Rogue security software is a form of
malicious software
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
and
internet fraud
Internet fraud is a type of cybercrime fraud or deception which makes use of the Internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property, and inheritance. Intern ...
that misleads users into believing there is a
virus
A virus is a submicroscopic infectious agent that replicates only inside the living Cell (biology), cells of an organism. Viruses infect all life forms, from animals and plants to microorganisms, including bacteria and archaea. Viruses are ...
on their computer and aims to convince them to pay for a fake
malware
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
removal tool that actually installs malware on their computer. It is a form of
scareware
Scareware is a form of malware which uses Social engineering (security), social engineering to cause Acute stress reaction, shock, anxiety, or the perception of a threat in order to manipulate users into buying Potentially unwanted program, unwa ...
that manipulates users through fear, and a form of
ransomware
Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
. Rogue security software has been a serious security threat in desktop computing since 2008.
An early example that gained infamy was
SpySheriff and its clones, such as Nava Shield.
With the rise of cyber-criminals and a black market with thousands of organizations and individuals trading exploits, malware, virtual assets, and credentials, rogue security software has become one of the most lucrative criminal operations.
Propagation
Rogue security software mainly relies on
social engineering (
fraud
In law, fraud is intent (law), intentional deception to deprive a victim of a legal right or to gain from a victim unlawfully or unfairly. Fraud can violate Civil law (common law), civil law (e.g., a fraud victim may sue the fraud perpetrato ...
) to defeat the
security built into modern
operating system
An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs.
Time-sharing operating systems scheduler (computing), schedule tasks for ...
and
browser software and install itself onto victims' computers.
A website may, for example, display a fictitious warning dialog stating that someone's machine is infected with a
computer virus
A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and Code injection, inserting its own Computer language, code into those programs. If this replication succeeds, the affected areas ...
, and encourage them through
manipulation to install or purchase
scareware
Scareware is a form of malware which uses Social engineering (security), social engineering to cause Acute stress reaction, shock, anxiety, or the perception of a threat in order to manipulate users into buying Potentially unwanted program, unwa ...
in the belief that they are purchasing genuine
antivirus software
Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
Antivirus software was originally developed to detect and remove computer viruses, hence the name ...
.
Most have a
Trojan horse
In Greek mythology, the Trojan Horse () was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer, Homer's ''Iliad'', with the poem ending ...
component, which users are misled into installing. The Trojan may be disguised as:
* A browser
plug-in or extension (typically toolbar)
* An image, screensaver or
archive file
In computing, an archive file stores the content of one or more files, possibly compressed, with associated metadata such as file name, directory structure, error detection and correction information, commentary, compressed data archives, sto ...
attached to an
e-mail
Electronic mail (usually shortened to email; alternatively hyphenated e-mail) is a method of transmitting and receiving Digital media, digital messages using electronics, electronic devices over a computer network. It was conceived in the ...
message
* Multimedia
codec
A codec is a computer hardware or software component that encodes or decodes a data stream or signal. ''Codec'' is a portmanteau of coder/decoder.
In electronic communications, an endec is a device that acts as both an encoder and a decoder o ...
required to play a certain
video clip
Video clip may refer to:
*Short videos, especially short-form content
** Video clip (online media), a short snippet of a video uploaded on the internet
*A music video
A music video is a video that integrates a song or an album with imagery that ...
* Software shared on
peer-to-peer
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network, forming a peer-to-peer network of Node ...
networks
* A free online malware-scanning service
Some rogue security software, however, propagate onto users' computers as
drive-by download
In computer security, a drive-by download is the unintended download of software, typically Malware, malicious software. The term "drive-by download" usually refers to a download which was authorized by a user without understanding what is being ...
s which exploit
security vulnerabilities in web browsers, PDF viewers, or email clients to install themselves without any manual interaction.
More recently, malware distributors have been utilizing
SEO poisoning techniques by pushing infected
URLs to the top of search engine results about recent news events. People looking for articles on such events on a search engine may encounter results that, upon being clicked, are instead redirected through a series of sites
[
] before arriving at a landing page that says that their machine is infected and pushes a download to a "trial" of the rogue program.
A 2010 study by
Google
Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
found 11,000 domains hosting fake anti-virus software, accounting for 50% of all malware delivered via internet advertising.
Cold-calling has also become a vector for distribution of this type of malware, with callers often claiming to be from "Microsoft Support" or another legitimate organization.
Common infection vectors
Black Hat SEO
Black Hat
search engine optimization
Search engine optimization (SEO) is the process of improving the quality and quantity of Web traffic, website traffic to a website or a web page from web search engine, search engines. SEO targets unpaid search traffic (usually referred to as ...
(SEO) is a technique used to trick search engines into displaying malicious
URLs in search results. The malicious webpages are filled with popular keywords in order to achieve a higher ranking in the search results. When the end user searches the web, one of these infected webpages is returned. Usually the most popular keywords from services such as
Google Trends are used to generate webpages via PHP scripts placed on the compromised website. These
PHP scripts will then monitor for search engine crawlers and feed them with specially crafted webpages that are then listed in the search results. Then, when the user searches for their keyword or images and clicks on the malicious link, they will be redirected to the Rogue security software payload.
Malvertising
Most websites usually employ third-party services for advertising on their webpages. If one of these advertising services is compromised, they may end up inadvertently infecting all of the websites using their service by advertising rogue security software.
Spam campaigns
Spam
Spam most often refers to:
* Spam (food), a consumer brand product of canned processed pork of the Hormel Foods Corporation
* Spamming, unsolicited or undesired electronic messages
** Email spam, unsolicited, undesired, or illegal email messages
...
messages that include malicious attachments, links to binaries and drive-by download sites are another common mechanism for distributing rogue security software. Spam emails are often sent with content associated with typical day-to-day activities such as parcel deliveries, or taxation documents, designed to entice users to click on links or run attachments. When users succumb to these kinds of social engineering tricks they are quickly infected either directly via the attachment, or indirectly via a malicious website. This is known as a drive-by download. Usually in drive-by download attacks the malware is installed on the victim's machine without any interaction or awareness and occurs simply by visiting the website.
Operation
Once installed, the rogue security software may then attempt to entice the user into purchasing a service or additional software by:
* Alerting the user with the fake or simulated detection of malware or
pornography
Pornography (colloquially called porn or porno) is Sexual suggestiveness, sexually suggestive material, such as a picture, video, text, or audio, intended for sexual arousal. Made for consumption by adults, pornographic depictions have evolv ...
.
* Displaying an animation simulating a system crash and reboot.
* Selectively disabling parts of the system to prevent the user from uninstalling the malware. Some may also prevent anti-malware programs from running, disable automatic
system software
System software is software designed to provide a platform for other software. An example of system software is an operating system (OS) (like macOS, Linux, Android, and Microsoft Windows).
Application software is software that allows users to d ...
updates and block access to websites of anti-malware vendors.
* Installing actual malware onto the computer, then alerting the user after "detecting" them. This method is less common as the malware is likely to be detected by legitimate
anti-malware programs.
* Altering system registries and security settings, then "alerting" the user.
Developers of rogue security software may also entice people into purchasing their product by claiming to give a portion of their sales to a charitable cause. The rogue Green antivirus, for example, claims to donate $2 to an environmental care program for each sale made.
Some rogue security software overlaps in function with
scareware
Scareware is a form of malware which uses Social engineering (security), social engineering to cause Acute stress reaction, shock, anxiety, or the perception of a threat in order to manipulate users into buying Potentially unwanted program, unwa ...
by also:
* Presenting offers to fix urgent performance problems or perform essential maintenance on the computer.
* Scaring the user by presenting authentic-looking pop-up warnings and security alerts, which may mimic actual system notices.
These are intended to use the trust that the user has in vendors of legitimate security software.
Sanction by the FTC and the increasing effectiveness of anti-malware tools since 2006 have made it difficult for
spyware
Spyware (a portmanteau for spying software) is any malware that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's securit ...
and
adware
Adware, often called advertising-supported software by its developers, is software that generates revenue by automatically displaying Online advertising, online advertisements in the user interface or on a screen presented during the installatio ...
distribution networks—already complex to begin with—to operate profitably. Malware vendors have turned instead to the simpler, more profitable
business model
A business model describes how a Company, business organization creates, delivers, and captures value creation, value,''Business Model Generation'', Alexander Osterwalder, Yves Pigneur, Alan Smith, and 470 practitioners from 45 countries, self-pub ...
of rogue security software, which is targeted directly at users of
desktop computers.
Rogue security software is often distributed through highly lucrative
affiliate network
An affiliate network acts as an intermediary between publishers ( affiliates) and merchant affiliate programs. It allows website publishers to more easily find and participate in affiliate programs which are suitable for their website (and thus g ...
s, in which affiliates supplied with Trojan kits for the software are paid a fee for every successful installation, and a commission from any resulting purchases. The affiliates then become responsible for setting up infection vectors and distribution infrastructure for the software.
An investigation by security researchers into the Antivirus XP 2008 rogue security software found just such an affiliate network, in which members were grossing commissions upwards of $
USD
The United States dollar (symbol: $; currency code: USD) is the official currency of the United States and several other countries. The Coinage Act of 1792 introduced the U.S. dollar at par with the Spanish silver dollar, divided it int ...
150,000 over 10 days, from tens of thousands of successful installations.
Despite its use of old-fashioned and somewhat unsophisticated techniques, rogue security software has become a significant security threat, due to the size of the impacted populations, the number of different variants that have been unleashed (over 250), and the profits that have been made for
cyber-criminals (over $300,000 a month).
Countermeasures
Private efforts
Law enforcement and legislation in all countries are slow to react to the appearance of rogue security software. In contrast, several private initiatives providing discussion forums and lists of dangerous products were founded soon after the appearance of the first rogue security software. Some reputable vendors, such as Kaspersky, also began to provide lists of rogue security software. In 2005, the Anti-Spyware Coalition was founded, a coalition of anti-spyware software companies, academics, and consumer groups.
Many of the private initiatives were initially informal discussions on general
Internet forums, but some were started or even entirely carried out by individual people. The perhaps most famous and extensive one is the Spyware Warrior list of rogue/suspect antispyware products and websites by Eric Howes, which has however not been updated since May 2007. The website recommends checking the following websites for new rogue anti-spyware programs, most of which are not really new and are "simply re-branded clones and knockoffs of the same rogue applications that have been around for years."
Government efforts
In December 2008, the
US District Court for Maryland—at the request of the
FTC—issued a
restraining order against Innovative Marketing Inc, a
Kyiv
Kyiv, also Kiev, is the capital and most populous List of cities in Ukraine, city of Ukraine. Located in the north-central part of the country, it straddles both sides of the Dnieper, Dnieper River. As of 1 January 2022, its population was 2, ...
-based firm producing and marketing the rogue security software products
WinFixer
WinFixer was a family of scareware Rogue software, rogue security programs developed by Winsoftware which claimed to repair computer system problems on Microsoft Windows computers if a user purchased the full version of the software. The software ...
,
WinAntivirus,
DriveCleaner,
ErrorSafe, and
XP Antivirus. The company and its US-based web host, ByteHosting Internet Hosting Services LLC, had their assets frozen, were barred from using
domain names associated with those products and any further advertisement or false representation.
Law enforcement has also exerted pressure on banks to shut down merchant gateways involved in processing rogue security software purchases. In some cases, the high volume of
credit card chargeback
A chargeback is a return of money to a Payment, payer of a transaction, especially a credit card transaction. Most commonly the payer is a consumer. The chargeback reverses a Electronic funds transfer, money transfer from the consumer's bank acc ...
s generated by such purchases has also prompted processors to take action against rogue security software vendors.
See also
*
Anti-virus
Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
Antivirus software was originally developed to detect and remove computer viruses, hence the name ...
*
Privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
*
Scareware
Scareware is a form of malware which uses Social engineering (security), social engineering to cause Acute stress reaction, shock, anxiety, or the perception of a threat in order to manipulate users into buying Potentially unwanted program, unwa ...
*
Technical support scam
*Winwebsec
Notes
References
External links
*
{{Information security
Types of malware
Security breaches
Social engineering (security)
zh:流氓软件