Scareware

Last updated
Dialog from SpySheriff, designed to scare users into installing the rogue software SpySheriffPopUp.png
Dialog from SpySheriff, designed to scare users into installing the rogue software

Scareware is a form of malware which uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users into buying unwanted software. [1] Scareware is part of a class of malicious software that includes rogue security software, ransomware and other scam software that tricks users into believing their computer is infected with a virus, then suggests that they download and pay for fake antivirus software to remove it. [2] Usually the virus is fictional and the software is non-functional or malware itself. [3] According to the Anti-Phishing Working Group, the number of scareware packages in circulation rose from 2,850 to 9,287 in the second half of 2008. [4] In the first half of 2009, the APWG identified a 585% increase in scareware programs. [5]

Contents

The "scareware" label can also apply to any application or virus which pranks users with intent to cause anxiety or panic.

Scam scareware

Internet security writers use the term "scareware" to describe software products that produce frivolous and alarming warnings or threat notices, most typically for fictitious or useless commercial firewall and registry cleaner software. This class of program tries to increase its perceived value by bombarding the user with constant warning messages that do not increase its effectiveness in any way. Software is packaged with a look and feel that mimics legitimate security software in order to deceive consumers. [6]

Some websites display pop-up advertisement windows or banners with text such as: "Your computer may be infected with harmful spyware programs. [7] Immediate removal may be required. To scan, click 'Yes' below." These websites can go as far as saying that a user's job, career, or marriage would be at risk. Products with advertisements such as these are often considered scareware. Serious scareware applications qualify as rogue software.

Some scareware is not affiliated with any other installed programs. A user can encounter a pop-up on a website indicating that their PC is infected. [8] In some scenarios, it is possible to become infected with scareware even if the user attempts to cancel the notification. These popups are specially designed to look like they come from the user's operating system when they are actually a webpage.

A 2010 study by Google found 11,000 domains hosting fake anti-virus software, accounting for 50% of all malware delivered via internet advertising. [9]

Starting on March 29, 2011, more than 1.5 million web sites around the world have been infected by the LizaMoon SQL injection attack spread by scareware. [10] [11]

Research by Google discovered that scareware was using some of its servers to check for internet connectivity. The data suggested that up to a million machines were infected with scareware. [12] The company has placed a warning in the search results for users whose computers appear to be infected.

Another example of scareware is Smart Fortress. This site scares the victim into thinking they have many viruses on their computer and asks them to buy a professional service. [13]

Spyware

Some forms of spyware also qualify as scareware because they change the user's desktop background, install icons in the computer's notification area (under Microsoft Windows), and claiming that some kind of spyware has infected the user's computer and that the scareware application will help to remove the infection. In some cases, scareware trojans have replaced the desktop of the victim with large, yellow text reading "Warning! You have spyware!" or a box containing similar text, and have even forced the screensaver to change to "bugs" crawling across the screen. [14] Winwebsec is the term usually used to address the malware that attacks the users of Windows operating system and produces fake claims similar to that of genuine anti-malware software. [15]

SpySheriff exemplifies spyware and scareware: it purports to remove spyware, but is actually a piece of spyware itself, often accompanying SmitFraud infections. [16] Other antispyware scareware may be promoted using a phishing scam.

Uninstallation of security software

Another approach is to trick users into uninstalling legitimate antivirus software, such as Microsoft Security Essentials, or disabling their firewall. [17] Since antivirus programs typically include protection against being tampered with or disabled by other software, scareware may use social engineering to convince the user to disable programs which would otherwise prevent the malware from working.

In 2005, Microsoft and Washington state successfully sued Secure Computer (makers of Spyware Cleaner) for $1 million over charges of using scareware pop-ups. [18] Washington's attorney general has also brought lawsuits against Securelink Networks, SoftwareOnline.com, [19] High Falls Media, and the makers of Quick Shield. [20]

In October 2008, Microsoft and the Washington attorney general filed a lawsuit against two Texas firms, Branch Software and Alpha Red, producers of the Registry Cleaner XP scareware. [21] The lawsuit alleges that the company sent incessant pop-ups resembling system warnings to consumers' personal computers stating "CRITICAL ERROR MESSAGE! - REGISTRY DAMAGED AND CORRUPTED", before instructing users to visit a web site to download Registry Cleaner XP at a cost of $39.95.

On December 2, 2008, the U.S. Federal Trade Commission ("FTC") filed a Complaint in federal court against Innovative Marketing, Inc., ByteHosting Internet Services, LLC, as well as individuals Sam Jain, Daniel Sundin, James Reno, Marc D’Souza, and Kristy Ross. The Complaint also listed Maurice D’Souza as a Relief Defendant, alleged that he held proceeds of wrongful conduct but not accusing him of violating any law. The FTC alleged that the other Defendants violated the FTC Act by deceptively marketing software, including WinFixer, WinAntivirus, DriveCleaner, ErrorSafe, and XP Antivirus. According to the complaint, the Defendants falsely represented that scans of a consumer's computer showed that it had been compromised or infected and then offered to sell software to fix the alleged problems. [22] [23] [24]

Prank software

Another type of scareware involves software designed to literally scare the user through the use of unanticipated shocking images, sounds or video.

Detection

Recent research has also introduced a new detection technology designed to identify scareware social engineering attacks with enhanced resilience. This approach targets the visual images presented to end users, which is a layer that attackers cannot easily obscure. [27]

See also

Notes

  1. "What is Malware? | IBM". www.ibm.com. Archived from the original on 2023-12-07. Retrieved 2023-12-06.
  2. "Millions tricked by 'scareware'". BBC News. 2009-10-19. Archived from the original on 2018-06-22. Retrieved 2009-10-20.
  3. 'Scareware' scams trick searchers Archived 2017-08-10 at the Wayback Machine . BBC News (2009-03-23). Retrieved on 2009-03-23.
  4. "Scareware scammers adopt cold call tactics". The Register. 2009-04-10. Archived from the original on 2018-02-10. Retrieved 2009-04-12.
  5. "Phishing Activity Trends Report: 1st Half 2009" (PDF). Archived (PDF) from the original on 2012-04-15. Retrieved 2009-10-05.
  6. John Leydon (2009-10-20). "Scareware Mr Bigs enjoy 'low risk' crime bonanza". The Register. Archived from the original on 2017-08-10. Retrieved 2009-10-21.
  7. Carine Febre (2014-10-20). "Fake Warning Example". Carine Febre. Archived from the original on 2017-04-10. Retrieved 2014-11-21.
  8. JM Hipolito (2009-06-04). "Air France Flight 447 Search Results Lead to Rogue Antivirus". Trend Micro. Archived from the original on 2012-02-17. Retrieved 2009-06-06.
  9. Moheeb Abu Rajab and Luca Ballard (2010-04-13). "The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution" (PDF). Archived (PDF) from the original on 2019-02-20. Retrieved 2010-11-18.{{cite journal}}: Cite journal requires |journal= (help)
  10. "Mass 'scareware' attack hits 1.5M websites, still spreading". On Deadline. April 1, 2011. Archived from the original on July 8, 2012. Retrieved April 2, 2011.
  11. "Malicious Web attack hits a million site addresses". Reuters.com. April 1, 2011. Archived from the original on November 11, 2014. Retrieved July 1, 2017.
  12. "Google to Warn PC Virus Victims via Search Site". BBC News . 2011-07-21. Archived from the original on 2016-07-21. Retrieved 2011-07-22.
  13. "Smart Fortress 2012". Kaspersky Lab Technical Support. February 29, 2012. Archived from the original on 2017-01-28.
  14. "bugs on the screen". Microsoft TechNet.[ permanent dead link ]
  15. Vincentas (11 July 2013). "Scareware in SpyWareLoop.com". Spyware Loop. Archived from the original on 8 November 2014. Retrieved 27 July 2013.
  16. spywarewarrior.com Archived 2018-09-22 at the Wayback Machine filed under "Brave Sentry."
  17. "theregister.co.uk". Archived from the original on 2017-08-10. Retrieved 2017-08-10.
  18. Etengoff, Aharon (2008-09-29). "Washington and Microsoft target spammers". The Inquirer. Archived from the original on 2008-10-02. Retrieved 2008-10-04.
  19. "Attorney General's Office Sues, Settles with Washington-based SoftwareOnline.com | Washington State". www.atg.wa.gov. Archived from the original on 2021-12-08. Retrieved 2021-12-21.
  20. Tarun (2008-09-29). "Microsoft to sue scareware security vendors". Lunarsoft. Archived from the original on 2010-06-20. Retrieved 2009-09-24. [...] the Washington attorney general (AG) [...] has also brought lawsuits against companies such as Securelink Networks and High Falls Media, and the makers of a product called QuickShield, all of whom were accused of marketing their products using deceptive techniques such as fake alert messages.
  21. "Fighting the scourge of scareware". BBC News. 2008-10-01. Archived from the original on 2018-02-12. Retrieved 2008-10-02.
  22. "Win software". Federal Trade Commission. Archived from the original on 2013-09-19. Retrieved 2012-03-15.
  23. "Wanted by the FBI - SHAILESHKUMAR P. JAIN". FBI. Archived from the original on 2017-06-27. Retrieved 2016-07-28.
  24. "D'Souza Final Order" (PDF). Federal Trade Commission. Archived (PDF) from the original on 2012-10-16. Retrieved 2012-03-15.
  25. Contents of disk #448 Archived 2018-09-18 at the Wayback Machine . Amiga-stuff.com - see DISK 448.
  26. "Dark Drive Prank". Archived from the original on 2018-07-24. Retrieved 2010-02-18.
  27. Seifert, Christian; Stokes, Jack W.; Colcernian, Christina; Platt, John C.; Lu, Long (2013). Robust scareware image detection. pp. 2920–2924. doi:10.1109/ICASSP.2013.6638192. ISBN   978-1-4799-0356-6. Archived from the original on 2024-04-12. Retrieved 2024-02-09.

Further reading

Related Research Articles

Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types.

In computing terminology, a macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application. Some applications, such as Microsoft Office, Excel, PowerPoint allow macro programs to be embedded in documents such that the macros are run automatically when the document is opened, and this provides a distinct mechanism by which malicious computer instructions can spread. This is one reason it can be dangerous to open unexpected attachments in e-mails. Many antivirus programs can detect macro viruses; however, the macro virus' behavior can still be difficult to detect.

Spyware is any software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's security, or other means. This behavior may be present in malware and in legitimate software. Websites may engage in spyware behaviors like web tracking. Hardware devices may also be affected.

<span class="mw-page-title-main">Antivirus software</span> Computer software to defend against malicious computer viruses

Antivirus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

Norton AntiVirus is an anti-virus or anti-malware software product founded by Peter Norton, developed and distributed by Symantec since 1990 as part of its Norton family of computer security products. It uses signatures and heuristics to identify viruses. Other features included in it are e-mail spam filtering and phishing protection.

Mobile malware is malicious software that targets mobile phones or wireless-enabled Personal digital assistants (PDA), by causing the collapse of the system and loss or leakage of confidential information. As wireless phones and PDA networks have become more and more common and have grown in complexity, it has become increasingly difficult to ensure their safety and security against electronic attacks in the form of viruses or other malware.

A registry cleaner is a class of third-party utility software designed for the Microsoft Windows operating system, whose purpose is to remove redundant items from the Windows Registry.

<span class="mw-page-title-main">WinFixer</span> Rogue security software

WinFixer was a family of scareware rogue security programs developed by Winsoftware which claimed to repair computer system problems on Microsoft Windows computers if a user purchased the full version of the software. The software was mainly installed without the user's consent. McAfee claimed that "the primary function of the free version appears to be to alarm the user into paying for registration, at least partially based on false or erroneous detections." The program prompted the user to purchase a paid copy of the program.

The Vundo Trojan is either a Trojan horse or a computer worm that is known to cause popups and advertising for rogue antispyware programs, and sporadically other misbehavior including performance degradation and denial of service with some websites including Google and Facebook. It also is used to deliver other malware to its host computers. Later versions include rootkits and ransomware.

Rogue security software is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and aims to convince them to pay for a fake malware removal tool that actually installs malware on their computer. It is a form of scareware that manipulates users through fear, and a form of ransomware. Rogue security software has been a serious security threat in desktop computing since 2008. An early example that gained infamy was SpySheriff and its clones, such as Nava Shield.

<span class="mw-page-title-main">Security and Maintenance</span> Microsoft Windows software

Security and Maintenance is a component of the Windows NT family of operating systems that monitors the security and maintenance status of the computer. Its monitoring criteria includes optimal operation of antivirus software, personal firewall, as well as the working status of Backup and Restore, Network Access Protection (NAP), User Account Control (UAC), Windows Error Reporting (WER), and Windows Update. It notifies the user of any problem with the monitored criteria, such as when an antivirus program is not up-to-date or is offline.

<span class="mw-page-title-main">SpySheriff</span> Spyware

SpySheriff is malware that disguises itself as anti-spyware software. It attempts to mislead the user with false security alerts, threatening them into buying the program. Like other rogue antiviruses, after producing a list of false threats, it prompts the user to pay to remove them. The software is particularly difficult to remove, since it nests its components in System Restore folders, and also blocks some system management tools. However, SpySheriff can be removed by an experienced user, antivirus software, or by using a rescue disk.

<span class="mw-page-title-main">PC Tools (company)</span> Australian software company

PC Tools, formerly known as WinGuides.com, was a software company acquired by Gen Digital formerly Symantec in 2008; the new owner eventually discontinued the PC Tools name. Company headquarters were in Australia, with offices in Luxembourg, the United States, United Kingdom, Ireland and Ukraine. The company had previously developed and distributed security and optimization software for the Mac OS X and Microsoft Windows platforms.

The Zlob Trojan, identified by some antiviruses as Trojan.Zlob, is a Trojan horse which masquerades as a required video codec in the form of ActiveX. It was first detected in late 2005, but only started gaining attention in mid-2006.

MonaRonaDona is a browser hijacker that uses unique tactics through popups or alert messages stating that you are infected with a virus. It uses this message to send users on a hunt for a MonaRonaDona remedy only to run into other malicious websites.

<span class="mw-page-title-main">Computer virus</span> Computer program that modifies other programs to replicate itself and spread

A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.

<span class="mw-page-title-main">Microsoft Security Essentials</span> Discontinued antivirus product for Microsoft Windows

Microsoft Security Essentials (MSE) is a discontinued antivirus software (AV) product that provides protection against different types of malicious software, such as computer viruses, spyware, rootkits, and Trojan horses. Prior to version 4.5, MSE ran on Windows XP, Windows Vista, and Windows 7, but not on Windows 8 and later versions, which have built-in AV components known as Windows Defender. MSE 4.5 and later versions do not run on Windows XP. The license agreement allows home users and small businesses to install and use the product free of charge.

<span class="mw-page-title-main">Malwarebytes</span> Internet security company

Malwarebytes Inc. is an American Internet security company that specializes in protecting home computers, smartphones, and companies from malware and other threats. It has offices in Santa Clara, California; Clearwater, Florida; Tallinn, Estonia; Bastia Umbra, Italy; and Cork, Ireland.

MS Antivirus is a scareware rogue anti-virus which purports to remove virus infections found on a computer running Microsoft Windows. It attempts to scam the user into purchasing a "full version" of the software. The company and the individuals behind Bakasoftware operated under other different 'company' names, including Innovagest2000, Innovative Marketing Ukraine, Pandora Software, LocusSoftware, etc.

Mac Defender is an internet rogue security program that targets computers running macOS. The Mac security firm Intego discovered the fake antivirus software on 2 May 2011, with a patch not being provided by Apple until 31 May. The software has been described as the first major malware threat to the Macintosh platform. However, it is not the first Mac-specific Trojan, and is not self-propagating.