Rogue Antivirus 360 vs. Legitimate Norton Software

May 1
11:57

2009

Kelly Wright

Kelly Wright

  • Share this article on Facebook
  • Share this article on Twitter
  • Share this article on Linkedin

Antivirus 360 is a case of malware code that managed to reveal multiple loopholes in Windows security configuration. Exploiting its resemblance to Norton products, this rogue software sells fake licenses to unsuspecting PC owners.

mediaimage

Rogue Antivirus 360 quite possibly deserves the notorious fame of one of the most annoying smitfraud cases ever created by "bad guys". This scam has a double advantage over the majority of other "smitfraud software". First,Rogue Antivirus 360 vs. Legitimate Norton Software Articles it's titled similar to worldwide known "Norton 360 Security Suite" line of antivirus products. Second, websites that are created with the sole purpose of pushing this scam onto unsuspecting web surfers, proudly claim to have been awarded by most reputable online magazines while also displaying the logo "ICSA Labs test passed".

Needless to say, this piece of malware is highly unwanted on any desktop or laptop. By self-starting at system boot-up, Antivirus 360 will display results of a fake scan where experienced PC users will find crucial Windows system files marked as "malicious threats" and "harmful objects". Removing them means putting at risk the overall system stability and performance. Luckily, Antivirus 360 has no ability to remove anything - it's main purpose is to distract users and turn them into panic. Looking very impressive and solid, this little rogue program achieves its goal. This approach topped by resemblance to Norton trademark works like a charm: people do fall for fake warnings and blatant pop-ups, and willingly pay for "full license" which is sold at "discount price". Scammers who created Antivirus 360 aren't humble in asking for money: they charge a weird "activation fee" in addition to more common call-back support and lifetime updates.

Antivirus 360 is different from similar malware infections in a number of aspects which are enumerated below.

  1. It modifies Windows HOSTS file which is used to determine browser behavior and controls redirects to websites. Antivirus 360 adds its own entries to HOSTS file in order to redirect search queries to dangerous websites.
  2. It implements browser hijack to fool surfers. By doing this trick, Antivirus 360 easily adds a "Google Tip" to Google home page. It looks to web surfers like Google is recommending them to buy Antivirus 360 license immediately because their copy is not registered. This a very smart tactic because most Google users are inclined to blindly believe every piece of advice allegedly coming from their favourite search engine. Needless to say that Google has nothing to do with rogue Antivirus 360. The "Google Tip" is generated by malware itself and inserted into loaded web pages. That's why browser hijacks are regarded by security experts among most dangerous threats existing on the Web.
  3. It generates its executable files with different checksums on different infected computers. This simple trick leaves certain security programs being unable to spot and identify pieces of the malware.

Of course you will find Antivirus 360 capable of self-replicating, disabling Registry Editor and sometimes Task Manager. This is a common symptom of all rogue programs.

Considering the fact that A360 often comes as part of infection brought into computer by a trojan virus (like Vundo), it's evident that removing all pieces of the malware becomes a complicated task. Normally popular antivirus programs are unable to cope with the issue. Therefore to successfully complete Antivirus 360 removal, you need a set of tools and proper instructions on how to use them.

Article "tagged" as:

Categories: