Monday, May 31, 2010

Beware of Downloading Fake Anti-Virus( MALWARE) Software


Malware lures users to download fake anti-virus


Malware: Mal/FakeAvJs-A

Also known as:




  • Avira: HTML/FakeAlert
  • McAfee: HTML/FakeAV
  • Microsoft: Trojan:JS/FakeIA
  • Symantec: Trojan.Fakeavalert
Who is at risk?: Windows users


About this threat:

Mal/FakeAvJs-A is a Trojan found on pages that display fake security scanning results and claim that there are threats on your computer. These pages also encourage you to download fake security software, known as FakeAV, from related websites. They will typically use repeated pop-ups and offer to download the software even if the user initially refuses. In some cases, the fake scanner may be automatically installed using browser vulnerabilities.

Users are directed to the fake scanning pages using social engineering techniques and search engine optimization, luring them with seemingly relevant search results. The static content of the fake scanning pages is normally done in HTML—JavaScript is normally responsible for dynamic content such as a scanning progress bars, displays of bogus threats and display popups.

The fake scanning software (installed as a result of visiting sites hosting Mal/FakeAvJs-A) is usually a member of the Troj/FaveAV family.


Fake AV Trojan installs even more fake AV
Malware: Mal/FakeAV-CZ


Also known as:


  • Ikarus: Trojan.Crypt
  • Kaspersky: Email-Worm.Win32.Joleee.eun
Who is at risk?:


Windows users

About this threat:

Mal/FakeAV-CZ is a generic detection for a family of fake anti-virus software. The Trojan appears to be a security tools that scans the computer for infections. It reports fake infections and prompts the user to purchase its full version in order to remove the alleged infections.

Mal/FakeAV-CZ has the functionality to install itself in the system tray or create pop-ups to constantly bug the user to purchase the "software." The Trojan may have the functionality to download more rogue software.

The Trojan may set or modify the following registry keys:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

When run, the Mal/FakeAV-CZ may trigger the following HIPS detection:

HIPS/RegMod-014
HIPS/ProcMod-007

Mal/FakeAV-CZ may attempt to contact a remote server, including:

core2937 (DOT) freesourceforyou (DOT) com


Courtesy : sophos.com

No comments: