Fake CCleaner Directs End-Users for Making Payment
GFI the security company has lately detected one Russian website hosted on 'myccleaner.ru' that provides a download namely CCleaner the popular device for system optimization as it as well directs end-users that they must pay a paltry sum. Help Net Security published this in news on August 12, 2011.
Appearing similar to the actual anti-malware device, the customized application dupes unwary end-users by beginning with exhibiting a prompt for "activation." Also, to be able to run the application, the victim is asked to pay either through Internet payment services like PayPal, paid call, SMS, WebMoney, terminals etc.; or utilize personal credit card.
Essentially, the website presents end-users an opportunity to give away cash through a variety of stunning methods. However, no download web-link offered fulfils the expected task except one, viz., "ccsetup303.exe" that in reality works maliciously.
Further, the majority of ways for making the payment apparently settle at US Dollar 5 and it won't ever perform the promised task too.
Hence, according to GFI's security investigators, consumers would do much well by visiting the authorized website as well as downloading the cleaning device from there instead. Moreover, the researchers identified the .exe file as Hoax.Win32.ArchSMS, which has a detectable rating of 29 successful virus engines out of the total 43 on VirusTotal.
The original, genuine CCleaner costs $24.95 including premium support if purchased from its maker's authorized website. Naturally, the lower purchase value of US $5 would encourage consumers to visit the above mentioned Russian website and download the application offered there.
And while according to the security researchers, unwary end-users may not recognize the scam prior to making the payment, there's one silver lining viz., anti-virus software that is up-to-date may possibly prompt that the download is malicious software immediately when it's taken down on the PC.
Now it isn't new to have hackers target bogus security applications. For, there have been instances of ransomware. Staring August 2011, phony BKA (Federal German Police) warned that ransomware was contaminating the public i.e. the fresh spying software, which penetrated end-users' PCs and demanded a ransom payment for restoring the computers back to operation.
Related article: Fake Spam Mail Announces Australian PM’s Heart Attack
» SPAMfighter News - 23-08-2011