The "No Network is 100% Secure" series
- Scareware -
A White Paper
All rights reserved - may not be copied without permission
Easyrider LAN Pro, NOC Design Consultants
Contact Us
What is Scareware?:
Scareware is software that often has limited or no benefit, that is sold to consumers
by employing unethical marketing practices. Scareware is designed to cause
shock, anxiety, or the perception of a threat directed at an unsuspecting user.
A common tactic is to convince users that their computer is infected with a virus,
then suggest that they download, and pay for, anti-virus software to remove it.
Usually the virus is entirely fictional. The software that the user is duped into
purchasing is typically non-functional or malware. Payments by credit card often
result in credit card fraud as well.
Cyber-criminals are increasingly hiding viruses in bogus computer security software
to trick people into installing treacherous programs on machines. Scareware pretends
to check computers for viruses, and then claims to find dangerous infections that the
program will fix for a fee. This rogue software lures users into paying for
"protection" that is actually malware that offers little or no real protection.
In addition, scareware is often designed to steal personal information, credit
card numbers and so on. Hackers have been capitalizing on hype and fear surrounding
widely reported viruses such as Conficker to trick people into loading scareware onto
computers.
Shock-based scareware: Shock scareware is designed to literally scare the user
through the use of unanticipated shocking images, sounds or video. The first software
of this type is generally credited to be "NightMare", a program distributed on the
Fish Disks for the Amiga computer in 1991. When NightMare is executed, it lies dormant
for an extended and random period of time, finally changing the entire screen of the
computer to an image of a skull while playing a horrifying shriek on the audio
channels.
Anxiety-based scareware: Anxiety-based scareware will put a user in situations
where there is no positive outcome. For example, a small program that presents a
dialog box saying "Erase everything on hard drive?" with two buttons, labeled "OK"
and "OK".
Alert-based scareware: Scareware is also used to describe software or
web site marketing practices that produce a series of frivolous and alarming warnings
or threat notices. Typically, these would involve being bombarded with pop-ups that
promote firewall and registry cleaner software. Criminal web sites will display
pop-up advertisement windows or banners with text such as: "Your computer may be
infected with harmful spyware programs. Immediate removal may be required. To scan,
click 'Yes' below." These web sites may also indicate that a user's job, career, or
marriage would be at risk.
Some scareware is not affiliated with any other installed programs. A user can be
approached with a pop-up from a website indicating that their PC is infected. In
some scenarios it is possible to become infected with scareware even if the user
attempts to cancel the notification. These pop-ups are especially designed to look
like they are from the user's operating system when they are actually a web page.
The safest way to abort these attacks is to terminate the web browser from the
task manager although very few users will do this. Clicking any portion of the
pop-up, including "cancel" or the close "x" is just as likely as not to install
the rogue software onto your machine.
Spyware scareware: Some forms of spyware also qualify as scareware because
they change the user's desktop background, install icons in the computer's system
tray claiming that the user's computer is infected with some kind of spyware that
the scareware application will remove.
Ransom-based scareware: Another type of malware renders a User's PC inoperable
and then demands a "ransom" to remove the malware.
A recently discovered malware called Antivirus2009 claims to have located corrupted
files on affected systems. Prospective marks are told they need to download a
package called FileFix Professional to recover these files. In reality, Antivirus2009
is responsible for encrypting the supposedly corrupted files, targeting documents in
the User's "My Documents" folder. FileFix Professional unscrambles this content but
only after users pay $50 for software of dubious utility.
Other forms of ransom scareware will lock up a User's PC and will require entering a
code number, which must be purchased, to unlock it.
Why does scareware work?: A recent report from North Carolina State University
showed that most internet users are unable to tell the difference between genuine and
fake pop-up messages. The study demonstrates how easy it is to fool people on the
web. Despite being told some of the messages were fake, people hit the OK button 63%
of the time.
Makers of fake anti-virus software exploit search engines to drive people to sites
peddling scareware. Using popular and mis-spelled search terms, the criminals divert
people to sites that issue fake warnings about virus infections. Some seed web
pages with popular keywords such as "Obama" but others use terms associated with
recent events. Using popular terms mean the pages appear high up in results when
people carry out a keyword search. Anyone clicking on a booby-trapped page is then
instantly re-directed to the site hosting the links to the fake security software.
Once they arrive, visitors are bombarded with pop-ups warning that their PC is
infected. To clear up the infection users are told they must download and pay for
anti-virus software which typically costs about $50
Research suggests some criminals are making as much as $10,000 USD a day from fake
security software. A report by the Anti-Phishing Working Group, released in March
2009, found 9,287 bogus anti-malware programs in circulation in December 2008 - a
rise of 225% since January 2008.
Scareware best practices: Users should be very wary of any pop-up window
claiming to find evidence of an infection. It is impossible to scan a user's local
disk without installing software. Installing software from an unknown Internet web
site is a fundamentally bad idea.
Do not perform "free" security scans offered on any web site. Messages telling you
to install and update security software for your computer seem to be everywhere. So
you might be tempted by an offer of a "free security scan", especially when faced
with a pop-up, an email, or an ad that claims "malicious software" has already been
found on your machine. Unfortunately, it's likely that the scary message is a come-on
for a rip-off.
Make it a practice not to click on any links within pop-ups.
Make certain that your security software is active and current: at a minimum, your
computer should have anti-virus and anti-spyware software, and a firewall.
If you're faced with any of the warning signs of a scareware scam or suspect a
problem, shut down your browser. Don't click "No" or "Cancel", or even the "x" at
the top right corner of the screen. Some scareware is designed so that any of those
buttons can activate the program. If you use Windows, press Ctrl + Alt + Delete to
open your Task Manager, and click "End Task". If you use a Mac, press Command +
Option + Q + Esc to "Force Quit". If you get an offer, check out the program by
entering the name in a search engine. The results can help you determine if the
program is on the up-and-up. But bear in mind that most are not!
Scareware purveyors go to great lengths to make their product and service look
legitimate. For example, if you buy the software, you may get an email receipt with
a customer service phone number. If you call, you're likely to be connected to
someone, but that alone does not mean the company is legitimate. Regardless,
remember that these are well-organized and profitable schemes designed to rip people
off.
Report possible fraud online at ftc.gov or by phone at 1-877-FTC-HELP. Details about
the purchase including what website you were visiting when you were redirected are
helpful to investigators.
Ransomware update - System Security malware: August 19, 2009.
The latest example of ranson-based scareware is a misleading app called "System
Security". This malware forces users to purchase it because it can render a system
nearly unusable. Once System Security is installed on a machine it terminates most of
the active user processes such as Firefox, antivirus programs, Acrobat Reader, and
others. Internet Explorer is spared from this list. If the user tries to run Task
Manager, antivirus software, or any other executable binary except Internet Explorer,
this misleading application reports that the respective binary is infected and blocks
access. Victims of this malware are forced to pay for a "subscription" to have it
removed. Needless to say, paying this ransom will not remove this malware from your
computer. This malware survives Even after system reboot. As always, we encourage
users to download applications directly from vendors' websites or legitimate partners.
AV signatures detect this misleading application as Trojan.Fakeavalert.
Registry Patrol: I've received a lot of inquiries about Registry Patrol asking
if it is scareware. The short answer is that Registry Patrol does not appear to
be scareware, however.... you would definitely want to Google reviews on this
product and company before buying and/or downloading it to your computer. The CNET
forum is packed with dissatisfied customers and contains almost no positive experience
reviews. A person claiming to represent the company but providing no name or contact
information disputed only one of the posts claiming "I suspect that this customer is
likely a competing software seller who has decided to use forums like this to attempt
to smear a quality product".
Based on the reviews I've read, Registry Patrol reportedly introduces substantial
instability in at least some of the computers that it's been installed on. But I see
no evidence that this instability is due to anything more than poor programming and
inadequate testing. However, if the above quoted CNET forum response actually came from
a company representative, one would probably be wise to seek out other solution
providers. Caveat emptor.
About the Author
Frank Saxton is a computer network security engineer and Easyrider LAN Pro principle.
Home-based in Portland, Oregon, Frank has been designing remote diagnostic and
network enterprise monitoring centers since the late 1970s. Prior to becoming a
professional systems engineering consultant in 1990, Frank had a 20 year career
in computer systems field engineering and field engineering management. Frank
has a BSEE from Northeastern University and holds several certifications including
Network General's Certified Network Expert (CNX). As a NOC design engineer and
architect, Frank works regularly with enterprise-class monitoring tools such as
HP Openview Operations, BMC Patrol and others. In his enterprise security
audit work, Frank uses sniffers and other professional grade monitoring tools on a
daily basis.
Next in the security white paper series:
How Cyber Criminals will mature over the next ten years
Are you vulnerable to drive-by exploits?
High value sites recent hacks
IT employment challenges of the 21st century
Employment reference checking white paper
Competency Certifications White Paper
Firewall White Paper
Virus White Paper
GhostNet White Paper
Password White Paper
Digital Identification Certificates White Paper
Cryptography White Paper
OpenID White Paper
Intrusion Detection Systems IDS White Paper
Rootkit White Paper
Unnecessary Windows XP Services White Paper
Exaflood Internet Brownout White Paper
Cloud Computing White Paper
Proxy Server White Paper
Personal Computer PC Security White Paper
Phishing White Paper
DNS Poisoning White Paper
Conficker White Paper
SPAM White Paper
Best Practices White Paper
Denial of Service DoS White Paper
Trojan Virus Attacks White Paper
Port Scanning White Paper
Monitoring Basics 101 White Paper
Monitoring Basics 102 White Paper
Monitoring Basics 103 White Paper
Virtual Machine Security White Paper
Aurora vulnerability White Paper
Shelfware White Paper
Outsourced IT White Paper
Easyrider LAN Pro Consulting services:
Network Security Audit and PC Tune-up service
- Proxy server installation and configuration
- Enterprise security consultations
- Disaster recovery planning
- Disaster recovery services
- Capacity, migration and upgrade planning
- Build and deploy central syslog server
- Build trouble ticket systems
- Design and build monitoring environments
- Design and build Network Operations Centers (NOC)
- HP Openview, BMC Patrol consulting
Last modified March 25, 2009
Copyright 1990-2009 Easyrider LAN Pro