Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Can You Install Monitor Spyware Via Email?


  • Please log in to reply
5 replies to this topic

#1 skiddyskat

skiddyskat

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:10:55 PM

Posted 02 April 2007 - 06:40 PM

Is it possible for someone to send me an email with “monitor tracking” spyware attached to it (like eBlaster or some other), and have it load on my computer without me knowing it?

An acquaintance, who I now realize has a history of tracking other people’s emails, recently sent me an email with an embedded link to refresh text. I innocently clicked it, and now fear she may be having me tracked. Is it possible to do that?

Thanks SK

BC AdBot (Login to Remove)

 


#2 fozzie

fozzie

    aut viam inveniam aut faciam


  • Members
  • 3,516 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Ossendrecht/The Netherlands
  • Local time:04:55 AM

Posted 03 April 2007 - 02:25 AM

Yes, that would be well possible.

Please run the following tests

In normal mode, run an online antivirus check from at least two and preferably three of the following sites
BitDefender
Computer Associates Online Virus Scan
Panda's ActiveScan
Trend Micro Housecall
Windows Live Safety Center Free Online Scan
This scanner from Trend does not require an Active X to run.

1. Detects and removes malware ( viruses, worms, trojans, etc. )
2. Detects and removes grayware and spyware
3. Restores damage caused by malware to your system.
4. Notifies about vulnerabilities in installed programs and connected network services.
5. Multi-platform support for: Windows, Linux, Solaris.
6. Easy-to-use with the Microsoft Internet Explorer and Mozilla Firefox.

and post back the results.

#3 skiddyskat

skiddyskat
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:10:55 PM

Posted 03 April 2007 - 05:50 PM

Thanks for the response fozzie, I'll do just that.

Could someone please explain to me what she sould have needed to do to get it installed on my pc through an email? Is is a standard function of those types of monitor software?

#4 hillbillygreek

hillbillygreek

  • Members
  • 397 posts
  • OFFLINE
  •  
  • Location:SC
  • Local time:10:55 PM

Posted 04 April 2007 - 12:07 AM

recently sent me an email with an embedded link to refresh text. I innocently clicked it, and now fear she may be having me tracked.

Thanks SK


Depending on what exactly happened after you clicked the link, this may have been all that is required for the keylogger to be installed. See below for an example:

Link: Phishing Scam Installs Keylogger Via Web Page

eBlaster can be sent as an exe attachment in an email. If the exe is executed then eblaster would be installed without user interaction or knowledge.

#5 skiddyskat

skiddyskat
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:10:55 PM

Posted 04 April 2007 - 12:34 PM

I ran Spyware Doctor, Spybot S&D, Ad-Aware, Kasperski, BitDefender, Panda and Windows Live. Outside of some minor things that I cleaned up, was what Panda came up with that I can't get rid of is Spyware:Cookie/Toplist.

Panda didn't delete it from the online version, the the other programs that I ran didn't find it.

Any suggestions?

SK

#6 fozzie

fozzie

    aut viam inveniam aut faciam


  • Members
  • 3,516 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Ossendrecht/The Netherlands
  • Local time:04:55 AM

Posted 04 April 2007 - 04:07 PM

If you want to be absolutely sure please follow the below steps. Refer to this post and you will be helped.

please read and follow all instructions in the pinned topic titled "Preparation Guide For Use Before Posting A Hijackthis Log". You may have performed some of these steps already. About half way down are instructions for downloading HijackThis and creating a log.

When you have done that, post a log in the HijackThis Logs and Analysis Forum, NOT here, for assistance by the HJT Team Experts. A member of the Team will walk you through, step by step, on how to clean your computer. If you post your log back in this thread, the response from the HJT Team will be delayed because your post will have to be moved. This means it will fall in line behind any others posted that same day.

Start a new topic, give it a relevant title and post your log along with a brief description of your problem, a summary of any anti-malware tools you have used and a summary of any steps that you have performed on your own. Please include the top portion of the HijackThis log that lists version information. An expert will analyze your log and reply with instructions advising you what to fix.

Please be patient. It may take a while to get a response because the HJT Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

If after 5 days you still have received no response, then post a link to your HJT log here.

After posting a log you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc.) unless advised by a HJT Team member. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make may cause confusion for the member assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users