October 2011 archive

System Security 2011 Rogue of the FakeScanti family

System Security 2011 is a rogue of the FakeScanti Family, that uses scare  tactics, fake scan results showing the computer is infected, and the blocking of all applications when trying to run them to scare the user into buying the rogue to clean the fake infections shown. Files and Locations: %SYSTEM%\<Random Named File>.exe %AppData%\svhostu.exe The …

Continue reading

AV Protection Online Rogue of the FakeScanti Family

AV Protection Online is a rogue of the FakeScanti Family, that uses deceptive tactics, results of fake scans showing the computer being infected, along with the blocking of all applications when trying to run them to goad the user into buying the rogue to clean the fake infections shown. Files and Locations: %SYSTEM%\<Random Named File>.exe …

Continue reading

Open Cloud AV Rogue of the FakeScanti Family

Open Cloud AV is a rogue of the FakeScanti Family, that uses scareware tactics, fake scan results of the computer being infected, and the blocking of other applications when trying to run them to goad the user into buying the rogue to clean the fake infections shown. Files and Locations: %SYSTEM%\<Random Named File>.exe %AppData%\svhostu.exe The …

Continue reading

Cloud Protection Rogue of the FakeScanti Family

Cloud Protection is a rogue of the FakeScanti Family, which uses scare tactics, fake scan results of the computer being infected, and the blocking of other applications when trying to run them to goad the user into buying the rogue to clean the fake infections shown. Files and Locations: %SYSTEM%\<Random Named File>.exe %AppData%\svhostu.exe The Cloud …

Continue reading

System Restore Rogue of the FakeSysDef Family

System Restore, a rogue of the FakeSysDef Family which uses fake scareware tactics of having hard drive and system errors to scare those infected to purchase the rogue. The System Restore rogue may also includes an MBR (Master Boot Record) Rootkit like TDL4, or  Sinowal used for profiting from search engine results hijackings even after the user purchases the rogue. Files and Locations: %LOCAL_APPDATA%\<Random File …

Continue reading

Guard Online Rogue of the FakeScanti Family

Guard Online is a rogue of the FakeScanti Family, that uses scare tactics and fake scan results showing the computer is infected along with the blocking of all other applications when trying to run them to scare the user into buying the rogue to clean the fake scan results shown. Files and Locations: %SYSTEM%\<Random Named File>.exe …

Continue reading

AV Guard Online Rogue of the FakeScanti Family

AV Guard Online is a rogue of the FakeScanti Family, that uses fake alert scare tactics and fake scan results showing the computer is infected tactics along with the blocking of other applications when trying to run them to scare the user into purchasing the rogue to clean the fake scan results it shows. This …

Continue reading

Security Guard 2012 Rogue of the FakeScanti Family

Security Guard 2012 is a rogue of the FakeScanti Family, that uses fake alert scare tactics and fake scan results showing the computer is infected tactics along with the blocking of other applications when trying to run them to scare the user into purchasing the rogue to clean the fake scan results it shows. This …

Continue reading

Security Sphere 2012 Rogue of the WinWeb Security Family

Security Sphere 2012 Rogue of the WinWeb Security Family replaces the Personal Shield Pro clone. This rogue like so many of today’s rogues, block the the running of all other applications and the constant pop ups and re-directs to scare messages designed to scare those infected into purchasing the rogue. Files and Locations: %COMMON_APPDATA%\<random named> .exe …

Continue reading