Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 23 May 2009

Beware fake security software

Posted on 00:42 by Unknown
Hackers make fortune selling fake software

by Michael Smith (Veshengro)

Cybercriminals frightening computer uses into downloading malware

Criminals can make a fortune by fooling people into buying fake security software.
To get people to the site hosting the rogue software, the cybercriminals use search engine optimisation techniques. They add misspelled keywords such as "liscnese" or "obbama" into pages on compromised websites. Search engines index these pages and display them as top search results. Once the victim has been lured to a compromised site, they are redirected to the site offering the bogus software.

Of the 1.8 million visitors who were redirected in one recent attack, around 1.79 per cent paid the £34 fee, making over a million pounds for the criminals.

A hacker can make more than £7,400 a day by redirecting people to rogue security software sites and getting them to pay for the malware.

Some IPs, however, are making efforts to redirect any misspelled and miss-typed web-addresses to their own sites, thus protecting the user. While this is at times rather annoying when this happens one should look at it as a protection though.

The company’s research, published in its Cybercrime Intelligence report for 2009, showed that not only were the criminals professionally organized and operating profitable affiliate networks, but the operations could easily be run by one or two people who had relatively little technical knowledge and skill.

Yuval Ben-Itzhak, Finjan chief technology officer, said: "Everything is being done automatically. They're using automatic tools to compromise the website and it isn't hard to find keywords. You don't need to have a PhD to set this up, and that is why it is so successful."

Finjan monitored a single operation for 16 consecutive days and estimated that during this time, the sales generated a haul of around $191,000 (£131,000) from 1.8 million unique users who were misdirected to the rogue anti-virus software.

To get people to the site hosting the rogue software, the cybercriminals were using search engine optimization techniques. They injected misspelled keywords such as "liscnese" or "obbama" into web pages on compromised websites. Search engines indexed these pages and displayed them as top search results. Once the victim had been lured to a compromised site, they were redirected to the site offering the bogus software.

Of the 1.8 million visitors who were redirected, between seven and 12 per cent downloaded and installed the software, and roughly 1.79 per cent paid the £34 fee. Members of the affiliate network were paid 9.6 cents for each successful redirection, which totalled $10,800 or £7,452 per day.

Security firm Finjan said the criminals are compromising web pages on legitimate sites in order to direct traffic to their malware and, by using scare tactics, are making people download and buy the bogus software.

The more we hear and see of this the more some people are wondering, I know, whether the Internet is, in fact, a safe place.

Those that may thus wonder let me say that the Internet is safe as long as you handle it with care and do not click on links that could be suspect and that the user has the best anti-virus and other protection software, which is updated daily. You protection is only as good as your latest update.

Having said this, some vulnerabilities can hit before industry is aware of the existence of the malware or vulnerabilities, and therefore we must beware of where we go and how and – check your spelling when typing.

© 2009
<>
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ►  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ►  March (14)
    • ►  February (30)
    • ►  January (21)
  • ►  2010 (192)
    • ►  December (20)
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ►  May (13)
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ►  January (27)
  • ▼  2009 (240)
    • ►  December (25)
    • ►  November (9)
    • ►  October (21)
    • ►  September (19)
    • ►  August (30)
    • ►  July (35)
    • ►  June (30)
    • ▼  May (21)
      • Impressions of an ASUS Eee PC 900
      • Touch the Light Fantastic
      • Survey Reveals Workaholics now working 2-6 hours a...
      • Tufin survey reveals the truth about fudging audit...
      • UK SMEs drastically underestimate IT security dang...
      • Experts says trashed hard drive fiasco at Pfizer c...
      • New In-Line product doubles network throughput
      • Beware fake security software
      • TDK bid to use solid state technology will not fly
      • Fortify says online credit card security lapse may...
      • The KBC Group Taps Tufin Technologies to Streamlin...
      • MPAA/RIAA Web site security flaw ironic, but unsur...
      • Mio launches new Navman range
      • ASUS Eee PC Seashell Netbook launched in UK
      • US missile launch data on eBay hard drive signifie...
      • Is Your Firewall A Fire Hazard?
      • Throwing Sheep in the Boardroom – Book Review
      • IT experts say MI6 drug information loss in Columb...
      • IT Security Solution helps keep Swine Flu under co...
      • Tufin Technologies supports Rt Hon David Blunkett'...
      • Tufin Open Platform launched providing platform fo...
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile