A new wave of fake antivirus programmes has infected more than 30-million users, earning cybercrooks hundreds of millions in the process.

"The information we have at present suggests that some 3% of these users have provided their personal details1 in the process of buying a product that claims to disinfect their computers," says Jeremy Matthews, head of Panda Security's sub-Saharan operations. "In fact, they never even receive the product. Extrapolating from an average price of R719.00, we can calculate that the creators of these programmes are receiving more than R144-million)."
All of this is achieved simply by creating thousands of variants of a new type of adware and distributing it across the Internet. Users can be infected in several ways: browsing Web pages with adult content; downloading files from peer-to-peer networks; responding to e-greetings; downloading files that exploit security holes so users are infected without realising, and many others. There have even been cases of the Google home page being manipulated.
These programs all operate in a broadly similar way: The program tells users that they are infected and pop-up windows, desktops and screensavers keep appearing, preventing the victim from using the computer. The aim is to scare the user into buying the fake antivirus with, for example, cockroaches 'eating' the desktop, or fake blue screens of death.
Internet-savvy users will realise quickly that this is a fake antivirus, and will look for a solution.
"One of the worst things, though, is that these programs are very difficult to disinfect," says Matthews. "More advanced users might try to disinfect them manually, but this is no easy task. In general, it can take users up to three days to completely remove this threat from a computer.
"That's why we advise users whose antivirus has not detected the threat to install a new generation security solution designed especially to detect, disinfect and eliminate all traces of these malicious programs."
However, not all users identify the problem: those who actually reach the pages selling the fake antivirus will find products that are clones of those developed by legitimate vendors. "We have to admit that these fakes and the corresponding Web pages can look quite authentic, and it's not surprising that some users end up buying them as they are desperate to clean their computers."
During the purchase process, users are asked to enter confidential data. On average, their credit cards are charged $49.95 for an "antivirus" that they never receive.
"As the products are imitations of well-known brands, the victims often turn to the companies, who can't do anything as they have not really bought any licenses. What we still don't know is whether the bank or credit card details are then used later by the cyber-crooks. If that were the case, the financial implications are even greater.
"This new technique demonstrates the ingenuity of cyber-crooks, who are constantly on the lookout for new ways to make money," concludes Matthews.