AI-Powered Cyberattacks: How to Detect, Prevent & Defend Against Intelligent Threats

Read Now
We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.

PUAs Open the Door to System Vulnerabilities

Share this Post

A few weeks ago, we published a blog post that posed an important question: How Much Can We Trust PUA Installers? To follow up on this theme and explore the topic a little further, we will now take a closer look at the relationship between vulnerabilities and PUAs (Potentially Unwanted Applications).

End user systems have been increasingly targeted by PUAs in recent years. These are usually offered to users when downloading applications from websites or during the installation of certain software. This can trick end users into thinking that the additional PUA is a component of the application they intend to use. Once these PUAs are allowed access to the user's system, they are likely to flood the user with endless advertisements, collect unnecessary and perhaps sensitive personal information, and slow down the system by occupying a substantial amount of CPU and memory. Furthermore, they provide an additional threat as they can introduce application vulnerabilities (which are considered security holes) to the user's system.

As mentioned in the previous blog post, around 50% of a group of randomly picked PUA installers were reported to contain threats. Does this mean that the other 50% are safe? The answer is definitely not. While some PUAs may not contain any immediate threat themselves, they can still be used as a catalyst for malware and viruses. Since the majority of these types of applications lack thorough maintenance and hit the market without any security protection, allowing them onto an end user's system is more likely to leave this system open and susceptible to attack. Consequently, PUAs increase the possibility of infection to, or the theft of user data from, the system.

There are many different vendors who currently provide huge databases which allow users to verify known vulnerabilities. NVD (National Vulnerability Database) and OSVDB (Open Sourced Vulnerability Database) are two of the most popular ones. For experimental purposes, we used both of these databases to search the 60 PUAs that we tested in the previous blog post for known vulnerabilities. The results of the study can be seen below (click the blue numbers for additional details):

Product name (Vendor name)Number of engines reported infectionNumber of vulnerabilities reported by NVDNumber of vulnerabilities reported by OSVDB
aMule (aMule Team)032
aMSN (aMSN Team)0510
Anomos (Anomos Liberty Enhancements)000
Artemis (CyberArtemis LLC)122
BearShare (MusicLab, LLC)122
BitHit (P2PHood LLC.)100
BitLord (BitLord)100
BitRope Sharing (BitRope)100
BitSpirit (ByteLinker Inc.)000
BitTornado (John Hoffman)000
BitTorrent (BitTorrent Inc.)01155
Bopup Messenger (B Labs)011
CitrixWire (CitrixWire)100
Crux P2P (Cruxp2p)3 or more00
DBGO (DBGO)000
Deepnet Explorer (Deepnet Security)000
Deluge (Deluge Team)024
Easy File Sharing Web Server (EFS Software, Inc.)3 or more1122
eDonkey (MetaMachine)3 or more13
FeyAccelerator (FeyTools LLC.)3 or more00
FeyTorrents (FeyTools LLC.)200
FlashGet (Trend Media Corporation Limited)012
Free Download Manager (FreeDownloadManager.ORG)0511
FrostWire (FrostWire)101
GetRight (Headlight Software, Inc.)012
Glace Space (CaffeeSoft)000
Global Downloader (Actysoft Inc)3 or more00
Hermes (HermesP2P LLC)3 or more 00
Lightning Download (Headlight Software, Inc.)000
LimeRunner (P2PHood LLC.)100
LimeZilla (ShareZillas)100
Lphant (Bandoo Media Inc.)000
Metacafe (Metacafe)022
Miranda IM (Miranda IM)048
Miro (Participatory Culture Foundation)3 or more60
Movie Torrent (GoodKatShare LLC)100
ooVoo (ooVoo LLC)111
P2P Rocket (P2P Rocket LLC)100
qBittorrent (The qBittorrent project)011
QIP (QIP.ru)143
Shareaza (Bandoo Media Inc.)024
ShareGhost (ShareGhost)100
Sharin'Hood (P2PHood LLC.)100
ShareIT (ESIB)000
StrongDC++ (BigMuscle)000
SoMud (SoMud)001
Soul Seek (SoulSeek)011
Speedy P2P Movie Finder (SPEEDYP2P)3 or more00
SuperNZB (TechSono Engineering, Inc.)000
Tixati (Tixati Software Inc.)000
Torrent Captor (Torrent Raptors LLC)100
Torrent Swapper (Tim Tucker)000
Trilix (Trilixp2p)3 or more00
TudZu (Tipi Software)000
TurboWire (GoForSharing LLC)3 or more00
Uranium Backup (Nanosystems S.r.l.)100
VIP Torrent (VipRumor LLC)100
Vuze (Azureus Software, Inc)211
Yet ABC (Choopan Rattanapoka)000
µTorrent (BitTorrent Inc.)089

According to the results listed above, 26 of the 60 PUAs contain known vulnerabilities. Additionally, 15 of the 30 "clean" PUAs from the multi-scan experiment (documented in the previous blog post) are reported to contain known vulnerabilities. If we combine these results, we notice that 75% (45 out of 60) of the randomly picked PUAs have been flagged as programs which can introduce either malware or known vulnerabilities to user systems.

PUA Chart

Does this research mean that users have only a 25% chance of downloading a "safe" PUA? Is it possible that the applications that were only detected by one engine and did not contain any of the known vulnerabilities are false positives? The answer to both of these questions may very well be yes. However, it must be noted that all the research data is based on known vulnerabilities and that the vulnerability database is growing every day, every hour, and even every minute. No one can guarantee that any software is positively and undeniably not vulnerable. For example, one has only to recall the recent OpenSSL "Heartbleed" vulnerability case, where the issue was completely unknown until reported, whereupon it became a massive threat.

The PUA industry is changing, and so is the vulnerability world. If end users do not take action or move quickly enough to protect their system, it will likely become an extremely challenging task for IT administrators to maintain and manage their networks. Therefore, user education must play a significant role in the solution. Educating end users to regionalize PUAs and keep them off their systems would go a long way towards helping the network's malware and vulnerability protection levels.

Similar to the previous post, the ultimate suggestion is still to avoid installing and using any PUA on an end user's system. However, if it is absolutely necessary that you avail of some PUA-provided functionalities, then I would suggest that you confirm the following three points before trying to launch any of these PUAs:

  1. Does the download source come from the application's official website or a reputable software-hosting website?
  2. Does the application contain any known malware? A multi-scanning website would answer this for you.
  3. Does the application contain any known vulnerability? Any reputable vulnerability database website would help identify the known vulnerability for a given application.

If the above questions produce any suspect answers, I would highly suggest not using this PUA and reporting it to your IT administrator. Helping to identifying PUAs and protecting the overall network are responsibilities that every end user should undertake.

Stay Up-to-Date With OPSWAT!

Sign up today to receive the latest company updates, stories, event info, and more.