Tiky is a spyware.
Spyware can be installed either with or without users' consent, and either with or without their knowledge about the data gathered and/or the use of it.
It captures certain information entered or saved by the user, with the corresponding threat to privacy:
It sends the gathered information to a remote user by any available means: email, FTP, etc.
It uses several methods in order to avoid detection by antivirus companies:
- It prevents scanning tools from running, such as Windows Registry Editor, FileMonitor, etc.
- It terminates its own execution if it detects that a memory dump program is running, such as Procdump.
- Its code is encrypted and it is only decrypted when it is going to run. Because of this, its code is not legible through a memory dump.
Tiky does not spread automatically using its own means. It needs an attacking user's intervention in order to reach the affected computer. The means of transmission used include, among others, floppy disks, CD-ROMs, email messages with attached files, Internet downloads, FTP, IRC channels, peer-to-peer (P2P) file sharing networks, etc.