulation & free version - synth anatomy - August 7th, 2025 [August 7th, 2025]
- Choose the right software for Making Tax Digital for Income Tax - GOV.UK - August 3rd, 2025 [August 3rd, 2025]
- Best free PDF editor of 2025: We tested out these completely free to use apps - TechRadar - August 1st, 2025 [August 1st, 2025]
- D&D is 'here to earn your trust, not ask for it', starting with making Beyond's maps software free, brushing up the SRD, and sharing 'third-party... - August 1st, 2025 [August 1st, 2025]
- The Best Video Editing Software We've Tested (July 2025) - PCMag - July 27th, 2025 [July 27th, 2025]
- Download iOS 26 now and upgrade your iPhone to the Liquid Glass look for free - T3 - July 27th, 2025 [July 27th, 2025]
- What drives Smith Micro Software Inc. stock price - Free Smart Trading Workshop - Autocar Professional - July 24th, 2025 [July 24th, 2025]
- I've tested a bunch of PDF editors. These are the best - PCWorld - July 22nd, 2025 [July 22nd, 2025]
- V S Achuthanandan: From the freedom struggle to free software, to bringing MGR and Ilaiyaraaja he always thought of the people - The Indian Express - July 22nd, 2025 [July 22nd, 2025]
- Free, open-source software to reduce the mental workload of organic producers - Hortidaily - July 22nd, 2025 [July 22nd, 2025]
- Is OneStream Software LLC a good long term investment - Free Real-Time Stock Data - Autocar Professional - July 20th, 2025 [July 20th, 2025]
- How the Free Software Foundation Battles the LLM Bots - StartupNews.fyi - July 20th, 2025 [July 20th, 2025]
- How the Free Software Foundation Battles the LLM Bots - The New Stack - July 20th, 2025 [July 20th, 2025]
- Smith Micro Software Inc. Stock Analysis and Forecast - Free Risk Assessment Services - jammulinksnews.com - July 20th, 2025 [July 20th, 2025]
- Where Could Newgen Software Technologies Limited (540900) Be Headed - Free Trend-Following Techniques - jammulinksnews.com - July 20th, 2025 [July 20th, 2025]
- Where Could R S Software (India) Limited (RSSOFTWARE) Be Headed - Free Market Volatility Navigation Tips - jammulinksnews.com - July 20th, 2025 [July 20th, 2025]
- Unity Software Inc. Stock Analysis and Forecast - Free Stock Selection - jammulinksnews.com - July 20th, 2025 [July 20th, 2025]
- Marin Software Incorporated Stock Analysis and Forecast - Free Daily Trading Room Entry - jammulinksnews.com - July 20th, 2025 [July 20th, 2025]
- Where Could Integra Telecommunication and Software Limited (536868) Be Headed - Free Capital Allocation Plans - jammulinksnews.com - July 20th, 2025 [July 20th, 2025]
- Macro Trends and Their Impact on B2B Software Technologies Limited (531268) - Free Daily Trading Room Entry - jammulinksnews.com - July 20th, 2025 [July 20th, 2025]
- Macro Trends and Their Impact on Oracle Financial Services Software Limited (OFSS) - Free Trend-Following Techniques - jammulinksnews.com - July 20th, 2025 [July 20th, 2025]
- Compucom Software Limited (532339)s Trend in 2025 - Free Trend-Following Techniques - jammulinksnews.com - July 20th, 2025 [July 20th, 2025]
- PTC launches aerospace & defense startup program with free software By Investing.com - Investing.com India - July 16th, 2025 [July 16th, 2025]
- Here's how a free software upgrade made the Sonos Ace worth their price tag - ZDNet - July 16th, 2025 [July 16th, 2025]
- Lucid to add hands-free driving features via software update - StreetInsider - July 16th, 2025 [July 16th, 2025]
- Free Software in India: How FSMK is Building Peoples Tech Future - Deccan Herald - July 14th, 2025 [July 14th, 2025]
- I started managing my kitchen with this free open-source software and Im not going back - XDA - July 14th, 2025 [July 14th, 2025]
- 15 free photo, design, video editing and productive software that are even better than paid ones - Hindustan Times - July 6th, 2025 [July 6th, 2025]
- CineStills New Film Scan Conversion Software is Fast, Accurate, and Free - PetaPixel - July 4th, 2025 [July 4th, 2025]
- The startup on a mission to free software engineers from batched software testing: Signadot - StartUp Beat - July 4th, 2025 [July 4th, 2025]
- How to get free software from yesteryear's IT crowd trick code into thinking it's running on a rival PC - theregister.com - June 28th, 2025 [June 28th, 2025]
- The best free CRM software of 2025: Expert tested - ZDNet - June 28th, 2025 [June 28th, 2025]
- I started managing my finances with this free accounting software and I'm not going back - XDA - June 28th, 2025 [June 28th, 2025]
- Feds question Ford in hands-free driving investigation - TechCrunch - June 26th, 2025 [June 26th, 2025]
- City of Sterling Heights, Velocity partner to support small businesses - Macomb Daily - June 22nd, 2025 [June 22nd, 2025]
- I've tested and used a lot of CAD software, but this free app is one of the best - Creative Bloq - June 20th, 2025 [June 20th, 2025]
- No, That TikTok Video Won't Help You Get Free Software - Forbes - May 30th, 2025 [May 30th, 2025]
- Lian Lis tube-hiding Hydroshift II LCD-C AIO cooler adds a rotating dial for software-free display and RGB control - Tom's Hardware - May 30th, 2025 [May 30th, 2025]
- I've been using Wixel, the new free design platform from Wix, and it's surprisingly good - Creative Bloq - May 19th, 2025 [May 19th, 2025]
- Best Adobe Photoshop alternative of 2025: Avoid Creative Cloud subscriptions with these top apps - TechRadar - May 17th, 2025 [May 17th, 2025]
- Tether Awards Another $100,000 Grant to BTCPay Server Foundation, Reaffirming Its Commitment to Free and Open Source Software Development - Tether.io - May 11th, 2025 [May 11th, 2025]
- Apple About To Make Unexpected Free Offer To All iPhone 13 Users - Forbes - May 11th, 2025 [May 11th, 2025]
- How to Use the A.I.-Powered Writing Tools on Your Phone - The New York Times - May 11th, 2025 [May 11th, 2025]
- 10 Best 3D Modeling Software That I Reviewed (and Loved) - Learn Hub | G2 - May 11th, 2025 [May 11th, 2025]
- I have tried a lot of different expense tracker software, and I keep coming back to this free, open-source tool - XDA - May 11th, 2025 [May 11th, 2025]
- Fantastic (free) plugins and how to use them: Full Bucket FB-3300 - MusicRadar - April 27th, 2025 [April 27th, 2025]
- The best free software for your gaming PC in 2025: programs you need to know - TechRadar - April 27th, 2025 [April 27th, 2025]
- postmarketOS on developing free and open source software to extend the life of consumer electronics - Association for Progressive Communications - April 27th, 2025 [April 27th, 2025]
- Take it from an expert: This is the best Windows backup software - pcworld.com - April 27th, 2025 [April 27th, 2025]
- WeThinkCode_ Tuition-Free Two years Software Development Programme 2025 for young Africans in South Africa. - Opportunities For Africans - April 27th, 2025 [April 27th, 2025]
- Samsung Galaxy handsets could get a massive free software upgrade as soon as this summer - MSN - April 14th, 2025 [April 14th, 2025]
- A Free Software Program Helped Create This Oscar-Winning Movie And Thats a Big Deal - Collider - April 8th, 2025 [April 8th, 2025]