Windows Antispyware 2009

Windows Antispyware 2009 is a rogue anti-spyware application originating from the same family class as Antivirus System PRO, Spyware Protect 2009 and Security Central. Due to affiliated trojans infiltrating the computer via security exploits, Windows Antispyware 2009 is easily installed onto the system without user knowledge or permission. Once active, Windows Antispyware 2009 launches fake security scans and warning notifications that all state the machine has been infected. This is to ensure the user is intimidated into purchasing the fake spyware remover Windows Antispyware 2009.

Posted on July 9, 2009 in Rogue Anti-Spyware Program

W32.Virut.CF

W32.Virut.CF (also known as W32/Virut.n) is a virus that uses Entry Point Obfuscation (EPO) in order to bypass antivirus program detection and evade the scanning process. W32.Virut.CF may then begin infecting executable files including .exe, .scr and other Portable Executable (PE) file formats. W32.Virut.CF may then inject an iframe into the body of the web-related files such as .html, .php and .asp, in order to further harm the computer user.

Posted on July 9, 2009 in Viruses

Virus.BAT.Gary.705

Virus.BAT.Gary.705 is a fake security notification created and issued by the rogue anti-spyware program called Windows Security Suite. Virus.BAT.Gary.705 is portrayed as being a threatening parasite in the falsified security alerts, though this is far from the truth. These Virus.BAT.Gary.705 pop-up windows read as follows: "Your computer is infected. Warning! Spyware found! Detected: Spyware; File Name: exec.sys; Name: Virus.BAT.Gary.705... This is a dangerous non-memory resident BAT infector. It writes itself to the end of C:\AUTOEXEC.BAT file." Virus.BAT.Gary.705 is nothing to be concerned about; however these security alerts will not go away until the user accepts the prompts and purchases Windows Security Suite, or until he removes both of these annoyances from the computer.

Posted on July 9, 2009 in Fake Error Messages

WI345d

WI345d is a fake security threat appearing on counterfeit warning notifications, all designed and launched by the rogue anti-spyware program known as Windows Security Suite. These WI345d pop-up windows read as follows: "Windows Security Alert! To help protect your computer, Windows Firewall has blocked some features of this progrma. Do you want to keep blocking this program? Name: WI345d; Publisher: Unknown... Windows Firewall has blocked this program from accepting connections from the Internet or a network. If you recognize the program or trust the publisher, you can unblock it. When should I unblock a program?" This WI345d is a fake and should not be taken lightly. Following the prompts will only cause the user to purchase and download the fake spyware remover Windows Security Suite. Instead, remove both the rogue spyware remover...

Posted on July 9, 2009 in Fake Error Messages

Jqs.exe

Jqs.exe is a fake security threat appearing on counterfeit warning notifications, all designed and launched by the rogue anti-spyware program known as Windows Security Suite. These Jqs.exe pop-up windows read as follows: "Windows Security Suite Process Control. An unidentified program is trying to access system process address space. Process name: jqs.exe..." This Jqs.exe is a fake and should not be taken lightly. Following the prompts will only cause the user to purchase and download the fake spyware remover Windows Security Suite. Instead, remove both the rogue spyware remover and Jqs.exe from the computer as soon as they are detected.

Posted on July 9, 2009 in Fake Error Messages

Unauthorized remote connection popup

Unauthorized remote connection pop-up is a fake security threat appearing on counterfeit warning notifications, all designed and launched by the rogue anti-spyware program known as Windows Security Suite. These Unauthorized remote connection pop-up windows read as follows: "Unauthorized remote connection! Your system is making an unauthorized personal data transfer to remote computer! Remote IP: 128.154.2611; Local IP: 10.0.2.15; Port: 23365… Warning! Unauthorized personal data transfer is detected! It may be your personal credit card details, logins and passwords, browsing habits or information about files you have downloaded. To protect your private data, please click "Prevent Connection" button below." This Unauthorized remote connection pop-up is a fake and should not be taken lightly. Following the prompts will only cause the user...

Posted on July 9, 2009 in Fake Error Messages

WiniFighter

WiniFighter is an illicit security program designed to extort money from you through devious actions. WiniFighter belongs to the family and may enter a computer through a Trojan infection or malicious website which could automatically install WiniFighter without your permission. Once installed, WiniFighter is able to redirect you to other malicious sites, pop-up fake windows security center alerts and scan your system returning bogus results. WiniFighter is not effective in detection or removal of any computer parasite. The use of WiniFighter is risky and may cause damage to your system rendering it unstable. WiniFighter has various clones that include

Posted on July 8, 2009 in Rogue Anti-Spyware Program

Smart Defender Pro

Smart Defender Pro (also known as SmartDefender PRO) is yet another rogue anti-spyware application hailing from the same family as AV AntiSpyware and P Antispyware 09. Due to affiliated trojans infiltrating via security exploits, Smart Defender Pro is installed onto a computer where it begins launching numerous fake security alerts and falsified infection reports in order to intimidate the user into following onscreen prompts that persuade him to purchase the commercial version of Smart Defender Pro. This fake spyware remover will not assist in keeping the compromised computer protected, however, and should be removed as soon as possible.

Posted on July 8, 2009 in Rogue Anti-Spyware Program

Security Central

Security Central screenshot

Security Central is a rogue anti-spyware application originating from the same family as Spyware Protect 2009, Antivirus System Pro and Barracuda Antivirus. Due to affiliated trojans infiltrating the computer via security exploits, Security Central is installed onto the system and from there, begins launching various fake security alerts. Along with the fictitious and sometimes grossly exaggerated infection reports supplied by the counterfeit system scans, these tactics ensure the user is intimidated enough into purchasing the fake spyware remover Security Central in order to combat these non-existent threats.

Posted on July 8, 2009 in Rogue Anti-Spyware Program

Microsoft Security Adviser

Microsoft Security Adviser is a rogue anti-spyware application that utilizes trojan infiltration in order to gain access to a computer and begin launching fake security alerts and pop-up windows advertising the parasite. Microsoft Security Adviser runs false system scans that display fictitious and sometimes grossly exaggerated infection results, all in order to intimidate the user into purchasing the fake spyware remover Microsoft Security Adviser in order to combat these supposed threats.

Posted on July 8, 2009 in Rogue Anti-Spyware Program

XP-deluxeprotector.com

XP-deluxeprotector.com is a browser hijacker promoting the rogue anti-spyware application known as XP Deluxe Protector. Due to affiliated trojans infiltrating the computer via security exploits and modifying the browser settings, web-surfing activities are redirected to the XP-deluxeprotector.com domain. Once here, the computer is subject to a fake online scan that displays fictitious and sometimes grossly exaggerated infection results, all in an attempt to intimidate the user into purchasing the fake spyware remover XP-deluxeprotector.com.

Posted on July 8, 2009 in Rogue Websites

Bloodhound.Exploit.257

Bloodhound.Exploit.257 is a detection method used to discover files that may attempt to exploit security holes in a computer system. These are usually concealed to protect from security applications and antivirus programs.

Posted on July 8, 2009 in Malware

Windows Security Suite

Windows Security Suite screenshot

Windows Security Suite is a rogue anti-spyware application that belongs to a huge family of fraudulent security software, the family. Due to affiliated trojans infiltrating the computer via security exploits and activating Windows Security Suite, a false system scan displays fictitious and sometimes grossly exaggerated infection results, along with numerous fake security alerts, all in an attempt to intimidate the user into thinking the system is threatened. User is then prompted to purchase and download the fake spyware remover Windows Security Suite in order to combat this threat. Windows Security Suite was designed the same way of its clones that include

Posted on July 7, 2009 in Rogue Anti-Spyware Program

Packed.Generic.238

Packed.Generic.238 detects malicious files more commonly found in the form of skynet_.dll, which is intentionally packed to conceal the file from security applications and antivirus programs. Packed.Generic.238 usually attempts detecting files that are packed by using a specific tool not typically designed to be used on legitimate software.

Posted on July 7, 2009 in Malware

WM/Helper Virus

WM/Helper Virus is a falsified infection typically found on fake security alerts that appear on a computer with the thanks of the rogue anti-spyware application USAntiSpy. WM/Helper Virus popup reads: "Warning. WM/Helper virus propagates by infecting Word documents in Microsoft WORD Versions 6.x/7.x on Windows and Macintosh platforms. The virus became active by using AutoMacros. All macros are encrypted using the standard Word execute-only feature. Meaning that the user is unable to edit or view the macro code." It is important to note that the WM/Helper virus is no longer a threat to any system, however many users are tricked into believing such a parasite may be infecting their machine, and are thus tricked into purchasing the fake spyware remover USAntiSpy.

Posted on July 7, 2009 in Fake Error Messages