{"id":2260,"date":"2011-06-25T11:07:26","date_gmt":"2011-06-25T15:07:26","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=2260"},"modified":"2011-06-25T11:07:26","modified_gmt":"2011-06-25T15:07:26","slug":"john-battled-scareware-and-lost","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/john-battled-scareware-and-lost\/","title":{"rendered":"John battled scareware and lost"},"content":{"rendered":"<p><span><strong>John says that Microsoft Security Essentials let him down!<br \/>\n<\/strong>In the  middle of trawling though some websites on Google in search of an article, my  screen was suddenly taken over by a glaring warning that my computer was in  danger of being taken over by &#8220;Trojan-BNK.Win32.Keylogger.gen&#8221;. I was then  informed, quite bluntly in fact, that the only solution lay in downloading and  installing XP Antivirus 2012 &#8211; FOR $70 . Only then would this Trojan threat be  removed. Yet I had Microsoft Security Essentials installed, as you have  recommended, and it should have been on guard! Why did it not pick this Trojan  up and eliminate it FREE OF CHARGE?<\/p>\n<p>I seemed to have no choice. My  computer was effectively locked up, rendered useless unless I paid up. I feel as  though I have been taken for a $70 scam. What is the story here please? Has any  other subscriber to Cloudeight experienced this? I have great confidence in your  knowledge and capacity to make complex things clearer so I am hoping you will  help me understand what was at work here. Thank you for being there for us all.  John H.<\/p>\n<p><strong>Our answer<\/strong><br \/>\nThank you for your nice comments, John.  We&#8217;re sorry to tell you that you are yet another victim of scareware (a rogue  security program). You should immediately call your credit card company and  report this &#8211; and get your money back. You&#8217;re dealing with criminals so you  might want to keep on the lookout for fraudulent charges on your credit  card.<\/span><\/p>\n<p><span>Almost everyone we know (including both of us) have confronted rogue security  programs, also called &#8220;scareware&#8221;. The reason that Microsoft Security Essentials  didn&#8217;t detect the Trojan is because it didn&#8217;t exist in the first place. If EB  and I would have visited that same poisoned site that you did, we&#8217;d have  received that exact same warning. And so would the next 10,000 visitors. All of  us would have been &#8220;infected&#8221; with a non-existent Trojan.<\/span><\/p>\n<p><span>A lot of people are fooled by these scareware attacks. They are created by  highly skilled programmers and graphic artists &#8211; the warnings and dialogs all  look like they&#8217;re coming from your Windows computer. And once you encounter a  rogue security program, you&#8217;re in for a rough ride even if you recognize it for  what it is. You cannot close the dialogs or the download by clicking the &#8220;X&#8221; or  &#8220;cancel&#8221; or &#8220;close&#8221; &#8211; you may not even be able to close your browser except by  accessing Task Manager, going into &#8220;Processes&#8221; and ending the process tree of  the browser&#8217;s executable. If you don&#8217;t close your browser fast enough, the rogue  will be downloaded, your security programs may be disabled, and your screen will  be covered with huge dialog from the rogue &#8211; and you can&#8217;t access anything on  your computer until you click &#8220;Buy Now&#8221;. You did and you&#8217;re out $70 unless you  call your credit card company and tell them you&#8217;ve been a victim of rogue  security software \/ scareware. <\/span><\/p>\n<p><span>And if you leave the rogue security program you bought on your computer &#8211;  you&#8217;re in danger of having information on your computer gleaned and sent to the  criminals you purchased the rogue from. It may only be your browsing data, or it  may be email addresses, or it may be even more sensitive information. You not  only paid $70 for a worthless program, you paid $70 for what is most likely  spyware, malware, and\/or adware. <\/span><\/p>\n<p><span>Rogue \/ Scareware is easy to recognize if you keep your head and you know  what to look for. For instance, how in the world would a web site know your  computer was infected just a few seconds after visiting that page? Did they scan  your computer without your permission &#8211; no. It takes several minutes &#8211; most of  the time even longer to scan your hard drive, and a web site can&#8217;t do that &#8211; not  without you knowing. The first clue that you&#8217;ve encounter scareware \/ rogue is  when you visit a site and you get a warning that your computer is infected with  a Trojan or some other nasty malware. It&#8217;s a scam. You need to close your  browser pronto and get away from that site as quickly as possible. Your computer  can become infected by the rogue in less than a minute &#8211; so the key to staying  out of trouble is to close your browser immediately. If you can&#8217;t use the &#8220;X&#8221; at  the top-right corner of your browser during the attack, right-click on an empty  space on your taskbar and open Task Manager, click the Processes Tab, find your  browser&#8217;s exe (firefox.exe for Firefox; iexplore.exe for Internet Explorer;  chrome.exe for Google Chrome), right-click on it, and choose &#8220;End process tree&#8221;  &#8211; you&#8217;ll get a Windows warning but it&#8217;s all right , go ahead and click &#8220;OK&#8221; to  terminate the process. If you can&#8217;t even access Task Manager, the best thing to  do is shut your computer off at the power switch. That will close everything and  stop the scareware attack &#8211; but only if you do it quickly. If you don&#8217;t,  no  matter what you do, your computer is infected and if it is, your screen will be  covered with a huge dialog from the rogue that will cover your taskbar and you  won&#8217;t easily be able to access any programs or functions until you pay the  ransom.<\/span><\/p>\n<p><span>If you find you couldn&#8217;t close your browser down fast enough, don&#8217;t panic.  You can still make it like it never even happened. <a href=\"..\/?p=1816\">See this article we wrote a  couple months ago<\/a>.<\/span><\/p>\n<p><span>MSE didn&#8217;t necessarily let you down. Most security programs don&#8217;t detect  rogue security programs &#8211; because they mimic regular Windows programs &#8211; they  don&#8217;t mimic viruses, Trojans, spyware or other malicious software. Also many  rogues will actually turn your security software off. And even if some security  software recognized some rogues &#8211; it wouldn&#8217;t recognized them all because there  are dozens of new ones popping up every day. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>John says that Microsoft Security Essentials let him down! In the middle of trawling though some websites on Google in search of an article, my screen was suddenly taken over by a glaring warning that my computer was in danger of being taken over by &#8220;Trojan-BNK.Win32.Keylogger.gen&#8221;. I was then informed, quite bluntly in fact, that the only solution\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/john-battled-scareware-and-lost\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[1162,929,1275],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/2260"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=2260"}],"version-history":[{"count":2,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/2260\/revisions"}],"predecessor-version":[{"id":2262,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/2260\/revisions\/2262"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=2260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=2260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=2260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}