Lavasoft News - August 2007

Lavasoft News - August 2007

You won’t want to miss the scoop we have for you in this issue of LN! September is ushering in a new era at Lavasoft as we reaffirm our commitment to providing you with the tools you need to safeguard your online information. Read all about it in our article on Lavasoft’s release of three new privacy tools. Developments are ahead within the company itself, as well, as we look towards the future of malware detection, removal, and protection. Security guru Joe Wells has been welcomed to the team, and in this issue, we’re introducing him to all of you Lavasoft News readers.

As always, a continuation of our commitment to your online security is to bring you reports and advice on the latest threats you’re countering online. We have fresh security updates on two dreaded Internet hazards - learn how to beat Zlob Trojans that pose as codecs needed to download videos, and how to make sure you don’t become a victim of the spam scams taking over e-mail inboxes across the globe.

From last month’s issue of LN, we’d like to thank all of our “green-minded” PC users with an update on the Lavasoft tree planting challenge. If you want to comment on an article you see in LN or have a topic you would like us to cover, write to

News from Lavasoft

Lavasoft Introduces New Privacy Tools
Lavasoft has released three new products to ensure that you have the necessary tools to secure your digital files and documents. Find out the key features of Lavasoft’s new Digital Lock, File Shredder, and Privacy Toolbox.

arrow Read more

Meet Joseph Wells – the Newest Member of the Lavasoft Team
We had the chance to ask the security software visionary and newly appointed member of Lavasoft’s management team, Joseph Wells, about his start in the industry and views on changes in online security.

arrow Read more

Defeating the Ever-Present Zlob
Loyal LN readers may remember our past warnings of fake codecs, a favored method to deliver the dreaded Zlob family of Trojans to a victim’s PC. This Internet menace seems to outlast all the others in its tenacity. Learn how to stop it, today!

arrow Read more

Spam Surge Inundates Inboxes
Our readers have been writing in, wanting to know more about the spam flood most of us are sorting out of our inboxes. You asked for, so here it is - the latest trends of this online nuisance and what you can do battle it.

arrow Read more

National Data Breach Notification Debate Heats Up Information Week
At Lavasoft, we are staunch supporters of activities to protect consumers. Lavasoft has joined the Cyber Security Industry Alliance (CSIA), an advocacy group set on advancing cyber security policies in the U.S. and E.U. to improve the security of global information systems. CSIA’s new Issue Brief urging U.S. national standards for consumer protection is spurring awareness on safeguarding private data.

arrow Read more

Security Shorts
Lavasoft News has compiled a list of "security shorts" - summaries of other online security stories making news around the world this past month.

arrow Read more

Spyware Newsbits

New Targets in Detection (August 2007)
Protect your privacy with a complete list of new targets for August 2007.

arrow Read more

Vista Compatible Ad-Aware 2007
We know that Vista compatibility is an important issue for many of our customers. At the end of August, Lavasoft released the Vista compatible version update of Ad-Aware 2007. You can receive the Vista compatible version update simply by using Ad-Aware 2007’s “Web Update” feature.

arrow Read more

Join the Lavasoft Team!
For years, computer users have consistently turned to Lavasoft to provide them with anti-spyware protection and security. Now, with nearly 300 million downloads of Ad-Aware, people throughout the world depend on us to ensure that their privacy is secure.” Take a look at open positions at Lavasoft today.

arrow Read more

To get all news on one, printable page, click here

Home   arrow

Lavasoft Tree Planting Challenge

In the August issue of Lavasoft News, part of our focus was how we can all do our part to make sure that the technology-centered world we live in leaves a less harmful impact on our surroundings. As part of this, we teamed up with an eco-friendly company, GreenPrint, to introduce the Lavasoft tree planting challenge.

We appreciate all of your efforts to cut down on paper product consumption by purchasing GreenPrint Home version. And remember, for each of your purchases, two trees will be planted!

To give you a little perspective on how these tree planting projects help the environment, according to the USDA Forest Service, a single tree generates $31,250 (U.S.) worth of oxygen, provides $62,000 worth of air pollution control, recycles $37,500 worth of water, and controls $31,250 worth of soil erosion, over a 50-year life span.

The tree planting project is being coordinated by American Forests, an organization that plants native trees in ecosystem restoration projects across the United States and around the world, and by Sustainable Harvest International (SHI), a group committed to long-term sustainable development in Central American farming communities where the trees are planted.

Take a look, below, at the areas throughout the globe where the trees from the Lavasoft challenge will be planted.

Home   arrow

Lavasoft Introduces New Privacy Tools

You already know that Lavasoft’s Ad-Aware anti-spyware products and Personal Firewall are effective, easy-to-use software to keep your computer secure. Now, in direct response to your demand for a greater variety of solutions to combat the array of security challenges in our digital world, Lavasoft has introduced new products that are a reflection of today’s information security threats.

With prying eyes able to access all kinds of confidential data through our computers, it is essential to have strong solutions in place. At Lavasoft, we are constantly evaluating the online environment to ensure that consumers have the means to control their computer security and privacy.

As more and more information is stored on our computers and passed back and forth from person to person, digital document and file security presents new challenges for home and corporate computer users, with fear of data breaches, identity theft, and loss of sensitive information. Lavasoft has released three new products to relieve that worry: Lavasoft Digital Lock, Lavasoft File Shredder, and Lavasoft Privacy Toolbox.

“While we will continue to protect the privacy and security of individuals with our flagship Ad-Aware anti-spyware software, the release of these three new products signals a new era at Lavasoft as we begin to provide our customers with additional security tools. Our products must continue to grow and expand in response to the demands of our customers and to today's varying security challenges,” said Jason King, the recently appointed chief executive officer at Lavasoft.

This new line of Lavasoft solutions, developed through the expertise of our partners in the computer security industry, are a natural addition to the privacy and security tools you use on a regular basis to safeguard your sensitive information. See a description of each of our new products below. Click on the product boxes to see a full features list for each product.

Lavasoft Digital Lock

FEATURESProtect the private digital data on your computer with the strong encryption technology of Lavasoft Digital Lock. Your online files, both at home and at the office, are a trove of private and potentially valuable information. Theft of confidential information can result in heavy financial loss, as well as lost time. With Lavasoft’s encryption technology, securely store or send files by e-mail knowing that your private information is safely locked and will never fall into the wrong hands.


Lavasoft Digital Lock Features List

  • Secure your files and sensitive data with strong encryption that supports several encryption algorithms, including the new AES standard 256 Bits.
  • Conveniently select files for encryption with a simple right-click, drag and drop functionality, or by browsing for a file.
  • Create encrypted e-mail attachments that can be sent to recipients that do not have Digital Lock installed - only the correct password is needed to unlock encrypted files.
  • Benefit from the Digital Lock’s ability for multiple encryption of selected files – encrypt a file more than once and use different combinations of passwords and encryption algorithms for added control.
  • Full shredding functionality means you have the opportunity to shred the original file after completing a successful encryption.
  • Store and send files the way you choose with an encryptor that supports your individual way of working with sensitive documents with both file encryption and disk encryption.

Lavasoft File Shredder

FEATURESTake control of the information on your PC with Lavasoft File Shredder. Even after you think you have deleted information and files, traces still remain on your computer. When you delete a file, empty your Recycle Bin or format your hard disk, the information is not always removed from your PC; these methods only alter the structure of the drive, leaving most of the data intact and recoverable. You can shred your sensitive digital files with the same certainty as you shred sensitive papers in a paper shredder. Permanently remove unwanted files and data, at home or at the office, with Lavasoft File Shredder.

Lavasoft File Shredder Features List

  • Permanently remove any sensitive digital information from your computer such as Word documents, Excel files, PowerPoint files, music files, videos, photos and more.
  • Select a file to be shredded with a simple right-click or browse for a file or folder.
  • Detect and remove “previous versions” automatically saved and hidden by Windows Vista.
  • Shred everything in your Recycle Bin with one easy click of a button.
  • Conveniently shred files by dragging and dropping them into your desktop "shredding bin.”
  • Shred all your temporary files left behind on your computer.
  • Use the "Shred all free space guide" to clean your computer from all old deleted files and folders that are still stored on your drives.
  • Document the files that have been permanently removed with a qualitative reporting option.
  • Supports the Department of Defence (DoD) shredding algorithm, using seven rounds of overwriting, as well as other advanced standards.

Lavasoft Privacy Toolbox

FEATURESBuild the security you require – get both the Lavasoft File Shredder and Digital Lock in one easy-to-use application. Securely store information or remove it for good from your PC with the Lavasoft Privacy Toolbox, giving you full control of your digital documents. Get the most for your money with savings of over 30 percent compared to buying both products separately!



Lavasoft Privacy Toolbox Features List

  • Choose to encrypt files for safe-keeping or shred documents you want to permanently delete with Lavasoft’s Digital Lock and File Shredder integrated into one program interface.
  • Take full control of your files and folders with the easy-to-use functions of the Privacy Toolbox.
  • Includes all of the functionality of both the Lavasoft Digital Lock and File Shredder to give you total command over your digital information.

Home   arrow

Meet Joseph Wells – the Newest Member of the Lavasoft Team

Lavasoft is pleased to announce that a leading innovator in the security industry, Joseph Wells, has joined the company’s management team as chief technology officer.

Wells is well-known for his extensive career in anti-Trojan and anti-virus solutions as well as his more recent work within anti-spyware and emerging security threats.

Along with his widely recognized work in the security software field, Wells has authored over 60 technical articles and scientific papers. He is renowned as the founder of WildList Organization International, a global cooperative identifying and reporting the latest virus threats.

Wells may be busy with plans for his new endeavor at Lavasoft, but Lavasoft News had the opportunity to ask him a few questions and to find out where his journey in the security industry has led him during the past 20 years.

Stay tuned for a more in-depth look at Wells’ insight on the security industry in upcoming issues of LN!

How did you become interested in the research and development of security software?

Though I had experience in programming, reverse engineering, and even assembly language programming on other platforms beginning in 1983, my career really started in 1987. Last year, I was going through a box of old papers and found the receipt for my first DOS computer, which I purchased, and started my first research company: Wells Research Information Services. The date on that receipt is August 7, 1987. That was when I began developing security programs.

What are the most significant changes you have seen in the security industry? In terms of sophistication and prevalence, how would you describe the types of malware and spyware threats that we see today?

Back in 1987, I was into online research based on systems such as Dialog and NewsNet, but also spent a lot of time on BBS’s. It was on the local BBS that I first found out about the Dirty Dozen; a list of Trojan Horse programs, which actually numbered more than twelve. So I developed my first heuristic Trojan detector.  Though viruses existed as early as 1986, it wasn’t until August of 1989 that I received and disassembled my first virus (Jerusalem.1808.A).

That was then. What about now?

As you know, I was recently interviewing with different companies.

As it turns out, by an extremely unlikely coincidence, I received an offer from Lavasoft and accepted it by e-mail on August 7, 2007. Yes. That’s right. I accepted this position of CTO with Lavasoft exactly 20 years to the day after I started my first research company!

Then, yesterday I was having a discussion with a friend who works for Kaspersky Labs. What were we discussing? The current problem with Trojan Horse programs.

I am reminded of the saying: “The more things change, the more they remain insane.”

So to answer the question, the most significant changes I have seen involve the speed, magnitude, diversity and complexity of the nature of this evolving threat.

Home   arrow

Defeating the Ever-Present Zlob

And the war against Zlob Trojans wages on. This online enemy goes by many names (Zlob, fake codecs, Zlob codecs, Smitfraud Trojans) but whatever alias is used, the devious tactics and growing prevalence on the web are undeniable. At Lavasoft, we have a vendetta against the Zlob, and a mission to help you keep this untamed online threat off of your system.

Zlob Trojans, similar to the closely related Vundo Trojans, are malware that usually masquerade as a codec needed to play a video, and then install adware or malware on an unsuspecting user’s system.

“This is absolutely the worst infestation right now on the Internet - certainly the most widely known and seen in the security forums,” says Janie "Calamity Jane" Whitty, a Lavasoft malware removal and prevention expert and Support Forums administrator.

To avoid getting infected with this underhanded malware, all it takes is a little caution and awareness of the problem.

The Tactic
How do you get infected in the first place? The usual scenario is that you attempt to download a video, only to receive a message that a special codec is needed to view it. After this prompt, you install the required “codec.” You may even have to accept an End User License Agreement (EULA), either spelling out exactly what will be downloaded onto your machine, or showing a fake EULA to make you believe the download’s legitimacy.

Once you install the program, you begin seeing loads of unwanted adware. A “nag” screen takes over your desktop in the form of a security warning or as a pop-up telling you your system is infected. The message demands that you run a scan or buy a specific “anti-spyware program” in order to fix your PC.

The Trickery
Where did you go wrong? The required codec was actually a fake, a Zlob Trojan capable of downloading more of its kind onto your system, along with a variety of adware and rogue anti-spyware. Messages you receive post-infection - another sneaky component - often mimic valid programs (like Windows Security Center) and many of the rogue anti-spyware programs imitate popular anti-spyware software (like Lavasoft’s Ad-Aware) to feign legitimacy.

The popularity of downloading and watching videos online, combined with users not finding out exactly what they are downloading onto their PCs is the perfect environment to keep Zlobs alive and thriving. These fake codecs are a frequently used ploy, brought to you through various methods that rely on the vulnerability of unsuspecting computer users including websites, e-greeting cards, and instant messages. Along with that, Zlob developers spew out new Zlob Trojans daily in an attempt to avoid detection by anti-spyware and anti-virus software.

“Despite our efforts, Zlob is still winning and it remains the number one public enemy, of this malware researcher anyway. Just take a look in the forums, our forums - ANY security forums and people are still coming in droves and hoards needing help to remove this malware.  It is constantly changing and jumping domains to avoid detection,” Whitty says.

Winning Strategies
How can you avoid falling for fake codecs? The first step is reading EULAs and privacy statements carefully before installing anything on your computer. If the EULA is hard to find or difficult to understand, reconsider installing the software. By not fully reading the EULA, you may agree to questionable activities by the software vendor and even to installing spyware and adware on your computer.

“Users need to be warned about these fake codecs. My own experience with these codecs is that if people would just read the EULAs of the software they download they would see that they are getting additional (and possibly unwanted) adware and spyware in that fake codec,” according to Whitty.

Lavasoft researchers are key fighters in the war on Zlobs, constantly finding new variants and putting them into detection. Currently, the Zlob family of Trojans are among the largest families of malware in Lavasoft’s Detection Database. Ad-Aware 2007, especially the real-time protection of Ad-Aware 2007 Plus or Pro, is an important weapon in the malware fight. Other armor you should equip your system with is updated anti-virus software, a firewall, and the latest security patches from Microsoft.

Below are a few more Zlob prevention tips from the security experts at Lavasoft.

  • Use up-to-date real-time protection. As stated above, real-time protection is key in keeping malware off of your system. Try Ad-Aware 2007 Plus or Pro - both include the Ad-Watch real-time monitor which proactively detects malware and parasites before they install on your PC.
  • Be leery of adult content videos. Zlob Trojans often masquerade as codecs needed to view pornographic videos. If you see a link for “free porn,” chances are it’s a sure way to get your PC infected.
  • Watch out for fake anti-spyware software. Never pay for a program that installed itself to your computer. This is a hallmark of rogue software.
  • Verify files before downloading. Never download software or a file without knowing exactly what it is. If you are unsure about a certain download, verify it by using an online virus scanner site or check with an expert at an online security forum, like Lavasoft’s Support Forums

Home   arrow

Spam Surge Inundates Inboxes

Most of us are well aware that e-mail is a method of choice for many malware attacks and scam techniques. But the e-mail scourge that none of us look forward to seeing in our inboxes has been making an onslaught like never before.

E-mail security firm Postini recently tracked the largest spam attack followed to date, a PDF spam deluge that increased the total spam count by 445 percent in a single day.

This particular scam involved a “pump and dump” ploy; recipients were sent PDF attachments, prompting them to buy stock in a small firm called Prime Time Group, Inc, setting off an artificial inflation of its stock price.

According to a recent EWeek article, the spam surge’s sudden strike and subsequent plunge was due to the work of botnets. Botnets, networks of zombie computers that are the source of many types of online threats, can be used to spread vast amounts of spam.

The volume of spam reportedly saw a 53 percent jump from the day before the attack started to the day it launched on August 7, Adam Swidler, a representative at Postini told EWeek.

“Why it stopped is a mystery, but more than likely it wound down because it was a spam run being conducted on a rented bot network,” according to Swidler’s statement in the article.

The attack, researchers say, has likely been launched by the infamous “Storm Worm” botnet. What began this past January as spam promising news reports of European storms has since been seen presenting itself as a greeting card from family members. A widespread spam attack in July used the tactic of concealing computer viruses in links to e-greeting cards.

According to the Washington Post, Postini saw about 275 million greeting card spam messages in the first 3 weeks in July. That same month, the so-called Storm Worm was said to represent about 30 percent of all spam, according to reports.

Whatever the subject, the intent remains the same: to con computer users to click malicious links or open attachments in their e-mail to carry out a scam.

The most recent spam trends have seen less of the traditional image spam, in favor of PDF, Excel, and Zip file attachments. Spammers have turned their attention in different directions in order to evade filters and make their way into your inbox, disguised as a trusted attachment. Image files are easier for spam filters to stop, while PDF files bypass many existing e-mail filters.

“PDF spam is the latest trick the spammers have come up with to evade traditional anti-spam filters,” Amir Lev, president of e-mail security provider Commtouch said in a company press release. “It took a bit of time, but some anti-spam engines eventually developed solutions to block the image-based spam that plagued inboxes last year. In response, the spammers quickly utilized their zombie infrastructure to progress into sending spam in a different format.”

While it may already feel that our inboxes are being flooded with spam and scams, by most measures, the prognosis is that junk and deceptive e-mails will only get worse.

To avoid e-mail scams and spam attacks, make sure to use a spam filter, in addition to updated anti-virus and anti-spyware software. When in doubt about an e-mail, it’s always best to stay on the cautious side: do not open e-mails from unknown senders, and verify the validity of links or attachments with the sender before viewing. Being aware of threats is always an important step to prevention – be proactive in reading reports and publications on the latest spam techniques

Home   arrow

Security Shorts

Long-Running Russian Phishing Scam Nabs $500,000
During a two-year long scam, two Russian hackers allegedly stole over $500,000 U.S. from Turkish bank customers through more than 260 money transfers. The hackers are said to have used a customized Remote Administration Trojan application to infect bank customers’ PCs in order to gain access to their accounts. According to authorities, one of the men has been arrested on fraud charges, while the other remains at large.

Read More

Australia to Battle Internet Porn
A government program in Australia, with the support of NetAlert, the nation’s Internet safety advisory board, is promising to help parents protect their children from online dangers. Australian Prime Minister John Howard announced in mid August the $160 million U.S. plan to clean up porn on the Internet. The majority of the cost will go towards a filtering program for home computer users and public libraries.

Read More

Germany’s Anti-Hacking Law Creates Debate
Germany’s recent legislative move to crack down on attacks on government and private-sector computer systems is being questioned by security experts. The anti-hacking law makes it a crime in Germany to build, sell, obtain or distribute “hacking tools,” with penalties including sentences of up to 10 years in prison, as well as fines. Some in the security industry believe, however, that the new law may damage the nation’s computer security by curbing legitimate research and analysis.

Read More

Study Finds Spam’s Weakness
A recent report by researchers at a university in the United States claims to have found a weakness in the “spam ecosystem” that may be used to curtail economic gain by spammers. According to the report from University of California, San Diego researchers, the engine that drives rising spam levels is not spam itself, but varying money-making scams; these scams are typically hosted on a single website, which may even be used to host several scams. The researchers claim that spam can be fought by targeting its economic livelihood.

Read More

U.K. MPs Call for Curbing the Web’s Wild West
A group of British Members of Parliament are urging stronger action by government and industry to protect consumers from the dangers of the Internet’s “lawless Wild West.” According to the British lawmakers, as computer crime grows in sophistication, computer users need additional protective measures from the government, software makers, Internet service providers, banks and shops.

Read More

Home   arrow

Lavasoft Privacy Toolbox
The risk associated with using the Internet, like spam, viruses, spyware and phishing, remains high, according to Consumer Reports. In the first half of 2007, spyware infections prompted 850,000 U.S. households to replace their computers, according to a recent survey. One out of every 11 surveyed had a major, often costly problem due to spyware. The economic fallout per incident was averaged at $100 (U.S.), with damage totaling $1.7 billion.

Source: Consumer Reports, State of the Net 2007
Term of the Month
A pump and dump scam is a spam technique that uses misleading messages to create hype around targeted stock – usually “penny stocks” that sell for less than $1 U.S. per share. Spammers acquire the stock before sending their spam, and then “dump” their shares after share prices have inflated. The result: investors are fooled into losing money, while the spammers make off with a profit. Read more about recent spam trends in our “Spam Surge” article.

Tech Tips
Every time you surf the Net, your browser keeps track of all of your online steps. With Ad-Aware 2007, we’ve given you an easy solution to remove all traces of your Internet browsing from your system, keeping spyware from documenting surf patterns and targeting you with adware and spyware. TrackSweep, one of the new privacy features in Ad-Aware 2007, gives you the option to clean your cache, cookies, history, last typed URLs, and browser tabs from Internet Explorer, Firefox, and Opera, in one clean sweep! To use TrackSweep, from the “Tools & Plug-Ins” tab in Ad-Aware 2007’s user interface, select “TrackSweep” and then choose the items you want cleaned. TrackSweep is a feature in Ad-Aware 2007 Free, Plus and Pro.
Helpful Homepage
The Anti-Phishing Working Group is an organization committed to wiping out online scams by focusing on eliminating fraud and identity theft that results from phishing, pharming, and e-mail spoofing. Visit its website to report phishing attempts, pharming sites, and crimeware, or browse the informative resources section to brush up on the latest threats.
Lavasoft AB
Lilla Bommen 1
411 04 Gothenburg
Page footer