Fake HDD
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Ranking: | 18,285 |
Threat Level: | 80 % (High) |
Infected Computers: | 54 |
First Seen: | September 2, 2011 |
Last Seen: | January 28, 2023 |
OS(es) Affected: | Windows |
One of the largest families of rogue security programs belongs to fake defragmentation utilities that are thought to originate from the Russian Federation. One large batch of clones in this family of rogues is characterized by its use of the letters HDD to make up the initials of each clone's name, or directly as an acronym. Some examples of clones of Fake HDD include HDD Fix, HDD Plus, and HDD Repair. Most of the clones in this family that use the HDD acronym are characterized by extremely similar interfaces. ESG security researchers recommend removing Fake HDD immediately from your computer system. This malware infection is identical to most rogue defragmentation programs. However, this should not be considered as a sign that Fake HDD should be ignored. The presence of Fake HDD on your computer system is a sign that your computer's security is breached, that other malware may be present and that your credit card information and personal details are at risk.
How Rogue Defragmenters Like Fake HDD Work
Rogue defragmenters like Fake HDD are typically installed onto a computer system through deceptive means. Some common ways of contracting a Fake HDD infection include dropper Trojans (Trojans that are designed to install malware onto a computer system) and the presence of a back door Trojan (these are Trojans that create a "backdoor" into your computer, which a hacker can then use to install software directly onto your hard drive.) The presence of Fake HDD will usually be obvious, due to its fake system scan and constant fake security alerts. These are designed to scare computer users into thinking that severe computer problems were found through this defragmenter tool. However, Fake HDD is fake. Fake HDD has absolutely no security or computer optimization capabilities. The purpose of rogue defragmenters like Fake HDD is to convince their victims to pay for a useless "license" or a "full version" of the rogue defragmenter.
Dealing With a Fake HDD Infection
Most of the problems associated with a Fake HDD infection can be remedied following a few simple steps:
- Start up your computer in Safe Mode. This should ensure that Fake HDD cannot start up in the background and start affecting your computer's activities.
- Use a legitimate anti-malware program to remove Fake HDD automatically. Manual removal is also possible, but should only be attempted if you are absolutely sure of what files and registry entries to edit or remove.
- Restart your computer system and run a full scan of your hard drives to remove any additional malware.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.