{"id":23413,"date":"2018-08-13T10:10:08","date_gmt":"2018-08-13T14:10:08","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=23413"},"modified":"2019-11-15T06:34:35","modified_gmt":"2019-11-15T11:34:35","slug":"file-sharing-affiliate-programs","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/file-sharing-affiliate-programs\/23413\/","title":{"rendered":"Free files (with some ads)"},"content":{"rendered":"<p>You\u2019re always careful about <a href=\"https:\/\/www.kaspersky.com\/blog\/phishing-ten-tips\/10550\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">opening e-mails from strangers<\/a>, extra cautious contemplating <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/new-airline-tickets-scam\/22179\/\" rel=\"noopener noreferrer nofollow\">great deals<\/a>, and assiduously avoid <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/porno-danger-fact-or-fiction\/21865\/\" rel=\"noopener noreferrer nofollow\">adult content<\/a>. So how could you wake up one day to a bunch of new browser toolbars, an excess of ads, and PC optimizers you know you never installed? What went wrong?<\/p>\n<p>Odds are, the culprit is an affiliate service. Affiliates negotiate agreements with file-sharing services to replace desired files with installers that bundle the file you want with some other products: browsers, optimizers, <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/not-a-virus\/18015\/\" rel=\"noopener noreferrer nofollow\">adware<\/a>. The affiliate, in turn, pays for each download. Our <a target=\"_blank\" href=\"https:\/\/securelist.com\/file-partner-programs\/87136\/\" rel=\"noopener noreferrer\">experts dug in for the details of how it all works<\/a>.<\/p>\n<h2>Why do people store files on such sites?<\/h2>\n<p>File-sharing sites that have affiliates are interested in gaining more users. So, in addition to storing content, they may offer a small amount of money to those who upload their files to the site. For example, one of the resources we studied pays users 4 rubles (about 6 cents) for every download of the uploaded file. It\u2019s not much, but it sweetens the deal.<\/p>\n<p>A user looking to make money on this will not only upload videos, books, music, and game mods to such a file-sharing site \u2014 he or she will also publish a link to it online, somewhere in a forum or fan page, for example, whose owners don\u2019t know anything about the affiliate.<\/p>\n<h3>Downloading to download<\/h3>\n<p>Other users then find the link in the course of browsing through a forum or searching for rare content. The link takes them to the file-sharing site, which often looks like a legitimate cloud service, such as Google Drive. There, they find the file. It may look like an archive, a torrent file, an ISO image, or an HTML document.<\/p>\n<p>But what the user downloads after clicking on that file is an executable \u2014 the installation file hidden in a password-protected ZIP archive, say, or a file that looks as if it has two extensions (super-new-map.zip.exe). It often comes with detailed installation instructions: Unzip the archive contents, enter this password, etc. The complexity is meant to obscure the questionable nature of the file from browsers and antivirus software.<\/p>\n<h3>And what is this installation file?<\/h3>\n<p>Here\u2019s what happens when the user has finished unzipping, entering passwords, and whatever else the downloaded archive requires, and finally launches the executable. First, the installer tells an affiliate server everything about the user\u2019s computer, including user name and list of launched tasks. The server responds with a list of affiliate programs that could potentially be installed on the computer. The response also contains the name of the file the user originally wanted to download.<\/p>\n<p>Then, for each affiliate program, the installer checks if the users\u2019 system has one of the security solutions that could spot that something weird is going on. The affiliate owners attempt to set everything up so as not to sound any alarms and get the user\u2019s attention.<\/p>\n<p>Only after all of that does the installer finally offer to download the desired file (and three to five affiliate programs \u201cwell-suited\u201d for your system). An Internet Explorer\u2013style download window pops up. In addition to the name of the original file the user desired, it lists everything else that will be downloaded, but in a very tiny, grayish font. In addition to that, most of the information is kept from view; you\u2019d have to resize the window to see all of the programs about to be installed. At this stage, the user could smell a rat, deselect all of the check boxes, and prevent the program from installing anything extra, but that would require attention \u2014 and supersharp vision.<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/08\/13100745\/file-sharing-affiliate-programs-screenshot1.png\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/08\/13100745\/file-sharing-affiliate-programs-screenshot1.png\" alt=\"\" width=\"810\" height=\"421\" class=\"aligncenter size-full wp-image-23416\"><\/a><\/p>\n<h3>Ads and more ads \u2014 and a little bit of malware<\/h3>\n<p>When purveyors of a file-sharing service come to an agreement with a \u201cpartner,\u201d they think only of their own profit. In other words, they really don\u2019t care what happens to users\u2019 devices; the only thing they care about is getting paid.<\/p>\n<p>As a result, users download many dubious files through the \u201cpartners.\u201d It\u2019s mostly <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/adware\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">adware<\/a>. However, in 20% of cases, real malware is downloaded. By the way, in 5% of cases, the \u201cpayload\u201d will appear to be a common browser. (If that\u2019s what the user gets, they may consider themselves fortunate.)<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n<h3>Safe download, no registration required<\/h3>\n<p>How can you download a useful file without getting useless trash (or worse) along with it? Here\u2019s our advice:<\/p>\n<ul>\n<li>Pay close attention to your browser\u2019s address bar. File-sharing sites, naturally, try to resemble innocuous services like Dropbox or Google Drive, but the URL doesn\u2019t go there. If the site looks right but the URL isn\u2019t, you\u2019d better avoid downloading anything from there.<\/li>\n<\/ul>\n<ul>\n<li>If they offer an executable (.EXE) file instead of the filetype you\u2019re after, don\u2019t download and launch it.<\/li>\n<li>Never download any additional installers, no matter how much a site insists you have to.<\/li>\n<li>Use a reliable security solution that won\u2019t allow you to download suspicious apps. For example, <a href=\"https:\/\/www.kaspersky.com\/advert\/security-cloud?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksc___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security Cloud<\/a> is a good choice.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Take a stroll through your apps and you\u2019re bound to encounter some unfamiliar names. Where do those unaccounted-for apps on your PC come from, and are they safe?<\/p>\n","protected":false},"author":2484,"featured_media":23414,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[572,3014,3015,2613,422],"class_list":{"0":"post-23413","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-adware","9":"tag-affiliates","10":"tag-file-sharing-services","11":"tag-not-a-virus","12":"tag-threats"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/file-sharing-affiliate-programs\/23413\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/file-sharing-affiliate-programs\/13869\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/file-sharing-affiliate-programs\/11589\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/file-sharing-affiliate-programs\/15893\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/file-sharing-affiliate-programs\/14177\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/file-sharing-affiliate-programs\/13271\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/file-sharing-affiliate-programs\/16679\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/file-sharing-affiliate-programs\/16094\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/file-sharing-affiliate-programs\/21078\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/file-sharing-affiliate-programs\/5646\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/file-sharing-affiliate-programs\/10812\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/file-sharing-affiliate-programs\/10719\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/file-sharing-affiliate-programs\/9579\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/file-sharing-affiliate-programs\/17438\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/file-sharing-affiliate-programs\/21285\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/file-sharing-affiliate-programs\/17118\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/file-sharing-affiliate-programs\/20758\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/file-sharing-affiliate-programs\/20748\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/threats\/","name":"threats"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=23413"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23413\/revisions"}],"predecessor-version":[{"id":29660,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23413\/revisions\/29660"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/23414"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=23413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=23413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=23413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}