{"id":1370,"date":"2011-04-16T10:08:02","date_gmt":"2011-04-16T14:08:02","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=1370"},"modified":"2011-04-18T10:38:32","modified_gmt":"2011-04-18T14:38:32","slug":"attacked-by-rogue-security-programs-heres-what-to-do","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/attacked-by-rogue-security-programs-heres-what-to-do\/","title":{"rendered":"Attacked by rogue security programs &#8211; Here&#8217;s what to do"},"content":{"rendered":"<p><strong>Bill is tricked into downloading a malware scam posing as an anti-malware program<br \/>\n<\/strong><br \/>\nYesterday I had an interesting experience. I received a message from Facebook supposedly, advising me that there was a problem with my user ID and password and that they were going to change it for me. They sent the new ones (user ID &amp; password) as an attachment which opened to Excel I believe it was. I should have known that the user is the only one who can\/should change that. Well, there was a box which was advertising a new program, &#8216;CleanThis&#8217;. I couldn&#8217;t get rid of it so I rebooted the computer. In doing so, the &#8216;program&#8217; installed. Then a box appeared with two choices listed&#8211;normal start or safe start. Of course the normal start was dimmed so in clicking safe start, this &#8216;thing&#8217; began scanning the computer. After it finished, it listed a bunch of items that &#8216;needed&#8217; to be removed\/repaired with this Heuristic module, which it needed and I didn&#8217;t have. I checked the order thing and they wanted an arm and a leg for the &#8216;program&#8217; and I suppose if they got a person&#8217;s credit card or such, that would be run to the max. Anyway, this program was not listed in Revo uninstaller nor the Control Panel so I couldn&#8217;t attempt a removal that way. I did find the program nestled in C:\\user\/bill\\app data\\roaming\\install.<\/p>\n<p>A bit later when I was running Malwarebytes, I was unable to  \t\t\t\tdelete the program. I figured it was password protected or  \t\t\t\tsomething? I was unable to get rid of the interface of the  \t\t\t\tprogram. It appeared to be a Microsoft program. One of the first  \t\t\t\tboxes that appeared advised me of a virus or something and then  \t\t\t\tI had two choices&#8211;I don&#8217;t recall now exactly what they were,  \t\t\t\tbut I clicked the one to find the solution to the problem or to  \t\t\t\tclean it up. It was labeled Microsoft Security Essentials. I  \t\t\t\tfigured that should be all right then, but thinking back on it,  \t\t\t\tI don&#8217;t have MSE installed in my computer.<\/p>\n<p>To make a long story short, I run Malwarebytes and got rid of a  \t\t\t\tcouple viruses and a Trojan. Then I run SuperAntispyware and  \t\t\t\tAvast Free and was able to completely rid my computer of these  \t\t\t\t&#8216;aliens&#8217;. Whatever it was blocked my access to my browser and I  \t\t\t\twas also unable to access my System Restore. Nasty.<\/p>\n<p>In checking the program before it was eliminated, the name of  \t\t\t\tthe &#8216;company&#8217; was listed as Cyber Wolf inc. (small i)  \t\t\t\tV7.13.0.192. At first I also figured Microsoft was trying a hard  \t\t\t\tsell, but even they wouldn&#8217;t be so blatant about it&#8211;would they?  \t\t\t\t\ud83d\ude42<\/p>\n<p>Again I wish to thank you folks so much for enticing me to install Malwarebytes and SuperAntispyware. Between them and Avast, I feel my bacon was saved. I took several snapshots of the desktop with these various items displayed if I may send them to you too. Thanks again. Bill<\/p>\n<p><strong>Our Answer<\/strong><br \/>\nBill, I think this is the first time in the history of InfoAve  \t\t\t\tPremium that a question has been almost longer than our answer!  \t\t\t\tThis is history. Not really. Our answer makes your question look  \t\t\t\tshort!<\/p>\n<p>Your question and story provide everyone a good lesson. No  \t\t\t\tlegitimate company is going to email you an attachment and tell  \t\t\t\tyou to use it to reset your password. It is not ever going to  \t\t\t\thappen. If a company has reason to believe your account was  \t\t\t\tbreeched, they may email you and suggest you login to your  \t\t\t\taccount and change your password, but they are not going to give  \t\t\t\tyou links to click and certainly they&#8217;re not going to send you  \t\t\t\tattachments to click. We all make mistakes; you made a mistake  \t\t\t\tby clicking on an attachment in an email you thought was from  \t\t\t\tFacebook. But remember this&#8230;no big company &#8211; or even small  \t\t\t\tcompany &#8211; which is legitimate is going to send you a &#8220;password  \t\t\t\treset&#8221; file to click on.<\/p>\n<p>But we can&#8217;t cry over spilled milk. The program you were  \t\t\t\tduped into downloading is one of the thousands of rogue security  \t\t\t\tprograms which not only infect your computer but make you pay  \t\t\t\tthem before you can &#8220;clean&#8221; (read &#8220;use&#8221;) your computer.  \t\t\t\tCleanThis is one of the thousands of rogues out there. They are  \t\t\t\tdistributed via email attachments, malicious web sites, and  \t\t\t\tmalicious advertisements. They have different M.O.&#8217;s but they  \t\t\t\tall work in the same way.<\/p>\n<p>First they offer to scan (or just start scanning your  \t\t\t\tcomputer without any warning). Actually what you are seeing is  \t\t\t\tnot really a scan of your system but an animated gif. Then there  \t\t\t\tis a warning that the &#8220;scan&#8221; found dozens of infected  \t\t\t\tfiles on the target computer &#8211; all of which are &#8220;dangerous&#8221; and  \t\t\t\twhich need to be removed. After the fake scan the program will offer  \t\t\t\tto clean all these infected files &#8212; for a price. If you don&#8217;t  \t\t\t\tpay the price, the program covers your desktop and you can&#8217;t get  \t\t\t\tit off your desktop &#8211; the window remains on top of all other  \t\t\t\twindows. You can&#8217;t use Alt F4 to close the window &#8211; and you can&#8217;t get to Task Manager to end the process. And unless you jump through hoops like you did &#8211; or use  \t\t\t\ta simple trick we showed everyone in this newsletter a while  \t\t\t\tback &#8211; the program will continue to start with Windows and  \t\t\t\tremain on top of your desktop and all other windows &#8211; making  \t\t\t\tyour computer useless. CleanThis is not nearly as bad as some.  \t\t\t\tSome of these rogues will fill your entire screen and you can&#8217;t  \t\t\t\topen other programs or use your computer.<\/p>\n<p>Unfortunately, these rogues generate tens of millions of  \t\t\t\tdollars for cybercriminals who extract a ransom from computer  \t\t\t\tusers. Some people will pay $39 or $49 for these rogues just to  \t\t\t\tget them off their desktop.<\/p>\n<p>(Bill was kind enough to send us this screen shot &#8211; along  \t\t\t\twith others.)<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/thundercloud.net\/infoave\/images\/2011\/cleanthis.jpg\" border=\"0\" alt=\"Cloudeight InfoAve\" width=\"580\" height=\"335\" \/><\/p>\n<p>This same thing has happened to many people. It almost happened to EB the other  day. It&#8217;s happened to me. I&#8217;ve even intentionally download one of these rogues  to learn ways to get out of it with no damage, no leftovers, and with the least  amount of work. Even those who are experienced with computers make mistakes. We  all get tired; we all sometimes are guilty of clicking without thinking;\u00a0  we all get in a hurry and get careless. The minute you think it  can&#8217;t happen to you is the minute it happens to you.<\/p>\n<p>Bill, we&#8217;re glad you were able to get rid of the rogue &#8211; and you did well. But  there is an easier, more certain, more complete solution to this kind of attack. Once you understand  that the program is communicating with a Web server while its running and that  it is starting up with Windows, you&#8217;ll see why our solution always works.<\/p>\n<p>We&#8217;ve featured this as a tip in our newsletter previously. But this tip is also  the answer to these kinds of attacks. When you use this tip you cut off the  program from its connection to the Internet and you cut off its ability to start  with Windows.<\/p>\n<p>And everyone should commit this tip to memory &#8211; or print it out and keep it  somewhere &#8211;\u00a0 because there&#8217;s a better than average chance that at least  half of you reading this will be attacked by a rogue this year. There are  thousands of them on the Web &#8211; and there are dozens of new ones being introduced  every day &#8211; all with names like Windows AntiVirus 2011, CleanThis, Windows  Security 2011, and so forth &#8211;\u00a0 all names indicative of a security program  but which are really malicious programs which will try to subvert your computer  and make you pay to clean phantom infections which don&#8217;t really exist.<\/p>\n<p>Here are some examples of rogue attacks. They look genuine, don&#8217;t they?<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/thundercloud.net\/infoave\/images\/2011\/64.png\" border=\"0\" alt=\"Cloudeight InfoAve\" width=\"540\" height=\"394\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/thundercloud.net\/infoave\/images\/2011\/fake1.jpg\" border=\"0\" alt=\"Cloudeight InfoAve\" width=\"486\" height=\"217\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/thundercloud.net\/infoave\/images\/2011\/fake2.jpg\" border=\"0\" alt=\"Cloudeight InfoAve\" width=\"520\" height=\"388\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/thundercloud.net\/infoave\/images\/2011\/fake4.png\" border=\"0\" alt=\"Cloudeight InfoAve\" width=\"540\" height=\"381\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/thundercloud.net\/infoave\/images\/2011\/fake3.jpg\" border=\"0\" alt=\"Cloudeight InfoAve\" width=\"600\" height=\"450\" \/><\/p>\n<p>All of the above are examples of fake security software &#8220;scanning&#8221; or asking to  scan your system. The scans are fake; the results are fake. But the money people  are duped out of by these rogue security programs is real.<\/p>\n<p>We want everyone to recognize these kinds of malicious attacks. And to realize  that even with the best antispyware, antimalware and antivirus installed &#8211; you  might still see one of these attacks. It&#8217;s a fact of Internet life. And you need  to know the fastest and best way to get rid of a rogue should you find yourself  in this situation.<\/p>\n<p>There is a one best way to take care of this kind of attack &#8211; and you don&#8217;t need  to download more software. And here it is. (If you&#8217;re printing this tip to save,  start printing from here.)<\/p>\n<p><strong>RSTRUI &#8211; Six letters you shouldn&#8217;t ever forget<\/strong><\/p>\n<p>Here&#8217;s a tip you won&#8217;t remember until you need it. But this little tip can pull  you out of some serious problems. There are several new rogue security programs  on the Web, and they all follow the same M.O.<\/p>\n<p>Thousands of rogues are currently being distributed on the Web or by email.  There are new ones appearing every day, and most of the time the new ones are  simply old ones with new names and updated user interfaces.<\/p>\n<p>Some of these rogues spawn full-page alerts (or popups) that always stay on top  of all other windows, no matter what you do. These kind are particularly  annoying because you can&#8217;t access your browser, Windows Explorer or any other  program because the rogue window is always on top. Some of these full page  alerts and popups have no &#8220;X&#8221; in the top-right corner with which to close them,  some do but the &#8220;x&#8221; does not work, while some work but only close the alert or  popup window momentarily.<\/p>\n<p>You can get these rogues simply by visiting a web site or by clicking an  attachment in an email. We wish we could give you a list of these sites but  there isn&#8217;t any way to do that. The sites distributing these rogues may be  legitimate sites which have been duped into &#8220;selling&#8221; these rogues; they may  sites which are owned by less-than-honest business people who are trying to make  a quick buck by partnering with the crooks who make these rogue security  products; or they maybe sites created by the crooks themselves. And even if we  could give you a list of sites &#8211; it would change and grow every day &#8211; there&#8217;s  just no way to keep up with them. But you don&#8217;t need to know the sites, all you need to know is this:<\/p>\n<p>When a warning appears telling you that a virus or Trojan has been detected on  your computer &#8211; DO NOT PANIC. Take a deep breath. Look carefully at the warning.  Pay no attention to fancy Windows-like graphics. Look to see if the name of your  security program(s) appear anywhere on that warning. If you use Avast &#8211; does it  say Avast? If you use Microsoft Security Essentials, does it say that? If you  use SUPERAntiSpyware &#8211; does it say SUPERAntiSpyware?<\/p>\n<p>You get the picture. If it&#8217;s a rogue &#8211; it won&#8217;t know what security software you  have installed, but the alert usually will have a legitimate sounding name on it  &#8211; like Windows Internet Security 2011. CleanThis, Windows AntiVirus 2011 or  similar.<\/p>\n<p>You&#8217;re going to have to reach down and hold on &#8211; take a deep breath and use all  your willpower so you don&#8217;t click the &#8220;Scan and clean my computer now&#8221; button.  Remember, if you do click the scan and clean button on one of these rogues,  you&#8217;ll be installing it. And if you do actually install one of these rogues,  you&#8217;re going to have a lot more problems.<\/p>\n<p>If you make a mistake and become infected or click a link that causes you to be  infected, it&#8217;s important that you don&#8217;t panic. You can recover from this type of  attack, but you need to stay calm and not do anything crazy like click &#8220;Purchase  &#8230;.. now&#8221;, or &#8220;Clean your computer now&#8221;, or &#8220;Activate now&#8221;.<\/p>\n<p>A number of these newer rogues are ingenious in their design. Their popups cover  your entire screen when you start your computer. And you&#8217;ll have no way to  minimize or close it &#8211; they give you one easy choice. The choice you&#8217;ll have is  to buy the rogue security program by clicking the button on the popup which says  &#8220;Buy now and clean your computer&#8221;, or similar. It can be very frustrating to  users &#8211; many of whom don&#8217;t know how to get this popup off their screens. You  can&#8217;t use ALT F4 to close it. There is no X in the top right corner, there is no  icon on your taskbar to right-click and close &#8211; and sometimes you can&#8217;t see your  task bar at all anyway.<\/p>\n<p>If this happens to you &#8211; and it will happen to you sooner-or-later &#8211; there is a  very simple solution. But you have to remember it and you have to remember not  to panic. Here is the simple solution:<\/p>\n<p>1. Shut your computer down. The only way you&#8217;ll be able to shut down is by  turning off your computer. Use the power switch. You may not be able to shut  down normally because your start button will be covered by the popup. (Some of  the rogue&#8217;s cover everything but the taskbar and the start button &#8211; but when you  click anything on the taskbar, the rogue popup reappears as soon as you click  &#8220;Start&#8221; or anything else.)<\/p>\n<p>2. Now after your computer has been shut down for at least a minute, turn the  power button on and keep tapping the F8 key while Windows is booting. This will  open your Safe Mode options. Choose &#8220;Safe Mode with Command Prompt&#8221;. This is the  only option you should use in this scenario. The reason? Because it doesn&#8217;t  start Windows Explorer &#8211; it opens a Window CMD window &#8211; the black and spooky  &#8220;DOS window&#8221;. But have no fear. Your computer is not connected to the  Internet. You&#8217;ve isolated your machine.<\/p>\n<p>3. When the command window opens &#8211; and this can take some time so be patient &#8211;  you&#8217;ll see something like C:\\Windows\\System32&gt;<\/p>\n<p>When you see C:\\Windows\\System32 &gt; type rstrui.exe and press the Enter key.<\/p>\n<p>Sit back, grab some coffee &#8211; or if you&#8217;re really nervous grab a double shot of  Irish whiskey- and wait. It may take 5 or 6 minutes before you see anything  change. But don&#8217;t worry, eventually it will change.<\/p>\n<p>After a few minutes you&#8217;ll see the System Restore dialog appear.\u00a0 And  when it does, start breathing easier because you&#8217;re almost home free. Choose a restore point at least 24 hours  prior to the time you were attacked. After you have selected a System Restore  point, go ahead and restore your computer. After a few minutes your computer  will reboot. When Windows boots, your rogue security program will be gone, no  more popups, no more trouble &#8211; it will be like nothing ever happened.<\/p>\n<p>And the best thing is &#8211; you won&#8217;t lose any emails, photos, music files, or  documents, etc. The only thing you&#8217;ll lose is any program(s) you&#8217;ve installed  since the restore point you chose.<\/p>\n<p>This tip can be used for many other problems too. Safe Mode with Command Prompt  does not even load the Windows shell &#8211; but it does load the Windows system  files, so you can access other Windows tools and features from the Command  Prompt.<\/p>\n<p>The key is RSTRUI.EXE and accessing it from Safe Mode with Command Prompt.  Because when you do you can go back in time and get rid of the rogue and all the  changes it made to your system. And your computer will be back to normal. It  will be like the problem had never even happened.<\/p>\n<p>Memorize this tip &#8211; or print it out. It <em>will<\/em> come in handy someday. Right  Bill?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bill is tricked into downloading a malware scam posing as an anti-malware program Yesterday I had an interesting experience. I received a message from Facebook supposedly, advising me that there was a problem with my user ID and password and that they were going to change it for me. They sent the new ones (user ID &amp; password)\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/attacked-by-rogue-security-programs-heres-what-to-do\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[138,929,589,14],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/1370"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=1370"}],"version-history":[{"count":5,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/1370\/revisions"}],"predecessor-version":[{"id":1373,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/1370\/revisions\/1373"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=1370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=1370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=1370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}