Some security applications stop scareware attacks proactively, detecting various sorts of payloads associated with several categories of scareware, blocking them, and displaying a Mal/FakeAV-PY detection. According to ESG security researchers, if your computer system is detecting a Mal/FakeAV-PY attack, this usually refers to a suspicious behavior which may mean that your computer system has become the target of a scareware attack. There are several types of scareware that are detected as Mal/FakeAV-PY, most of which are usually Trojans that install a fake anti-virus or defragmenter on the victim's computer system. The Mal/FakeAV-PY detection indicates that the victim's computer is the target of a popular online scam that is often the result of having visited an unsafe website, downloaded an infected file or opened an infected file attachment or link in an unsolicited email message. If your security software indicates that you are the victim of a Mal/FakeAV-PY attack, you are probably protected, but should scan your hard drive just to be on the safe side. Most modern malware attacks include various components. While your real-time malware scanner may be able to intercept some attacks, modern malware will attempt to exploit as many known vulnerabilities as possible, injecting batches of malicious files onto the victim's computer system. In fact, it is not uncommon for PC security analysts to remove hundreds of Trojans, viruses and other kinds of malware infections from a single infected drive!
Understanding Online Scams Detected as Mal/FakeAV-PY
Scareware scams are usually designed to scare inexperienced computer users in order to scam them out of their money. Some examples of scareware include the following:
- Mal/FakeAV-PY may refer to fake anti-virus programs that detect numerous fake infections and then attempt to convince the victim to purchase a useless 'full version' in order to remove these non-existent infections. These kinds of scareware threats are known as rogue anti-virus or rogue anti-malware applications.
- Mal/FakeAV-PY may also refer to the presence of a fake defragmenter which, in a way similar to rogue anti-virus programs, will pretend to be a legitimate computer optimization tool. However, these kinds of programs are actually designed to spam their victims with error messages claiming that their computer has several severe problems that can only be removed by purchasing a 'full version' of the rogue defragmenter.
- Other kinds of scareware associated with Mal/FakeAV-PY are also known as ransomware, programs designed to lock the victim's computer (often claiming to be doing so on behalf of a law enforcement agency), demanding the payment of a ransom in order to return control of the infected computer.
Infected with Mal/FakeAV-PY? Scan Your PC for FreeDownload SpyHunter’s Spyware Scanner
to Detect Mal/FakeAV-PY
Security Doesn't Let You Download SpyHunter or Access the Internet?
Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
- Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
- Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
- Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
- IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.
If you still can't install SpyHunter? View other possible causes of installation issues.