Fake scareware program, a variant of Winweb Security.
(No relation to System Security 2009, a legitimate application.)
Sample at netsecurityonline com/downloadsetupws.php (live malware).
Alex Eckelberry
(Thanks, Patrick Jordan)
The Legacy Sunbelt Software Blog
The Great Years: 2004-2010
Fake scareware program, a variant of Winweb Security.
(No relation to System Security 2009, a legitimate application.)
Sample at netsecurityonline com/downloadsetupws.php (live malware).
Alex Eckelberry
(Thanks, Patrick Jordan)
Some technical issues on my end, all fixed.
Normally, I write about malware scams. However, I have been seeing quite a few ads recently along the lines of “Teeth Whiteners Exposed”. Curious, my scam radar started going off. I know a fair amount about internet marketing and affiliate channels, and started digging a bit.
“Celebrity Sexy Teeth” purports to provide amazing benefits in whitening teeth (as it “works with both the inner and outer enamel” and the weird statement that a “combination of key ingredients are amazingly effective at drawing hydrogen peroxide in to the tiny pores of your teeth to whiten both the outer layer of enamel for immediately noticeable whiter teeth, and the inner layers of enamel for long lasting results”).
Pushed through affiliate sites such as best-teeth-whitening.com (these fake review sites easily fool people), running ads promising to show “Teeth Whiteners Exposed”, the company is making money off of a product that is quite likely… snake oil.
A search on the product’s name reveals significant dissatisfaction, such as “It doesn’t work and when I opened it the stuff came bubbling out making a mess and wasting a lot of it.”, “I’ve been using it for more than two weeks, haven’t noticed any difference at all. I’m going to try to send it back, hopefully they’ll up hold their guarantee.”, “I tried it exactly as directed. Completely useless, no result whatsoever, “This product is a scam, total ripoff. I paid $50.00 for this crap and I couldn’t see any difference after using.” and so on (although I did find one positive review, against an overwhelming negative stream of user comments).
A dental group on Goggle Groups discusses the product with skepticism, as one reader even notes that the first ingredient listed is Propylene Glycol (antifreeze).
A site with real user reviews shows similar issues. Of course, blogs that likely make affiliate commissions tout the product’s benefits.
So what does the BBB say? Errr… Nothing good. The company behind this product is Ionoline, which the BBB gives fails here (for Celebrity Sexy Lips) and here (for some other service called “GetWired”). They also have launched a new product, Celebrity Sexy Body (the female fat burner!).
There are plenty of solutions if you’re looking for such a product, including the cheapest — Hydrogen Peroxide.
But certainly, I would stay clear of this one.
Alex Eckelberry
Thorsten Holz, one of our partners in our Sunbelt CWSandbox has published a good paper on the underground economy.
We study an active underground economy that trades stolen digital credentials.We present a method with which it is possible to directly analyze the amount of data harvested through these types of attacks
in a highly automated fashion. We exemplify this method by applying it to keylogger-based stealing of credentials via dropzones, anonymous collection points of illicitly collected data. Based on the collected data from more than 70 dropzones, we present the first empirical study of this phenomenon, giving many first-hand details about the attacks that were observed during a seven-month period between April and October 2008. This helps us better understand the nature and size of these quickly emerging underground marketplaces.
You can read the paper here. Heise has also done a writeup on this paper (here).
Alex Eckelberry
You can bring gunpowder onto planes! (via Schneier).
Alex Eckelberry
MS Antispyware 2009 is new rogue from WinSpywareProtect family.
Sites Associated
193.142.244.217 MsAntispyware2009 com
94.247.2.84 Files.Msas2009dl com
94.247.2.88 dl.msas2009storage com
216.195.42.227 Sales.buymsantispyware2009 com
Bharath M N
Chandra Prakesh, our Antivirus Lab Manager, presented a paper at AVAR this year on Rustock. PDF here, Powerpoint here.
From a research perspective, Rustock is quite interesting, as it is a complex backdoor trojan that turns a compromised system into a covert proxy, using highly sophisticated methods of evasion.
Chandra is a bit of an expert on Rustock. He’s also written papers on other subjects that I’ve referenced on the blog here and here.
Alex Eckelberry
Rogue security products, often referred to as “scareware”, are a form of malware that uses scare tactics to make people falsely believe their systems are infected with malware, in exchange for payment.
It’s a form of extortion that we’ve routinely blogged about.
Sunbelt’s Patrick Jordan keeps track of a lot of them, and has put together a boatload of screen shots of these rogues from 2008.
I’ve posted them to my Flickr account, here (faithful blog readers will recall I did something similar back in 2006).
Alex Eckelberry
I’m a bit late on blogging this, but there’s a new rogue, Antivirus 360, which replaces Antivirus 2009.
The scam scan is at:
antivirus-rapid-scanner com/360/1/en/_freescan.php?sid=880751
Also, an exe is downloaded from
lead-protection com/download/av_360glof.exe
The free trial of VIPRE will clean this.
Alex Eckelberry
(thanks, Patrick Jordan)
This is pretty cool: Our VIPRE Enterprise has been named as a Finalist in the 2009 SC Awards Program.
Alex Eckelberry
Fascinating reading here from the FTC complaint.
Highlights:
Some of the players: Sam Jain, a man with a past, running the show. Daniel Sundin, apparently Jain’s second in command. James Reno, of ByteHosting (check this search also), helping out on the technical aspects. Maurice D’Souza and Marc D’Souza, helping Innovative find credit card processors (difficult, because there were so many chargebacks and complaints). Kristy Ross, who placed the fraudulent ads.
I don’t feel ill will to many people. But with this crew, I hope they rot in prison.
Alex Eckelberry
(Thanks Suzi)
Following on the FTC action today against Innovative Marketing, I thought I’d share some internal proprietary research we have on this group.
If anyone might think this action isn’t warranted, this is pretty much the proof that the FTC is spot-on.
Alex Eckelberry
Major news: The FTC is going after Innovative Marketing, which has marketed products like WinFixer and other rogue antispyware programs. These deliberate scams and frauds have been a plague on the internet now for several years.
At the request of the Federal Trade Commission, a U.S. district court has issued a temporary halt to a massive “scareware” scheme, which falsely claimed that scans had detected viruses, spyware, and illegal pornography on consumers’ computers. According to the FTC, the scheme has tricked more than one million consumers into buying computer security products such as WinFixer, WinAntivirus, DriveCleaner, ErrorSafe, and XP Antivirus. The court also froze the assets of those responsible for the scheme, to preserve the possibility of providing consumers with monetary redress.
According to the FTC’s complaint, the defendants used an elaborate ruse that duped Internet advertising networks and popular Web sites into carrying their advertisements. The defendants falsely claimed that they were placing Internet advertisements on behalf of legitimate companies and organizations. But due to hidden programming code that the defendants inserted into the advertisements, consumers who visited Web sites where these ads were placed did not receive them. Instead, consumers received exploitive advertisements that took them to one of the defendants’ Web sites. These sites would then claim to scan the consumers’ computers for security and privacy issues. The “scans” would find a host of purported problems with the consumers’ computers and urge them to buy the defendants’ computer security products for $39.95 or more. However, the scans were entirely false.
According to the complaint, the two companies charged in the case – Innovative Marketing, Inc. and ByteHosting Internet Services, LLC – operate using a variety of aliases and maintain offices in various countries. Innovative Marketing is a company incorporated in Belize that maintains offices in Kiev, Ukraine. ByteHosting Internet Services is based in Cincinnati, Ohio.
We have a long history of tracking Innovative Marketing’s sleazy deals. They are pure, unadulaterated slime, a statement I can back it up with extensive in-house research.
This is really good news. Really.
Press release here, complaint here.
Alex Eckelberry
Thorsten Holz and Carsten Willems, our partners in Sunbelt CWSandbox, have collaborated with Konrad Rieck, Patrick Dussel and Pavel Laskov on a paper, “Learning and Classification of Malware Behavior”.
The abstract explains it well:
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variants severely undermine the effectiveness of classical signature-based detection.
Yet variants of malware families share typical behavioral patterns reflecting its origin and purpose. We aim to exploit these shared patterns for classification of malware and propose a method for learning and discrimination of malware behavior.
Our method proceeds in three stages: (a) behavior of collected malware is monitored in a sandbox environment, (b) based on a corpus of malware labeled by an anti-virus scanner a malware behavior classifier is trained using learning techniques and (c) discriminative features of the behavior models are ranked for explanation of classification decisions. Experiments with different heterogeneous test data collected over several months using honeypots demonstrate the effectiveness of our method, especially in detecting novel instances of malware families previously not recognized by commercial anti-virus software.
Alex Eckelberry
(And forgive me, if you’re not a malware wonk, this will not be interesting.)
Found in a PDF at the Global Energy Connection for the State of California. Insert double-entrende joke here: [_______________].
Fun starts at around page 9 in a PDF file (use caution, links may go to malware).
PDF is at www. globalenergyconnection.ca.gov/codir/pdf/ CompanyListingUS.pdf
Alex Eckelberry
Panda has a good writeup on a new malware constructor.
Here’s a rather chilling pic from their blog:
Panda blog link here.
Alex Eckelberry