Understanding Current Trends in the Fake Anti-Virus/Scareware Ecosystem
The cyber-criminal groups behind fake anti-virus (scareware/rogueware) infections have run into some significant roadblocks over the last few years, but there is much more to the overall story. Some groups have been arrested. Some have had their operations and entire call support centers shut down. Some groups attracted too much attention, picked off the low hanging fruit and eventually walked away from their botnets. In some cases, the groups just weren’t very skilled at developing anti-anti-malware techniques, blackhat SEO, and malware distribution. They couldn’t keep up with the changes in anti-malware technologies, weren’t exactly dedicated to the effort, and simply fell off the map. However, some of the remaining scareware distribution gangs upped the ante and are aggressively developing difficult-to-detect polymorphic installers and difficult-to-remove support components. And the newest of these malware components include some of the first ITW 64-bit malware components to be taken seriously. But, for the most part, the scareware program itself remains the same. The development continues to change and progress, all for the purpose of evading anti-malware solutions and helping coerce the end-user to pay for the fake product, including support/rootkit components like TDSS (and its extreme complexities) or the more recent Black Internet (also known as “Trojan-Clicker.Win32.Cycler”) support/rootkit components. These complex Mbr infectors and other rootkit components meant to maintain money-making scareware on the system are signs of this somewhat extreme development effort.
Tags: anti-virus, Industry News, Industry News, Information Technology, Internet Security, Kaspersky, security, Software, virus
You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.