Spyware is unwanted software, a type of malicious software or malware, designed to expose sensitive information, steal internet usage data, gain access to or damage your computing device.
Any software downloaded to a user's device without authorization can be classified as spyware. Even spyware programs installed for innocuous reasons often violate end user privacy agreements and have the potential for abuse.
Spyware is a cyber threat, primarily due to the risk of exposing personal information, credit card numbers, protected health information (PHI), keystrokes, personally identifiable information (PII) or login credentials.
In its least damaging form, spyware runs in the background creating unwanted CPU activity, disk usage, hindered Internet connections, stability issues, application freezes, failure to boot and system-wide crashes.
These infects may not be evident to users who assume performance issues are related to faulty or outdated software, installation problems or a different malware infection. This can result in technical support costs and users buying a new computer due to their existing system becoming too slow.
More aggressive forms of spyware reset browser homepages, open pop-up ads, redirect web searches and impact browser security.
At its most damaging, spyware tracks all computer related activity, exposes sensitive data, password, credit card numbers, banking details aiding in identity theft and corporate espionage or additional cyber attacks.
Some types of spyware will disable firewalls and antivirus software, reduce browser security settings and open up new attack vectors. Aggressive variants aim to disable or remove competing spyware programs to decrease the likelihood the victim will take action or invest in a spyware removal tool.
Spyware can infect PCs, Macs, iOS, Android, Unix and many other operating systems, with the Microsoft Windows operating system representing the largest cybersecurity risk due to the majority of spyware creators targeting those machines. This has been driven by Window's widespread popularity over Apple and other Unix based operating systems.
Spyware is distributed in a number of ways.
A common method is to trick users into visiting a malicious website, through email, text messages, pop-ups or ads.
Users can even become infected when they take no action. In some situations, infected ads are delivered to would-be victims via a legitimate website in a practice known as malvertising.
Cybercriminals may distribute spyware via social engineering, phishing or spear phishing emails designed to look like they originate from a trusted source.
Or users might download legitimate software with spyware bundled with it, such as when mobile spyware is bundled in with legitimate apps and slips through Google and Apple's screening processes, ending up on the Google Play or App Store.
It's important to understand that spyware doesn't necessarily spread in the same way as other types of malware or computer worms. In general, spyware is not concerned with transmitting or copying itself to other devices.
Rather spyware installs itself by deceiving the user, bundling itself with desirable software or by exploiting vulnerabilities in web browsers and operating systems. Internet Explorer is a frequent target due to its popularity, history of security issues, deep integration with the Windows operating system and Browser Helper Objects which allow attackers to modify the browser's behavior. These vulnerabilities are often well-known, patched and listed on CVE.
Spyware can be classified into nine categories:
As the threat of spyware has increased, so too have the number of techniques to counteract it. Some best practices include:
One important, often overlooked part of preventing spyware infections is vendor risk management. Your internal security standards are only as good as your worst service provider's, just look at what happened to Target when one of their HVAC vendors was infiltrated. Third-party vendors introduce third-party risk and fourth-party risk that you need to monitor and where possible mitigate.
Start by developing a vendor management policy, third-party cyber management framework and vendor risk assessment questionnaire template. If you don't have the expertise internally, consider investing in vendor risk management software that can help you automate vendor risk management, rate your vendors against 50+ criteria and provide a security rating so you know who your most at risk vendors are. Information risk management can't stop with your organization.
Spyware can be difficult to detect as it is designed to be deceptive and hard to find. Often the first indication of spyware infections is reduced processing power or Internet speed. For mobile spyware, unexplained data usage and reduced battery life.
Anti-spyware programs exist to:
They do this by looking at the contents of the Windows registry, operating system files, installed programs and for behavioral signatures that match known spyware.
These tools frequently update their database of threats to keep up with new spyware cybercriminals create.
Further, ISPs and network administrators may use firewalls and web proxies to block access to websites known to install spyware, monitor the flow of information going to and from a networked computer and install hosts files to prevent computers from connecting to spyware-related web addresses.
Another option is to reset the computer to factory settings, this approach requires important data to be backed up and configuration management.
We're experts in data breaches and data leaks, our research has been featured in the New York Times, Wall Street Journal, Bloomberg, Washington Post, Forbes, Reuters and Techcrunch.
UpGuard Vendor Risk can minimize the amount of time your organization spends managing third-party relationships by automating vendor questionnaires and continuously monitoring your vendors' security posture over time while benchmarking them against their industry.