![]() ![]() More recent variants hosted in high-traffic sites also have script-based capabilities, allowing them to infect even more systems. Some FAKEAV variants may also be considered "ransomware," as these encrypt files to force affected users to purchase the rogue software. Using scare tactics such as alerting users of alarming changes to their systems that cause panic is also usual for rogue antivirus applications. This forces affected users to purchase full versions of malicious software to supposedly rid their systems of nonexistent malware infection. Infected systems often display pop-up windows showing fake warnings of malware infection. Graphic user interface of MACDefenderįAKEAV software make use of graphical user interfaces (GUIs) and pose as legitimate antivirus applications. What are the bogus product names for Mac that FAKEAV used?įigure 2. Once users click the malicious links, they are pointed to sites where they can download OSX_FAKEAV.A or sites where the Black Hole Exploit pack is hosted.įigure 1. Cybercriminals are also abusing Google’s image search feature, rigging top search results for certain keywords and image results. Users are then redirected to FAKEAV download pages when they click the URL posted on their walls, they are redirected to FAKEAV download pages. OSX_DEFMA.B (one of the FAKEAV detections for Mac) arrives on users’ systems via spammed malicious links on the social networking site, Facebook. ![]() How do newer variants of FAKEAV arrive on the users’ systems? Social networking sites and malvertisements can also lead to compromised or malicious sites that ultimately lead to FAKEAV downloads. Search engine optimization (SEO) poisoning is a technique cybercriminals use to redirect users to malicious sites. FAKEAV variants may also pose as codecs that users need to download and install to view supposed videos. Rogue antivirus software also pose as legitimate antivirus or anti-spyware applications that show up as results when users search in popular engines. Hackers use different techniques such as spamming users with email messages containing links to rogue antivirus or FAKEAV download pages. Rogue antivirus software may arrive on users' systems through a variety of means. How does this threat arrive on users' systems? Even with the FAKEAV volume decline, its distribution will likely recover since cybercriminals can monetize large sums of money from stolen information. This is seen in the emergence of bogus Mac antivirus software like MACDefender and MacSecurity. Moreover, FAKEAV, which typically targeted Windows-based systems are also targeting Mac OS X-based systems. The latest FAKEAV variants have rootkit components similar to other prominent malware families such as ZeroAccess and SpyEye. FAKEAV malware continue to evolve in terms of technology and social engineering tactics to keep up with the ongoing security industry efforts. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |