Malware flea market pays hackers to hijack PCs

Hackers willing to compromise victims'computers globally and get paid for it

Among a slew of online cybercrime forums, stands out as a malware flea market where shadowy pushers of Trojan downloaders and tools for evading detection are bargaining with thousands of would-be "affiliates" willing to compromise victims' computers globally and get paid for it.

Top dollar goes to anyone who can compromise computers in the United States. Those who do the dirty work are paid US$140 for every 1,000 U.S. computers they seed with bits of malware, to ready these victims' computers for other types of criminal assaults such as stealing financial data, sending spam or pushing fake antivirus software. The pay-per-install rate drops to $110 per 1,000 computers in the United Kingdom; $60 in Italy; $30 in France and just $6 in Asia. Curiously, Russia and several of Russia's neighbors, such as Belarus and Ukraine, are considered off limits. 

America's 10 Most Wanted Botnets

"They will not pay for installs in Russia or former Soviet Bloc countries," says Kevin Stevens, a researcher at SecureWorks, which recently issued a report delving into the malware bargaining that goes on at The online forum encompasses about 10 distinct entities, such as and (believed since August to be the new name of InstallsCash), angling for affiliates to do their dirty work to take control of computers they can exploit. "They don't want infection of Russian computers," Stevens says.

Some rogue antivirus software even has an installer component that checks to see if a user has visited sites such as (the Russian-language Google site) or, and if so will exit immediately.

Many researchers suspect Russian-speaking kingpins to be the key players at, where forum discussions go on in both Russian and English. In addition, the earning4u site, which is among the most notorious, has a Russian IP address.

There's plenty of speculation why big-time malware pushers such as wouldn't want to mess with computers owned by Russians or in countries bordering Russia where many ethnic Russians reside. But the most likely explanation is one put forward by Benjamin Edelman, assistant professor at Harvard Business School in its negotiations, organizations and markets unit.

"Why would Russian law enforcement want to pursue attacks that never hurt Russians?" Edelman says. "By declining to hurt people in their own country, they discourage law enforcement from pursuing them."

Crimeware forums flourish

Geographic motivations aside, it's the contentious marketplace at -- where thousands of affiliates demand to be paid or brag about numbers of computers infected -- that draws the main interest from security researchers.

"The hot thing now is rogue antivirus software,'" says Eric Chien, technical director at Symantec's security technology and response division. "It pops up and says you're infected, convincing users to go pay $70 to get de-infected." Most of the code writers for the pay-per-install sites are believed to be based in Eastern Europe or Russia, Chien says.

It's only in the past couple of years that has emerged as what's perhaps the biggest of the crimeware forums, Chien says. The site has been around for at least five years, and early on it catered to the adware industry. Though adware is widely detested, its propagandists made some defense of legitimacy. But that era of quasi-legitimate software is largely gone, replaced with blatant crimeware designed to steal and deceive to make a buck.

Today, is "a primary way that people get malware," Chien says, noting a large number of major threats, such as Virut and Vundo, originated as pay-per-install programs.

The malware pushers at keep track of ever-changing numbers of computers under control, which call home to report on successful installations. The affiliates get paid via payment methods that include e-gold, WebMoney, PayPal, Fethard, Western Union, MoneyGram, Anelik and ePassporte.

It's known that affiliates use a variety of methods to get malware installed on each victim's machine, which include exploiting peer-to-peer networks such as BitTorrent and eMule. Pay-per-install affiliates might bind a malicious file to a legitimate program and upload the bundled file, with the goal to have computer users download the malicious bundled file and execute it, SecureWorks points out., to encourage its affiliates, offers guidance on how to use a "seedbox," a dedicated server to upload and download digital files to spread the malware since peer-to-peer sites try to keep malware out of their networks.

Other means, including malicious downloads from compromised Web sites, are evidence of spreading pay-per-install malware. This could be done by outside attackers or rogue insiders.

Malware pushers also sell crimeware applications called crypters that can be used to hide malicious code once it's on victimized computers. One example is PXCrypter, which costs $75 and includes one "stub," which is available to perform the decryption; additional stubs cost $25. has a Trojan downloader for sale called SDdownloader or Silent Downloader, which normally costs $300, but is on sale now for $225. The download managers let attackers infect a computer and force it to download and install any pay-per-install malware upon command.

And in the twisted business world of, scammers also make use of what's called "black hat search-engine optimization" to direct traffic to their sites that host malicious code. Tools such as XRumer can announce an attacker's Web site by posting messages about it wherever possible online. Another method is to use "doorway pages," which are Web pages that list many keywords in an attempt to increase the search-engine ranking, according to SecureWorks.

So far, the international crimeware pay-per-install rings have gone largely unchecked, many say. Only a determined effort to stop the people behind them will have any impact, Chien points out, as they can move apparatus like domain names around to so-called "bulletproof hosting," or rogue providers that will look the other way.

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags hackerspay-per-install.orginternet securitymalwarehacking

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Ellen Messmer

Network World
Show Comments


Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop

Learn more >

Lexar® JumpDrive® S57 USB 3.0 flash drive

Learn more >


Lexar® JumpDrive® S45 USB 3.0 flash drive 

Learn more >


Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards 

Learn more >

HD Pan/Tilt Wi-Fi Camera with Night Vision NC450

Learn more >

Lexar® JumpDrive® C20c USB Type-C flash drive 

Learn more >

Audio-Technica ATH-ANC70 Noise Cancelling Headphones

Learn more >


Back To Business Guide

Click for more ›

Most Popular Reviews

Latest News Articles


PCW Evaluation Team

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Aysha Strobbe

Windows 10 / HP Spectre x360

Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!

Mark Escubio

Windows 10 / Lenovo Yoga 910

For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?