The "No Network is 100% Secure" series
- Scareware -
A White Paper
All rights reserved - may not be copied without permission
Easyrider LAN Pro, NOC Design Consultants
What is Scareware?:
Scareware is software that often has limited or no benefit, that is sold to consumers
by employing unethical marketing practices. Scareware is designed to cause
shock, anxiety, or the perception of a threat directed at an unsuspecting user.
A common tactic is to convince users that their computer is infected with a virus,
then suggest that they download, and pay for, anti-virus software to remove it.
Usually the virus is entirely fictional. The software that the user is duped into
purchasing is typically non-functional or malware. Payments by credit card often
result in credit card fraud as well.
Cyber-criminals are increasingly hiding viruses in bogus computer security software to trick people into installing treacherous programs on machines. Scareware pretends to check computers for viruses, and then claims to find dangerous infections that the program will fix for a fee. This rogue software lures users into paying for "protection" that is actually malware that offers little or no real protection. In addition, scareware is often designed to steal personal information, credit card numbers and so on. Hackers have been capitalizing on hype and fear surrounding widely reported viruses such as Conficker to trick people into loading scareware onto computers.
Shock-based scareware: Shock scareware is designed to literally scare the user through the use of unanticipated shocking images, sounds or video. The first software of this type is generally credited to be "NightMare", a program distributed on the Fish Disks for the Amiga computer in 1991. When NightMare is executed, it lies dormant for an extended and random period of time, finally changing the entire screen of the computer to an image of a skull while playing a horrifying shriek on the audio channels.
Anxiety-based scareware: Anxiety-based scareware will put a user in situations where there is no positive outcome. For example, a small program that presents a dialog box saying "Erase everything on hard drive?" with two buttons, labeled "OK" and "OK".
Alert-based scareware: Scareware is also used to describe software or web site marketing practices that produce a series of frivolous and alarming warnings or threat notices. Typically, these would involve being bombarded with pop-ups that promote firewall and registry cleaner software. Criminal web sites will display pop-up advertisement windows or banners with text such as: "Your computer may be infected with harmful spyware programs. Immediate removal may be required. To scan, click 'Yes' below." These web sites may also indicate that a user's job, career, or marriage would be at risk.
Some scareware is not affiliated with any other installed programs. A user can be approached with a pop-up from a website indicating that their PC is infected. In some scenarios it is possible to become infected with scareware even if the user attempts to cancel the notification. These pop-ups are especially designed to look like they are from the user's operating system when they are actually a web page. The safest way to abort these attacks is to terminate the web browser from the task manager although very few users will do this. Clicking any portion of the pop-up, including "cancel" or the close "x" is just as likely as not to install the rogue software onto your machine.
Spyware scareware: Some forms of spyware also qualify as scareware because they change the user's desktop background, install icons in the computer's system tray claiming that the user's computer is infected with some kind of spyware that the scareware application will remove.
Ransom-based scareware: Another type of malware renders a User's PC inoperable and then demands a "ransom" to remove the malware. A recently discovered malware called Antivirus2009 claims to have located corrupted files on affected systems. Prospective marks are told they need to download a package called FileFix Professional to recover these files. In reality, Antivirus2009 is responsible for encrypting the supposedly corrupted files, targeting documents in the User's "My Documents" folder. FileFix Professional unscrambles this content but only after users pay $50 for software of dubious utility.
Other forms of ransom scareware will lock up a User's PC and will require entering a code number, which must be purchased, to unlock it.
Why does scareware work?: A recent report from North Carolina State University showed that most internet users are unable to tell the difference between genuine and fake pop-up messages. The study demonstrates how easy it is to fool people on the web. Despite being told some of the messages were fake, people hit the OK button 63% of the time.
Makers of fake anti-virus software exploit search engines to drive people to sites peddling scareware. Using popular and mis-spelled search terms, the criminals divert people to sites that issue fake warnings about virus infections. Some seed web pages with popular keywords such as "Obama" but others use terms associated with recent events. Using popular terms mean the pages appear high up in results when people carry out a keyword search. Anyone clicking on a booby-trapped page is then instantly re-directed to the site hosting the links to the fake security software. Once they arrive, visitors are bombarded with pop-ups warning that their PC is infected. To clear up the infection users are told they must download and pay for anti-virus software which typically costs about $50
Research suggests some criminals are making as much as $10,000 USD a day from fake security software. A report by the Anti-Phishing Working Group, released in March 2009, found 9,287 bogus anti-malware programs in circulation in December 2008 - a rise of 225% since January 2008.
Scareware best practices: Users should be very wary of any pop-up window claiming to find evidence of an infection. It is impossible to scan a user's local disk without installing software. Installing software from an unknown Internet web site is a fundamentally bad idea.
Do not perform "free" security scans offered on any web site. Messages telling you to install and update security software for your computer seem to be everywhere. So you might be tempted by an offer of a "free security scan", especially when faced with a pop-up, an email, or an ad that claims "malicious software" has already been found on your machine. Unfortunately, it's likely that the scary message is a come-on for a rip-off.
Make it a practice not to click on any links within pop-ups.
Make certain that your security software is active and current: at a minimum, your computer should have anti-virus and anti-spyware software, and a firewall.
If you're faced with any of the warning signs of a scareware scam or suspect a problem, shut down your browser. Don't click "No" or "Cancel", or even the "x" at the top right corner of the screen. Some scareware is designed so that any of those buttons can activate the program. If you use Windows, press Ctrl + Alt + Delete to open your Task Manager, and click "End Task". If you use a Mac, press Command + Option + Q + Esc to "Force Quit". If you get an offer, check out the program by entering the name in a search engine. The results can help you determine if the program is on the up-and-up. But bear in mind that most are not!
Scareware purveyors go to great lengths to make their product and service look legitimate. For example, if you buy the software, you may get an email receipt with a customer service phone number. If you call, you're likely to be connected to someone, but that alone does not mean the company is legitimate. Regardless, remember that these are well-organized and profitable schemes designed to rip people off.
Report possible fraud online at ftc.gov or by phone at 1-877-FTC-HELP. Details about the purchase including what website you were visiting when you were redirected are helpful to investigators.
Ransomware update - System Security malware: August 19, 2009. The latest example of ranson-based scareware is a misleading app called "System Security". This malware forces users to purchase it because it can render a system nearly unusable. Once System Security is installed on a machine it terminates most of the active user processes such as Firefox, antivirus programs, Acrobat Reader, and others. Internet Explorer is spared from this list. If the user tries to run Task Manager, antivirus software, or any other executable binary except Internet Explorer, this misleading application reports that the respective binary is infected and blocks access. Victims of this malware are forced to pay for a "subscription" to have it removed. Needless to say, paying this ransom will not remove this malware from your computer. This malware survives Even after system reboot. As always, we encourage users to download applications directly from vendors' websites or legitimate partners. AV signatures detect this misleading application as Trojan.Fakeavalert.
Registry Patrol: I've received a lot of inquiries about Registry Patrol asking if it is scareware. The short answer is that Registry Patrol does not appear to be scareware, however.... you would definitely want to Google reviews on this product and company before buying and/or downloading it to your computer. The CNET forum is packed with dissatisfied customers and contains almost no positive experience reviews. A person claiming to represent the company but providing no name or contact information disputed only one of the posts claiming "I suspect that this customer is likely a competing software seller who has decided to use forums like this to attempt to smear a quality product".
Based on the reviews I've read, Registry Patrol reportedly introduces substantial instability in at least some of the computers that it's been installed on. But I see no evidence that this instability is due to anything more than poor programming and inadequate testing. However, if the above quoted CNET forum response actually came from a company representative, one would probably be wise to seek out other solution providers. Caveat emptor.
About the Author
Frank Saxton is a computer network security engineer and Easyrider LAN Pro principle.
Home-based in Portland, Oregon, Frank has been designing remote diagnostic and
network enterprise monitoring centers since the late 1970s. Prior to becoming a
professional systems engineering consultant in 1990, Frank had a 20 year career
in computer systems field engineering and field engineering management. Frank
has a BSEE from Northeastern University and holds several certifications including
Network General's Certified Network Expert (CNX). As a NOC design engineer and
architect, Frank works regularly with enterprise-class monitoring tools such as
HP Openview Operations, BMC Patrol and others. In his enterprise security
audit work, Frank uses sniffers and other professional grade monitoring tools on a
Next in the security white paper series:
How Cyber Criminals will mature over the next ten years
Are you vulnerable to drive-by exploits?
High value sites recent hacks
IT employment challenges of the 21st century
Employment reference checking white paper
Competency Certifications White Paper
Firewall White Paper
Virus White Paper
GhostNet White Paper
Password White Paper
Digital Identification Certificates White Paper
Cryptography White Paper
OpenID White Paper
Intrusion Detection Systems IDS White Paper
Rootkit White Paper
Unnecessary Windows XP Services White Paper
Exaflood Internet Brownout White Paper
Cloud Computing White Paper
Proxy Server White Paper
Personal Computer PC Security White Paper
Phishing White Paper
DNS Poisoning White Paper
Conficker White Paper
SPAM White Paper
Best Practices White Paper
Denial of Service DoS White Paper
Trojan Virus Attacks White Paper
Port Scanning White Paper
Monitoring Basics 101 White Paper
Monitoring Basics 102 White Paper
Monitoring Basics 103 White Paper
Virtual Machine Security White Paper
Aurora vulnerability White Paper
Shelfware White Paper
Outsourced IT White Paper
Easyrider LAN Pro Consulting services:
Network Security Audit and PC Tune-up service
- Proxy server installation and configuration
- Enterprise security consultations
- Disaster recovery planning
- Disaster recovery services
- Capacity, migration and upgrade planning
- Build and deploy central syslog server
- Build trouble ticket systems
- Design and build monitoring environments
- Design and build Network Operations Centers (NOC)
- HP Openview, BMC Patrol consulting
Last modified March 25, 2009
Copyright 1990-2009 Easyrider LAN Pro