Showing posts with label fake antivirus software. Show all posts
Showing posts with label fake antivirus software. Show all posts

Monday, October 19, 2009

Fake security software in millions of computers: Symantec


WASHINGTON (Reuters) - Tens of millions of U.S. computers are loaded with scam security software that their owners may have paid for but which only makes the machines more vulnerable, according to a new Symantec report on cybercrime.

Cyberthieves are increasingly planting fake security alerts that pop up when computer users access a legitimate website. The "alert" warns them of a virus and offers security software, sometimes for free and sometimes for a fee.

"Lots of times, in fact they're a conduit for attackers to take over your machine," said Vincent Weafer, Symantec's vice president for security response.

"They'll take your credit card information, any personal information you've entered there and they've got your machine," he said, referring to some rogue software's ability to rope a users' machine into a botnet, a network of machines taken over to send spam or worse.

Reuters

Thursday, September 24, 2009

Drudge, Other Sites Flooded With Malicious Ads


Criminals flooded several online ad networks with malicious advertisements over the weekend, causing popular Web sites such as the Drudge Report, Horoscope.com and Lyrics.com to inadvertently attack their readers, a security company said Wednesday.


The trouble started on Saturday, when the criminals somehow placed the malicious ads on networks managed by Google's DoubleClick, as well as two others: YieldManager and ValueClick's Fastclick network, according to Mary Landesman, a senior security researcher with ScanSafe.

The attack comes just a week after the New York Times Web site was tricked into displaying a deceptive 'scareware' advertisement for fake antivirus software from scammers pretending to be ad buyers with Vonage, an Internet telephony company.

Instead of trying to trick Web surfers into buying bogus software, these ads attacked.

They would pop up a nearly invisible window in the victim's browser that contained a maliciously encoded pdf document, which included attack code that placed a variant of the Win32/Alureon Trojan horse program on the victim's computer. Sometimes, the ads would also try to exploit a previously patched flaw in Microsoft's DirectShow software, Landesman said.

"The user would have seen a very brief opening of a blank pdf window and it would be at the bottom portion of their screen," she said. The Alureon Trojan is known to download additional malware and often hijack victims' search results, she said.

The pdf attacks apparently only affected victims with out-of-date versions of Adobe's Reader or Acrobat software, she added.

Between Saturday and Monday, the ads accounted for 11 percent of all Web pages blocked by ScanSafe's Web filtering software, a sign that many people were being presented with the malicious ads. And because the pdf pages were modified slightly every time they were displayed, most antivirus products didn't detect them.

In tests, ScanSafe found that only 3 out of 41 antivirus vendors detected the malware.

"To be honest, they were pretty clever in the way they carried this out," Landesman said. "They managed to infiltrate sites that enjoy very good traffic and they were able to use a mechanism for creating this pdf that caused it to be nearly completely undetected."

This is not the first time Google's DoubleClick has been associated with this type of malicious advertising. Earlier this year criminals placed similar ads on the home page of technology trade magazine eWeek, whose ads were managed by DoubleClick.

PC World