Monday 26 December 2016

Tech Support Scammers Lure Users With Fake Norton Warnings, Turn Out To Be Symantec Reseller

Fraudulent tech support companies are well-known for taking advantage of unsavvy computer users by reeling them in with scare tactics and charging large amounts of money for bogus services.

In many cases, these crooks sell free security products (or straight up pirate them) for hundreds of dollars more than their actual retail price. Security vendors may not be aware of these practices let alone what kind of sales pitch scammers use to force those sales.

In one of the worst cases of abuse we have seen so far, a company that happens to be an active member of the Symantec Partner Program is scamming people with fake warnings designed to look like Symantec’s flagship product, Norton Antivirus.

[youtube https://youtu.be/39hw2m_9GwA&rel=0]

The alert message is displayed via a web page hosted on quicklogin.us/norton and urges users to call for support immediately saying: “System Critically Infected. If you are not able to click on this button, Immediately contact Support toll Free Helpline 1-855-637-1900”

Of course this screen is completely fake, but combined with an alarming audio message playing in the background, it may be enough to dupe some users.

We decided to call the toll-free line to see what kind of support we may get. Our expectations were not very high but we were not prepared for what we would eventually find out.

We were instructed to go to fastsupport.com to allow the technician to take remote control of our computer, therefore enabling him to perform a diagnostic. (Note: we strongly advise to never let anyone or any company you do not feel comfortable about, get remote access to your computer.)



login
This process is a core part of the scam because it allows crooks to tighten their hold on potential victims. With remote access, scammers can literally do whatever they want on the user’s machine including stealing documents to installing (real) malware.

Once the technician was logged in, he wasted no time in going for the most infamous trick used by tech support scammers, the Windows EventViewer.



eventviewer
Sadly, Microsoft’s central log and error reporting tool can all too easily be leveraged thanks to those yellow and red warnings, which the majority of the time are perfectly normal. Of course, for a scammer it’s the perfect way of claiming those are infections or viruses.

Not satisfied with this, the technician figured he could pull another well-known trick to seal the deal. This time he opened up the TaskManager and pointed out a particular process called csrss.exe.

csrss
This file is a core Windows program but as is often the case, malware authors often rename their samples to look like a legit file and use the same naming conventions.

Googling for csrss.exe returns several pages that promote registry scanners to look for errors associated with that file name, as well as descriptions labeling this process as a Trojan. That’s all the scammer really needs to make his point, without even scanning or checking whether the process in question is the real one or a piece of malware.

Having finished the diagnostic in a record 5 minutes, the technician proceeds to the sales part of his script. A couple of different support plans are offered:
  1. A one time fix and installation of Norton for $199.
  2. A one year warranty with Norton for $249.
invoice_notepad
At this point we still don’t know who this company is and the only information we have is their toll free number from the fake warning page. The payment portal shows that they are Silurian Tech Support.
payment_page
A cursory background review of this company revealed some startling details including the fact that they were an official member of the Symantec Partner Program:

letter
We immediately reported all of our evidence to Symantec who took this case very seriously and confirmed that this company was indeed a member of the program. Symantec also let us know that they were going to take immediate action to resolve this issue.

It is a sad state of affairs when tech support scammers are not ashamed of using lies to sell their products and services but also double cross their partners, thereby inflicting brand and reputation damage.

Most of the time, the support provided by these crooks is way under par, and unsurprisingly we often hear about people’s computers getting worse than when they first called in. That leads to refund requests which sometimes end up with the very security vendors whose products are abused.

At Malwarebytes, we regularly hear about people that bought our software for hundreds of dollars, sometimes even over one thousand dollars. They imagine we sold it to them (often scammers impersonate big brands) and it is heart breaking to have to let them know they were conned and may never see their money again.

The best protection against tech support scams remains user awareness and extreme caution whenever facing one of those fake warnings. The crooks’ one and only weapon is social engineering since they rely on people believing their made up stories. If you are able to spot fake alerts and pop ups, stay away from them and do not call the toll free number.

If you are interested in helping out in preventing potential new victims, please write down the URLs, phone numbers and other details you are able to grab (screen captures also help). These can be reported on various forums and even to us directly so that we can shut down those scammers’ distribution points and help law enforcement go after them.

If you, or someone you know has already been scammed, feel free to check out our resource page for additional information on how to recover from these attacks and prevent further damage and unexpected costs.

Leave a Reply

Your email address will not be published. Required fields are marked *

Thursday 22 December 2016

Remove Bigbrandgiftcards.com virus

Bigbrandgiftcards.com virus ads might occur when your computer is infected with a malicious browser extension installed by Adware or Potentially Unwanted Software (PUPs). The pop-up ads from “Bigbrandgiftcards.com” are caused by adware.

The domain is only used to promote the ads and not malicious or associated with the malware. The ads might vary, sometimes it promotes products from different shopping sites, sometimes fake updates and in this case a Bigbrandgiftcards.com pop-up.
Adware and Potentially Unwanted Programs are usually bundled with freeware. It’s very important that you pay attention to the license agreements and installation screen when installing free software.

If the custom installation offers a decline, custom or advanced button, click it to find out if there is any additional software installed that you do not need or want. During installation the adware offers you additional software to enrich your browser experience. Take note that this additional software might promote ads to keep it free.

More Information :  CLICK HERE

Wednesday 21 December 2016

Remove Enter.thesupermobi.com virus

Enter.thesupermobi.com virus ads might occur when your computer is infected with a malicious browser extension installed by Adware or Potentially Unwanted Software (PUPs). The pop-up ads from “Enter.thesupermobi.com” are caused by adware.

The domain is only used to promote the ads and not malicious or associated with the malware. The ads might vary, sometimes it promotes products from different shopping sites, sometimes fake updates and in this case a Enter.thesupermobi.com pop-up. Adware and Potentially Unwanted Programs are usually bundled with freeware. It’s very important that you pay attention to the license agreements and installation screen when installing free software.

If the custom installation offers a decline, custom or advanced button, click it to find out if there is any additional software installed that you do not need or want. During installation the adware offers you additional software to enrich your browser experience. Take note that this additional software might promote ads to keep it free.

See More Information : Norton enter key |  Norton setup key

Tuesday 20 December 2016

How to Securely Set Up a New Computer:

1. Install Security Software

The moment you connect to the Internet, your computer becomes vulnerable. While a brand-new computer out of the box may seem secure, it is not. Sometimes a brand-new computer may sit in a stock room for months before finding its new home. One of the very first things you should do with your new computer is install an Internet security software suite, such as Norton Security. An up-to-date Internet security program will defend your computer against viruses, spyware, malware and other online threats.

2. Software Updates

As we mentioned above, sometimes a computer can sit around for a while before being sold. During that time, there’s a good chance that the software installed on the computer has been updated by the manufacturer to help protect against known software vulnerabilities. However, that new computer has never been turned on until it arrives in your hands, and has not had the chance to be updated.
Once you have installed your Internet security software, run all operating system updates. This will protect your computer against the latest, known threats on the Internet landscape.

3. Remove Unnecessary Software

A lot of new computers will come bundled with other software, or “add-ons.” Each program on your computer is essentially a weakness, because it can contain software vulnerabilities. The more programs on your computer, the more vulnerable it is. Go through your applications on your computer and delete the ones you know you won’t use.

4. Put a Password on It

Like the key to your house, the password is the key to your digital life. Secure password use is essential for all physical devices, as it is the first defense against unauthorized access. While you may think your computer is safe at home, things do happen, and in the event that your computer or laptop gets lost or stolen, no one can get into it.
Many people make the mistake of using passwords that are too simple. Yes, your pet’s name is a nice password, however it’s also much easier to crack than a term mixed with numbers and symbols in addition to random letters. In today’s fast-paced, high-tech world, there’s no such thing as a password that’s too complicated.

5. Transferring Data

If you backed up your data successfully before you wiped your old hard drive, putting your files back onto a new computer will be a snap. Just plug in your USB or external hard drive and drag your old files onto your new computer.

CLICK HERE  : http://norton-setup-install.com

Thursday 15 December 2016

Ransomware tries its hand at being a deadly viral meme

Memes are weird things and weren’t always about lolcats or frogs or whatever the latest terrible image macro doing the rounds happens to be. I quite like this line from Wikipedia on said subject:

Proponents theorise that memes are a viral phenomenon that may evolve by natural selection…Memes that propagate less prolifically may become extinct, while others may survive, spread, and (for better or for worse) mutate.

The plot of The Ring is pretty much the concept of a meme made deadly – pass on this cursed videotape within 7 days, or you die horribly

How far will you go to save yourself?

Well, our old friend 2016 is here to ask that question one more time, because ransomware authors have decided to tweak their victim’s get out of jail method. Don’t have the funds to obtain an unlock key? No problem – just infect two people and you’re back in business (assuming they pay up to unlock their own files). It’s all gone a bit pyramid scheme, hasn’t it?

Interestingly, the time limit to regain your files is the same as the time limit imposed on potential victims of Sadako: seven days.





The only way that could be creepier is if they’d released this during Halloween. 

Named after the well known BitTorrent client Popcorn Time, this file goes one step further than most in a mission to make some money. It encrypts files in the usual places – Documents, Music, Pictures and Desktop – and targets pretty much every file extension under the sun. After encryption, the splash screen explaining what’s happened claims the creators are from Syria and that money generated from the ransomware will be used for “food, medicine, and shelter”.

At this point, the choices available boil down to randomly entering a key to unlock the files (not a good idea, as there is mention in the source code that incorrect key entry may eventually result in automatic file deletion), or to play the game and begin the process of infecting other people, in the hopes of obtaining an unlock key.
Note that it isn’t enough to infect another person – you have to hope they pay the ransom too, or they don’t count as a notch on your tally of victims.

All of this only works on the assumption that the ransomware authors will actually provide an unlock key and that is certainly up for debate. It’s also probable that victims won’t want to risk friendships so they’ll end up trolling for random victims in chat rooms, social media and other fish in a barrel locations. In other words, like common or garden script kiddies going about their daily business.

What a mess!

As Graham Cluley mentions, you don’t want to risk getting into trouble with the law because you decided to save yourself by torching the data of others. Should you fall victim to a piece of ransomware, don’t give up hope – many of these files are poorly coded and in many cases, members of the security community, independent researchers, security firms, and more besides manage to come up with decryption tools.
Virus Protection Install Norton Security 

See More Details : Norton setup | Norton setup install 

Tuesday 13 December 2016

Fundamental Endpoint Security Best Practice: Securing Privilege on the Endpoint

Information security professionals know there are two fundamental endpoint security practices that should be part of their security program in order to reduce the attack surface. Validated by various government information security organizations and industry analysts, the first practice is application patching, and it has been widely adopted thanks to commonly available enabling tools. The second is securing privilege on the endpoint.

As part of the research conducted for the “CyberArk Global Advanced Threat Landscape Survey 2016,” 750 IT decision makers were asked if their organization’s users have local administrative privileges on their endpoint devices. Sixty-two percent said yes.

Removing local admin rights from workstations is perceived to be a difficult trade-off between security and usability. This is because the end-user often has to contact the desktop support team for the most trivial of tasks, resulting in lost productivity.

This also increases the burden of work for the support team, which can lead to missed service level agreements and increased support costs. The overall result can be a stand-off between the information security and desktop support teams.

Plugging endpoint security gaps

 To compensate, organizations have added layers of preventative endpoint security, including anti-virus, personal firewalls, intrusion prevention, application and device control.

Even with these in place, many view a network breach as inevitable. In response, data loss prevention (DLP) has been deployed to detect and block attempts to exfiltrate sensitive information. In many instances, file and full disk encryption has also been added to ensure that any information stolen is useless – unless the attacker also steals encryption keys.

Today the perceived choice is either to bet on yet more prevention controls or follow the continued acceptance that a breach is inevitable, and therefore, opt to add detection and response capabilities. These complement prevention controls by helping organizations to understand when and where malicious activity might occur on their network; unfortunately, they often offer too little too late, especially with the current ransomware trend.

Enforcing least privilege

What if information security professionals could go back to that fundamental best practice that is missing? If they can overcome the objections to deploying technologies that allow them to do what they know is right, their endpoints could be far more secure. There are better options today. For example, combining least privilege management with application control allows revocation of local administrator rights, but also offers elevation of privilege for trusted applications when needed.

Facilitating application control

Application control can provide significant additional benefits, such as enabling a policy-based approach to allow known good applications to execute while blocking malicious software. There are two common objections to this approach, which CyberArk has addressed – manual policy creation and the binary approach of white and black listing.

By trusting sources of files, such as those from software distribution tools or file shares, and those with trusted signatures, CyberArk has found that 99% of applications can be automatically added to the policy. The final 1% do not have to be treated in a binary manner. This is the practice that creates a user productivity issue and generates a help desk call when the user tries to install a new application. You can run unknown applications in a restricted mode but prevent access to sensitive information, network shares and the Internet. If the application is malicious, the threat is contained on the endpoint..

Containing attacks on the endpoint

Least privilege combined with application control is a security best practice to contain attacks on the endpoint. As part of a program to secure privileges on the endpoint, consider protecting Windows credentials and those stored by popular browsers too. If you can detect and block credential theft attempts, you will stand a far better chance of containing an attack on the endpoint

CLICK HERE