Jump to content

Defining a social platform based program as Adware?


Recommended Posts

From what I know about Adware and the multitude that it can have on a computer, it is of my best interest to know, weather or not my friend should remove a social platformed program called Roblox. Now the main reason I am concerned for this, is that I have gone through 2 computers both of them were completely slow after the first week of opening the box. Both of them had Roblox on them. On the second computer, however, it had McAfee which was my first security software. Every time I would open Robox it would give me a pop up saying a trojan has been quarantined. Mainly populated by children aged 8-18 it would oppose as a very vulnerable place to have malware. Roblox also combines a browser and a program. The way it works is, people can create and script (LUA) games and upload them to the page and/or play on the games they uploaded or what someone else uploaded. Having played Roblox I have received several threats of which they would use my IP to find me and etc. There have been many accounts of which people who have signed up to play for this have had their Accounts hacked. Not knowing how the ROBLOX Corporation earns their money, over 32,000 people play this. The only way I see them earning their money is through in-game currency. With their guidelines and executions of discipline on those that have broken rules, I have contacted them several times by personal email to tell them about the distribution of pornography in front of children. Because of LUA scripting, there are things called emotes where the virtual characters can wave, sleep, jump, etc. Well due to the adolescent age group there is an emote where the characters can "twerk". If anyone could help classify this program on weather or not it is a form of malware or vulnerable for malware it would be of great help. I also don't mind putting down more information from Roblox if needed. 

 

 

Thank you

Link to post
Share on other sites

  • Root Admin

I have no idea if the program is or not, but we can help you scan it and look for signs of it behaving as an adware threat. Cleaning the computer and looking at ways to stop it from getting infected.

I would suggest following the advice from the topic here Available Assistance for Possibly Infected Computers and having one of the Experts assist you with looking into your issue.


Thank you

 

Link to post
Share on other sites

Well, I used Adware Cleaner and it showed 10 different results for that program. What is definitely weird about the program's installation process is, the fact that it provides a pop-up version at the bottom of the browser page. When you click on it, it has its own installation box, so it doesn't really run through the computer's administration control. The program is also in a bundle of 2 Studio is a part of the bundle where you can create a private server using other's IP address, so that other characters can join to do LUA scripting and build games. With ever Update that I get for Roblox, the slower and more "Laggier" it gets on my computer. 

 

I also didn't completely install the program. I cancelled on start up

Edited by samm52520
To add more information
Link to post
Share on other sites

That's not an answer for what I asked.

 

Otherwise please follow Ron's ( AdvancedSetup ) advice.

17 hours ago, AdvancedSetup said:

I would suggest following the advice from the topic here Available Assistance for Possibly Infected Computers and having one of the Experts assist you with looking into your issue.

 

Link to post
Share on other sites

Malwarebytes' Anti-Malware ( MBAM ) does not work on the premise that "software is vulnerable".  MBAM works on the premise that software is installed surreptitiously or that the software has malicious intent.  That premise is the software is a Potentially Unwanted Program ( PUP ) or it is malicious as in "malware" ( MALicious softWARE ).

Many applications have vulnerabilities.  It could be that the software was written hastily without checking that variables have limits and boundaries.  It could be that the software has so many capabilities that some of those abilities it provides can be abused.  I can post a laundry list of applications and software utilities whose software has been targeted due to vulnerabilities.  The one thing they all had in common is that the ones most taken advantage of for vulnerabilities ( known or unknown ) are the ones most common on a given PC. 

If an application has a distribution of 60,000 computers and has vulnerabilities, it is a low value target.

If an application has a distribution of 10's or 100's of million computers and it has vulnerabilities then that software application is a high value target.

It is a case of "Most Bang for the Buck".


If you think that your PC may have succumbed to malware or PUPs, then I reiterate that you should take the following advice.

21 hours ago, AdvancedSetup said:

I would suggest following the advice from the topic here Available Assistance for Possibly Infected Computers and having one of the Experts assist you with looking into your issue.

If you think that there is software on your PC that may be vulnerable to exploitation then let me explain a few points.

When one talks about an "exploit" there are two basic kinds.
 
*  Exploiting a software vulnerability to gain elevated privileges to effect a compromise
 
*  Taking advantage of a capability to use in their benefit in an unexpected or unanticipated way.
 
As an example of the first case I'll use the Lovsan/Blaster worm.  It exploited a software vulnerability in the Operating System RPCSS/DCOM which uses TCP port 135.  The Lovsan/Blaster worm would send a specific set or string of characters to TCP port 135 to create a "buffer overflow with an elevation of privileges" condition where if successful, the worm would create a BLASTER.EXE file on the target system and then execute it.  Once the PC was infected it would seek new hosts and the Lovsan/Blaster worm would spread exponentially.
 
As an example of the second  case I'll use the Wimad trojan.  The Wimad trojan takes advantage of the Digital Rights Management (DRM) incorporated in media files such as MP3, WMV and other music and video files.  By taking advantage of the DRM, it would be used in combination of Social Engineering and one's desire for "free music" or a "free movie" to cause the person to download and run some malicious program.
 
Therefore you use an anti exploitation application to thwart the malicious activity of deliberately exploiting a vulnerability to effect a system compromise.
 
One may use a specially crafted...

  • PDF file to exploit a vulnerability in a PDF viewer like Adobe Reader or FoxIt.
  • MOV file to exploit a vulnerability in a Apple's QuickTime renderer.
  • GIF file to exploit a vulnerability in Microsoft's Graphics Device Interface (GDI).
  • DOC, XLS or other MS Office document file to exploit a vulnerability in Microsoft Office or to use a macro to download and execute a file or extract an embedded file and execute it.
  • RMP file to exploit a vulnerability in RealPlayer.


It is for situations as enumerated above where an anti exploit application will be used to monitor and shield a given application, which exhibits vulnerabilities, from attempts using the vulnerability/exploitation attack vector.  It is not for untrusted applications.
 
The intention is to monitor and shield a given application which has a propensity of being exploited.

Malwarebytes' Anti-Exploit ( MBAE ) is designed to deal with many of the types of malware associated with scripts, documents and media files where MBAE will protect the computer against Exploitation attempts whether they were exploits of software vulnerabilities or taking advantage of an application in an unusual way and works at an "action level" and not a "file level" like MBAM. MBAE provides protection of applications that are commonly  known to be associated with and normally used by the file type.

 

Reference:  MBAE FAQ

 

Edited by David H. Lipman
Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.