Scareware: Wikis

  
  
  

Note: Many of our articles have direct quotes from sources you can cite, within the Wikipedia article! This article doesn't yet, but we're working on it! See more info or our list of citable articles.

Encyclopedia

From Wikipedia, the free encyclopedia

Scareware comprises several classes of scam software, often with limited or no benefit, sold to consumers via certain unethical marketing practices. The selling approach is designed to cause shock, anxiety, or the perception of a threat, generally directed at an unsuspecting user. Some forms of spyware and adware also use scareware tactics.

A tactic frequently used by criminals involves convincing users that a virus has infected their computer, then suggesting that they download (and pay for) antivirus software to remove it.[1] Usually the virus is entirely fictional and the software is non-functional or malware itself.[2] According to the Anti-Phishing Working Group, the number of scareware packages in circulation rose from 2,850 to 9,287 in the second half of 2008.[3] In the first half of 2009, the APWG identified a 583% increase in scareware programs.[4]

The "scareware" label can also apply to any application or virus (not necessarily sold as above) which pranks users with intent to cause anxiety or panic.

Contents

Scam scareware

Internet Security bloggers/writers also use the term "scareware" to describe software products that — while serving some desired purpose — also produce a lot of frivolous and alarming warnings or threat notices, most typically commercial firewall and registry cleaner software. This class of program tries to increase its perceived value by bombarding the user with constant warning messages that do not increase its effectiveness in any way. Software is packaged with a look and feel that mimics legitimate security software in order to deceive consumers.[5]

Some websites display pop-up advertisement windows or banners with text such as: "Your computer may be infected with harmful spyware programs. Immediate removal may be required. To scan, click 'Yes' below." These websites can go as far as saying that a user's job, career, or marriage would be at risk. Products using advertisements such as these are often considered scareware. Serious scareware applications qualify as rogue software.

In recent findings some scareware is not affiliated with any other installed programs. A user can encounter a pop-up on a website indicating that their PC is infected.[6] In some scenarios it is possible to become infected with scareware even if the user attempts to cancel the notification. These popups are especially designed to look like they come from the user's operating system when they are actually a webpage.

In 2005, Microsoft and Washington state successfully sued Secure Computer (makers of Spyware Cleaner) for $1 million over charges of using scareware pop-ups.[7] Washington's attorney general has also brought lawsuits against Securelink Networks, High Falls Media and the makers of Quick Shield.[8]

In October 2008, Microsoft and the Washington attorney general filed a lawsuit against two Texas firms, Branch Software and Alpha Red, producers of the Registry Cleaner XP scareware.[9] The lawsuit alleges that the company sent incessant pop-ups resembling system warnings to consumers' personal computers stating "CRITICAL ERROR MESSAGE! - REGISTRY DAMAGED AND CORRUPTED", before instructing users to visit a web site to download Registry Cleaner XP at a cost of $39.95.

On June 25, 2009, the Federal Trade Commission in the United States reached a settlement with two defendants in a case involving a massive “scareware” scheme. The two defendants settled charges of deceptive advertising and forfeited more than $100,000 in assets. According to the Federal Trade Commission, the two settling defendants were part of a massive deceptive advertising scheme that tricked more than a million consumers into buying “rogue” computer security products, including WinFixer, WinAntivirus, DriveCleaner, ErrorSafe, and XP Antivirus. The scheme allegedly relied on deceptive advertisements featuring bogus computer “scans” that falsely claimed to detect viruses, spyware, and illegal pornography on consumers’ computers. The settlement imposed a judgment of nearly $1.9 million against the two Cincinnati-based defendants, James Reno and ByteHosting Internet Services, LLC. This amount represents the gross revenues these two settling defendants realized from the alleged scam. The settlement prohibits James Reno and ByteHosting from using deceptive “scareware” advertising tactics and from installing malicious programs on consumers’ computers. The settlement also permanently bars Reno and ByteHosting from ever again doing business with their co-defendants. The settlement does not affect the FTC’s ongoing case against the remaining defendants in the suit.[10]

According to the complaint, the two companies charged in the case – Innovative Marketing, Inc. and ByteHosting Internet Services, LLC – operate using a variety of aliases and maintain offices in various countries. Innovative Marketing, incorporated as a company in Belize, maintains offices in Kiev, Ukraine. ByteHosting Internet Services is based in Cincinnati, Ohio. The complaint alleges that these two companies, along with individuals Daniel Sundin, Sam Jain, Marc D’Souza, Kristy Ross, and James Reno, violated the FTC Act by misrepresenting that they conducted scans of consumers’ computers and detected a variety of security or privacy issues, including viruses, spyware, system errors, and pornography. The complaint also names a sixth individual, Maurice D’Souza, as a relief defendant who received proceeds from the scheme.[11]

Spyware

Some forms of spyware also qualify as scareware because they change the user's desktop background, install icons in the computer's system tray (under Microsoft Windows), and generally make a nuisance of themselves, claiming that some kind of spyware has infected the user's computer and that the scareware application will help to remove the infection. In some cases, scareware trojans have replaced the desktop of the victim with large, yellow text reading "Warning! You have spyware!", and have even forced the screensaver to change to "bugs" crawling across the screen.

SpySheriff,[12] exemplifies spyware/scareware: it purports to remove spyware, but is actually a piece of spyware in itself, often accompanying SmitFraud infections.

Prank software

Another type of scareware involves software designed to literally scare the user through the use of unanticipated shocking images, sounds or video.

The first program of this type is generally credited to be "NightMare", a program distributed on the Fish Disks for the Amiga computer (Fish #448) in 1991. When NightMare executes, it lies dormant for an extended (and random) period of time, finally changing the entire screen of the computer to an image of a skull while playing a horrifying shriek on the audio channels.[13]

Anxiety-based scareware puts users in situations where there is no positive outcome. For example, a small program can present a dialog box saying "Erase everything on hard drive?" with two buttons, labeled "OK" and "OK". Regardless of which button is chosen, nothing is destroyed other than the user's composure.

See also

Further reading

Notes

  1. ^ "Millions tricked by 'scareware'". BBC News. 2009-20-19. http://news.bbc.co.uk/2/hi/technology/8313678.stm. Retrieved 2009-10-20.  
  2. ^ 'Scareware' scams trick searchers. BBC News (2009-03-23). Retrieved on 2009-03-23.
  3. ^ "Scareware scammers adopt cold call tactics". The Register. 2009-04-10. http://www.theregister.co.uk/2009/04/10/supportonclick_scareware_scam/. Retrieved 2009-04-12.  
  4. ^ http://www.antiphishing.org/reports/apwg_report_h1_2009.pdf Phishing Activity Trends Report: 1st Half 2009
  5. ^ John Leydon (2009-10-20). "Scareware Mr Bigs enjoy 'low risk' crime bonanza". The Register. http://www.theregister.co.uk/2009/10/20/scareware_psychology/. Retrieved 2009-10-21.  
  6. ^ JM Hipolito (2009-06-04). "Air France Flight 447 Search Results Lead to Rogue Antivirus". Trend Micro. http://blog.trendmicro.com/search-results-for-air-france-flight-447-lead-to-rogue-antivirus/. Retrieved 2009-06-06.  
  7. ^ Etengoff, Aharon (2008-09-29). "Washington and Microsoft target spammers". The Inquirer. http://www.theinquirer.net/gb/inquirer/news/2008/09/29/washington-microsoft-target. Retrieved 2008-10-04.  
  8. ^ Tarun (2008-09-29). "Microsoft to sue scareware security vendors". Lunarsoft. http://www.lunarsoft.net/news/1-frontpage/378-microsoft-to-sue-scareware-security-vendors. Retrieved 2009-09-24. "[...] the Washington attorney general (AG) [...] has also brought lawsuits against companies such as Securelink Networks and High Falls Media, and the makers of a product called QuickShield, all of whom were accused of marketing their products using deceptive techniques such as fake alert messages."  
  9. ^ "Fighting the scourge of scareware". BBC News. 2008-10-01. http://news.bbc.co.uk/2/hi/technology/7645420.stm. Retrieved 2008-10-02.  
  10. ^ . http://www.ftc.gov/opa/2009/06/winsoftware.shtm.  
  11. ^ "Court Halts Bogus Computer Scans". Federal Trade Commission. 2008-12-08. http://www.ftc.gov/opa/2008/12/winsoftware.shtm. Retrieved 2009-09-12.  
  12. ^ SpywareWarrior.com - http://www.spywarewarrior.com/rogue_anti-spyware.htm filed under "Brave Sentry."
  13. ^ Contents of disk #448. Amiga stuff.com - see DISK 448.







Got something to say? Make a comment.
Your name
Your email address
Message