TOP 5 PERILOUS ROGUEWARE
1. MS ANTIVIRUS
The popular 'MS Antivirus' family is characterized by special professional appearance and blocks the active virus scanner. The rougueware even trades under names like 'System Security' or 'WinPC Defender'.
2. SECURITY TOOL
The rogueware known as 'Total Security' imitates security warnings from Windows. It can delete desktop icons, display a black desktop background and slows down the system.
3. InTERNET SECURITY 2010
Internet Security 2010 not only annoys with warning messages. But using an infiltrated DLL file it blocks websites such as Facebook and YouTube so as to pursue the user to purchase the full fake version.
4. ANTIMALWARE DEFENDER
Different from the original 'Windows Defender' by Microsoft, this rogueware is difficult to identify by untrained eyes. Once it ends up on the computer, it takes control of the browser and frequently displays virus warnings.
5. USER PROTECTION
This variant spreads itself in form of fake video codecs that are offered over manipulated websites that offer videos for download. 'User Protection' affects the system performance and soon leads to system crash.
Hackers  and web fraudsters make a killing with the help of spurious anti-virus  programs. And distinguishing these from the real ones can be very  tricky.
 
 The  desktop suddenly becomes black, security warnings are flashed and an  unknown virus scanner offers itself as a solution for the problem: often  this is how the attacks of cyber gangsters appear. Most of the times  the invader uses fake anti-virus programs (rogueware or fake antivirus),  which tempts us with virus messages to purchase expensive full  versions. And this trick has worked like magic for millions: This year  alone, McAfee has valued total damages of over $300 million all over the  world. We show how to trace rogueware and how to get rid of them. An  updated Security Suite is of utmost importance, since every month  thousands of new rogueware samples and millions of such websites appear  over the Internet—a briskly increasing trend. Fake antivirus programs  can be categorized into hundreds of families, out of which only a  handful are known.
Identification: Obtrusive pop-ups
Rogueware  spreads itself through primed websites. They use security loopholes in  the browser or in plug-ins like Flash Player; and introduce malware over  drive-by download or request the user to download fake video codecs,  which contains malicious codes. 
In  case a fake scanner is installed on your PC, you can identify it from  the symptoms. The most obvious are obtrusive pop-ups indicating  apparent  virus attacks followed by requests to purchase the full version. Close  this window from Task Manager, because even clicking on 'Cancel' can  open a perilous website or download other malware. A few variants  display messages using security risks warnings in the taskbar or  firewall warnings and change the desktop wallpaper or screensaver.  Moreover, rogueware scans the computer much faster than an authentic  virus scanner and displays unrealistic results. 
Very  rarely do rogueware attack alone. Once the attacker gets access to the  computer, they can then further add more malware. Mostly, these fake  antiviruses are accompanied by trojans that spy on the computer and  forward user data using a backdoor or install programs such as  keylogger. A worm subsequently connects the infected computer into a  botnet, so user unknowingly contributes to spreading the rogueware.  Nowadays, extortionist tools (ransomware) have also started coming along  with fake antiviruses.
The  various symptoms bothers the user till he/she eventually visits the  website of the fake antivirus. The attacker even spreads the links to  these sites through spam mails as well as over social networking  websites such as Facebook and Twitter. Thus, the promoted programs are  revealed often through cryptic web addresses in the mails. If you wish  to install a new virus protection, you should always visit the website  of the antivirus developer directly: even Google search is not secure.  It  is the second most popular way to spread such programs. In the process,  the hackers use latest topics, and also specific search queries related  to virus protection, so as to list their sites right at top of the  search results. Most of the times these sites do not contain any  malicious codes but they automatically direct the user to a website  which eventually infects the computer.
At  first glance the professionally designed websites of rogueware  developers appear impressively authentic, for instance the way they  feature fictitious test results and high discounts. Some of them even  feature a functional telephone and email helpline service. The promoted  programs costs anything between Rs 1,845 and Rs 6,000, however, soon  from the price everything seems suspicious. Generally, you should stay  away from such programs that scan computer for free but require a full  version for removing the viruses. And in any case you should never  reveal your credit card details on such websites.
However,  if you have installed an updated security suite, it should be able to  prevent every rogueware attack. Even if an attacker manages to slip in,  for instance while the virus scanner was not updated, it is very  possible that the fake antivirus blocks your Security Suite.  Subsequently you should never download anymore updates and in any case  do not start your virus scanner. In such a case, you should try using a  malware removal tool by another manufacturer (for instance Kaspersky  Virus Removal Tool).
Removal: Often only with detours 
In  case none of the above tips help, you must remove the worm manually.  First of all, check your PC with the online scanner of an antivirus  developer. You will then be able to see which rogueware has affected the  computer, thereafter with help of support sites such as removeIt.info,  you can find out which process you should end and which registry entries  are required to be deleted. This way you can restore the system to a  state in which an updated virus scanner will be able to remove traces of  the rogueware.
Online scanners:
housecall.trendmicro.com
security.symantec.com
Removal tips:
removeit.info
www.bleepingcomputer.com
www.removeonline.com  



 

 


0 comments:
Post a Comment
you can comment here