Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

10/31/2008
01:16 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Antivirus 'Scareware' is Lucrative

Rogue antivirus software circulating on the Web potentially making top distributors millions of dollars a year

Turns out an infamous pop-up aimed at spooking users into downloading a phony anti-virus program does detect a little malware, but only as a cover for what it really does -- make big bucks for its developers and distributors. According to new research conducted by SecureWorks director of malware research Joe Stewart, who recently dissected the infamous software program and its money trail, affiliates who sell the so-called Antivirus XP 2008 (and now 2009) get a 58 to 90 percent commission on sales of the around $50 package.

The program infects Web sites with phony pop-ups warning users that their machine is infected and to download the "anti-virus" software.

Stewart also discovered that, surprisingly, the fraudulent Antivirus XP 2008 software does actually contain some anti-malware functions, but only to make it appear legitimate. While the software claims to detect more than 100,000 known viruses, it really only catches and removes 17 minor ones, including former versions of the software itself, Stewart says. "Some are cookies, not really malware," he says. "I was surprised that it has some functionality."

While only about 2 percent of users actually fall for the fake AV software, the fraudulent software is still lucrative to the spammers and other bad guys who sell it on behalf of its developer, Bakasoftware of Russia. Stewart infiltrated Bakasoftware's distribution program and found that a handful of the top "affiliates" who sell the software could potentially make as much as $5 million a year. He found a Bakasoftware listing of what its distributors, or affiliates, make: One affiliate who successfully installed 154,825 copies of AV XP 2008 in 10 days but sold only 2,772 of them still earned him $146,525.

"At that rate, the affiliate could be expected to earn over 5 million U.S. dollars a year, simply by maintaining a large botnet and forcing AV XP 08 installs on 10,000 to 20,000 computers a day," Stewart wrote in his report.

Affiliates are typically individuals, many who run botnets, he says. "They know how to buy and sell, and just need to line up as many sponsor programs as they can to cash in on that. This [AV software] is one of those programs," Stewart says.

So what exactly does the software do to the machines that install it? Mostly it spoofs the way most AV programs work, Stewart says, and does not infect the machine per se. "It's possible it could install other code because it has an update feature," he says. "But you have the ability to turn it off and tell it not to run."

In some cases, however, AV XP 2008/09 affiliates have downloaded malware along with their software on victims' computers. SecureWorks has seen password stealers and other Trojans stuffed onto victims' machines as well.

The attackers begin the process by inserting their adware pop-ups in Web sites via ActiveX, Flash, and other third-party plug-ins, Stewart says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-30481
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
CVE-2021-20020
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
CVE-2021-30480
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
CVE-2021-21194
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21195
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.