Scammers embrace McAfee fiasco to pitch fake AV
Poison search results to put links that lead to scareware in front of frustrated users
Computerworld - Scammers have quickly piggybacked onto news of a buggy McAfee antivirus update that clobbered thousands of computers, security researchers said today.
Early Wednesday, McAfee released a flawed signature update that wrongly tagged a crucial system file in Windows XP Service Pack 3 (SP3) as malware. After the software quarantined the "svchost.exe" file, thousands of PCs, most of them in businesses, crashed and rebooted repeatedly.
Firms are still dealing with the aftermath, with some companies forced to manually reconfigure hundreds or even thousands of systems.
The debacle made news not just in the technical press, but in more mainstream outlets, including the New York Times and USA Today.
And news is scammers' bread and butter. Using their now-traditional technique of poisoning results at majorsearch engines like Google and Bing, "scareware" makers have pushed links touting fake antivirus software to at or near the top of the results lists, said Graham Closely, senior technology consultant with Sophos.
The links appear when users type search terms such as "McAfee update" and "McAfee 5958," the latter a reference to the faulty update's designation, added Panda Security in a post to its company blog today.
"If you click on a dangerous link like this, then you risk the chance of your computer being hit by a fake anti-virus attack, which may attempt to con you out of your credit card details or trick you into install[ing] malicious code onto your computer," said Cluley in a post to his blog.
McAfee owned up to the problem -- Barry McPherson, executive vice president of support, said "No excuses" late Wednesday -- and the company has posted guides to help businesses and consumers restore incapacitated PCs. On Wednesday afternoon, McAfee issued a replacement update for the faulty signature file.
That did little to soothe some frustrated users. "Today has been a nightmare. Maybe time to look at a new virus solutions once the license expires," said a user identified as "alomas" on a McAfee corporate support forum thread that has nearly 150 messages. "Could not handle another day like this and confidence in McAfee at an all time low."
Fake security software is a very lucrative and thus popular part of the cybercrime ecology. According to a 2008 report, crooks can make as much as $5 million annually in the practice. McAfee rival Symantec, meanwhile, recently reported that the second-most-downloaded piece of malware during 2009 was the "FakeAV" Trojan horse, which displays false alerts and lowers security settings on compromised PCs. The phony alerts try to dupe users into heading to a site where they can download the sham software.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org.
- Researcher claims two hacker gangs exploiting unpatched IE bug
- Update: Third of Internet Explorer users at risk from attacks
- Microsoft plans another short patch slate for next week, but finds a few XP bugs to crush
- Target attack shows danger of remotely accessible HVAC systems
- Target hackers try new ways to use stolen card data
- Update: Microsoft to patch just-revealed Windows zero-day tomorrow
- NSA spying prompts open TrueCrypt encryption software audit to go viral
- Microsoft warns of Office zero-day, active hacker exploits
- Hackers move to create next Blackhole after 'Paunch' arrest
- Adobe hack shows subscription software vendors lucrative targets
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts