Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Back to the news list

Fake anti-viruses and other February 2010 threats

March 1, 2010

Though short, February saw quite a number of viral threats. Along with traditional and online fake anti-viruses in the spotlight, new extortion schemes involving mobile devices appeared, while the proportions of the Windows blockers epidemic declined.

Windows blockers

Joint efforts of Doctor Web, law enforcement organizations, telecom operators, short number aggregators and wide public awareness of the Trojan.Winlock problem allowed reducing the number of infected machines to figures comparable to the number registered when the epidemics began in November 2009. While in January the number of detections of Trojan.Winlock registeredper day could exceed 100 000, in February the figure dropped to several thousands per twenty-four hours.

In spite of the sharp decline, dozens of thousands of users in Russia and Ukraine fall victims of the Trojan on a daily basis.

In the last two weeks of February a new browser blocking extortion scheme became widely popular. Going to a malicious web-page brought up a pop-up window that wouldn’t close unless an “activation code” was entered. The code is provided for a paid SMS. Even though this problem can be solved quite easily (stop the browser process using the task manager or force a system reboot), the number of people fallen victims of this scheme still increases among users of Windows as well as among people that use Mac OS.

Fake anti-viruses

In February cyber-criminals more often resorted to fraud schemes involving sites promoting fake anti-viruses to Internet users from Russian and other CIS countries. Links to such sites are spread over e-mail, compromised ICQ accounts and using contextual advertising on web search results pages and in social networks. Access to such web-sites is blocked by the Dr.Web Parental control.

Along with online fake anti-viruses Russian users were sometimes offered a customary Trojan.Fakealert. In such cases they were persuaded to download and install a fake anti-virus that imitated a scanning procedure and after that offered a user to send a paid short message.

Even though Trojan.Fakealert target group included Russian-speaking users, the highest number of victims of the fraud was found among speakers of English. Trojan.Fakealert offers a victim to pay 50 U.S. dollars for the fake anti-virus with a credit card. The offer to purchase a full version of the supposed anti-virus can be displayed in a browser window as well as using the fake anti-virus’s interface. Statistics regarding Trojan.Fakealert for the last six months shows a rapid growth in number of samples of the malware found in the wild started in October 2009. Doctor Web’s statistics server registers a huge number of detections of fake anti-viruses by Dr.Web solutions every 24 hours. And the top 20 of most widely spread malicious programs in February included 8 modifications of Trojan.Fakealert.

New Internet fraud scheme

A new fraud scheme used for money laundering lures users into giving away their mobile phone numbers in order to subscribe to a certain service. An SMS reply provides a would-be subscriber with an activation code where the contents usually have nothing to do with the topic to which the web-site is related. By entering the code a user signs up for a service. The service fee is debited from the user’s account on a daily basis without any warning. The withdrawn amount is small, so a user may fail to notice that something is wrong right away. Besides, terminating such a subscription may be difficult and require a paid SMS to be sent.

The number of malicious programs in e-mail traffic increased four times in February compared to the previous month. This dramatic surge was mainly caused by a growing number of fake anti-viruses and their downloaders in e-mail attachments. The number of malicious files among all files scanned on user machines increased by 24% in February thus reaching the figure registered in December 2009.

Malicious programs detected in mail traffic in February

 01.02.2010 00:00 - 01.03.2010 00:00  
1Trojan.DownLoad.3723613268129 (12.99%)
2Trojan.DownLoad.472569134010 (10.07%)
3Trojan.DownLoad.415518884635 (9.80%)
4Trojan.MulDrop.408966453617 (7.12%)
5Trojan.Fakealert.51156387160 (7.04%)
6Trojan.Botnetlog.zip5901875 (6.51%)
7Trojan.Packed.6835227906 (5.76%)
8Trojan.Fakealert.52384784832 (5.28%)
9Trojan.DownLoad.502463684616 (4.06%)
10Trojan.Fakealert.58253130816 (3.45%)
11Trojan.Fakealert.54372289040 (2.52%)
12Trojan.Fakealert.53562074904 (2.29%)
13Trojan.Fakealert.57841794312 (1.98%)
14Trojan.PWS.Panda.1221683685 (1.86%)
15Trojan.Fakealert.52291668784 (1.84%)
16Trojan.Fakealert.54571462032 (1.61%)
17Trojan.Siggen.182561388200 (1.53%)
18Trojan.MulDrop.462751329338 (1.47%)
19Win32.HLLM.MyDoom.544641180755 (1.30%)
20Trojan.Proxy.7778915616 (1.01%)

Total scanned:30,893,462,045
Infected:90,692,324 (0.294%)

Malicious programs detected on user machines in February

 01.02.2010 00:00 - 01.03.2010 00:00  
1VBS.Redlof4183128 (21.44%)
2Trojan.DownLoader.based3130742 (16.05%)
3Trojan.AuxSpy.1111182739 (6.06%)
4Win32.HLLW.Gavir.ini949089 (4.86%)
5Win32.Dref790282 (4.05%)
6Trojan.WinSpy.440633507 (3.25%)
7Trojan.AuxSpy.137560187 (2.87%)
8Win32.HLLW.Shadow.based349694 (1.79%)
9VBS.Generic.548347960 (1.78%)
10VBS.Sifil259869 (1.33%)
11Trojan.DownLoad.32973251364 (1.29%)
12Win32.Alman.1240227 (1.23%)
13Win32.HLLW.Shadow240103 (1.23%)
14Trojan.Packed.666187657 (0.96%)
15JS.Redirector.based.1182715 (0.94%)
16Trojan.Packed.19647166247 (0.85%)
17Win32.HLLW.Autoruner.2536160988 (0.83%)
18Win32.HLLW.Autoruner.5555145973 (0.75%)
19BackDoor.IRC.Sdbot.4590114824 (0.59%)
20Trojan.Fraudster.48101890 (0.52%)

Total scanned:95,717,237,918
Infected:19,509,126 (0.0172%)

Tell us what you think

To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.


Other comments