Specter Pro -- Spyware

Do you have a question? Post it now! No Registration Necessary.  Now with pictures!

Threaded View


I installed Specter Pro just for kicks (downloaded a torrent) and noticed that
NO AV s/w detects it.  

Is there a sweetheart deal with the AV companies to exclude it?

Are there any more commercial spy ware programs that the AV companies decide not
to warn you about?

Are there ANY programs that DO detect and remove it?

Thanks!



Re: Specter Pro -- Spyware




Quoted text here. Click to load it


Here is the URL if you are not familiar with it:
http://www.spectorsoft.com /


Re: Specter Pro -- Spyware



Quoted text here. Click to load it

Not all spyware is malware, just as not all adware is malware. Some
antimalware or antivirus might detect legitimate spyware if you have it
set to alert to potentially unwanted programs (PUP).



Re: Specter Pro -- Spyware



FromTheRafters wrote:

Quoted text here. Click to load it

I'd not seen this product before and renewed thoughts prompted by it!

*What if* ....... ?

One or more of those 'trusted' malware cleaning forums (or even a
trusted software programme) could, surely, download such a programme
onto a user's machine so that, forever afterwards, whatever is done on
that machine may be monitored by an outside agency.

 From what I have seen by watching computer cleaning activity on many
forums (and undergoing same personally, for practice purposes!) naive
folk are invited to install all manner of (to them) unknown programmes -
which they do without hesitation. They have no clue as to how such
action may affect their machine later on.

Lambs to the slaughter, maybe?  ;)

--
Dave


Re: Specter Pro -- Spyware




| FromTheRafters wrote:

Quoted text here. Click to load it


| I'd not seen this product before and renewed thoughts prompted by it!

| *What if* ....... ?

| One or more of those 'trusted' malware cleaning forums (or even a
| trusted software programme) could, surely, download such a programme
| onto a user's machine so that, forever afterwards, whatever is done on
| that machine may be monitored by an outside agency.

|  From what I have seen by watching computer cleaning activity on many
| forums (and undergoing same personally, for practice purposes!) naive
| folk are invited to install all manner of (to them) unknown programmes -
| which they do without hesitation. They have no clue as to how such
| action may affect their machine later on.

| Lambs to the slaughter, maybe?  ;)

Troll, troll...  troll.

What if your automobile tire falls off and your car crashes and you die.  Will
you stop
using your car ?

What if you took your narrow boat on the Themes and you hit a log and puncture
your hull
and you drown.  Will you stop using your boat ?

What North Korea sends a nuclear tipped ICBM at the UK.  Will you build a bomb
shelter ?

What if you crossed the street and were hit by a car and died.  Will you stop
crossing the
street ?

What if your wife sleep walks, picks up a knife and stabbs you as you slept.
Would you
divorce your wife ?

What if...

You constantly bring "what ifs..." into the picture is nothing but troll bait.

Is there a point in this post's "what if..." scenario ?  No.


--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp



Re: Specter Pro -- Spyware




Quoted text here. Click to load it


David,

Do you know the answer to my question, please?  You or Dustin should know since
you guys are the resident experts here, right?





Re: Specter Pro -- Spyware





Quoted text here. Click to load it


| David,

| Do you know the answer to my question, please?  You or Dustin should know since
| you guys are the resident experts here, right?


I'm not an expert but, FTR his it on the nose.

You have to be wary about grey area software.

If the software is designed to be spyware and it is publicized as such and the
EULA states
the facts then it falls into the grey area of a Potentioally Unwanted Program
(PUP).

If you are on an employers computer the employer may install monitoring software
that
falls into this grey area.  The software is properly stating what it does and
the EULA is
in line then it can be used in a lawful fashion.  However if a monitoring
software has no
disclaimers or falsley states its intentions in a EULA for what it does or if it
has no
documentation and use clauses then it can be non-legitimate and thus be declared
malware.


--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp



Re: Specter Pro -- Spyware




Quoted text here. Click to load it


Okay, what about detection?  When I played with it I threw Aviva, MBAM, and
Super A/S and .... ziltch.

This is not for a company PC, it's for my own personal PC.  And a can't
understand why (as far as I know), nobody has software to detect it.

What other devious key loggers are out there that will provide the owner of his
OWN PC if such (PUP) are installed.  And how do I find out if they ARE there?
I'm not the only one with admin rights to my PC, I have a girlfriend (nuf'
said?) lol ...


 

Re: Specter Pro -- Spyware




Quoted text here. Click to load it

If you don't already have an account at the mbam forum, I'd recommend you
create one. Create a fresh thread describing this software and the url
where you obtained it, so that they can acquire samples.

The team will check it out and perhaps add it to future definitions.

Just so you know tho, the spectorsoftpro suite would fall under..
greyware. It's spyware, but discloses this during installation. :)
 
Quoted text here. Click to load it

It could just be a newer executable, or simply hasn't been brought to
their respective attentions. The antimalware guys rely on people like you
to bring things to light you feel should be detected. So, bring this to
their attention via the forum.
 
Quoted text here. Click to load it

To take a guess, probably lots. Some aren't always so straight up about
their intentions either.


--
"Hrrngh! Someday I'm going to hurl this...er...roll this...hrrngh.. nudge
this boulder right down a cliff." - Goblin Warrior


Re: Specter Pro -- Spyware



Hello, G.!

You wrote on Sat, 01 May 2010 17:09:18 -0500:

  | Okay, what about detection?  When I played with it I threw Aviva, MBAM,
 | and Super A/S and .... ziltch.
 |
 | This is not for a company PC, it's for my own personal PC.  And a can't
 | understand why (as far as I know), nobody has software to detect it.

Your millage may vary...

--
With best regards, gufus.  E-mail: stop.nospam.gbbsg@shaw.ca



Re: Specter Pro -- Spyware




[...]

Quoted text here. Click to load it

The *malware* to detect, would be the surreptitious installer (trojan)
of the keylogger. Since you evidently installed it yourself, there *is*
no malware to detect. If this program comes with a way to install it
surreptitiously, then that function (or it's result) *should* be
detected. What you would need in order to prevent one administrator from
being able to detect that the other' has installed spyware is to have
the whole deal on a monitor or hypervisor where one administrates the
"platform" on which both administrators appear to administrate in the
emulated "environment".

Don't worry about malware too much, you've got a
girlfriend/administrator so you're pretty much 'toast' anyway. :oD



Re: Specter Pro -- Spyware




Quoted text here. Click to load it

I also do house calls on the side.  I would like a program that detects ALL key
loggers, not just non-commercial ones.  Husband spying on wife, etc...



Re: Specter Pro -- Spyware



Quoted text here. Click to load it

I'm speculating here that some antispyware vendors would be willing to
supply detection for these once they are reported to them.



Re: Specter Pro -- Spyware




Quoted text here. Click to load it

I would have to agree. :)


--
"Hrrngh! Someday I'm going to hurl this...er...roll this...hrrngh..
nudge this boulder right down a cliff." - Goblin Warrior


Re: Specter Pro -- Spyware




Quoted text here. Click to load it

As many of the keyloggers are commercial in nature; Perhaps you could
purchase a copy of the popular ones and provide the complete installer to
various antimalware researchers.

I'd be willing to release a database update to BugHunter to include each
one you are willing to provide. I'll go one step further, I'll submit
them to my friends at malwarebytes for possible inclusion into their
databases as well.

That's probably your best bet for getting something to detect all of
them; Atleast in so far as commercial goes. Us antimalware guys go for
the things we see in the wild, doing harm.


--
"Hrrngh! Someday I'm going to hurl this...er...roll this...hrrngh.. nudge
this boulder right down a cliff." - Goblin Warrior


Re: Specter Pro -- Spyware




Quoted text here. Click to load it


I'm not buying them, but here is where you can look.....

http://extremenova.org/details.php?q=4d21d5e379ac1bd6c756d8755a2e4637138803e7
http://h33t.com/download.php?id=4b383db7d8893f0f2d93ed61950f9b79c2e6f525&f=Spector+Pro+2009%5BH33T%5D%5BNexTG%5D.torrent
http://h33t.com/download.php?id=6627ba39fa2573190a632ae1aaf7e7b8ab9e6021&f=Spector+Pro+2009+%2B+Serial++%5BGet+eye+on+your+childen%5D+%5Bwallpapers001%5D%5Bh33t%5D.torrent


Thanks for the offer.


Re: Specter Pro -- Spyware



G. Morgan wrote, about keylogging software:

Quoted text here. Click to load it

If you don't trust her, why does she have an _admin_ account on your
computer?

Solution:  upgrade to Girlfriend 2.0

--
   -bts
   -Four wheels carry the body; two wheels move the soul

Re: Specter Pro -- Spyware



Quoted text here. Click to load it

That's not very likely, such a trojan would soon be discovered and dealt
with - very bad for the 'trusted' source's reputation. That's right
there with the old "What if the AV people are writing the viruses?"
conspiracy theory.

I can't think of a legitimate reason, offhand, for surreptitiously
installing spyware. The administrator/owner of a machine can install it
*and* exclude the AV or whatever from alerting someone in userland to
its existence.



Re: Specter Pro -- Spyware



FromTheRafters wrote:
[...]
Quoted text here. Click to load it

Thank you for responding FTR! :)

Quoted text here. Click to load it

But .... *I* believe that it is *possible*!
                                  ********

As I've said elsewhere ..........

"What a super ruse it would be, eh? - to clear a machine of everyone
else's 'nasties' but then, perhaps, leave their own package installed on
the user's machine. No one would ever suspect, would they?"

Quoted text here. Click to load it

Now this is where we seem to have a *real* difference of opinion, FTR!

Just *who* would discover such covert malware. With today's high-speed
and powerful machines a *user* is highly *unlikely* to discover that
they have become part of a botnet! If their /cleaned/ machine is
performing *better* that it had in a long while, why would the *user*
suspect anything untoward?

My limited understanding of matters is that once a machine is under the
control of a botmaster, all personal control is effectively lost.

Do you dispute this?

Quoted text here. Click to load it

The reasons for installing /illegitimate/ spyware are manifold but it
would be principally to steal money. Cybercrime has risen exponentially
since the advent of high-speed Broadband connection - maybe in the past
6 or 7 years in most places.

How this has happened is of much interest to me. Perhaps we could
discuss anything in this article which which you disagree?

http://www.geekstogo.com/2007/10/03/what-is-a-backdoor-trojan /

I was especially interested in this extract:-

"Because backdoor trojans have the potential to gain such complete
control of a system, and install malicious code that may not be
detectable, itís wise to consider reformatting any system thatís been
infected."

MAY NOT BE DETECTABLE - Wow! ;-)

--
Dave - seeking only the truth

Re: Specter Pro -- Spyware



Quoted text here. Click to load it

Bigger picture:

Remember the quote about how you can fool some of the people some of the
time, but you can't fool all of the people all of the time? Malware like
that relies on the first part of that quote. It doesn't care about the
second part because there is no shortage of fools. Such software does
eventually get discovered, but usually cannot be traced back to a single
source - there are many sources and they change location often. If
someone has a *real firewall* then this type of commercial malware's
activities can soon be discovered.

So asking "who would" is the wrong question - the individual is
insignificant in comparison to the whole. Instead you must ask yourself
if *anybody* would discover the hidden function, and what that would
mean to an otherwise legitimate (contactable) business.

Quoted text here. Click to load it

Yes, but I may be reading it differently than you are. It would depend
on how much control is still afforded you by the nature of the offeding
program.

[...]

Quoted text here. Click to load it

Not to be confused with being "undetectable". :o)

The author is probable talking about what I usually refer to here as
"unknowns". Once you discover that you have a backdoor trojan that is
known to download and execute various and sundry *other* malicious
programs. Various and sundry "may not be detectable" since they are
undefined.



Site Timeline