New
#1
The images look really scary
Source -
Millions of users have been duped into installing malicious software, also known as malware onto their systems allowing cybercriminals to steal money and other personal details. Here’s how the attack works:
Step One: Get the user to the malicious website
First, the group or groups behind these attacks first post large numbers of links to some new domain by spamming community forums, blog comments, and by putting the links inside hidden elements on compromised websites in a technique known as Blackhat SEO (Search Engine Optimization). In this way, they are able to get the target website high up in search results for common or recently trending search terms. Right now, for example, search results on Wimbledon and the World Cup are actively being poisoned in this manner.
The above technique is usually seen in conjunction with one or more of the following:
- Redirects from compromised websites that are otherwise legitimate
- Spam emails that are often sent via other compromised computers
- Malvertisements where attackers pay for an ad in a legitimate ad network, but use the ad to send people to the malicious website. In the past year, reputable sites like the New York Times, White Pages, Tech Crunch and others have been caught hosting such malvertizements.
Step Two: The con game
Once on the website, social engineering tricks are invoked to convince a user to fall for this modern Internet con. Computer users are conditioned with constant reminders to keep their computer free from virus and malware by running anti-virus software and keeping their virus definitions up to date. These websites use this conditioning against the user, using visual elements to establish authority and trust and then causing a sense of danger and urgency when notifying the user that their computer is infected with viruses and that their data personal computer is under someone else’s control.
Rogue anti-virus malware comes in many different forms and will take different approaches to fool a user, but at the most basic level, rogue anti-virus scams convince the user that they have a problem and that they need to download some software to fix the problem.
The screenshots below are just a few examples of fake scanners. These specially crafted pages are made with great detail to look exactly like Windows XP, Vista, or Windows 7 system alerts.
Fake scans like these are very believable for uneducated users and lead to a very high success rate for cybercriminals.
Threat Center Live Blog: Introduction to Rogue Anti-Virus
They're not exactly easy to remove either because the first thing they do is stop the user from starting any programs, including task manager.
If I have access to the system, the easiest way to remove these is to boot and run the Recovery Disc from Avira. Then follow it up with a Malwarebytes Anti-malware scan. Another option, is to remove the drive, and connect it externally to another system running MSE. Both remove the virus quickly and easily.
Unfortunately the average home user doesn't even know which way to turn a screwdriver, let alone remove a HDD from a laptop, connect it to another computer and run a virus scan. It's a bit of a challenge without the proper skill set.
Unfortunately this sort of thing has been around for years,
Spyware Warrior: Rogue/Suspect Anti-Spyware Products & Web Sites
and equally unfortunate is that they won't be going away any time soon.
Lol while I was reading this thread a Microsoft Security Essentials pop up appeared telling me their was a new version and I should upgrade now. Knowing it was just a coincidence I did it. It still creep-ed me out a little bit because while it updated I got a "Microsoft Security essentials is turned off, you should turn it on" message followed by a "Find an anti-virus program" security prompt. A couple of seconds latter the green tent with the check mark was back though. What are the odds that it should pick this very moment to do that?
True, but these forum boards aren't typically for the average user, and are littered with people who provide support, whether it be professionally, on the side, or both.
That's normal, because the program itself was being updated, not just the definitions. As with most software, the old version had to be yanked out before the new version could be applied.