Jump to content

Christopher Boyd (IT security): Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
→‎Adware Critic: wikilink 180solutions
Donnymo (talk | contribs)
→‎External links: Removed spam links
Line 44: Line 44:
*[http://www.vitalsecurity.org Vitalsecurity.org]
*[http://www.vitalsecurity.org Vitalsecurity.org]
*[https://mvp.support.microsoft.com/profile=d66a3ca8-2c01-4c2f-87e1-25d0121c6c85 Chris Boyd's Microsoft Valued Professional Profile]
*[https://mvp.support.microsoft.com/profile=d66a3ca8-2c01-4c2f-87e1-25d0121c6c85 Chris Boyd's Microsoft Valued Professional Profile]
*[http://blog.spywareguide.com FaceTime Security Blog]
*[http://www.facetime.com FaceTime]
*[http://www.vitalsecurity.org/xpire-splitinfinity-serverhack_malwareinstall-condensed.pdf Technical report on hacking Apache servers]
*[http://www.vitalsecurity.org/xpire-splitinfinity-serverhack_malwareinstall-condensed.pdf Technical report on hacking Apache servers]
*[http://isc.sans.org/diary.php?date=2004-11-24 Information on hacking Apache servers from SANS.org]
*[http://isc.sans.org/diary.php?date=2004-11-24 Information on hacking Apache servers from SANS.org]

Revision as of 20:52, 5 September 2007

Christopher Boyd, better known as his online pseudonym Paperghost, is webmaster of computer security organization Vitalsecurity.org, a Microsoft Security MVP, and Director of Malware Research for security company FaceTime.

Originating from Liverpool, England, Boyd studied an Honours Degree in Fine Art, working in film, paint and music.

Computer Security

At some point in 2001, Boyd changed direction professionally and threw himself into the study of Spyware, Adware and Malware.

In July 2004, he relaunched Vitalsecurity.org (he was a staff writer for Vitalsecurity.net in 2000-2001) and he has been instrumental in uncovering and bringing to the public attention issues of privacy and spyware.

In November 2004, a modular hacking technique was employed to compromise windows end-users by hacking Apache servers.[1] When hacked, the servers would redirect a user on any of the server's websites, leading them to a set of ever-changing infection pages. These pages employed recoded viruses, trojans, malware and spyware. This technique is used heavily today by the groups behind CWS.

The idea that alternative browsers such as Opera and Firefox could somehow enhance end-user security was cut down in March 2005[2] with the discovery of a Java applet that, if agreed to, would install a large (and varied) adware bundle onto the end-users PC.It was found that having the "rogue" site in the user's blocklists and security tools would do nothing, the install bypassing these tactics completely if the end-user clicked "Yes". An updated Firefox .XPI installer (which infected Internet Explorer) was also deployed in some of these installs.

BitTorrent Controversy

In June 2005, it was discovered that more and more Adware makers were turning to alternative sources for their installs, as more end-users become clued up on common install tactics.[3] A reliance on crude social engineering and P2P systems that were previously clean was now on the rise. Boyd discovered that BitTorrent forums and file-sharing sites were used as a major source of distribution for Aurora (a program produced by Direct Revenue) and a number of other major adware programs, wrapped up in bundles produced by a company (MMG) who lost control of their own network.[4] Potentially copyright infringing files, illegal pornography and incorrect / absent disclosure was exposed on such a scale as to cause the companies involved (direct revenue, 180 solutions and others) to publicly declare their discontinuation of these methods.

This story caused such an uproar that numerous media pundits weighed in, and (in some cases) made a delicate situation worse. An article by John C Dvorak of PCMag.com alleged Boyd was part of some "Grand Microsoft Conspiracy" to bad-mouth BitTorrent to the benefit of their planned P2P tool, Avalanche.[5] Furious P2P users (who were not familiar with the backstory of the investigation) even went as far to say Boyd was in league with the RIAA, out to create further problems for file-sharers by bringing these bundles to light. However - Dvorak's piece caused something approaching outrage on the other side of the fence, leading a fellow Ziff Davis Media Publication to go head to head with Dvorak.[6] Dave Methvin of PC Pitstop followed up the investigation with his findings.[7] He alleges that some of the films distributed contained potentially illegal underage pornography, and not long after, MMG went offline and the Adware companies all pulled out of this particular distribution.

Fake Google Toolbar

In October 2005, Boyd discovered a "fake" Google Toolbar which was being distributed via Instant Messaging.[8] The toolbar allowed the user to store credit card details, and also opened up a fake Google search page. Boyd also tracked the toolbar back to 2003, through three different versions, each one exploiting vulnerabilities in the Windows operating system.

Instant Messaging Rootkit

In October / November 2005, Boyd discovered what is considered to be the first known instance of a Rootkit being distributed via Instant Messaging, hidden inside a large payload of Adware and Spyware.[9] Over a period of months, the group behind the attacks distributed numerous inventive payloads (such as a forced install of BitTorrent[10] to spread movie files) and were eventually traced back to the Middle-East.

Adware Critic

Boyd is a notoriously fierce critic of Adware companies, famously causing 180 Solutions to label him a "fanatic" on their Weblog, with bad feeling in evidence on both sides to this day.[11] He is regularly referenced on other leading Antispyware sites such as Sunbelt Blog, Suzi Turner's ZDNet blog and Ben Edelman's home page.

Media Appearances

Boyd makes regular appearances in the media, and has featured on The David Lawrence Show, BBC Radio 5 and in printed magazines such as ITWeek and SCMagazine. He has also spoken at conferences such as the Antispyware Coalition Workshop in Washington D.C., and his site has been known to create a "Mini-Slashdot" effect on sites he has linked to, due to the traffic he himself generates - besides "regular" visitors, he makes frequent appearances on sites that generate large syndication such as Slashdot and Digg.com.

Security Discoveries

In 2006, Boyd has continued to make significant discoveries in the field of security, including

  • The discovery of a 150,000 strong Botnet ring that used a custom-built PERL script to steal payment data from third party shopping cart applications[12]
  • An expose of a web-browser that redirected end-users to potentially illegal pornography[13]
  • An Instant Messaging Worm that installs its own web browser.[14]
  • The discovery that Adware makers Zango were promoting their content on Myspace.[15]
  • A modular, multi-chained string of infections dubbed the "Pipeline Worm".[16]
  • An Instant Messaging infection that uses Botnet-style tactics to enable clickfraud.[17]
  • The discovery of a worm using Quicktime files to spread across MySpace with the intent of pushing Zango Adware.[18]

References