Normal
0
false
false
false
EN-US
X-NONE
X-NONE
MicrosoftInternetExplorer4
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:”Table Normal”;
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:””;
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:10.0pt;
font-family:”Calibri”,”sans-serif”;
mso-fareast-font-family:Calibri;}
Malware authors continue to exploit the same social
engineering vector of curiosity to lure their victims into endangering their
data. Inquiring users employing unprotected systems could be exposed by simply
clicking the apparently innocent links related to the election topic.
The M.O. is classical: when clicked, the link of an
apparently legitimate Web site displayed in the search results page automatically
redirects the browser towards a Web page that infects the unwary user with a
variant of System Security Rogue
detected by BitDefender as Trojan.FakeAV.ABT.
Its behaviour is similar to its older “relatives” – XP
Antivirus, Antivirus 2009, AV360, Personal Antivirus or Total Security Rogue: when
landing on the malware distribution Web page, the browser window is
automatically minimized and a warning message simultaneously displays,
notifying the user about several computer infections and the availability of System Security.
By clicking either OK or Cancel buttons of the several
pop-up windows invading the screen, the user triggers a fake movie that plays
in the restored browser window. The movie mimics an on-going scanning process
that supposedly detects loads of malware onto the system, while other fake pop-up
windows should swindle the user into downloading the malware.
System Security Rogue
tries to trick the user into registering the fake product by giving notices of
false detections, more and more at each so called scan. Once on the machine, it
alters or irremediably damages the content of several system files and delivers
numerous pop-ups with bogus system problems and fake infections, while also
incessantly requesting the user to buy/renew a license. To be more persuasive,
it also removes the users’ desktop wallpaper and blocks multiple applications.
To protect your systems and data and avoid compromising your
systems and data, follow the five security tips below:
tags
I rediscovered "all that technical jazz" with the E-Threat Analysis Team at Bitdefender, the creator of one of the industry's most effective lines of internationally certified security software.
View all postsNovember 14, 2024
September 06, 2024