Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Symantec Hit With Lawsuit Calling its Lineup of Performance Products “Scareware”

Lawsuit Alleges That Symantec’s Lineup of Performance Utilities are “Scareware”, and Designed to Report Problems, Even if None Exist.

Lawsuit Alleges That Symantec’s Lineup of Performance Utilities are “Scareware”, and Designed to Report Problems, Even if None Exist.

A lawsuit seeking class action status, filed by a resident in the state of Washington, calls Symantec’s performance software “Scareware”, a form of malicious software that is designed to frighten a person into taking action, such as making a purchase. In the complaint, James Gross says that Symantec’s actions are undeniably fraudulent, and violate unfair competition laws.

At issue is Symantec’s computer performance line, Norton Utilities. Norton Utilities includes two additional tools – PC Tools Registry Mechanic and PC Tools Performance Toolkit. The newly vamped Norton Utilities was created after Symantec acquired PC Tools in 2008. All three products are still available on their own.

Norton Utilities Called Scareware in Law SuitNorton Utilities is being called Scareware in the complaint, due to the restrictions placed on it, and the various performance utilities for trial usage. While the software will identify several potential problems, it will only address and correct each problem if the software is fully registered.

From the complaint, obtained by SecurityWeek:

“First, Symantec represents to the consumer that the Scareware is capable of identifying and fixing a wide range of PC errors, privacy threats, and other computer problems. Next, to demonstrate the Scareware’s value to the consumer, Symantec allows the user to download the software and perform a “free diagnostic” scan, which purportedly detects whether any such problems exist on the individual’s PC. Then, the Scareware report, in alarmist fashion, that harmful errors and other threats exist on the user’s PC. Finally, Symantec informs the consumer that a handful of these issues may be fixed for free, but the individual must purchase the product to fully remove the remaining so-called errors.”

Charging for software to provide functionality is fair practice and by no means malicious, but the court documents go on to state that the Scareware itself actually does nothing, and is instead designed to report false issues in order to generate sales.

“Furthermore, the Scareware does not, and cannot, provide the benefits promised by Symantec. Accordingly, consumers are duped into purchasing software that does not function as advertised, and in fact, has very little (if any) utility,” the complaint adds.

The court documents report that by design, Symantec’s products are developed to report problems, even if none exist. Gross, through his attorneys, hired a computer forensics expert to examine the software, and in the complaint said they were able to confirm that the software always reports that the users’ computer’s system health is low.

Advertisement. Scroll to continue reading.

“The scareware does not conduct any actual diagnostic testing on the computer,” the complaint alleges. “Instead, Symantec intentionally designed its Scareware to invariably report, in an extremely ominous manner, that harmful errors, privacy risks, and other computer problems exist on the users’ PC, regardless of the real condition of the consumer’s computer.”

“…the only reason for consumers to purchase the Scareware products is to ‘fix’ the supposed ‘errors’ that the free scans ‘detected’.”

The compliant filed by Gross seems to take issue with the fact that some of Symantec’s offerings are Shareware or Trial-ware.

The suit is seeking $5,000,000 USD in damages. The order for class status is pending.

After reviewing the complaint, Symantec’s legal team provided SecurityWeek with the following statement:

“Symantec does not believe the lawsuit has merit and will vigorously defend the case. The Norton and PC Tools solutions at issue are designed to improve the system performance of our customers’ devices in terms of speed, maintain the health of their machines, and protect our customers’ information. The optimization and privacy functions of these solutions fix registry errors, wipe computer usage, and shred deleted items. Some include additional functionality such as recovery tools to restore lost items. Several independent third parties have tested and reviewed these products very favorably, verifying the effectiveness of their functionality.”

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Endpoint Security

Gigabyte has announced BIOS updates that remove a recently identified backdoor feature in hundreds of its motherboards.

Endpoint Security

Several major companies have published advisories in response to the Downfall vulnerability affecting Intel CPUs.

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

CISO Strategy

Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.

Endpoint Security

The Zero Day Dilemma

Endpoint Security

When establishing visibility and security controls across endpoints, security professionals need to understand that each endpoint bears some or all responsibility for its own...