Ads, apps or free programs can infect your electronic devices with adware without knowing it

Users, without noticing it, can authorize the download of this malware on computers or cell phones and filter their data in Ecuador.

Karla León realized that something was wrong with her computer when massive advertisements began to appear. He claims that he displayed windows with the message “you won a new free cell phone click here”, “you are our user 1000000 and you won a prize. Click here”.

Advertising became so invasive that it did not let her navigate with ease. When his browser’s web page was automatically changed, he decided to go to a technician to check the device.

“The guy told me that I had allowed an ad program to be installed and that it generated all these ads and strange behavior on my laptop,” he says.

She adds that the technician asked her if she had downloaded any ‘free’ programs lately: “And yes, I downloaded a program to make templates for marketing digital. The boy assured me that by downloading and accepting the terms of that program, I also agreed to the advertisements”.

In other words, when Carla downloaded the free program, she also unknowingly allowed her laptop to host a adware what is the combination of the words advertising (advertising) and software (program) in English and refers to someone software, malicious or not, displaying ads in an app or on the web browser to generate revenue from clicks and impressions on ads.

Sometimes the program developer collaborates with the provider of the adware, which can also be downloaded to mobile phones, in order to earn income from its “free” program. The developers sell these ad space to companies which they charge for the number of clicks or impressions. For almost 300 clicks and more than 50,000 impressions they can charge $ 300.

The problem is that these advertisements can sometimes redirect users to malicious sites that seek to steal personal data.

Cybercriminals took advantage of the rage for the series The Squid Game and used an app to infect thousands of cell phones with a Trojan

The other most common way to get infected with adware is that a malicious programmer finds a vulnerability in a browser that it can exploit. Vulnerabilities are created accidentally during the development process, and manufacturers frequently release updates to patch these security gaps.

However, if a patch does not yet exist or the user does not apply an update, the hackers they can find a way to sneak into your device. They usually do this through pass-through downloads, which occur when you visit an infected website that secretly downloads software in the system, indicates the cybersecurity company Avast.

A is identified adware installed on a device when you start to see pop-up windows with fake ads for no apparent reason or when several ads appear consecutively causing a discomfort when browsing.

Even the user can be redirected to unwanted sites that can lead to the download of a malware. All its malicious activity is invasive and notorious while the user browses the internet.

Russian hackers who attacked the US government seek to infiltrate the cloud

Although it is usually referred to adware like a kind of malware, the reality is that adware it is considered a potentially unwanted application (PUA). This means that while it can lead to malicious sites, the risk of taking another malicious action is lower, although it can occur”, Comments Camilo Gutiérrez Amaya, head of the research laboratory at ESET Latin America.

It may have among its objectives to collect data, as was the case of the adware Wajam, which is capable of collecting and filtering information from the victim user, such as software installed, the equipment model, among other information.

In 2015, Avast discovered a number of apps for adware Masquerading as games that stayed on the Google Play Store long enough for users to download them 10 million times.

In fact, lthe creators of adware They have improved their technique and, currently, they manage that the free app or program does not show ads during the first 30 days so as not to arouse suspicion.

Most of the time it is the user himself who accepts the installation of the adware for not paying attention during the installation process of a program or an app. This means that the adware it accesses the system, and therefore the data, in a “legal” way because the user accepted the installation, Gutiérrez indicates.

This “permission” that is granted unconsciously would leave the user defenseless and in the case of Ecuador it could not benefit from either the Organic Law on Data Protection, recently approved by the Assembly, or the Comprehensive Organic Criminal Code (COIP).

According to the COIP, the illegal interception of data is a computer crime and can be punished with a penalty of between 3 and 5 years of pressure.

I received a message from a number with an African country code, what should I do?

In 2021, until last September, 1,265 investigations for cybercrime were opened across the country. A figure higher than that of 2020 when 682 were counted, that is, an increase of 583 cases, according to data from the National Police. Although it is not specified how many investigations are due to the figure of illegal data interception.

What are the alerts to know if a device has a adware?

  • The browser starts to run slower than usual or may close unexpectedly.
  • Ads appear on web pages where they didn’t appear before.
  • The home page or search page was modified without user authorization.
  • Every time a web page is visited, the browser is redirected to a different page.
  • New toolbars appear (toolbars), plugins or extensions in the browser that were not there before.
  • Clicking anywhere on a web page opens one or more pop-up windows with unwanted ads.
  • Unwanted applications are installed on the computer without permission.

How can you protect your devices from a adware?

  • Keep the web browser updated.
  • Avoid opening ads with false warnings or those that contain messages that are too good to be true.
  • Use a reliable extension that blocks ads while browsing the internet.
  • Avoid browsing untrustworthy websites, especially those that the browser marks as unsafe.
  • Avoid downloading programs from untrusted sources.
  • During the installation of a program, read carefully the terms and conditions of use before accepting them.
  • Have a security solution to block this type of content when browsing the internet. (I)

You may also like

Immediate Access Pro