Facebook Shuts Down Fake Profiles Designed to Spread Malware

The social networking world continues to be attacked by hackers but Facebook has taken some action to shut down malicious fake profiles that were setup by cybercrooks for the purpose of spreading malware. Social networks such as Facebook are known to be playgrounds for online attackers and scammers allowing them to spread their malicious software. AVG Technologies, a security company that provides antivirus applications, has revealed cases where users of one of their services, have detected several Facebook profiles that were virtually identical with the exception of the name. These duplicate profiles each included a link to a video that was discovered to display fake warnings when clicked upon. Basically, after clicking on the link shown in Figure 1 below, a computer user is prompted with a fake system scan warning them of computer...

Posted on October 2, 2009 in Computer Security

Samoa Tsunami and Microsoft Security Essentials Search Terms Lead to Rogue AV

The recent and unfortunate Tsunami that occurred in Samoa from an earthquake and Microsoft's release of Security Essentials has sparked an increase in links to rogue anti-virus applications through poisoned search results. Using popular subject matters as a means of spreading fake security applications over the Internet through poisoned search results is nothing new. At one time, the infamous Swine Flu topic was a popular searched keyword that hackers took advantage of by creating malicious web pages that were linked to through Internet search results. In recent events, the search keywords "Tsunami", "Earthquake" and "Western Samoa" were returning pages linked to fake anti-virus applications. One of the exploited applications is known to be Windows PC Defender. Windows PC Defender is a fake security program that uses aggressive tactics...

Posted on October 2, 2009 in Computer Security

Spywarewebsiteblock.com

Spywarewebsiteblock.com is a malicious website that can hijack a web browser application and change settings without permission from the computer user. Spywarewebsiteblock.com, once visited, will display fake warning message and then lead to a page that promotes and sells the Alpha Antivirus rogue anti-spyware program.

Posted on October 2, 2009 in Browser Hijackers

FakeAlert.N

FakeAlert.N is a vicious computer Trojan horse that is part of the FakeAlert family of infections. FakeAlert.N is able to modify settings such as the background wallpaper and screensaver. Fake security messages are also displayed by FakeAlert.N which can lead to the infection of malware files or applications. FakeAlert.N has been proven to be difficult to manually remove as this process could risk damage of essential system files.

Posted on October 2, 2009 in Trojans

Packed.nPack

Packed.nPack is a backdoor Trojan computer infection. Packed.nPack has the ability to slip onto a computer through undetected actions. After a computer is infected with Packed.nPack, then it could be compromised through a remote connection where personal data can be stolen. Packed.nPack is difficult to manually remove due to files loading into memory at startup.

Posted on October 2, 2009 in Trojans

Myantispywarecheck07.com

Myantispywarecheck07.com is a browser hijacker. Once visited, Myantispywarecheck07.com is able to change web browser settings and has the capability of displaying fake warning messages. Myantispywarecheck07.com is used as a promotional tool to advertise the Alpha Antivirus rogue anti-spyware program. Messages displayed on Myantispywarecheck07.com can lead to the download or purchase page for Alpha Antivirus which is a bogus security application.

Posted on October 2, 2009 in Browser Hijackers

Malware.Banc.A

Malware.Banc.A is a malware infection that performs actions similar to that of a Browser Helper Object. Once installed, Malware.Banc.A can log entered text through the Internet Explorer web browser program. Malware.Banc.A is able to spread malicious DLL files onto an infected computer’s hard drive. Malware.Banc.A is not easy to manually remove.

Posted on October 2, 2009 in Malware

SettingsModifier.PornAgent

SettingsModifier.PornAgent is a computer worm that can infect other files within the infected system. SettingsModifier.PornAgent is also able to create or modify system registry entries that load at startup of Windows. SettingsModifier.PornAgent is difficult to manually remove.

Posted on October 2, 2009 in Worms

W32/Zmist Removal

Zmist is a Trojan infection that is used to take over computer user's machines and expose their financial and personal data. Zmist poses a severe threat to computers. Zmist uses rootkit techniques to avoid detection and removal, making it particularly troublesome for computer users to remove Zmist. If your security software indicates the presence of Zmist on your computer, security researchers strongly recommend its immediate removal. Make sure that your security software is capable of dealing with rootkits and similar threats to certain that Zmist and all associated components are removed completely. Why Trojans Such as Zmist are Created There are many types of threats. Trojans like Zmist receive their name from the Trojan Horse of antiquity. They receive this name because of the way they carry out their attacks. Viruses are designed...

Posted on October 1, 2009 in Trojans

SecureFighter

SecureFighter screenshot

SecureFighter is a dangerous rogue anti-spyware application that comes from the group of hackers that make and spread the fake security programs SecureVeteran. Each of these programs uses similar methods for persuading computer users to purchase a full version of the fake security application. SecureFighter, once installed, will display fake alert messages that attempt to warn users of a computer parasite infection and then populate the infected computer with fake files that it returns in a system scan only to further confuse the computer user. SecureFighter is not able to detect and remove legitimate computer parasites or spyware.

Posted on October 1, 2009 in Rogue Anti-Spyware Program

Home Personal Antivirus

Home Personal Antivirus screenshot

Home Personal Antivirus is a rogue anti-spyware application that is designed to trick computer users out of their money in forcing them to purchase a full version of Home Personal Antivirus. Home Personal Antivirus uses fake Windows Security Center popup alerts and bogus system scan results to make computer users think that they should purchase Home Personal Antivirus to remove the threats. Home Personal Antivirus comes from the family of the rogues XP Police Antivirus, Win PC Defender and Total Secure 2009. Home Personal Antivirus is incapable of removing any type of computer threat. Use of Home Personal Antivirus will only result in endless popup notifications. Manual removal of Home...

Posted on October 1, 2009 in Rogue Anti-Spyware Program

Adware.Ascentive

Adware.Ascentive is a computer adware infection that is able to display annoying popup advertisements that may lead to the download and installation of malware applications. Adware.Ascentive can load at startup of Windows and gain access to a user's system without permission.

Posted on October 1, 2009 in Adware

Adware.Delfin.B

Adware.Delfin.B is a misleading parasite that is sometimes pawned off as a media view application. Adware.Delfin.B can run in the background and download malicious files or applications to the infected system without notification to the computer user.

Posted on October 1, 2009 in Adware

Trojan.Mybot

Trojan.Mybot is a computer Trojan horse that can be installed onto a computer through freeware or shareware (usually bundled with malware) that you download on file sharing websites, opening attachments from unknown emails or visiting a malicious questionable website. Once Trojan.Mybot is installed, it can perform malicious actions on the infected system without notification to the computer user. Trojan.Mybot has proven to be difficult to manually remove.

Posted on October 1, 2009 in Trojans

Adware.Begin2Search

Adware.Begin2Search is a dangerous adware infection that has the ability to simulate clicks over the internet through an Internet Explorer hidden window. Adware.Begin2Search is able to load at startup of Windows and lay resident in memory going undetected.

Posted on October 1, 2009 in Adware