{"id":82185,"date":"2016-02-23T10:20:39","date_gmt":"2016-02-23T04:50:39","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=82185"},"modified":"2016-03-26T16:57:02","modified_gmt":"2016-03-26T11:27:02","slug":"potentially-unwanted-application-pua-a-digital-nuisance","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/potentially-unwanted-application-pua-a-digital-nuisance\/","title":{"rendered":"Potentially Unwanted Application (PUA) &#8211; A Digital Nuisance"},"content":{"rendered":"<p>This post aims to provide an insight to our readers about programs called Potentially Unwanted Applications, about what they are and how they can be a threat to our privacy and security.<\/p>\n<p><strong>What are Potentially Unwanted Applications?<\/strong><br \/>\nPotentially Unwanted Applications (PUA) are often bundled with genuine software that are freely available online and are usually sourced from shady, less popular or untrustworthy websites. PUAs mainly include spyware, adware, downloaders, etc. They are called so because they are often downloaded by the user erroneously or without making a conscious decision. This occurs mostly in cases where the user fails to read the software download agreement.<\/p>\n<p><strong>Why are Potentially Unwanted Applications unwanted?<br \/>\n<\/strong>PUAs are not necessarily harmful but their activities are considered so and may pose a threat to user privacy. Most of them are known to perform one or more of the following activities.<\/p>\n<ul>\n<li>Tracking user\u2019s location<\/li>\n<li>Collecting user\u2019s personal data and selling it to a third party<\/li>\n<li>Displaying ads based on the browsing habits of user<\/li>\n<li>Modifying browser settings like default search engine, home page, etc.<\/li>\n<li>Adds extensions to browser which modifies the browser settings<\/li>\n<li>Downloads malicious files from unknown and untrustworthy websites<\/li>\n<li>Misuse social networking sites data for user analysis<\/li>\n<li>Force user to complete survey which collects user\u2019s personal information<\/li>\n<\/ul>\n<p><strong>How do PUAs infiltrate your computer?<br \/>\n<\/strong>PUAs \u2018get\u2019 installed in system when a user fails to ignore them while downloading various software from untrusted websites. Below are listed the various scenarios where a PUA can gain entry into a computer.<\/p>\n<p><strong>1. Default options asking to install toolbar or extensions<br \/>\n<\/strong>The user visits various websites to download free software, screensavers, games, etc. All such freeware are usually bunched with multiple third party software. Sometimes, they provide \u2018Downloader\u2019 which downloads intended files along with other software. Below are some examples.<\/p>\n<p><strong>Scenario 1<br \/>\n<\/strong>Selecting the \u201cRecommended\u201d option during installing a free software, unwanted third party applications are installed by default. Figure 1 shows the installation of a PUA called BearShare. Once installed in the computer, it sets <em>Bearshare.net<\/em> as the default home page and adds <em>Wincore Mediabar<\/em> to the browser. And all this is done without the user consent. This PUA belongs to the <strong>BrowserModifier.KipodToolsCby<\/strong> family.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-82186\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-11.png\" alt=\"Figure 1\" width=\"538\" height=\"397\" \/><\/a><br \/>\nFigure 1<\/p>\n<p><strong>Scenario 2<br \/>\n<\/strong>In another scenario, as shown by Figure 2, two check boxes are pre-selected to set the default homepage and search engine to <em>ask.com.<\/em> This PUA belongs to the <strong>PUA.Mindsparki.Gen<\/strong> family.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-21.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-82187\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-21.png\" alt=\"Figure 2\" width=\"530\" height=\"435\" \/><\/a><br \/>\nFigure 2<\/p>\n<p><strong>2. Disguised as download links<br \/>\n<\/strong>Cyber criminals take advantage of ads shown on websites by displaying several fake download options. An unsuspecting user is most likely to click on such fake ads and this results in the installation of PUAs on their computer. Below are some examples.<\/p>\n<p><strong>Scenario 1<br \/>\n<\/strong>The \u2018Download\u2019 link highlighted below masks itself as an actual link to download a game. But, when the user clicks on it, a compressed executable file containing PUAs gets downloaded on the computer.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-31.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-82188\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-31.png\" alt=\"Figure 3\" width=\"749\" height=\"538\" \/><\/a><br \/>\nFigure 3<\/p>\n<p><strong>Scenario 2<br \/>\n<\/strong>In another scenario, similar to the above one, when a user searches for downloading free MP3 songs, the site displays multiple ads that appear as actual download links that confuse the user.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-41.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-82189\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-41.png\" alt=\"Figure 4\" width=\"757\" height=\"504\" \/><\/a><br \/>\nFigure 4<\/p>\n<p>When the user clicks on the fake download button, they get redirected to another site, which prompts them to download a PUA. If the user proceeds further and clicks on the download link, the browser shows a prompt to add a browser extension which ultimately modifies the browser settings.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-51.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-82190\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-51.png\" alt=\"Figure 5\" width=\"705\" height=\"339\" \/><\/a><br \/>\nFigure 5<\/p>\n<p><strong>3. Executable files downloaded instead of the intended media file<br \/>\n<\/strong>In some cases, users download PUAs instead of what they intended to, such as a movie or a song. While the user is under the impression they have downloaded a file with extensions .MP3, .MP4, .FLV, .WAV etc., they actually end up downloading a .EXE (executable) file.<\/p>\n<p>If the \u2018Hide extension of known file types\u2019 option is selected, then the executable file may appear as a media file as shown in figure 6.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-61.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-82191\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-61.png\" alt=\"Figure 6\" width=\"697\" height=\"281\" \/><\/a><br \/>\nFigure 6<\/p>\n<p>On the other hand, if this option is unchecked, then the file shows up as an executable instead of a movie file (Figure 7).<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-71.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-82192\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-71.png\" alt=\"Figure 7\" width=\"508\" height=\"321\" \/><\/a><br \/>\nFigure 7<\/p>\n<p>In another example, the user intends to download a game setup but instead, ends up downloading an executable file of a smaller size.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-82193\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-8.png\" alt=\"Figure 8\" width=\"531\" height=\"98\" \/><\/a><br \/>\nFigure 8<\/p>\n<p>Clicking on the file then installs other unwanted software.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-82194\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-9.png\" alt=\"Figure 9\" width=\"689\" height=\"113\" \/><\/a><br \/>\nFigure 9<\/p>\n<p><strong>4. Taking advantage of users\u2019 neglect towards the Privacy Policy and License Agreement<br \/>\n<\/strong><\/p>\n<p>Each software is bound by an End User License Agreement (EULA) &#8211; an agreement between the software publisher and user of the software,. The agreement establishes the user&#8217;s right to the use of software. In most cases, users ignore to read the agreement thoroughly and proceeds to the installation of the software. EULAs are lengthy documents and that is what deters users from reading it. Taking advantage of this, software publishers add unusual clauses to agreements which clearly specify the security risks involved in installing a particular software. And this makes the user solely responsible for any drawbacks of using the software. Below is an example that explains this scenario.<\/p>\n<p><strong>Scenario 1<br \/>\n<\/strong>The below License Agreement clearly states that the software is vulnerable to security risks and should not be considered secure. It further mentions issues about privacy and potential exposure to malicious attacks like spoofing, spamming, breaking passwords, harassment, forgery, etc.<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-10.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-82195\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-10.png\" alt=\"Figure 10\" width=\"479\" height=\"366\" \/><\/a><\/strong><br \/>\nFigure 10<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-111.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-82196\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-111.png\" alt=\"Figure 11\" width=\"459\" height=\"351\" \/><\/a><br \/>\nFigure 11<\/p>\n<p><strong>Unwanted activities of PUAs<br \/>\n<\/strong>Following are various examples of activities performed by various PUAs.<\/p>\n<p><strong>Scenario 1<br \/>\n<\/strong>A PUA modifies the default home page to <em>home.search.com<\/em> which gets redirected to <em>sweetpacks-search.com. <\/em>The site shows unwanted ads, clicking on which triggers the download of another rogue application.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-12.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-82197\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-12.png\" alt=\"Figure 12\" width=\"558\" height=\"394\" \/><\/a><br \/>\nFigure 12<\/p>\n<p style=\"text-align: left;\"><strong>Scenario 2<br \/>\n<\/strong>A PUA adds a toolbar to the browser to provide emoticons (smileys) for Instant Messaging applications<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-13.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-82203\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-13.png\" alt=\"Figure 13\" width=\"718\" height=\"203\" \/><\/a><br \/>\nFigure 13<\/p>\n<p><strong>Scenario 3<br \/>\n<\/strong>Before letting the user install the <em>\u201cMP3 cutter and joiner\u201d<\/em> application, the PUA asks for personal information related to income, education, and other irrelevant data. This information could be sold in online black market for malicious purpose.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-14a.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-82204 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-14a.png\" alt=\"Figure 14a\" width=\"504\" height=\"391\" \/><\/a><br \/>\nFigure 14 (a)<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-14b.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-82198\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-14b.png\" alt=\"Figure 14b\" width=\"503\" height=\"395\" \/><\/a><br \/>\nFigure 14 (b)<\/p>\n<p><strong>Scenario 4<br \/>\n<\/strong>A PUA adds an extension to the browser to monitor its activity. This occurs when the user clicks on a fake download link intending to download a song or a video from a website.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-15.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-82199\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-15.png\" alt=\"Figure 15\" width=\"830\" height=\"399\" \/><\/a><br \/>\nFigure 15<\/p>\n<p><strong>Detection Statistics<br \/>\n<\/strong>Figure 16 represents the Quick Heal detection statistics for some of the interesting PUAs discussed above, from January 2015 to January 2016.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-16.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-82200\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-16.png\" alt=\"Figure 16\" width=\"663\" height=\"409\" \/><\/a><br \/>\nFigure 16<\/p>\n<p><strong>Preventive Measures<\/strong><\/p>\n<p>1. While downloading applications or files from untrustworthy and unknown websites, verify whether the downloaded application installs what you had intended to.<\/p>\n<p>2. Read and understand the privacy policy and risks involved in downloading any software.<\/p>\n<p>3. Be careful while clicking on download links.<\/p>\n<p>Read all browser extension permissions carefully. If they seek any unwanted or suspicious permissions, avoid them. Below is list of permissions that you need to be careful of:<\/p>\n<ul>\n<li>Access to all data on your computer and the websites that you visit<\/li>\n<li>Access to read, request or modify data from every page you visit<\/li>\n<li>Access to browsing history and your physical location<\/li>\n<\/ul>\n<p>4. Never respond to online surveys that ask for personal or financial information.<\/p>\n<p>5. Verify file extensions after downloading to avoid running executables assuming that they are a media file. Disable \u201c<em>Hide extensions for known file types<\/em>\u201d option in<em> Tools menu &gt; Folder Option &gt; View Tab from Explorer.<\/em><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-17.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-82201\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-17.png\" alt=\"Figure 17\" width=\"396\" height=\"482\" \/><\/a><br \/>\nFigure 17<\/p>\n<p>Quick Heal\u2019s Antimalware mechanism detects and cleans most PUAs. To start an AntiMalware scan on your PC, right click on Quick Heal Antivirus icon in the quick launch tray and select \u201c<em>Launch Antimalware<\/em>\u201d. Click on \u201c<em>Scan Now<\/em>\u201d to start scanning.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-18.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-82202\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/02\/Figure-18.png\" alt=\"Figure 18\" width=\"577\" height=\"376\" \/><\/a><br \/>\nFigure 18<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #666666;\">ACKNOWLEDGMENT<\/span><\/p>\n<p><strong>Subject Matter Experts:<\/strong><\/p>\n<ul>\n<li>Tejas Girme<\/li>\n<li>Bharat Kale<\/li>\n<\/ul>\n<p>&#8211; Threat Research and Response Team.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This post aims to provide an insight to our readers about programs called Potentially Unwanted Applications, about what they are and how they can be a threat to our privacy and security. What are Potentially Unwanted Applications? Potentially Unwanted Applications (PUA) are often bundled with genuine software that are freely available online and are usually [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":82395,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[285,164,289],"tags":[25,1207,1208,613],"class_list":["post-82185","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applications","category-cyber-crime","category-cyber-safety","tag-phishing","tag-potentially-unwanted-application-pua","tag-pua","tag-scam"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/82185"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=82185"}],"version-history":[{"count":2,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/82185\/revisions"}],"predecessor-version":[{"id":82369,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/82185\/revisions\/82369"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/82395"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=82185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=82185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=82185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}