Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43434
  • Total Topics: 16528
  • Online today: 3114
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 2
Guests: 3045
Total: 3047









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 23. October 2009., 07:34:33 »

I shall send him this new letter and make him get a legit virus scanner =s


You have this option "Send this topic" for notifications... (above a name of this Topic)

Posted by: bBbLaHhH
« on: 22. October 2009., 21:50:22 »

Wow... My friend uses this ... he tried to get my to use it to... I shall send him this new letter and make him get a legit virus scanner =s
Posted by: F3RL
« on: 22. October 2009., 12:08:10 »

I dont find rogue-ware as an 'effective' way of scamming, if you have decent knowledge of computer.
Sad, most people aren't educated and does not have sufficient knowledges to protect their identity from
web.
Posted by: Samker
« on: 18. October 2009., 21:36:56 »



The fake antivirus phenomenon has taken an unpleasant turn with the discovery of a Windows program that not only cons users into buying an unnecessary license but appears to lock files and applications on the victim's PC.

According to security company Panda Security, rogueware program Total Security 2009 starts out in conventional fashion with the 'discovery' of a no n-existent malware infection for which it demands an unusually ambitious $79.95 (£50), and even has the cheek to ask a further $19.95 for 'premium' technical support.

Users deciding against purchasing the license find that all files and applications on their PC have been designated as 'infected' and made inaccessible until the user follows on-screen instructions to buy a license using the only working application, Internet Explorer.

According to Panda Security, the technique used to block access involves simple interception of Windows calls to open files and applications, closing them before they can open: http://pandalabs.pandasecurity.com/archive/Rogueware-with-new-Ransomware-Technology_2221_.aspx
Sophisticated techniques such as file encryption are not needed.

"This intercepting technique has been used before in other malware, for instance any rootkit malware, which is specifically designed to hide and kill processes silently in the background. However, this is the first time in history it has been spotted in conjunction with rogueware," said Panda Security's technical director, Luis Corrons..

Panda Security's demonstration video shows the con working on an XP system: Rogueware with new Ransomware Technology™

The program itself is remarkably developed, as has become a new trend for bogus antivirus in recent months, and mimics the design and configuration options found on many legitimate programs, including setting up 'updates', privacy settings and scanning schedules. It is even possible to change the default language from English to German or Spanish.

"The way this rogueware operates presents a dual risk: first, users are tricked into paying money simply in order to use their computers; and second, these same users may believe that they have a genuine anti-virus installed on the computer, thereby leaving the system unprotected," said Corrons.

The bogus program would get on to a user's PC in the first place after they had either clicked on a link in a spam email, or by visiting an infected distribution website, or even by visiting the program's convincing-looking product homepage. Once registered, Total security 2009 remains on the system.

"This technique allows the criminals to make money before the AV companies catch up to them with signatures to finally detect the threat. Specifically, criminals will generate a new undetected sample on the fly and then distribute it to users. Knowing that the AV companies will detect it shortly, the criminals force users into purchasing the rogueware before the signature detection can kick in to remove it," said Corrons.

The program has been circulating for some weeks and infection rates are believed to be small. But the technique of combining fake antivirus prompts with a form of ransom-cum-hijacking will probably become a new front in the fake antivirus industry's campaign to make people buy more completely useless programs.

In the last year, fake antivirus programs have become possibly the biggest money-making scam on the Internet after spam marketing, even managing to find distribution on false pretences through premium Internet sites such as The New York Times.

There is growing evidence that many genuine antivirus programs don't detect some of these scam programs, which might also be a reason behind their success.

(PCW)

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023