Free anti-spyware is software that is designed to combat the installation of spyware on your device. Spyware is usually bundled into third party applications (often freeware) and so the user actually gives the spyware permission to be installed onto their device without knowledge of doing so when installing the legitimate program. Beware Of Fake Anti-Spyware Programs. The scam usually starts with your search for 'best spyware removal program' or something similar. Search results, or paid ads on search results pages, may lead the unwary to a site which promises a free scan to detect spyware on your computer.

From Wikipedia, the free encyclopedia

Rogue security software is a form of computer malware that deceives or misleads users into paying for the fake or simulated removal of malware. Rogue security software, in recent years, has become a growing and serious security threat in desktop computing.[1]

Propagation

Rogue security software mainly relies on social engineering in order to defeat the security built into modern operating system and browser software and install itself onto victims' computers.[1]

Most have a Trojan horse component, which users are misled into installing. The Trojan may be disguised as:

  • A browser plug-in or extension (typically toolbar)
  • An image, screensaver or archive file attached to an e-mail message
  • Multimedia codec required to play a certain video clip
  • Software shared on peer-to-peer networks[2]
  • A free online malware scanning service[3]

Some rogue security software, however, propagate onto users computers as drive-by downloads which exploit security vulnerabilities in web browsers, pdf viewers, or e-mail clients to install themselves without any manual interaction.[2][4]

More recently, malware distributors have been utilizing SEO poisoning techniques by pushing infected URLs to the top of search engine results about recent news events. People looking for articles on such events on a search engine may encounter results that, upon being clicked, are instead redirected through a series of sites[5] before arriving at a landing page that says that their machine is infected and pushes a download to a 'trial' of the rogue program.[6][7]

Operation

Once installed, the rogue security software may then attempt to entice the user into purchasing a service or additional software by:

  • Alerting the user with the fake or simulated detection of malware or pornography.[8]
  • Displaying an animation simulating a system crash and reboot.[1]
  • Selectively disabling parts of the system to prevent the user from uninstalling them. Some may also prevent anti-malware programs from running, disable automatic system software updates and block access to websites of anti-malware vendors.
  • Installing actual malware onto the computer, then alerting the user after 'detecting' them. This method is less common as the malware is likely to be detected by legitimate anti-malware programs.

Developers of rogue security software may also entice people into purchasing their product by claiming to give a portion of their sales to a charitable cause. The rogue Green antivirus, for example, claims to donate $2 to an environmental care program for each sale made. [9]

Some rogue security software overlaps in function with scareware by also:

  • Presenting offers to fix urgent performance problems or perform essential housekeeping on the computer.[8]
  • Scaring the user by presenting authentic-looking pop-up warnings and security alerts, which may mimic actual system notices.[10] These are intended to leverage the trust of the user in vendors of legitimate security software.[1]

Sanction by the FTC and the increasing effectiveness of anti-malware tools since 2006 have made it difficult for spyware and adware distribution networks—already complex to begin with[11]—to operate profitably.[12] Malware vendors have turned instead to the simpler, more profitable business model of rogue security software, which is targeted directly at users of desktop computers.[13]

Rogue security software is often distributed through highly-lucrative affiliate networks, in which affiliates supplied with Trojan kits for the software are paid a fee for every successful installation, and a commission from any resulting purchases. The affiliates then become responsible for setting up infection vectors and distribution infrastructure for the software.[14] An investigation by security researchers into the Antivirus XP 2008 rogue security software found just such an affiliate network, in which members were grossing commissions upwards of $USD150,000 from tens of thousands of successful installations per month.[15]

Law enforcement

In December 2006, the Washington Attorney General announced that it had reached settlement in a suit against Secure Computer LLC, the White Plains-based vendor of the Spyware Cleaner rogue security software, under the Computer Spyware Act passed by the Washington State Legislature in 2005. Secure Computer, under consent decree, agreed to pay more than $USD75,000 in restitution to consumers.[16]

In December 2008, the US District Court for Maryland—at the request of the FTC—issued a restraining order against Innovative Marketing Inc, a Kiev-based firm producing and marketing the rogue security software products WinFixer, WinAntivirus, DriveCleaner, ErrorSafe, and XP Antivirus.[17] The company and its US-based web host, ByteHosting Internet Hosting Services LLC, had their assets frozen, were barred from using domain names associated with those products and any further advertisement or false representation.[18]

Law enforcement has also exerted pressure on banks to shut down merchant gateways involved in processing rogue security software purchases. In some cases, the high volume of credit cardchargebacks generated by such purchases has also prompted processors to take action against rogue security software vendors.[19]

Partial list of rogue security software

The following is a partial list of rogue security software, most of which can be grouped into families. These are functionally-identical versions of the same program repackaged as successive new products by the same vendor.[15][20]

  • Advanced Cleaner[21]
  • AlfaCleaner[22]
  • Alpha AntiVirus[23]
  • ANG Antivirus (knock-off of AVG Anti-virus)
  • Antimalware
  • AntiSpyCheck 2.1[24]
  • AntiSpyStorm[25]
  • AntiSpyware 2009[26]
  • Antispyware 2010
  • Antivirus Soft [27]
  • AntiSpyware Bot from 2Squared Software
  • AntiSpywareExpert[28]
  • AntiSpywareMaster[29]
  • AntiSpywareSuite[30]
  • AntiSpyware Shield[31]
  • Antivermins[32]
  • Antivirus 2008[33]
  • Antivirus 2009[34]
  • Antivirus XP 2010[35]
  • Antivirus 2010 (also known as Anti-virus-1)[36],[37]
  • Antivirus 360[38]
  • Antivirus Pro 2009[39]
  • AntiVirus Gold[40]
  • Antivirus Live[41],[42]
  • Antivirus Master[43]
  • Antivirus XP 2008[44]
  • Antivirus Pro 2010[45]
  • Antivirus Soft
  • Antivirus System PRO[46]
  • Avatod Antispyware 8.0[47]
  • Awola[48]
  • BestsellerAntivirus[49]
  • Cleanator[50]
  • ContraVirus[51]
  • Control Center
  • Cyber Security[52]
  • Doctor Antivirus[53]
  • Doctor Antivirus 2008[54]
  • DriveCleaner[55]
  • Dr Guard
  • EasySpywareCleaner[56]
  • Errorsafe[57]
  • Eco Antivirus
  • Green Antivirus 2009[58]
  • IE Antivirus (aka IE Antivirus 3.2)[59]
  • IEDefender[60]
  • InfeStop[61]
  • Internet Antivirus (aka Internet Antivirus Pro, distributed by plus4scan.com)[62]
  • Internet Security 2010[63],[64]
  • KVMSecure[65]
  • Live PC Care
  • MacSweeper[66]
  • MalwareCrush[67]
  • MalwareCore[68]
  • MalwareAlarm[69]
  • Malware Bell (a.k.a. Malware Bell 3.2)[70]
  • Malware Defender (not to be confused with the HIPS firewall of the same name)[71]
  • Malware Defense
  • MS Antivirus (not to be confused with Microsoft Antivirus or Microsoft Security Essentials)[72]
  • MS AntiSpyware 2009 (not to be confused with Microsoft AntiSpyware, now Windows Defender)[73]
  • MaxAntiSpy[74]
  • My Security Wall
  • MxOne Antivirus[75]
  • Netcom3 Cleaner[76]
  • Paladin Antivirus
  • PCSecureSystem[77]
  • PC Antispy[78]
  • PC AntiSpyWare 2010[79]
  • PC Clean Pro[80]
  • PC Privacy Cleaner[81]
  • PerfectCleaner[82]
  • Perfect Defender 2009[83]
  • PersonalAntiSpy Free[84]
  • Personal Antivirus[85]
  • Personal Security
  • PAL Spyware Remover[86]
  • PCPrivacy Tools[87]
  • PC Antispyware[88]
  • PSGuard[89]
  • Rapid AntiVirus[90]
  • Real AntiVirus[91]
  • Registry Great[92]
  • Safety Alerter 2006[93]
  • Safety Center
  • SafetyKeeper[94]
  • SaliarAR[95]
  • SecureFighter[96]
  • SecurePCCleaner[97]
  • SecureVeteran[98]
  • Security Scan 2009 [99]
  • Security Tool[100]
  • Security Toolbar 7.1[101]
  • SiteAdware
  • Security Essentials 2010 (not to be confused with Microsoft Security Essentials)[102]
  • Smart Antivirus 2009[103]
  • Soft Soldier[104]
  • SpyAxe[105]
  • Spy Away[106]
  • SpyCrush[107]
  • Spydawn[108]
  • SpyGuarder[109]
  • SpyHeal (a.k.a SpyHeals & VirusHeal)[110]
  • SpyMarshal[111]
  • Spylocked[112]
  • SpySheriff (a.k.a PestTrap, BraveSentry, SpyTrooper)[113]
  • SpySpotter[114]
  • SpywareBot (Spybot - Search & Destroy knockoff, Now known as SpywareSTOP).[115]
  • Spyware Cleaner[116]
  • SpywareGuard 2008 (not to be confused with SpywareGuard by Javacool Software)[117][118]
  • Spyware Protect 2009[119]
  • SpywareQuake[120]
  • SpywareSheriff (often confused with SpySheriff)[121]
  • Spyware Stormer[122]
  • Spy Tool
  • Spyware Striker Pro[123]
  • Spyware Protect 2009[124]
  • SpywareStrike[125]
  • SpyRid[126]
  • SpyWiper[127]
  • SysGuard
  • System Antivirus 2008[128]
  • System Live Protect[129]
  • SystemDoctor[130]
  • System Security[131]
  • Total Secure 2009[132]
  • TrustedAntivirus[133]
  • TheSpyBot (Spybot - Search & Destroy knockoff)[134]
  • UltimateCleaner[135]
  • VirusHeat[136]
  • VirusIsolator[137]
  • Virus Locker[138]
  • VirusProtectPro (a.k.a AntiVirGear)[139]
  • VirusRemover2008[140]
  • VirusRemover2009[141]
  • VirusMelt[142]
  • VirusRanger[143]
  • Virus Response Lab 2009[144]
  • VirusTrigger[145]
  • Vista Antispyware 2010[146]
  • Vista Antivirus 2008[147]
  • Vista Internet Security 2010
  • Volcano Security Suite
  • Win 7 Antivirus 2010
  • WinAntiVirus Pro 2006[148]
  • WinDefender (not to be confused with the legitimate Windows Defender)[149]
  • Windows Police Pro[150]
  • Windows Protection Suite[151]
  • WinFixer[152]
  • WinHound[153]
  • Winpc Antivirus[154]
  • Winpc Defender[155]
  • WinSpywareProtect[156]
  • WinWeb Security 2008[157]
  • WorldAntiSpy[158]
  • XP AntiSpyware 2009[159]
  • XP AntiSpyware 2010[160]
  • XP Antivirus 2010[161]
  • XP Antivirus Pro 2010[162]
  • XP-Shield[163]
  • Zinaps AntiSpyware 2008[164]

References

  1. ^ abcd'Microsoft Security Intelligence Report volume 6 (July - December 2008)'. Microsoft. 2009-04-08. pp. 92. http://www.microsoft.com/downloads/details.aspx?FamilyID=aa6e0660-dc24-4930-affd-e33572ccb91f&displaylang=en. Retrieved 2009-05-02.
  2. ^ abDoshi, Nishant (2009-01-19), Misleading Applications – Show Me The Money!, Symantec, https://forums2.symantec.com/t5/blogs/blogprintpage/blog-id/security_risks/article-id/53, retrieved 2009-05-02
  3. ^Doshi, Nishant (2009-01-21), Misleading Applications – Show Me The Money! (Part 2), Symantec, https://forums2.symantec.com/t5/blogs/blogprintpage/blog-id/security_risks/article-id/54, retrieved 2009-05-02
  4. ^http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html
  5. ^Chu, Kian; Hong, Choon (2009-09-30), Samoa Earthquake News Leads To Rogue AV, F-Secure, http://www.f-secure.com/weblog/archives/00001779.html, retrieved 2010-01-16
  6. ^Hines, Matthew (2009-10-08), Malware Distributors Mastering News SEO, eWeek, http://securitywatch.eweek.com/seo/malware_distributors_mastering_news_seo.html, retrieved 2010-01-16
  7. ^Raywood, Dan (2010-01-15), Rogue anti-virus prevalent on links that relate to Haiti earthquake, as donors encouraged to look carefully for genuine sites, SC Magazine, http://www.scmagazineuk.com/rogue-anti-virus-prevalent-on-links-that-relate-to-haiti-earthquake-as-donors-encouraged-to-look-carefully-for-genuine-sites/article/161431/, retrieved 2010-01-16
  8. ^ ab'Free Security Scan' Could Cost Time and Money, Federal Trade Commission, 2008-12-10, http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt121.shtm, retrieved 2009-05-02
  9. ^CanTalkTech - Fake Green AV disguises as security software with a cause
  10. ^http://tech.yahoo.com/blog/null/107193
  11. ^Testimony of Ari Schwartz on 'Spyware', Senate Committee on Commerce, Science, and Transportation, 2005-05-11, http://www.cdt.org/testimony/20050511schwartzspyware.pdf
  12. ^Leyden, John (2009-04-11). 'Zango goes titsup: End of desktop adware market'. The Register. http://www.theregister.co.uk/2009/04/21/zango. Retrieved 2009-05-05.
  13. ^Cole, Dave (2006-07-03), Deceptonomics: A Glance at The Misleading Application Business Model, Symantec, https://forums2.symantec.com/t5/blogs/blogprintpage/blog-id/grab_bag/article-id/5, retrieved 2009-05-02
  14. ^Doshi, Nishant (2009-01-27), Misleading Applications – Show Me The Money! (Part 3), Symantec, https://forums2.symantec.com/t5/blogs/blogprintpage/blog-id/security_risks/article-id/55, retrieved 2009-05-02
  15. ^ abStewart, Joe (2008-10-22), Rogue Antivirus Dissected - Part 2, SecureWorks, http://www.secureworks.com/research/threats/rogue-antivirus-part-2/?threat=rogue-antivirus-part-2
  16. ^Attorney General McKenna Announces $1 Million Settlement in Washington’s First Spyware Suit, Washington State Office of the Attorney General, 2006-12-04, http://www.atg.wa.gov/pressrelease.aspx?&id=5926, retrieved 2009-05-02
  17. ^Ex Parte Temporary Restraining Order RDB08CV3233, United States District Court for the District of Maryland, 2008-12-03, http://www.ftc.gov/os/caselist/0723137/081203innovativemrktgtro.pdf, retrieved 2009-05-02
  18. ^Lordan, Betsy (2008-12-10), Court Halts Bogus Computer Scans, Federal Trade Commission, http://www.ftc.gov/opa/2008/12/winsoftware.shtm, retrieved 2009-05-02
  19. ^Krebs, Brian (2009-03-20), 'Rogue Antivirus Distribution Network Dismantled', Washington Post, http://voices.washingtonpost.com/securityfix/2009/03/sunlight_disinfects_rogue_anti.html, retrieved 2009-05-02
  20. ^Howes, Eric L (2008-11-21), Spyware Warrior - Family Resemblances, http://www.spywarewarrior.com/family_resemblances.htm, retrieved 2009-05-02
  21. ^Precise Security - Advanced Cleaner
  22. ^Spyware Warrior - AlfaCleaner
  23. ^Alpha AntiVirus - Spyware-Review
  24. ^BleepingComputer - AntiSpyCheck 2.1
  25. ^BleepingComputer - AntispyStorm
  26. ^2-Spyare - AntiSpywareExpert
  27. ^BleepingComputer - Antivirus Soft
  28. ^2-Spyare - AntiSpywareExpert
  29. ^2-Spyware - AntiSpywareMaster
  30. ^Precise Security - AntiSpywareSuite
  31. ^BleepingComputer - AntiSpyware Shield
  32. ^BleepingComputer - Antivermins
  33. ^BleepingComputer - Antivirus 2008
  34. ^2-Spyware - Antivirus 2009
  35. ^MyAntispyware - Antivirus XP 2010
  36. ^Article noting that Antivirus 2010 and Anti-virus-1 are the same
  37. ^BleepingComputer - Antivirus 2010
  38. ^BleepingComputer - Antivirus360
  39. ^BleepingComputer - AntivirusPro2009
  40. ^Symantec - AntiVirus Gold
  41. ^PCinDanger - Antivirus Live
  42. ^BleepingComputer - Antivirus Live
  43. ^BleepingComputer - Antivirus Master
  44. ^Symantec - Antivirus XP
  45. ^SpywareFixPro - Antivirus Pro 2010
  46. ^411-Spyware - Antivirus System PRO
  47. ^2-Spyware - Avatod Antispyware
  48. ^SpywareRemove - Awola
  49. ^SpywareRemove - BestsellerAntivirus
  50. ^2-Spyware - Cleanator
  51. ^McAfee - ContraVirus
  52. ^SpywareFixPro - Cyber Security
  53. ^XP-Vista - Doctor Antivirus
  54. ^2-Spyare - Doctor Antivirus 2008
  55. ^Symantec Symantec - DriveCleaner
  56. ^MalwareBytes - EasySpywareCleaner
  57. ^Symantec - Errorsafe
  58. ^411-Spyare - GreenAV2009
  59. ^2-Spyare - IE Antivirus
  60. ^MalwareBytes - IEDefender
  61. ^SpywareRemove - InfeStop
  62. ^Symantec - Internet Antivirus
  63. ^http://www.precisesecurity.com/rogue/internet-security-2010/
  64. ^http://www.pcindanger.com/internet-security-2010-removal.html
  65. ^2-Spyare - KVMSecure
  66. ^Symantec - MacSweeper
  67. ^MalwareBytes - MalwareCrush
  68. ^MalwareBytes - MalwareCore
  69. ^MalwareBytes - Malware Alarm
  70. ^2-Spyware - Malware Bell
  71. ^2-Spyware - Malware Defender
  72. ^BleepingComputer - MS Antivirus
  73. ^BleepingComputer MS Antispyware 2009
  74. ^2-Spyware - MaxAntispy
  75. ^Dunkelstern Software - Review
  76. ^Sunbelt Security - Netcom3 Cleaner
  77. ^411-spyware - PCSecureSystem
  78. ^BleepingComputer - PC Antispy
  79. ^ [www.2-spyware.com/remove-pc-antispyware-2010.html]
  80. ^MalwareBytes - PC Clean Pro
  81. ^SpywareRemove - PC Privacy Cleaner
  82. ^MalwareBytes - PerfectCleaner
  83. ^BleepingComputer - Perfect Defender 2009
  84. ^BleepingComputer - PersonalAntiSpy Free
  85. ^BleepingComputer - Personal Antivirus
  86. ^SpywareWarrior - PAL Spyware Remover
  87. ^ComputerAssociates - PCPrivacy Tools
  88. ^SpywareRemove - PC Antispyware
  89. ^SpywareRemove - PSGuard
  90. ^BleepingComputer - Rapid AntiVirus
  91. ^BleepingComputer - Real Antivirus
  92. ^Precise Security - Registry Great
  93. ^Bleeping Computer - Safety Alerter 2006
  94. ^SpywareFixPro - SafetyKeeper
  95. ^Emsi Soft - SaliarAR
  96. ^BleepingComputer - Secure Fighter
  97. ^SpywareRemove - SecurePCCleaner
  98. ^Bleeping Computer - SecureVeteran
  99. ^[1]
  100. ^Spyware-Review Security Tool
  101. ^Precise Security - Security Toolbar 7.1
  102. ^PcinDanger - Security Essentials 2010
  103. ^2-Spyware - Smart Antivirus 2009
  104. ^SpywareFixPro - Soft Soldier
  105. ^Symantec
  106. ^Spyware Warrior - Spy Away
  107. ^BleepingComputer - SpyCrush
  108. ^Symantec - SpyDawn
  109. ^Precise Security - SpyGuarder
  110. ^BleepingComputer - SpyHeal
  111. ^411-Spyware - SpyMarshal
  112. ^Symantec - Spylocked
  113. ^Symantec - SpySheriff
  114. ^Symantec - SpySpotter
  115. ^2-Spyare - SpywareBot
  116. ^Spyware Warrior - Spyware Cleaner
  117. ^BleepingComputer - SpywareGuard 2008
  118. ^Javacool Blog - Fake 'SpywareGuard2008″ rogue – beware
  119. ^2-Spyware - Spyware Protect 2009
  120. ^Symantec - Spyware Quake
  121. ^Spyware Warrior - Spyware Sheriff
  122. ^Sunbelt Security - Spyware Stormer
  123. ^MalwareBytes - Spyware Striker Pro
  124. ^411-Spyware - Spyware Protect 2009
  125. ^Spyware Warrior - SpywareStrike
  126. ^Symantec - SpyRid
  127. ^McAfee - SpyWiper
  128. ^411-Spyare - System Antivirus 2008
  129. ^BleepingComputer - System Live Protect
  130. ^Symantec - SystemDoctor
  131. ^2-Spyware - System Security
  132. ^ (aka total security)BleepingComputer - Total Secure 2009
  133. ^2-Spyware - Trusted Antivirus
  134. ^Symantec - TheSpyBot
  135. ^BleepingComputer - UltimateCleaner
  136. ^Symantec - VirusHeat
  137. ^Symantec - VirusIsolator
  138. ^BleepingComputer - VirusLocker
  139. ^Symantec - VirusProtectPro
  140. ^Symantec - VirusRemover2008
  141. ^ComputerAssociates - VirusRemover2009
  142. ^Symantec - VirusMelt
  143. ^Sunbelt Security - Virus Ranger
  144. ^Virus Removal Guru - Virus Response Lab 2009
  145. ^BleepingComputer - VirusTrigger
  146. ^BleepingComputer Antivirus Vista 2010
  147. ^Precise Security - Vista Antivirus 2008
  148. ^411-Spyware - WinAntiVirus Pro 2006
  149. ^2-Spyware - WinDefender
  150. ^SpywareFixPro - Windows Police Pro
  151. ^BleepingComputer - Windows Protection Suite
  152. ^Symantec - WinFixer
  153. ^Symantec - WinHound
  154. ^Winpc Antivirus
  155. ^Winpc Defender
  156. ^Symantec - WinSpywareProtect
  157. ^BleepingComputer - WinWeb Security 2008
  158. ^Symantec - WorldAntiSpy
  159. ^SpywareRemove - XP AntiSpyware 2009
  160. ^MyAntispyware - XP AntiSpyware 2010
  161. ^BleepingComputer - XP Antivirus
  162. ^MyAntispyware - XP Antivirus Pro 2010
  163. ^[2]
  164. ^Precise Security - Zinaps AntiSpyware 2008

See also

External links

  • Howes, Eric L (2007-05-04), Spyware Warrior: Rogue/Suspect Anti-Spyware Products & Web Sites, http://www.spywarewarrior.com/rogue_anti-spyware.htm, retrieved 2009-05-02

Most computer users will have their own experience or know someone who has experienced rogue software being installed onto their system. Although it comes in many forms, rogueware is often referred to as fake antivirus software which is a kind of program that tricks its way onto your computer and pretends to be a real antivirus application. It then runs what is essentially a simulation that tells you your machine is infected with viruses, trojans, worms and other scary programs, and you need to buy their software to remove the problems. This is of course a lie and the issues are fabricated by the fake program to scare you into buying it. There are also similar fakes around that tell you the hard drive is dying and you need to pay a fee to “recover” your files.

Quite often a fake antivirus interferes with current security software and disables Windows functions to try and stop you from disabling its process. It will usually prevent you from running any EXE files such as web browsers, security scanners, Task Manager, Regedit, Command Prompt and just about any other executable. Basically it locks down your PC just enough to make it virtually unusable while also protecting itself from deletion.

The thing about fake antivirus software is it’s mostly non destructive meaning your files aren’t at risk like they would be with a virus or worm which destroys data. Instead they essentially cripple the computer and nag you into paying (which does nothing apart from allow you to stop the fake program) or until you find a way to kill the program and clean up the system. Of course, there are other types of rogue and malicious software around, ransomware being similar but even more aggressive locking you out of Windows completely until you pay a fee.

Thankfully, removing fake antivirus, internet security, antispyware and hard disk recovery programs is quite easy with a little experience, and there are several tools around that can help. Some will be able to kill the process allowing all your software to run normally, using your favorite malware scanner to clean up the leftovers. Other programs can kill and clean at the same time. Here’s some tools for you to try out.

1. RogueKiller

Redneck rampage collection isotopes. RogueKiller by Tigzy is a highly effective tool at killing most types of rogue software dead in its tracks. This includes just about all fake antivirus or fake hdd rogues, fake police and other types of ransomware, TDSS trojans and several zeroaccess infections. As well as being able to scan and kill malicious running processes, drivers and services using its blacklist, RogueKiller can also perform several repairs to the system some of these programs can leave behind.

After the program has started, it will immediately run a quick scan of running processes and services, and then kill anything found to be malicious. If you wanted to, you could close it after the fake av process has been killed and run a malware scanner such as Malwarebytes to take care of the cleaning process. The program itself does have several options to fix problems such as removing suspicious entries from the Run and RunOnce registry keys, suspicious tasks and also anything malicious in the startup folder. Any shortcuts hidden by fake hdd programs can also be restored.

Simply press Scan and the registry will be checked and you can then selectively remove any entries which don’t appear to be connected with the rogueware before clicking Delete. If during the scan anything in the Hosts file or the Proxy and DNS settings is found to be non standard, you have the option to view what it is and reset any of these back to the default using the three buttons on the right. The MBR option supports up to five physical devices and if an infection is detected in the boot record of a drive, the program has the ability to repair it, reverting back to a standard boot loader.

The RogueKiller.exe has a neat trick because it will sometimes start even though the fake antivirus has blocked executable files from running, for example it bypassed Smart Security but couldn’t do the same on System Care without renaming the exe to Winlogon.exe or Explorer.exe. The program sends anonymous statistics back to the developer and in the RogueKiller window it says that if you don’t agree to this, you shouldn’t use the program.

Download RogueKiller

2. RKill

The Rkill tool was originally designed to quickly kill the process of a fake antivirus or other piece of rogue software so that you could run another tool to clean it up. It’s now become more useful with a few more added abilities that can help you fix and restore some basic system settings that often get affected. These include executable file associations which stop executable files from running and system policies that can disable certain system functions like Task Manager or the Command Prompt.

Although these extra repair functions are very useful, RKill is still not meant to be a removal tool for the fake antivirus or rogueware but a means to stop it from running so you can run other programs to deal with it. The malicious executable file and any startup registry entries will still remain until they are removed by third party software such as Malwarebytes or Hitman Pro etc. You should also not reboot the computer between using RKill and running a malware scan because the rogueware will simply reactivate itself again on startup.

Usage for RKill is simply to download the program and launch it, all other operations for scanning and killing processes, checking the registry, services, digital signatures and the HOSTS file is fully automatic with no interaction required. You will find on the website there are several different links to download, they are in fact the same file but with different names to bypass the rogue process. We found that most newer fake antivirus rogues also block .com and .scr extensions as well as .exe, although renaming the file to winlogon.exe, explorer.exe, userinit.exe or wininit.exe seemed to work pretty much all the time. After RKill has completed, you should now be able to install or run any antivirus/antimalware programs to complete the cleaning process.

Download RKill

3. Using a Product Key to Kill the Fake Antivirus

Although we obviously don’t recommend you do this, but if you were to purchase fake antivirus software, what you should be sent is activation details to register the program. This will consist of something like a user name or email address and a product key which you then enter into the program. After that you will soon discover the software actually does nothing and will just enable you to stop or exit the program. This is useful though, because with the rogue process stopped the system can be scanned normally and the rogue program can easily be removed.

We came across a great website resource called S!Ri.URZ that will give some information and screenshots for most of the fake software out there. What it also lists where possible, is the product key to activate the fake program and any username or email that needs to be entered. Most rogue software will have a “Buy now”, “Activate software” or “Remove all threats” button easily visible so you can enter a serial. Input the details from the S!Ri.URZ website and if activation is successful, the program can now be closed completely allowing real security software to run. As you can see above, we registered System Doctor 2014 using the key provided and the rest was easy after it was closed.

On the next page we have 3 more solutions and some tips if you’re having problems.

12Next › View All

You might also like:

6 Ways to Kill Multiple Windows Processes at Once6 Ways to Test if Your Antivirus and Antimalware is WorkingComprehensive List of 26 Uninstallers and Removal Tools for Internet Security and Antivirus Software5 Ways to Kill and View Processes on a Remote Computer7 Ways To to Remove a File Extension Association in Windows

I have tried both both Malwarebytes & Superantispyware but it didn’t resolve the problem but the RogueKiller tool did it all. Thanks for the suggested tools and it is really helpful

Reply
carl9 years ago

The number of times I’ve run into the fake antivirus malware on my and other peoples systems beggers belief… I just wish I could get my hands on the cockroaches that develop this infestation.

Reply

Thank god something like this came out. I work as a tech at a major university in the technology building. The Rtard teachers constantly get these stupid things. It makes me laugh that the teachers in the COLLEGE OF TECHNOLOGY manage to get these. At least twice a week Ill have to get one of these fake anti viruses off.

Reply
Mark10 years ago

I suggest you only use Malwarebytes as it is a fantastic free software that removes much more than the Fake Antivirus software and will not cause any side effects on any operating system,

Reply

Wooh this is great software.Thank you Raymond

Reply
sudeep10 years ago

it really works………
i tried too….
many many thanks to you……

Reply

Great tip, Raymond!

Reply

Anti-spyware Software

Dan S.10 years ago

I usually prefer to use Super Anti Spyware. It covers both rogue antiviruses and other kinds of spyware. The free version offers cleanup and the pro version offers realtime protection as well as other features.
Interesting find, nontheless :)

Reply

i used Superantispyware it removes and i’ll try this Fake antivirus thanks Raymond …

Reply
Mike10 years ago

Hey Ray,

Thanks for this great post again as it really help my friend’s computer in removing the fake anti-virus.Kudos !!!

Reply

thanks for the info ray! :D

Reply
ednap_ina10 years ago

use malwarebytes guys… it really knows how to destroy fake antivirus

Reply

It’s also an amazingly fast download too!

I clicked on the link to download, and first thought, “nothing happened”, then checked my download file.

Yep! there it was!

Thank You Raymond!

Steve

Reply
keo10 years ago

cool … just with file size 83k only!

Reply

Nice one to give it a try.
Thanks Raymond for sharing this.
amon

Reply
nazz10 years ago

thanks Ray…

Reply

nice tool. thanks.

Reply
sudeep10 years ago

thanks ray…….

Reply

really great information Ray

Reply
Tangomouse10 years ago

Free Anti Spyware

thank you ray ,thats going straight on my usb stick

Reply

Very useful ray.

Reply
Fran10 years ago

Good one, Ray…

Reply

Wow.nice to know.Thanks for sharing Ray.

Reply
Yaman10 years ago

thanks Raymond

Reply

Thanks Ray for this important advice.
And also thanks for the guy from Malaysia – Olsen – who developed the software Remove Fake Antivirus.

Reply
hims10 years ago

good info ray. thanks

Reply

Free Spyware Program

thanks good one

Free Anti-spyware Programs Downloads

Reply

Anti Spyware Free Download

Leave a Reply

Coments are closed
© 2020 - d8cmb.netlify.com
Scroll to top