Live Online Portal: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
We aren't here to name and shame
Fix
 
Line 1: Line 1:
{{Short description|Windows-platform based Malware}}
{{Short description|Windows-platform based Malware}}
'''Live Online Portal''' ('''LOP'') is [[malware]] that is installed on [[Microsoft Windows]].<ref>{{cite magazine |url=https://books.google.com/books?id=8DcEAAAAMBAJ&dq=%22live+online+portal%22&pg=RA1-PA40 |title=Counter Intelligence Brief |magazine=InfoWorld|date=4 October 2004 }}</ref>
'''Live Online Portal''' ('''LOP''') is [[malware]] that is installed on [[Microsoft Windows]].<ref>{{cite magazine |url=https://books.google.com/books?id=8DcEAAAAMBAJ&dq=%22live+online+portal%22&pg=RA1-PA40 |title=Counter Intelligence Brief |magazine=InfoWorld|date=4 October 2004 }}</ref>


Lop.com is a web site owned by C2Media LTD. It is a [[pay per click|pay-per-click]] search portal where other websites will pay for each click to their sites via LOP. A method they used to get people to their site was to install a [[browser hijacker]] component on people's computers which would advertise their site through [[pop-up ad|pop-ups]]. The installer could turn the user's [[web browser]] into a device with different links to lop.com.<ref>{{cite web |title=Lop.com |url=http://www.spywareinfo.com/articles/lop/ |website=Spywareinfo |archiveurl=https://web.archive.org/web/20050520020605/http://www.spywareinfo.com/articles/lop/ |archivedate=May 20, 2005 |date=April 22, 2004}}</ref>
Lop.com is a web site owned by C2Media LTD. It is a [[pay per click|pay-per-click]] search portal where other websites will pay for each click to their sites via LOP. A method they used to get people to their site was to install a [[browser hijacker]] component on people's computers which would advertise their site through [[pop-up ad|pop-ups]]. The installer could turn the user's [[web browser]] into a device with different links to lop.com.<ref>{{cite web |title=Lop.com |url=http://www.spywareinfo.com/articles/lop/ |website=Spywareinfo |archiveurl=https://web.archive.org/web/20050520020605/http://www.spywareinfo.com/articles/lop/ |archivedate=May 20, 2005 |date=April 22, 2004}}</ref>


Older variants of LOP were quite predictable and installed [[Browser Helper Object]]s and startup entries with known names. Some later LOP variants used a string of pseudo-random words as their executable names<ref name=doxdesk/> and have been placing these executables in the user's application data directory. For example, there are LOP variants which call their file "meal dog house bone.exe".{{Citation needed |date=April 2024}}
Older variants of LOP were quite predictable{{Editorializing |date=April 2024}} and installed [[Browser Helper Object]]s and startup entries with known names. Some later LOP variants used a string of pseudo-random words as their executable names<ref name=doxdesk>{{cite web |title=lop |url=http://www.doxdesk.com/parasite/lop.html |website=DOXdesk |archiveurl=https://web.archive.org/web/20050403193832/http://www.doxdesk.com/parasite/lop.html |archivedate=April 3, 2005}}</ref> and have been placing these executables in the user's application data directory. For example, there are LOP variants which call their file "meal dog house bone.exe".{{Citation needed |date=April 2024}}



==References==
==References==

Latest revision as of 16:48, 27 April 2024

Live Online Portal (LOP) is malware that is installed on Microsoft Windows.[1]

Lop.com is a web site owned by C2Media LTD. It is a pay-per-click search portal where other websites will pay for each click to their sites via LOP. A method they used to get people to their site was to install a browser hijacker component on people's computers which would advertise their site through pop-ups. The installer could turn the user's web browser into a device with different links to lop.com.[2]

Older variants of LOP were quite predictable[editorializing] and installed Browser Helper Objects and startup entries with known names. Some later LOP variants used a string of pseudo-random words as their executable names[3] and have been placing these executables in the user's application data directory. For example, there are LOP variants which call their file "meal dog house bone.exe".[citation needed]

References[edit]

  1. ^ "Counter Intelligence Brief". InfoWorld. 4 October 2004.
  2. ^ "Lop.com". Spywareinfo. April 22, 2004. Archived from the original on May 20, 2005.
  3. ^ "lop". DOXdesk. Archived from the original on April 3, 2005.