Scammers embrace McAfee fiasco to pitch fake AV
Poison search results to put links that lead to scareware in front of frustrated users
Computerworld - Scammers have quickly piggybacked onto news of a buggy McAfee antivirus update that clobbered thousands of computers, security researchers said today.
Early Wednesday, McAfee released a flawed signature update that wrongly tagged a crucial system file in Windows XP Service Pack 3 (SP3) as malware. After the software quarantined the "svchost.exe" file, thousands of PCs, most of them in businesses, crashed and rebooted repeatedly.
Firms are still dealing with the aftermath, with some companies forced to manually reconfigure hundreds or even thousands of systems.
The debacle made news not just in the technical press, but in more mainstream outlets, including the New York Times and USA Today.
And news is scammers' bread and butter. Using their now-traditional technique of poisoning results at majorsearch engines like Google and Bing, "scareware" makers have pushed links touting fake antivirus software to at or near the top of the results lists, said Graham Closely, senior technology consultant with Sophos.
The links appear when users type search terms such as "McAfee update" and "McAfee 5958," the latter a reference to the faulty update's designation, added Panda Security in a post to its company blog today.
"If you click on a dangerous link like this, then you risk the chance of your computer being hit by a fake anti-virus attack, which may attempt to con you out of your credit card details or trick you into install[ing] malicious code onto your computer," said Cluley in a post to his blog.
McAfee owned up to the problem -- Barry McPherson, executive vice president of support, said "No excuses" late Wednesday -- and the company has posted guides to help businesses and consumers restore incapacitated PCs. On Wednesday afternoon, McAfee issued a replacement update for the faulty signature file.
That did little to soothe some frustrated users. "Today has been a nightmare. Maybe time to look at a new virus solutions once the license expires," said a user identified as "alomas" on a McAfee corporate support forum thread that has nearly 150 messages. "Could not handle another day like this and confidence in McAfee at an all time low."
Fake security software is a very lucrative and thus popular part of the cybercrime ecology. According to a 2008 report, crooks can make as much as $5 million annually in the practice. McAfee rival Symantec, meanwhile, recently reported that the second-most-downloaded piece of malware during 2009 was the "FakeAV" Trojan horse, which displays false alerts and lowers security settings on compromised PCs. The phony alerts try to dupe users into heading to a site where they can download the sham software.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org.
- Researcher claims two hacker gangs exploiting unpatched IE bug
- Update: Third of Internet Explorer users at risk from attacks
- Microsoft plans another short patch slate for next week, but finds a few XP bugs to crush
- Target attack shows danger of remotely accessible HVAC systems
- Target hackers try new ways to use stolen card data
- Update: Microsoft to patch just-revealed Windows zero-day tomorrow
- NSA spying prompts open TrueCrypt encryption software audit to go viral
- Microsoft warns of Office zero-day, active hacker exploits
- Hackers move to create next Blackhole after 'Paunch' arrest
- Adobe hack shows subscription software vendors lucrative targets
Read more about Security in Computerworld's Security Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts