Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Fake AV Attacks Decline as Cybercriminals Shift Tactics

Cybercrooks are not ready to give up on fake anti-virus attacks just yet and they’re even coming up with new methods to trick victims into paying up.

Cybercrooks are not ready to give up on fake anti-virus attacks just yet and they’re even coming up with new methods to trick victims into paying up.

These rogue anti-virus camapigns display numerous virus warnings on infected machines in an effort to trick users into paying a fee to have the so-called threats removed. With the emergence of ransomware, fake anti-virus has witnessed a significant decline recently. However, while such threats might not be as common as they used to be, cybercriminals continue to use them to make a profit.

Security researchers at Microsoft have been monitoring the evolution of fake AVs and they’ve noticed that pieces of malware such as Win32/Winwebsec, Win32/OneScan, Win32/FakeXPA and Win32/FakePAV, which at one point were the most prevalent of the rogue families, have been on a downward trend all over the world.

“However, since the big malware ‘players’ are having more trouble in taking advantage of users paying for fake security products, and are moving away from this kind of social engineering, we are seeing other players willing to fill the gap – luckily with small impact,” Daniel Chipiristeanu of the Microsoft Malware Protection Center explained in a blog post.

One example is the fake AV detected by Microsoft as Rogue:Win32/Defru. It’s not uncommon for such malware to prevent victims from visiting the websites of security solutions providers to ensure that the infection cannot be easily removed. However, Defru takes it even further by using the “hosts” file to redirect users to a fake antivirus website.

When the victims attempt to access sites like apple.com, bing.com, facebook.com, microsoft.com and yahoo.com, they are taken to a bogus “Windows Security” page where they’re presented with a fake scan and several malware alerts. A total of more than 300 websites are targeted by Defru, including security websites, news websites, social networks and other popular online services.

After being presented with the bogus warnings numerous times, users might give in and agree to pay to have their computers “cleaned up.”

The cybercriminals behind this operation appear to be targeting Russian speaking users, with most victims being located in Russia, Ukraine and Kazakhstan.

Advertisement. Scroll to continue reading.

“The rogue is written in PHP, uses a PHP EXE compiler (Bambalam) and will copy itself to %appdata%w1ndows_<4chars>.exe (e.g. “w1ndows_33a0.exe”). It persists at system reboot by adding itself to the registry key HKCUSOFTWAREMicrosoftWindowsCurrentVersionRun with the value “w1ndows_<4chars>,” said Chipiristeanu.

Fortunately, it’s not difficult to remove the malware from an infected device. Users must remove the entry value from the “Run” registry key, and delete the executable file from disk and the entries from the “hosts” file.

Dodi Glenn, senior director of Security Intelligence and Research Labs at ThreatTrack Security, believes that redirecting users from good websites to malicious ones can be an effective method to siphoning money from victims.

“There has been a big decline in rogues lately. We tend to see spikes in rogue malware distribution towards September, when students are going back to school, and the holiday season begins. The miscreants will typically prey on people who are searching for hot topics, such as Christmas gifts, etc., by setting up drive by download sites, infecting machines which have vulnerabilities on them,” Glenn told SecurityWeek.

Experts say cybercriminals are moving away from fake anti-virus attacks because they’re not as profitable as they used to be.

“Fake A/V is something that we’ve been monitoring for a long time and it has been a favorite tool in the arsenal of cyber criminals given the ease with which users can be tricked into either paying for a bogus subscription, or downloading malware when presented with what looks like a legitimate anti-virus alert,” said Jayce Nichols, chief of threat analysis and innovation at iSIGHT Partners.

“The reduction in infections from Fake A/V most likely points toward a decrease in profitability for the criminal actors using it – either driven by heightened user awareness and (more likely) effective combatting techniques from anti-malware vendors. Criminal actors typically take the path of least resistance which also promises the highest return. Cyber criminals gravitate towards the most profitable options – if rogue / Fake A/V is becoming less profitable, they are going to use it less,” Nichols told SecurityWeek.

Both experts agree that ransomware is much more efficient when it comes to helping cybercrooks make a profit.

“We believe that ransomware applications, like CryptoLocker, will continue to be created, in efforts to take money from victims. It is important to know that these applications are not only targeting Windows machines, but also Android devices,” Glenn said.

“We’ve seen a rise in ransomware – primarily because unlike Fake A/V, the bad actors can actually hold the victim over a fire by encrypting their files. We reported on an active campaign using ransomware just the other day – which appears to use a new variant we dubbed ‘TorrentLocker‘ – and we think that we’ll continue to see broad use of ransomware as an alternative to Fake A/V moving forward,” Nichols noted.

 

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.