HI Geeks,

Remember four years ago when the "Fake Codec" scam managed to infect
even large corporations?  The bad guys still try this approach every
now and then, but their most successful "invention" to date is clearly
the fake anti-virus. We've been covering it repeatedly for the past
two, three years now, and still is going strong. If an attack vector
stays the same for years, it can only mean one thing: It is netting
the bad guys enough money that they don't feel the urge to innovate.

The following popped up earlier today when some readers surfed to a
perfectly OK web site that had apparently been hacked and "amended".
The site that seems to start the dive down the FakeAV rabbit hole at
the moment is (dontclick!) baullka-dot-com/red.php . The goodies then
come from 91.216.122.x which is known to provide unsolicited anti-
virus "help". Another netblock involved - 188.229.88.x and
188.229.92.x - seems to be a recent addition to the FakeAV universe.

I'm including a couple screenshots below, it never hurts to know what
the current incarnation of FakeAV looks like ... *especially* since
their current EXE registers with a mere 6/43 on the Virustotal scale.

Stay safe!

Cheers,
0xN41K

-- 
You received this message because you are subscribed to the Google Groups 
"nforceit" group.
To post to this group, send an email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/nforceit?hl=en-GB.

Reply via email to