Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique





















Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Panda Security Orange Alert

October 2008 by Panda Security

30 million computers are infected by fake antivirus programs generating profits for cyber-crooks of more than €10 million every month

-  The distribution of more than 7,000 variants of this type of adware, starting almost a year ago, continues to trick millions of Internet users who spend an average of three days disinfecting their systems

-  This scam is really designed to obtain users’ bank details, as after infection, users are directed to Web pages selling fake antivirus products

-  According to the data we have, “from an average price of €49.95, we can calculate that the creators of these programs are receiving more than €10 million per month, as 3% of those infected actually end up buying the fake product”

It’s not new and it’s not original, but the number of infections caused by fake antiviruses continues to increase rapidly. The creators of these programs only have one aim: to profit financially from their creations, and they are achieving this. “According to the data we are receiving at PandaLabs” –says Luis Corrons, technical director of PandaLabs-, “more than 30 million users have been infected by this new wave of fake antivirus programs. The information we have at present suggests that some 3% of these users have provided their personal details1 in the process of buying a product that claims to disinfect their computers. In fact, they never even receive the product. Extrapolating from an average price of €49.95, we can calculate that the creators of these programs are receiving more than €10 million per month”2.”

All of this is achieved simply by creating thousands of variants of a new type of adware and distributing it across the Internet. Users can be infected in several ways: browsing Web pages with adult content; downloading files from peer-to-peer networks; responding to e-greetings; downloading files that exploit security holes so users are infected without realizing, etc. There have even been cases of the Google home page being manipulated: (http://www.flickr.com/photos/panda_...).

These programs all operate in a broadly similar way: The program tells users that they are infected and pop-up windows, desktops and screensavers keep appearing, practically preventing the victim from using the computer. The aim is to scare the user into buying the fake antivirus with, for example, cockroaches ‘eating’ the desktop, or fake blue screens of death.

Internet-savvy users will realize quickly that this is a fake antivirus, and will look for a solution. “One of the worst things though, is that these programs are very difficult to disinfect. More advanced users might try to disinfect them manually, but this is no easy task. In general, it can take users up to three days to completely remove this threat from a computer”, adds Corrons. “That’s why we advise users whose antivirus has not detected the threat to install a new generation security solution designed especially to detect, disinfect and eliminate all traces of these malicious programs”.

However, not all users identify the problem: Those who actually reach the pages selling the fake antivirus will find products that are clones of those developed by legitimate vendors. “We have to admit that these fakes and the corresponding Web pages can look quite authentic, and it’s not surprising that some users end up buying them as they are desperate to clean their computers”.

During the purchase process, users are asked to enter confidential data. On average, their credit cards are charged €49.95 for an ‘antivirus’ that they never receive. “As the products are imitations of well-known brands, the victims often turn to the companies, who can’t do anything as they have not really bought any licenses”.

What we still don’t know is whether the bank or credit card details are then used later by the cyber-crooks. If that were the case, the financial implications are even greater.

“This new technique demonstrates the ingenuity of cyber-crooks, who are constantly on the lookout for new ways to make money”, says Corrons.

At Panda Security we advise users to install a latest generation antivirus to avoid infections from this type of adware. To this end, we are offering users a free version, with 3-months’ services, of Panda Internet Security 2009.

These types of epidemics are part of the new malware dynamic.

We no longer witness widescale epidemics caused by a single virus such as ‘I love you’ (http://en.wikipedia.org/wiki/ILOVEYOU) or Sasser. These headline-grabbing malicious codes were designed to bring notoriety and kudos to their creators by infecting as many computers as possible.

Now however, cyber-crooks operate in organized mafias with purely financial motives. They bombard the user community with thousands of new variants of each of the malware families everyday. In doing this they hope to saturate antivirus laboratories and at the same time avoid the kind of media attention given to single-virus epidemics. Users therefore have a false sense of security.

PandaLabs has so far detected more than 7,000 variants of fake antivirus programs.




See previous articles

    

See next articles