Some people stick a piece of tape over the Web-Cam on their laptop, maybe you even do it yourself. Are they over-cautious, paranoid, a little strange? Are you? Or is there reason behind this madness? Many of us have heard the stories about people being spied on using their own computer or people being black-mailed using embarrassing or in-criminating video footage un-knowingly recorded from compromised Web-Cams. But are these stories true and are some people’s seemingly paranoid pre-cautions justified? Un-fortunately the answer is yes, pre-caution against this type of activity is necessary and there are a multitude of programs out there that can be used for this type of malicious activity…and more. Remote-Access Trojans (R.-A.T.s), or what we are calling "Creepware", are programs that are installed without the victim’s knowledge and allow an attacker to have access and control of the compromised computer from a remote location.
This Blog will aim to give a general overview of Creepware; describing what these threats are and what can, and is, done with them and what the implications are or both the victims and the users of Creepware. The blog will also look at the economy of Creepware, examining the Underground Market dealing in everything from the sale of software to the sale and trade of victims. Finally, we will look at how Creepware is spread and how to protect against it.
- Blog: Creepware - Who’s Watching You?