Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

5/16/2011
03:17 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Free Tool From G Data Cleans Fake Antivirus Scareware

G Data FakeAVCleaner removes programs from systems

London, UK, 16 May 2011 - G Data is today announcing the introduction of a removal program aimed at fake antivirus (AV) software. The free tool, G Data FakeAVCleaner, is available for all web users to download from here.

G Data reports a 35% increase in fake antivirus software in the past 15 months, leading to the creation of this tool which addresses the most active fake AV program 'System Tool'. After installation, the fake AV programs, also referred to as 'scareware', notify the user of an infection on the system. To 'disinfect' a PC, the programs instruct the user to purchase a 'full version'.

"The development and deployment of scareware has become a highly profitable business. Fake antivirus programs have a double benefit for cyber criminals: they receive money from users who purchased a 'full version' of their useless tools and they get hold of the victims' credit card data. To make matters worse: the fake AV programs often also put online criminals in a position that allows them to download additional malware onto their victims' computers", explains Eddy Willems, Security Evangelist at G Data. "Scareware offers a huge pay off for the e-crime community. ‘System Tool’ type fake programs, among which you can also find 'WinHDD' have been spread widely in the past 12 months."

-ENDS-

Notes to Editor

How to install G Data FakeAVCleaner:

It is virtually impossible to remove a scareware program from a system without an external tool. Additionally, the program routines of 'System Tool' prevent manual removal. G Data's FakeAV Cleaner is all you need to remove these programs from the system. The installation consists of four simple steps:

1. Download G Data FakeAV Cleaner from the G Data website: http://www.gdatasoftware.co.uk/support/downloads/tools.html 2. If downloaded on a different system than the currently infected one, the setup file must be transferred to the affected system. 3. Run the G Data FakeAV Cleaner setup file. The file is named "svchost.exe". 4. Reboot the computer to finalize the installation.

G Data's advice on how to avoid infections with fake AV software:

To protect the PC and the data it holds, G Data recommends to install a comprehensive security suite which is updated regularly and has a HTTP filter.

* Only download software from trusted vendor sites or download portals. * Both operating system and browser should be updated constantly. * Think twice before clicking a link. Clicking a link might redirect you to a website that distributes scareware. * If receiving pop up messages, check spelling and grammar carefully. If a popup contains incorrect grammar or spelling it might be an indicator for an attempted fraud.

Visit G Data's SecurityBlog for more information: http://blog.gdatasoftware.com/blog/article/fakeav-scams-do-not-stop.html

G Data Software AG

G Data Software AG, based in Bochum, is an innovative and rapidly expanding software company that focuses on IT security solutions. A specialist in Internet security and pioneer in the field of virus protection, the company was founded in Bochum in 1985 and developed the first antivirus program more than 20 years ago.

Consequently G Data is amongst the oldest security software companies in the world. Over more than five years, no other European security software provider has won national and international tests and awards more frequently than G Data.

The product range comprises security solutions for end customers as well as medium to large-sized enterprises. G Data security solutions are available worldwide in more than 90 countries.

More information about the company and G Data Security solutions is available at www.gdatasoftware.co.uk

Media Enquiries:

Champion Communications

[email protected]

0207 268 3440

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5641
PUBLISHED: 2020-11-24
Cross-site request forgery (CSRF) vulnerability in GS108Ev3 firmware version 2.06.10 and earlier allows remote attackers to hijack the authentication of administrators and the product's settings may be changed without the user's intention or consent via unspecified vectors.
CVE-2020-5674
PUBLISHED: 2020-11-24
Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2020-29002
PUBLISHED: 2020-11-24
includes/CologneBlueTemplate.php in the CologneBlue skin for MediaWiki through 1.35 allows XSS via a qbfind message supplied by an administrator.
CVE-2020-29003
PUBLISHED: 2020-11-24
The PollNY extension for MediaWiki through 1.35 allows XSS via an answer option for a poll question, entered during Special:CreatePoll or Special:UpdatePoll.
CVE-2020-26890
PUBLISHED: 2020-11-24
Matrix Synapse before 1.20.0 erroneously permits non-standard NaN, Infinity, and -Infinity JSON values in fields of m.room.member events, allowing remote attackers to execute a denial of service attack against the federation and common Matrix clients. If such a malformed event is accepted into the r...