Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
News

Morpheus Hijacks Browsers For Affiliate Links 504

An anonymous reader submits: "According to this news.com article, morpheus (aka streamcast) has begun silently installing a browser plugin on its users' machines that basically hijacks the web browser even when not running Morpheus. An afflicted browser will sense if a user is going to visit a shopping site like Yahoo! or Amazon, and secretly send them to a different site instead and then redirect them from this site to the user's intended destination. The user will not be aware that this is happening... however the site doing the redirecting will benefit because they are set up as an affiliate partner and will get a commission on the backs of the user. On a horrible scale of 1 - 10 for sleazy business practices, I rate this a 9. Comments?"
This discussion has been archived. No new comments can be posted.

Morpheus Hijacks Browsers For Affiliate Links

Comments Filter:
  • Scary (Score:3, Interesting)

    by EvilAlien ( 133134 ) on Wednesday March 20, 2002 @01:39AM (#3192443) Journal
    What else is peer-to-peer software silently borrowing?

    Trillian password files perhaps? [neworder.box.sk]

    • Re:Scary (Score:3, Insightful)

      by mcrbids ( 148650 )
      That's not all. Try searching for "system.dat". That's the Windows System Registry. There, you can get names, passwords, Install codes, all kinds of neat stuff. Hit Gnutella or Morpheus. Do a regex to get the keys, etc.

      That's scary.
      • Re:Scary (Score:3, Informative)

        by matrix29 ( 259235 )
        The skinny of the news is a file called BPBOH.DLL that comes with the MORPHEUS PREVIEW version and carries the nasty little bugger that is causing CONSTANT browser crashes right now on my system. LAVASOFT's AdAware has a program called REFUPDATE which includes the killer for this little spyware nasty. The downside is RefUpdate is SUPPOSED to be aware of BPboh.dll, but didn't find it on my system as per Lavasoft's mirror page. So search the BPBOH.DLL and delete the nasty crashing bugger.

        The nasty is made by a sleazy firm called Wurld Media, Inc. (They spelled it "Wurld" not "World")

        Here's a snippet of the bastard.
        rdxr020305.dat (which appears on my desktop)
        bpboh.dll (the offending file)
        bpboh2.dll (not on my system but in the hex dump)
        www.rdxrp.com
        www.maplehollow.com
        www.rdx rs.com
        www.inmotiongolf.com
        /rdxr020304.dat
        /bp boh.dll
        about:blank werule
        \winbpupd.exe
        www.sephora.com
        http://www.sephora.com
        (Who wants to boycott Sephora's "we'll make you look like a prostitute" makeup selection? I don't wear it, but who would?)
        http://www.sephora.com/help/about_sephora.jhtml?lo cation=contact [sephora.com]

        www.shop.barnesandnoble.com
        www.barnesandnoble. com
        http://www.barnesandnoble.com
        (Who wants to boycott Barnes&Nobles now for foisting crappy spyware on us? I sure do! By the way, MAKE CERTAIN you let them KNOW what we feel about spyware please.)
        http://www.barnesandnoble.com/help/customer_servic e/morehelp.asp?userid=199PI1EZ1Y [barnesandnoble.com]

        Go to this nasty crapware website and share how you feel about their little spyware games please.
        http://www.wurldmedia.com/ [wurldmedia.com]
        Their email address for contacting them is
        corpcom@wurldmedia.com [mailto]

        Or use their snail mail address:
        WURLD Media, Inc.
        63 Putnam Street
        Saratoga, Springs, NY 12866
        Telephone: 1-518-691-1100
        Fax: 1-518-691-1180
        (Oh... let me think for a moment about what kinds of FAX pranks exist...)

    • Re:Scary (Score:4, Funny)

      by supermoose ( 562109 ) on Wednesday March 20, 2002 @02:22AM (#3192657)


      The last time I ran a peer-to-peer client, the darn thing went and stole all my music! =)

    • Excuse me... (Score:5, Insightful)

      by metacell ( 523607 ) on Wednesday March 20, 2002 @04:02AM (#3192878)
      ... but this is a storm in a waterglass. I must point out what the article actually said and didn't say.

      The article said that StreamCast will:

      1. Redirect users to another site to collect usage statistics before sending them to the site they wanted to go to. This might be seen as invading people's privacy, but no personal data will be collected, merely usage statistics.

      2. Put up a shopping section in Morpheus. That sounds perfectly legitimate to me.

      3. Put referrals to online stores inside the browser window in some unspecified manner.

      Please note that 1) and 3) are two separate points. They won't redirect you to another site when you're trying to go to Amazon.com, and then claim the referral bonus. The redirection is only for collecting usage statistics.
      And the referrals inside the browser window have nothing to do with the redirection.

      There's nothing in the article saying that StreamCast will hijack other people's referrals.

      There's nothing in the article saying that StreamCast will pretend to refer people to sites (like Amazon.com) when they go there themselves.

      • Re:Excuse me... (Score:5, Insightful)

        by AnalogBoy ( 51094 ) on Wednesday March 20, 2002 @04:16AM (#3192910) Journal
        Slashdot requires sensationalism such as this to keep up it's reader base. I propose one of the following is true:

        1) The editors are complete and total idiots.

        2) The editors are actually brilliant businessmen who know how to tool their audience into a frenzy, keeping them addicted to the forum, where they return to the page every x minutes/hours to continue their bitching/arguments/debates/conversations/firstpost ing/trolling to their hearts content all the while racking up $$ in ad revenue.

        I'll let you be the judge.
        • Re:Excuse me... (Score:5, Insightful)

          by Elvis Maximus ( 193433 ) on Wednesday March 20, 2002 @10:28AM (#3193769) Homepage
          There is a third possibility:

          3) The editors started this thing on a whim and lucked out when it became popular enough that they could make a living doing it. But they're not professional editors, publishers, or fact checkers, and they're not particularly interested in those things. And with a few thousand people critiquing every story, no amount of sloppiness goes unnoticed.

          Just throwing it out there.
    • Re:Scary (Score:4, Informative)

      by thing12 ( 45050 ) on Wednesday March 20, 2002 @09:33AM (#3193523) Homepage
      The best any program can do is hide the passwords if they want to allow auto-login. It just can't be done any other way. You can get auto-login passwords MSN, AOL, and ICQ all by going through the registry or configuration files. Trillian could encrypt the files, but then you need to enter a password when Trillian starts. Maybe that's a small price to pay for a little bit of added security, maybe it it's not worth it to most people.

      I encrypt my Trillian directory and run it as a user that has the ability to read those files. And likewise I run all file sharing programs as a user that has no permissions at all except for their own directories. Windows 2000/XP aren't so bad :-) at least they give you a process model that's similar to *nix.

    • Re:Scary (Score:3, Interesting)

      by Zeinfeld ( 263942 )
      What else is peer-to-peer software silently borrowing?

      There are a bunch of overlapping issues here. One is the politician problem. Many people want to vote for politicians who are going to serve their personal self-interest best. This raises the problem that the self-interest of the politician is rarely that of the voters, particularly if they are elected. So politicians who make a bid for public support on the basis of self interest alone are likely to believe what they preach and serve their personal self interest exclusively.

      The problem of spyware appears to be almost unique to P2P software. This might be coincidence, P2P just happened to get hot at the same time that the Internet bubble burst and Internet business models turned Hobbsean. On the other hand it appears more likely that people who write software whose primary purpose is to help people steal music have no moral qualms about exploiting their users as well.

      A second set of problems comes from the fact that P2P pretty much cuts itself off from most of the traditional Internet business models. Post Napster no P2P company can make money from any business model that requires them to maintain a central server or long term business relationships with other companies.

      The thread contains many posts that attempt to dispute the claim that Morpheus is doing anything bad. The debate tactics used suggest that it is FUD from the Morpheus self justification dept. There are plenty of posts saying 'the poster hasn't read the article, Morpheus is not stealing referals', only that is precisely what the article accuses Morpheus of. This is not about collecting information about users.

      On the legal side I don't imagine that this is a sustainable business model. There is no way that Amazon and the other companies are going to want to pay people for intercepting referals from other sources. Depending on the circumstances if an affiliate is collecting money by misrepresentation the actions may constitute fraud.

      The other main issue is of application security. Here the only significant difference between Linux and Windows is that Windows being more popular makes it a more attractive target for scumware. Linux has to consider the problem since if Microsoft develops a defense the scumware folk will attack Linux next on the 'bear principle' - I don't have to outrun the bear, I just have to outrun you.

      There is a hook in IE to disable all third party plug ins. The problem is that this is the big switch approach. What there should be is the ability to select which plug ins are enabled. Windows really should not have so many under the covers switches for installing software. I recently found that one of my machines had been infected by comet cursor, I have no idea when. Checking the Windows registry to find out if you have spyware reminds one of Arthur Dent's difficulty finding out about the plans to build a bypass through his house.

      The problem with the big switch is that Adobe Acrobat is pretty useful. Macromedia flash is also useful in limited circumstances. I like the animations on Slate, but the new breed of annoyance ads have led me to disable it. There sholuld be a switch to allow plug ins to be enable on a site by site basis. Unfortch, the security zone mechanism does not do this as yet.

  • more links (Score:4, Informative)

    by kritikal ( 247499 ) on Wednesday March 20, 2002 @01:39AM (#3192444)
  • by monkeyserver.com ( 311067 ) on Wednesday March 20, 2002 @01:40AM (#3192450) Homepage Journal
    So this is based on zero knowledge, but I would guess that that violates the terms of referership (is that a word), considering that fact that that "partner" did not actually refer you to the site.

    I think a list should be compiled and reported, I would guess that places like yahoo and amazon could file criminal, if not at least civil, suits against such cheaters. It wouldn't surprise me if they did too, just to make a point, and to try not to jade users to the system....

    any thoughts? that's a dumb question this is /.
  • by Raskolnk ( 26414 ) on Wednesday March 20, 2002 @01:40AM (#3192456)
    Now that Morpheus is just a hacked-up (or down ;-) version of Gnucleus, there's really no point in using it anyway. I don't see what it provides that Gnucleus doesn't, other than annoyance.
  • Great Comments (Score:2, Redundant)

    by shogun ( 657 )
    Oh this is promising, I load up this news article and theres a total of 3 comments posted under it, all of which are below my threshold, I assume all of which are first posts. But anyway back on topic.
    I've heard of sneakyness not far off this already. It seems some of the other P2P file sharing programs also like to install sneaky plugins which do things from reporting your every url visited up to popping up windows with ads in them on encoutering certain keywords. Very nasty and can also incur a performance hit.
  • Okay.. (Score:2, Insightful)

    by Anonymous Coward
    So Kazaa, the premeir FastTrack client, begun to bundle spyware.

    Great, I can deal. I switch to Grokster.

    Grokster begins to bundle spyware.

    Fuck. Switch to Morpheus.

    Morpheus bails from FastTrack, and switches to Gnutella.

    Fuck again. Switch back to Grokster, use AdAware [lavasoftusa.com].

    See that Morpheus, who explicitly claimed that it contained "No Spyware of Any Kind" engage in this type of practice?

    I can only laugh at the pitiful wreck that the company/corporation-based P2P programs have become.
    • Limewire is good. But don't download its Windows installer- that has spyware in it! Instead: install a JVM on your computer, then go to Limewire's page for alternate OS downloads [limewire.com], select "other" as your operating system, and run it using the JVM, without all the crap they bundle in. Most spyware is Windows-specific.
      Yeah, it's a shame that P2P only became popular recently, in the age of the MP3. If it had been invented 10-20 years earlier, with RFCs, and had the stature of, say, FTP, people would be thinking of it as a fundamental part of the Internet. Instead we have this horrible situation, where anyone who uses a P2P client is presumed to be a freeloader or a criminal. P2P deserves better than a bunch of spyware-loaded clients that block each other's users from their own networks.
  • by DuncanMurray ( 448670 ) on Wednesday March 20, 2002 @01:41AM (#3192467) Homepage
    Business 101 - try really , really hard to piss off your customers

  • I like it. (Score:4, Insightful)

    by Neck_of_the_Woods ( 305788 ) on Wednesday March 20, 2002 @01:42AM (#3192469) Journal
    The truth of it is this could be seen as a virus. It is just a profitable one. They will get smacked on this one as soon as it comes out in the light of day.
    • Re:I like it. (Score:3, Informative)

      by muffen ( 321442 )
      The truth of it is this could be seen as a virus.

      You could not be more wrong. This is nothing like a virus. A virus is defined as a piece of code that replicates. Since this does not follow the definition, it is NOT a virus.
  • well in all honesty (Score:2, Interesting)

    by theCURE ( 551589 )
    What you don't know can't hurt ya. Most people will still get up and go to work the next day. The crud is going to come down the line, when it waterfalls into a much bigger problems with worse results.
  • by AtomicBomb ( 173897 ) on Wednesday March 20, 2002 @01:42AM (#3192477) Homepage
    Man-in-the-middle attack is the only phrase that flash across my mind... I have no way to check the identity of the "referer".

    You can call me a paranoid. Each time when I need to buy stuff online using credit card. I will reboot to a cleaner "environment" -- a clean copy of OpenBSD or something similar. God knows who the hell the various windows plugins are doing..
  • by quan74 ( 451034 ) on Wednesday March 20, 2002 @01:43AM (#3192480) Homepage
    From also recording your credit card info etc by acting as "the man in the middle" There should be laws to stop this kind of thing instead of ones that make it illegal to record a backup of a CD I purchased!
  • by Cutriss ( 262920 ) on Wednesday March 20, 2002 @01:44AM (#3192487) Homepage
    An afflicted browser will sense if a user is going to visit a shopping site like Yahoo! or Amazon, and secretly send them to a different site instead and then redirect them from this site to the user's intended destination.

    The final destination is more or less the same. The difference is the intermediary. Morpheus isn't stopping me from going to Amazon by instead redirecting me to Borders.com...They're just stealing referral dollars.

    Honestly, though...I wonder how long it'll be before these online vendors lock out Morpheus' referral IDs, or even worse, deny the connections altogether (since the most recent source IP will be Morpheus' proxy, not your own).

    And I assume that if there's a pre-existing Referral ID, Morpheus will strip it out and replace it with its own. Doesn't this constitute actual monetary theft?
    • how long it'll be before these online vendors lock out Morpheus' referral IDs, or even worse, deny the connections altogether (since the most recent source IP will be Morpheus' proxy, not your own).

      It doesn't sound like it uses any kind of proxy, an IE plugin redirects you to another website which redirects you back to amazon/yahoo/whoever so the morpheus machine isn't the one connecting to the vendors, they're just telling your machine what url to request from the vendor. I would be very surprised if vendors honor the comissions "earned" through this method.
      • It could make a huge difference to small Web sites that rely on referrals to defray bandwidth costs. Linking to relevant books on Amazon (or bn) can often make more than banner ads. If a significant proportion of users have Morpheus installed (not an unreasonable assumption), the other referring sites could go under.


        I know I'll be checking that any referral programs my Web site participates in aren't on Morpheus's hitlist, and switching to a competitor if they are. I expect others to do the same, thus giving retailers like Amazon a real incentive to make sure that they don't pay anything out to Morpheus.

  • by Rayonic ( 462789 ) on Wednesday March 20, 2002 @01:45AM (#3192493) Homepage Journal
    But I keep getting redirected to ZDnet somehow!
  • It's scumware... (Score:5, Informative)

    by ckkoh ( 514975 ) on Wednesday March 20, 2002 @01:45AM (#3192497)
    This belongs to a new breed of nusiance known as scumware. Check out http://www.scumware.com for more info.
  • by MattRog ( 527508 ) on Wednesday March 20, 2002 @01:46AM (#3192508)
    Morpheus is totally fucked.
  • by Suicide ( 45320 ) on Wednesday March 20, 2002 @01:47AM (#3192511) Homepage
    Honestly, I had the idea for this a while ago while talking with a friend. I've been waiting for someone else to implement it. Its not that much different than those sites that collect and list internet deals, in the hopes that you'll follow their links and they'll get the referer fee, Like this one [slickdeals.net].

    While I personally see this as a bad thing, since they do it behind the users back, I would probably have no objection to installing something similar for slashdot. I don't exactly feel the need to subscribe, but I would have no objection to them collecting a referrer fee off of my internet purchases.
    • Its not that much different than those sites that collect and list internet deals, in the hopes that you'll follow their links and they'll get the referer fee, Like this one [slickdeals.net].

      It is totally different than the sites that provide lists of internet deals. These sites refer customers to a site that the consumer most likely would not have gone to if they had not known it was the lowest price. Sites that list internet deals deserve the referall because that is the reason the refered site sold the product. Morpheus has nothing to do with why that consumer went there and thats why it is nothing at all like the internet deal sites. And furthermore, these deal sites don't covertly install a plugin to get all the referalls, they simply have links on a page and provide a service to consumers.

  • I guess this is why I entered cnn and ended up on slashdot.
  • by dytin ( 517293 ) on Wednesday March 20, 2002 @01:49AM (#3192517) Homepage
    This isn't that bad really for the user, Yahoo and Amazon will give a commision to somebody anyways. What really annoys me is that this hurts all the other websites in the world. If I give a legitimate referal from my site to Amazon, then I should get the commision, not Morpheus. If this becomes common practice, then it will effectively kill the way that business is done on the web, and in the process take out a ton of small websites that are struggling to stay alive out there.
    • by Dynedain ( 141758 ) <slashdot2 AT anthonymclin DOT com> on Wednesday March 20, 2002 @01:58AM (#3192558) Homepage
      This isn't that bad really for the user, Yahoo and Amazon will give a commision to somebody anyways

      WRONG!!!!! - What's happening here is when a user types in amazon.com, Morpheus redirects the request through their amazon referrer page. Hence, amazon is now paying out referals that it otherwise would not have. Direct navigation does not incurr referal fees, only refered navigation
  • "With these plugins, I'll take over the WORLD!"

  • by Tremblay99 ( 534187 ) on Wednesday March 20, 2002 @01:51AM (#3192527)
    Under "Tools" -> "Internet Options" -> "Advanced" deselect "Enable third party browser extensions" and reboot. Even if the .dll responsible for the redirection, bpboh.dll, is installed, it won't be able to run.
    • of course that turns off flash, shockwave, java, possibly windows audio support, quicktime, real, vrml, and a whole slew of other things you might have running and actually want
      • by GoRK ( 10018 ) on Wednesday March 20, 2002 @05:15AM (#3193048) Homepage Journal
        No it doesn't. Browser extensions aren't the same thing as plugins like flash/shockwave/etc. that handle files based on a mimetype (or file extension - stupid microsoft). Browser Extensions change the behavior of the browser itself - They are things like the Google toolbar and that Alexa piece of crap. There are some useful ones too that do things like block ads and kill popups. I have Extensions turned off and I can still see flash just fine. Sadly, I can no longer kill popups or ads so easily in IE anymore. Oh well... for all these settings and extensibility, we still can't control the levels of access that scripting languages have to or system or selectively allow certain programs to run.

        I think IE is scumware.
    • Thus disabaling the most useful thing about IE, the google toolbar!
  • And what, pray tell, is a fucking 10?

    I think someone is being a little um. . . friendly to these jerks. Not that the warez leech kiddies don't deserve it.
    Bah

    • by bonzoesc ( 155812 ) on Wednesday March 20, 2002 @02:00AM (#3192567) Homepage
      A 10 is when it takes control of your computer, prints out ads, and has your AIBO tape them up all over your house. It paints your walls with company logos, tapes over your Star Trek tapes with infomercials, fills up your TiVO with the same, and replaces all your vinyls with Britney Spears CDs. It will kick your puppy and attack your kittens. It converts your children to Scientology and steals your beer.
      • Good Lord, man, that sounds like what some people I knew in college might have done, except that they would have used New Kids on the Block and Debbie Gibson CDs.

        Oh wait, it's Deborah Gibson now. Sorry Debbie.

  • by shri ( 17709 ) <shriramc.gmail@com> on Wednesday March 20, 2002 @01:51AM (#3192530) Homepage
    Has anyone asked Amazon what they think about this practice?

    From what I can see on their website [amazon.com] ..

    To protect the integrity of the reputation of Amazon.com Associates as well as the Amazon.com brand name, you may not promote your site via certain forms of indiscriminate advertising, commonly referred to as "spamming." Accordingly, you may not promote your site via unsolicited commercial e-mail (UCE), postings to non-commercial newsgroups, or cross-postings to multiple newsgroups at once. In addition, you may not promote your site in any way that effectively conceals or misrepresents your identity, domain name, or return e-mail address.

    If I were Amazon, why would I pay 10-15% margin to someone who has not really promoted the product, but has hijacked the links?

    They also probably violate this portion of the operating agreement.

    We may reject your application if we determine (in our sole discretion) that your site is unsuitable for the Program. Unsuitable sites include those that:
    promote sexually explicit materials promote violence promote discrimination based on race, sex, religion, nationality, disability, sexual orientation, or age promote illegal activities include "amazon" or variations or misspellings thereof in their domain names otherwise violate intellectual property rights
  • TurboTax and Quicken install advertising icons on the user's desktop. A whole bunch of Windows applications do that, often icons for Internet providers, but in the case of TurboTax and Quicken they install icons for banks.

    These folks really must think that they own the user once the user buys their product, becuase even a "respectable" company like Intuit doesn't seem to have any problem with monkeying around with the private parts of the user's computer for their own purposes. Certainly those icons are paid placements.

    Bruce

    • by j7953 ( 457666 ) on Wednesday March 20, 2002 @01:20PM (#3194728)
      These folks really must think that they own the user once the user buys their product

      Well, maybe that's because they effectively do own the user? Operating systems are still designed around the idea that any application has all priviledges the user running it has. This is a good idea if you have small tools -- e.g., cat may read all the files that I have read permission on. When you have larger applications, like a complete office suite, this solution is somewhat less good. Once the user installs software from the internet, this design is a fundamentally flawed one.

      Users expect that e.g. on a UNIX system, cat will only read files, and therefore it is a perfect idea to let cat read all files that the user has read permission on. The user's perception will be "I may read this file," when technically it is actually "software I run may read this file."

      As soon as the user installs software that does things they don't expect, because the software doesn't advertise all of its functionality, this model breaks. Most users won't even find out, and if they did, they'd probably ask "why is Morpheus allowed to do this?" The user will no longer have the perception that he is doing things, and will have to realize that actually it is the software doing things. The operating system however is still designed around the idea that everything the sofware does was intended by the user. (No, I don't have an idea for a better design.)

  • It's called FRAUD (Score:2, Insightful)

    by erc ( 38443 )
    If I were Amazon, I'd be going after both the affiliates and Morpheus - this sort of thing is called fraud...
  • I saw something doing that (wierd long url and instant redirect) when I was browsing, esp. when I went to register.com.......I figured some piece of software I had was doing it (figured it was DivX 5 though).....now I know
    • by gregor ( 6723 )
      I played with a few URLs, and here's my findings:

      www.ebay.com

      links to http://www.qksrv.net/image-280514-220264, which has an instant redirect to pages.ebay.com. I played with this in netscape 6.2 and lynx, and they still directly put me towards www.ebay.com. There is definitely redirection occurring here.

      www.amazon.com

      links to http://www.amazon.com/exec/obidos/subst/home/home. html/104-9801158-34639, while netscape and lynx go similar (but not the same) page in the same sub-directory tree. I'm not sure if there's a url redirect occurring here.

      www.barnesandnoble.com

      In IE, goes to http://service.bfast.com/bfast/serve?bfmid=2181&so urceid=21425507&categoryid=rn_home, then redirects towards a barnesandnoble.com redirected address. Netscape and lynx still go straight the low level barnesandnoble.com address. There is also definite, blatant redirection occurring here.

      So, there you have it- out of just three simple checks, Morpheus went and screwed with two of them. I'm getting this crap off my machine and installing a better gnutella client.

  • ... I use Opera. Although if too many people start using it, I'll haveta find something else.
  • More evidence that people suck.
  • by libertynews ( 304820 ) on Wednesday March 20, 2002 @02:02AM (#3192579) Homepage
    If I were a user of Morpheus I'd be looking at filing charges for cracking my computer and using it for unauthorized activities. Companies conducting business like this need to be naild HARD. Teach them a lesson and make an example of them.

    And what about the programmers who wrote this 'feature'? Who are they? I wouldn't be opposed to blacklisting them, or at least smearing their names across the headlines. This is sleazy and unethical and shouldn't be tolerated by the rest of us 'respectible' programmers.

    Brian
  • Like KaZaA? (Score:2, Insightful)

    by Xenex ( 97062 )
    Reminds me of a report [slashdot.org] about KaZaA around the middle of last year. The TopText 'spyware'added yellow links to some words in Internet Explorer. I never dealt with it first-hand, but it sounded very annoying.

    Is Morpheus' latest effort at all related? It seems to be based around thr same idea, however the idea of being redirected sounds worse. For exanple, does it work that if you type say, http://www.google.com, you arrive at AltaVista?

    What is it with crappy (ex)FastTrack networks and I-can-believe-it's-not-trojan software?

  • On a horrible scale of 1 - 10 for sleazy business practices, I rate this a 9.

    Almost as horrible as stealing Intellectual Property from musicians?
  • go there, get your copy today! this has got to have some lawyers in a frenzy, but really when you're the crack dealer selling to HS kids, is someone really going to suddenly pay attention now that you're lacing it with some heroin?
  • Sad, but not new (Score:2, Insightful)

    by ziriyab ( 549710 )
    I saw something similar a few weeks ago. A friend asked me to take a look at his computer. He had started getting bombarded with porn ads for no reason. I fired up his IE and found out that his home page had been switched to a site that redirected him to his old home page, but not before popping up a bunch of porn windows. The process was invisible to him.

    What's worse is that it had somehow also managed to make it impossible to change his homepage from within IE (the fields were grayed out.) After a quick registry hack he was porn free

    Anyway, as long as there's a way for people to make money off the swiss cheese that passes for software security, they're going to do it. The sad thing is most people don't know how to stop these things. The sadder thing is that most people don't remember a time when the internet wasn't about making money (when people were boycotting web sites with banner ads) and don't think there's much wrong with these tactics.

  • So don't use IE... (Score:4, Insightful)

    by jdreed1024 ( 443938 ) on Wednesday March 20, 2002 @02:23AM (#3192663)
    I should get some mod points for that subject :-)

    Seriously though, the article says it can only affect IE. This makes sense, given that it's easier to do sneaky things in the registy and elsewhere which, while invisible to the user, will cause drastically different behavior in parts of the operating system, like IE.

    Aren't you glad you use Netscape? Don't you wish everyone else did?
    (apologies to the old Dial ads)
  • by heretic108 ( 454817 ) on Wednesday March 20, 2002 @02:27AM (#3192674)
    While visiting astalavista to, um, get a serial number that I'd previously lost from a program I'd bought, I followed a link to a site http://www.cracks.am [cracks.am]. When I clicked on the link to download the serial, a dialog popped up asking for my permission to install a program from C2 Media, and certifying that the program had a certificate from Verisign.
    Stupidly, I clicked yes, and promptly regretted it. A whole day of browser abuse followed.
    * My desktop got taken over by an 'affiliates' homepage
    * My desktop got swarmed with icons for adult and gambling sites
    * If a site took a long time to load, or got a 404, my browser would end up at the portal http://www.lop.com, part of the 'affiliates' network.
    The program didn't leave a listing in the add/remove window. It wasn't in c:\program files.
    It had buried itself deep into my windows folder.

    Instinctively I searched my disks and registry for lop.com and removed all references. No cure. My browser still kept going to lop.com.

    My only cure was radical action. I ran Win2k in a VMware box with disks set to non-persistent. Immediately before saying 'yes' to the installation, I ran the 'InCtrl' install tracker program. Thank God for InCrtrl - after the install was done, I had a list of all files added by this nasty piece of scumware, and had the utmost pleasure in removing it once and for all.
  • Screw subscription based system for Slashdot. Just make up interesting articles and put them in the headlines and get the company involved to pay for being a referrer. Slashdot viewers would see great articles like this: Windows XP Home Page: Which Edition Is Right for You? [microsoft.com] and Target's Deal of the Week [amazon.com]. In return, Microsoft and Target pay $0.01 a hit or something. CmdrTaco could retire in a few days!

    It's like hijacking hits, but with the slashdot effect.

  • ...both the original version and the preview. Good ridance.
  • Somebody really needs to file Federal criminal charges on this. This clearly "exceeds authorized access", as defined in the Federal computer crime law.
  • by rufusdufus ( 450462 ) on Wednesday March 20, 2002 @02:40AM (#3192719)
    Installing Bearshare also installs two secret spyware apps. One of them does a similar redirection, but is especially evil because it bypasses firewalls like ZoneAlarm. More information about this at cexx.org/newnet.htm [cexx.org] and lots of related stuff at the root cexx.org [cexx.org]
    • Installing Bearshare also installs two secret spyware apps.

      Yeah, but I was able to figure this out! The dialog in question presented during installation has following checkboxes:

      • BearShare
      • BearShare Desktop Icon
      • SaveNow
      • New.net Domain Names
      • Desktop Shortcuts: Links to Great Products
      • n-CASE Ad Delivery System
      Simply uncheck everything else but BearShare and there's no spyware. To be honest, if you couldn't figure out which of those you need then I'd suggest you to sell your PC and purchase Xbox or PS2 instead.

      ("Secret spyware" that was mentioned contains New.net and SaveNow)

  • Delete Morpheus (Score:5, Insightful)

    by Von Rex ( 114907 ) on Wednesday March 20, 2002 @02:44AM (#3192726)
    First, they took an open source app, Gnucleus [gnucleus.com], and repackaged it as their own, adding nothing while actually degrading the software by adding popup ads.

    Second, they started banning from their chat room anyone who mentioned this fact and posted the url to Gnucleus.

    Now, they're installing scumware in order to control your browser for their own profit even while you're not using Morpheus.

    Anyone left who still wants to argue with me about whether or not Music City is a company of degenerate sleazebags? Anyone who still disagrees with me that the proper course of action is to delete Morpheus and install Gnucleus immediately? (at least until something better comes along).
  • I hoped the Morpheus name would help gnutella network along but maybe not...

    ... although I have installed this "Preview Edition" I ran a piece of software and could find no BHO files other than Norton's and Adobe's.

    So... my question is where is the spyware?
  • by letxa2000 ( 215841 ) on Wednesday March 20, 2002 @02:47AM (#3192732)
    My guess is that this will quickly be eliminated. Regardless of whether the users are happy about it I seriously doubt Amazon, eBay, Yahoo, etc. are going to be willing to pay Kaza any money for referals that they didn't really generate.

    This is like spammers embedding banner images in their spam and getting paid every time someone opens the email just because the banner was loaded. It's just running the meter and the entity being screwed is the website that is paying them a referral fee.

    The article, in one part, reads: "Griffin said the technology is simply taking the old affiliate referral program to a new level. Most of the referrals will happen inside the Morpheus application itself after the new version is launched with a commerce section, he said."

    Yeah, right. Most of the referrals will clearly be a result of their sneaky browser add-ons, not because anyone really pays attention to the commerce section of a P2P client. Heck, P2P users generally get as much as they can for FREE--not exactly the target market of much of anyone.

  • For you windows users, I noticed that Morphesus also installs a program called BDE under "\%Windows%\BDE", and it installs a Registry Key under:

    "HKEY_LOCAL_MACINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Run".

    This key loads the program at startup. The program appears to be some sort of video codec/player.
  • by Dynedain ( 141758 ) <slashdot2 AT anthonymclin DOT com> on Wednesday March 20, 2002 @02:54AM (#3192757) Homepage
    After reading this article (and noticing redirects being performed on my system - i thought it was something else, not morpheus) I downloaded this utility: BHO Cop [cnet.com] which is designed to search out these nasty browser-attached proggies and allow the user to disable them. I found the culprit: bpboh.dll put out by Wurld Media [wurldmedia.com], who, according to their inadequite website, claim the primary goal of their business is to help companies be profitable (very ambiguous, don't you think?).

    Well, I disabled the .dll w/ BHO Cop, relogged in (WinXP) and low and behold, when I go to amazon.com, I end up at the root page rather than a referal page deep in the system.

    So - download and run BHO Cop now! who knows what else you might find (Acrobat seems to have dumped something as well)
  • by EMR ( 13768 ) on Wednesday March 20, 2002 @03:11AM (#3192791)
    goto http://www.Lavasoft.com [lavasoftusa.com] and download ad-aware and the latest ref update and have it remove all your spyware from your computer..
  • The new Morpheus marketing program is based on a technology called browser helper objects (BHO), which attach themselves to Microsoft's Internet Explorer browser

    The Morpheus spyware is just a .dll that will be loaded every time your Internet Explorer starts. It is registered in the windows registry.

    So this bho spyware can be removed by using bhocaptor [webattack.com] . Bhocaptor displays all bho that are registered within windows registry. So, what you need to do is to select Morpheus bho(a .dll file) and then deactivate it.

    As bho is an Internet explorer technology, those who are using netscape or mozilla should be immune to this spyware.
  • Well, here goes.

    This like you asking a guy for directions to the "Stop and Rob", but he gives you directions to his brothers store, "Grab and Run". His brother lets him live in the basement of his house, because he sends lots of business to the "Grab and Run".

    You wanted to get some YooHoo but the "Grab and Run" doesn't have any, and you were going to shoplift it anyhow.

    Doubly pissed, you report the "Grab and Run" to the authorities (you saw a rack of VCRs in the back room, making copies of Asian snuff films.) The cops come and arrest the owner and throw his ass in jail.

    After looking up the address of the "Stop and Rob", you head over there. The brother of the now jailed owner sees you, beats you to the ground, and takes your wallet. In your wallet is an I.O.U. from your boss to an employee that works in the same row of cubes as you. Your wallet is gone, and so is your mugger, so you get up and run over to the "Stop and Rob".

    You ask to use the phone, and while the clerk is hitting on some drunk chick with a feather boa, you steal your bottle of YooHoo.

    1. Before anyone responds to this, I might add that this analogy is far better than all the "I buy a Ford; they won't let me play my radio" analogies, on so many levels. Also, this post is not offtopic! It is a comprehesive analysis of the current Morpheus situation. Thank you. You may return to your duties.


  • And to think I actually -owned- streamcast.org for a while. Yeesh.

  • Taken from download page of Morfeus:

    "This ad-supported software includes technology that will serve banner advertisments through the program interface. Morpheus also includes BuyersPort, a shopping portal that may log your IP address, track surfing habits online, and share aggregate user information to third parties. For more information, please refer to BuyersPort's privacy policy."
  • by Anonymous Coward
    Ok, we know that morpheus is spyware. Would anyone mind telling me how to find that out? I have a few programs that i would like to test and see if they are whispering behing my back
  • by plaidfishes ( 565635 ) on Wednesday March 20, 2002 @03:51AM (#3192864)
    I have sent the following message to Robin Gross of EFF.

    Dear Ms. Gross

    I am writing to express my concern that my attempts to financially support EFF have been stolen by Morpheus and similar companies. I have long been careful to use the Amazon Affiliate Button on your front page for all of my book purchases. I have felt that doing this combined to support what I believe in simply and effectively. Since my purchases have been well over $1000 per year for at least the last two years, I know that it has to have been worth at least some money to EFF.

    It has recently become apparent that Morpheus et al. have been placing software such as TopText and other scumware on users machines. These programs have the sole purpose of rewriting affiliate links. This effectively redirects the financial benefits of these links to the scumware operators. To put it bluntly, this is theft, no different than if they had taken the affiliate checks and written their own names as payee.

    I have supported the EFF for years. I supported Morpheus partly because of EFF's support of them. But I am frankly disgusted by this turn of events. As the Director of the Campaign for Audiovisual Free Expression, and a staff attorney for EFF for Fair Use and Intellectual Property, I believe that you may well be the single best person to let them know they have gone too far. To take a principled stand on Fair Use is one thing. To pump ads to users while using the software is also perfectly legit. To actively steal revenue from other people, companies and organizations, even after the user has supposedly removed the software, without notice is simply beyond comprehension.

    Sincerely

    Walter Williams

  • by dugless ( 453465 ) on Wednesday March 20, 2002 @04:35AM (#3192949) Homepage
    Didn't Morpheus' just recently (as in last month) contain a prominent "no spyware" logo?

    That sure didn't last long.
  • by Chetmurray ( 216997 ) on Wednesday March 20, 2002 @05:40AM (#3193094) Homepage
    To hell with the idiots downloading porn or warez.

    This affects website owners. Many small websites make ends meet by their affiliate links. This will steal that money away. This is one of the few way small webmasters can make money - short of begging.

    And aren't we all sick of the virtual begging cup by now? Don't let the last legit way for sites to make money be destroyed. Sites that don't have traffic for banner ads sales, need these sales. They need this income. If this takes off, it will wipe out small sites everywhere.

    As an example, look at http://www.gonegold.com

    Informative helpful website. IGN pays them squat. But they do make money on their affiliate gaming links. Take them away and who will pay the site's bandwidth? That is the real issue, that is the real fight. And for some smaller sites, this really is a fight for their survival.

    By the way- what is the implications that the only thing you have to agree with when installing morpheus is the gnu license. their is no mention of this spyware(even though it is installed).

    Chet
  • by wedg ( 145806 ) on Wednesday March 20, 2002 @06:03AM (#3193138) Homepage Journal
    ...that comes up all the time, particularly with reguard to virii and warez. If you can't trust the software - don't install it. When you run any .exe in Windows, you accept that you do not know that it is going to do - at all! It may format your hard-drives, and mail all your porn to your mother.

    So, if you don't want all the crap, don't use software you can't trust. How do you know if you can trust it? Well, you could audit the source code and compile it yourself. You could write the software yourself. Or you could get the software maker to sign into a legally binding contract which says that their software will not do anything but its primary intended use (for Morpheus, this would be stealing music), and that they must disclose everything that it's going to do to your computer. Fat chance of that.

    What do I do? I run Linux. I only login as a unpriviledged user (I have access to my home directory, that's all.) All the software I install I only install into my home directory (again, as the unpriviledge user.) I'm the sole user of my machine - I don't need to be putting it in /usr/local for others, so I never need to log in as anything but that unpriviledged user.

    The security then isn't perfect, but strangely enough, most open source projects don't include spyware/scumware of any sort. So I don't worry about it.

    Running any priviledged executable is the ultimate shrinkwrap EULA, saying, "I give you permission to do what ever you want to my computer." We'd all be a little better off if people were more paranoid about their computer - but if they don't mind untrusted software messing around, who am I to stop them? Maybe we'll get lucky, and the next version of Morpheus or Kazaa will automagically lock out any user that downloads it. That would provide a nice lesson. Would it be a virus? Well, you chose to download it and run it yourself. So, I say no.

    What do you think?
  • by grundie ( 220908 ) on Wednesday March 20, 2002 @06:09AM (#3193145)
    I'm a sysadmin in a large call centre which used to tolerate a certain amount of personal use of it's computers. One of the main helpdesk requests to the IS department had was for ghosting's of computers which had been so f**cked up by various bits of spyware. The worst offender by far was Save Now, getting it to uninstall was a pain and even when you did think it was gone, it would reappear sooner or later. We firewalled the Save Now website and any addresses the app connected to to and rather than die after 2-3 attempts the plugin would thrash the firewall contiuously trying to make a connection. We also came across a particular nasty spyware app which had no visible front end but would randomly redirect you to a porn site, thankfully we had Super Scout installed which blocked 99% of porn sites. However this didn't help the poor employee who unknowingly had this crap on his PC as he though he was going to be sacked for looking at porn (we have always had a very, very tough line on porn).

    Most of the spyware on the computers was not intentionally installed which is what made it worse. The last straw for us was when we discoverd a Win98, 1ghz Pentium with 256mb RAM and a fast hard drive taking 15 minutes to start as it was loaded with so much spyware/plugins/rubbish and they all wanted to start simultaneously, running a packet sniffer on that particular machine showed that spyware was using over half the bandwidth available. We locked down the network after that barring access to anything known to inolve file sharing, plugins, spyware etc. However there is an interesting side note, we had a retained lawyer with IT specialisms, aparently the UK Computer Misuse Act makes it illegal to alter the contents of a computer without getting the users authority, which was interesting.

    It's bad enought these spyware app's stealing money from deserving small websites and let's face it users as well. You just need to see the damage they can do to networks and computers as well, I can see a lot of sysadmins becomming very angry if these sort of applications get more sneaky and nasty in the way the operate.
  • by Bender Unit 22 ( 216955 ) on Wednesday March 20, 2002 @08:18AM (#3193321) Journal
    I have played with a couple of them.

    Limewire has spyware/adware hardwired into the program, at least in the Windows version. Re-apearing Reqistry keys shows this.

    Seems to be possible to run BearShare without all the snooping. But 3rd party crap is included and you must be careful not to get it installed..

    A bit offtopic but still on the subject of spy/adware.

    Now even my Logitech comes with a lot of crap that when you try to install their drivers, you have to read carefully right to the end what the diaglog boxes says and even after avoiding all their "helpful" programs there seems to be one or two programs running in the background that you can remove without it having any impact on the functions of the mouse like the webwheel etc. witch by the way will have a date with my packet sniffer one day, I'd be surpriced if they didn't do some monitoring.
    That Logitech was really too much, they REALLY tried to shove a lot of junk down your throat. Which made med loose the last ounce of respect for the company. I am a user who knows what to look out for, but I'll bet that 99% of the mouse buyers just answers yes to it all.
  • by TheTomcat ( 53158 ) on Wednesday March 20, 2002 @12:04PM (#3194249) Homepage
    Documentation on Browser Helper Objects (BHOs) [microsoft.com] at MSDN [microsoft.com].

    S

All seems condemned in the long run to approximate a state akin to Gaussian noise. -- James Martin

Working...