Malware Research Director at Gridinsoft https://gridinsoft.com/blogs/author/baglay/ Welcome to the Gridinsoft Blog, where we share posts about security solutions to keep you, your family and business safe. Thu, 04 Jul 2024 14:58:09 +0000 en-US hourly 1 https://wordpress.org/?v=94006 200474804 Coin Miner Investigation: When, Why, For What https://gridinsoft.com/blogs/coin-miner-investigation/ https://gridinsoft.com/blogs/coin-miner-investigation/#comments Mon, 26 Feb 2018 16:06:06 +0000 https://blog.gridinsoft.com/?p=2038 1. Coin Miner malware gains its popularity Due to rising cost of cryptocurrency recently, Bitcoin particularly (BTC) to 20000 USD, our Analysts Team noticed an increased amount of malicious programs, especially those who focused on the secret mining of cryptocurrency. GridinSoft Anti-malware detect them as Trojan.CoinMiner/Risk.CoinMiner. For few recent months CoinMiner is one of the… Continue reading Coin Miner Investigation: When, Why, For What

The post Coin Miner Investigation: When, Why, For What appeared first on Gridinsoft Blog.

]]>
1. Coin Miner malware gains its popularity

Due to rising cost of cryptocurrency recently, Bitcoin particularly (BTC) to 20000 USD, our Analysts Team noticed an increased amount of malicious programs, especially those who focused on the secret mining of cryptocurrency. GridinSoft Anti-malware detect them as Trojan.CoinMiner/Risk.CoinMiner.

For few recent months CoinMiner is one of the top 20 the most popular threats among with Adware, that were super popular once.

Most popular malware families for the last 30 days
Most popular malware families for the last 30 days

Analyzing the dynamics of detection such type of threats, we predict that coinminers will at least keep its positions in the near future, and even get more distribution.

CoinMiner malware family distribution
CoinMiner malware family distribution

2. Coin Miner wanna be WannaCry

Cyber-criminals create many complicated ways to infect users’ systems. The most popular method of infection is called Bundled Software.

While unsuspecting user installs legitimate software, one or several (usually malicious) programs are silently installed alongside. The same method is now actively used by the authors of CoinMiner.

Often, installed mining programs are copies of utilities for mining xmrig, gplyra, or slightly modified versions. This distribution method is straightforward, but you can only infect one computer per installation. The authors of Trojan.CoinMiner began to look for other ways of infection.

The unprecedented success of the WannaCry (WannaCrypt) ransomware family showed the authors of malicious software an easy way to infect computers over the network. Moreover, they discovered that most a computer users don’t work on the latest version of Windows OS, which makes them easy money in the hands of skillful cybercriminals.

Of course, the authors of CoinMiner took advantage of this opportunity. After all, it is enough to infect somehow one computer in the network to distribute the miner to all the others. And this is a noticeable increase in the mining bot-net.

And that is exactly what happened. Some time ago, all the major antivirus vendors reported using the exploit EnernalBlue in conjunction with the miners. We also noticed the presence of exploits from the hacker group ShadowBrokers in conjunction with CoinMiner on users’ systems. GridinSoft detects such utilities as Virtool.ShadowBrokers.

System infected with Trojan.CoinMiner (SecUpdateHost.exe) along with EternalBlue exploit (spoolsv.exe)
System infected with Trojan.CoinMiner (SecUpdateHost.exe) along with EternalBlue exploit (spoolsv.exe)
SecUpdateHost.exe detections on virustotal.com
SecUpdateHost.exe detections on virustotal.com

Link for the full report

spoolsv.exe detections on virustotal.com
spoolsv.exe detections on virustotal.com

Let’s remind you that the exploit EnernalBlue allows you to remotely execute code in kernel mode on a networked computer using vulnerabilities in the SMB v1 protocol. Together with the latest Windows updates, Microsoft forcibly turns off this protocol.

Microsoft disables SMBv1
Microsoft disables SMBv1

3. Coin Miner software bundled with your browser. Really?

Our analysts analyze the state of users’ systems daily to identify new threats. This time, during the research, a suspicious file was found in the browser WebFreer. We made further analysis that you can find below.

Suspicious file found along with WebFreer browser
Suspicious file found along with WebFreer browser

The browser has its official website (hXXps://www.webfreer.com), where WebFreer is advertised as a safe, convenient and fast browser.

Official WebFreer web site
Official WebFreer web site

Let’s look on the site in details. Specifically – at the home page code.

Oops! We got Monero miner
Oops! We got Monero miner

Indeed, the page’s code is worth a look. On the main page of the WebFreer website, a 3malicious script is built-in that executes the cryptocurrency mining when your browser is just open. The latest versions of popular browsers block content that is sent from unsafe HTTP protocol, so in our case, the script was blocked by the Chrome browser. If you are using an older browser version, you may be at risk.

By clicking on the download button, the WebFreer installer starts downloading. The file named WebFreer_Setup_1.3.2.0 is an NSIS installer of 53.7 MB size. Interestingly, the file is not signed by any digital signature, making it impossible to verify its authenticity. So, anyone who has access to WebFreer servers can modify the browser without users’ notice.

Setup file is not digitally signed
Setup file is not digitally signed

Downloaded version 1.3.2.0 is the latest one at the moment. The installation process is standard.

  • creates directory % ProgramFiles% \ WebFreer. This is the main browser directory;
  • creates directory %LocalAppData%\Web Freer. It stores user data;
  • creates file %SystemDir%\WebClientService.exe. This file is malicious;
  • creates file %SystemDir%\webproxy.exe. This file is malicious;
  • to autostart the browser while system startup it creates a registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Web Freer, that refers to file %ProgramFiles%\WebFreer\webfreer.exe;
  • for work of malicious process creates service WebClientService, that refers to file %System%\WebClientService.exe;
  • to provide network access, it creates Windows Firewall rules that allow incoming TCP and UDP connections for %ProgramFiles%\WebFreer\webfreer.exe;
  • creates registry keys HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WebFreer and HKCU\Software\WebFreer, that aren’t malicious.
Firewall rules added by WebFreer installer
Firewall rules added by WebFreer installer

3.1 Digging deeper

Let’s analyze in details these files.

WebClientService.exe

As was mentioned before, the launch of this executable file occurs via the WebClientService service created during the installation of the browser. It is obvious that authors of malware tried to hide using similar name with a legitimate WebClient service. A usual user won’t notice a dirty trick, even if he decides to see the list of processes manually.

Static analysis leads us to conclude that the file was written by C ++. Obviously, the application does not have a graphical interface.

WebClientService.exe written in C++
WebClientService.exe written in C++

It is worth paying attention to the import of functions. In addition to the standard ones, the use of the curl library is obvious. Obviously, in the future we will see the interaction of service with the Internet.

Service uses curllib
Service uses curllib

In the further analysis, some variables and functions have been renamed for easier perception. They, as well as comments, are listed in the screenshots below.

Further analysis shows that file has standard main function, in which the internal function is associated with the WebClientService service by WinAPI’s StartServiceCtrlDispatcher function.

Service’s start function is standard
Service’s start function is standard

Let’s take a closer look at the function that is executed in conjunction with the service. We immediately see the registration of the control handler function (via RegisterServiceCtrlHandler), as it should be.

Service’s main function
Service’s main function

Let’s not rush things and analyze the function of processing control code. The control codes processing function itself is of no interest and can only accept SERVICE_CONTROL_STOP code. Accordingly, service can’t be suspended.

An interesting point is that in the case of receiving the SERVICE_CONTROL_STOP code, the processing function returns in response to SERVICE_STOP_PENDING, and the service execution does not stop immediately (but the service will be forcibly terminated by SCM after the expiration of the time limit). Malware authors don’t specify the parameter dwWaitHint, which should be passed in case of the return of code SERVICE_STOP_PENDING. Though it doesn’t affect the main functionality of the malicious service.

Service’s control handler function
Service’s control handler function

After registering the handler of the control codes, we see the standard preparation for the launch of service. After creating the service completion event, you can notice an interesting function that for convenience of analysis was called by us GetHedgeCoinData. It runs twice: if the first start was unsuccessful, the malicious one waits for 60 seconds (Sleep (60000)), then makes a second attempt.

Let’s look at the function itself to understand what functions it is doing.

GetHedgeCoinData function is small yet interesting
GetHedgeCoinData function is small yet interesting
Nested CheckAvailability function uses curl library
Nested CheckAvailability function uses curl library

Malware uses the curl library to connect to the URL hXXps: //sites.google.com/site/hedgecoin. After the request was made, the response code and return data are checked. The GetHedgeCoinData function succeeds if the query was executed.

As you can see, the site is disabled by Google right now, so it is not possible to retrieve the data that was on this domain.

Google disables malicious site. Nice job!
Google disables malicious site. Nice job!

However, as we didn’t get information from the specified web address, the malware uses the predefined (hardcoded) parameters:
-a cryptonight -o stratum+tcp://mine.anybt.com:1111 -u 478WNYwHN4SQs8j89P8QJY4DKm2c6JhCQizi5ucjooKuFQirbtEsafJinSXLwZcysnN1L98r2vocKjGjKoXRrEiRGpmyErc -p x -t 1

Obviously, these parameters are used for cryptocurrency mining. Specifically, the algorithm cryptonight and the domain mine.anybt.com, located on the hosting GoDaddy.com (based on whois information) is in use.

WhoIs information about anybt.com domain
WhoIs information about anybt.com domain

Remember these settings, they will be used below. The next function we named CheckWebProxyFiles , that processed files used by malware.

Checking files and copying them
Checking files and copying them

As you can see from the code, there can be 3 identical malicious files on the user’s system:

  1. %commonappdata%\_iocache_.dat
  2. %system%\webproxy.exe
  3. %programfiles%\WebFreer\webproxy.exe

If any of the last two files will be removed, service will restore from a copy in %commonappdata%\_iocache_.dat.

Let’s return to the main function. After the above operations with files, the following function is executed, that is intended for launching webproxy.exe.

Finally launching webproxy.exe with needed parameters
Finally launching webproxy.exe with needed parameters

The service checks the presence of %system%\webproxy.exe or %programfiles%\WebFreer\webproxy.exe file (it’s enough at least one of them), and then generates the startup parameters (the ones we saw above). After that it creates the process, saving its ProcessID. The constant bCreateProtectedProcess, hidden into the application code, attracts attention. If its value is 76 (0x4C), then the process is started as a protected one. In the sample analyzed by us this value was equal to 76.

The further behavior of the service depends on the success of launching the webproxy.exe process. If the process couldn’t be started, the service is shut down.

Further behavior depends on process start’s result
Further behavior depends on process start’s result

If the webproxy.exe process is successfully launched, the service is marked as started and it creates an endless stream, in which the integrity of the files (CheckWebProxyFiles) is checked and the process of webproxy.exe is restarted, if necessary.

Every 5 seconds service keeps an eye on webproxy process
Every 5 seconds service keeps an eye on webproxy process

So, it’s time to sum up.

Service WebClientService:

  1. refers to a file %system%\WebClientService.exe;
  2. starts automatically when the system starts up;
  3. executes a request to the URL hXXps://sites.google.com/site/hedgecoin;
  4. has built-in parameters for mining (but does not do mining itself);
  5. It starts a protected process at startup %system%\webproxy.exe or %programfiles%\WebFreer\webproxy.exe;
  6. performs file copying operations %commonappdata%\_iocache_.dat, %system%\webproxy.exe and %programfiles%\WebFreer\webproxy.exe;
  7. after startup it monitors every 5 seconds the status of the webproxy.exe process and, if necessary, starts it again;
  8. after startup it monitors every 5 seconds the presence of %commonappdata%\_iocache_.dat, %system%\webproxy.exe and %programfiles%\WebFreer\webproxy.exe. If necessary, restores them from copies.

webproxy.exe

When parsing the WebClientService service, we repeatedly encountered the mention of another malicious file – webproxy.exe. Due to information already received, we can safely assume that this file is a coin miner. Let’s check this hypothesis.

PE Header tells us it is a 64-bit EXE
PE Header tells us it is a 64-bit EXE

Information from the PE header tells us that this file is executed on 64-bit systems. It is very strange for a malware, because this can potentially reduce the number of infected systems, although most computers in the world work on modern OS with 64-bit width. At least Windows x86 users can sleep peacefully, this coin miner won’t even launch on their systems.

Packed with UPX. Boring
Packed with UPX. Boring

Data about the sections in the PE header tells us that we face a packed UPX file in front of us.

After the routine unpacking procedure, we get the usual executable console file written in C.

We got non-packed 64-bit executable
We got non-packed 64-bit executable

Let’s check the string constants in the file and, perhaps, we will find something interesting.

Yep. CPUMiner-Multi is used
Yep. CPUMiner-Multi is used

Indeed, we have found an interesting fact. Let’s allow the proposition that we are dealing with the original cpuminer-multi. The malware authors did not remove the string constants from the file, so we even got the GitHub of the coin miner’s author (not a malicious program, but the legitimate utility for mining – cpuminer-multi). We found cpuminer-multi-version 1.3.1 on GitHub without problems. The only thing left to do is just to compare our files with those found.

So, webproxy.exe is actually cpuminer-gw64-core2.exe
So, webproxy.exe is actually cpuminer-gw64-core2.exe

Now it is clear why webproxy.exe is a 64-bit application, regardless of the OS bitness on which WebFreer is installed: cpuminer-multi version 1.3.1 exists only in 64-bit version.

Mining process is in progress…
Mining process is in progress…

In total, webproxy.exe is not of much interest for analysis, since it is a copy of the common utility for mining cpuminer-gw64-core2.exe.

3.2 Was WebFreer always be so?

We decided to check whether users of the previous version of the WebFreer browser are at risk. To do this, we downloaded the previous browser version – 1.3.1.0, and compared the contents of the installers.

Not webproxy.exe neither webclientserver.exe are present
Not webproxy.exe neither webclientserver.exe are present

As it turned out, the previous version of the browser WebFreer did not contain any malicious elements, namely – hidden coin miners.

4.Conclusion

Together with you, we have found and analyzed the WebFreer browser, which is installed in a system along with malicious elements. They carry out crypto-currency mining causing harm to your system and computer. Your computer is busy solving the mining tasks. As a result, its performance and speed are reduced, and there may be a problem of a high noise level of cooling systems, overheating, and even breakdown of the computer.

Whether the malicious minor was included in the WebFreer browser purposefully by its authors or whether a cyberattack was performed on their server, it is impossible to say for sure because there is no digital signature.

At the end of our analysis, we would like to give you some tips on how to protect yourself and your loved ones.

  • Use only the latest versions of the software.
  • Install operating system updates in a timely manner. Most infections can be avoided simply by installing OS updates.
  • Use only trusted browsers.
  • Do not install unknown software from suspicious sources.
  • Check the presence of a digital signature in the programs that you use. This will not be the 100% solution against infection, but it will significantly reduce it.
  • If you notice a slowdown or worsening of your PC performance, scan your system.

Coin miners gain popularity, so dozens of new viruses appear every hour, and usual antiviruses can’t effectively fight them. GridinSoft Anti-Malware updates the virus database hourly, so you can be sure that you have the strongest protection.

The post Coin Miner Investigation: When, Why, For What appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/coin-miner-investigation/feed/ 2 2038
New Times, New Threats: Adware.Amonetize investigation https://gridinsoft.com/blogs/new-times-new-threats-adware-amonetize-investigation/ https://gridinsoft.com/blogs/new-times-new-threats-adware-amonetize-investigation/#respond Fri, 13 Oct 2017 15:38:51 +0000 https://blog.gridinsoft.com/?p=1317 Lately, our Team faced with complaints about Adware.amonetize virus. It hits most of the countries of Europe, the biggest quantity of infections is in China, Azerbaijan, Iran, Italy, Turkey, Saudi Arabia and Indonesia. It doesn’t matter Internet Explorer, Firefox, Google Chrome, Safari or other browsers do you use: you will see ads anyway. We investigated… Continue reading New Times, New Threats: Adware.Amonetize investigation

The post New Times, New Threats: Adware.Amonetize investigation appeared first on Gridinsoft Blog.

]]>
Lately, our Team faced with complaints about Adware.amonetize virus. It hits most of the countries of Europe, the biggest quantity of infections is in China, Azerbaijan, Iran, Italy, Turkey, Saudi Arabia and Indonesia. It doesn’t matter Internet Explorer, Firefox, Google Chrome, Safari or other browsers do you use: you will see ads anyway. We investigated this virus and found that it spreads via a method we call bundling. It means that adware.amonetize sneaks into your system alongside with free software.

How adware.amonetize works?

So what are main symptoms of this adware? Ads, ads and once more ads. You will see disturbing pop-ups, annoying banners, redirects in your browser. It is not a secret that every virus was created to gain profit, adware.amonetize is one of them. It gets pay-per-click revenue, so that is why you see so many ads. Every click and redirects on the sponsored website are coins in the money box. What is more interesting, we’ve noticed that adware.amonetize collects personal information of its victims! Browsing history, emails, messengers, name, locations and even banking credentials can fall into the hands of hackers.

Where it is installed?

Our Analysts Team found out that Adware.Amonetize stored in %programfiles%, in a folder with a random name that contains 10 characters of the English alphabet + digits.
Examples:
% programfiles% \ 04gcs4ypv6 \ 04gcs4ypv.exe (check on Virus Total)
% programfiles% \ 0gp81q2mg5 \ d5wn9p9nf.exe (check on Virus Total)
% programfiles% \ 39rossub2g \ 39rossub2.exe (check on Virus Total)

Where it is installed?
Where it is installed?

These files are without a signature and add themselves to the startup list with random names:

“HKCU\Software\Microsoft\Windows\CurrentVersion\Run\UPCABJZUFTF7J48” >> “”%programfiles%\04gcs4ypv6\04gcs4ypv.exe””

“HKCU\Software\Microsoft\Windows\CurrentVersion\Run\9A00GNV8DAW655S” >> “”%programfiles%\39rossub2g\39rossub2.exe””

“HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ZXFX5IAHM64HROQ” >> “”%programfiles%\e0in79xcut\e0in79xcu.exe””

Adware.amonetize is a very tricky, as you may already notice. To hide files on the disc it use software from Nir Sofer – NirCmd (check on Virus Total).

Exe file under the name chipset.exe is in the folder with a random name from the letters + numbers in %appdata%, %localappdata%, %commonappdata% or %temp% and is written in the titles with the name GoogleUpdateSecurityTaskMachine_XX and Optimize Start Menu Cache Files-S-XX (XX stands for any uppercase character).

For example:
Task: “%system%\Tasks\GoogleUpdateSecurityTaskMachine_NL” >> “%localappdata%\Temp\02e22efae9e744b3a1fa6dae595a32e1\chipset.exe exec hide GBCWKWPKVU.cmd ”

Task: “%system%\Tasks\GoogleUpdateSecurityTaskMachine_OO” >> “%commonappdata%\5cd66b2d442541229cdaf3947384919f\chipset.exe exec hide EIUHMIJWVC.cmd “

Task: “%system%\Tasks\Optimize Start Menu Cache Files-S-GZ” >> “%appdata%\92dcc1e5f2854a97b66db725d3492ecf\chipset.exe exec hide IDGSTZEJUB.cmd “

Why is adware.amonetize dangerous?

As we already said, it collects your personal information. This reason should be enough to delete adware.amonetize ASAP. Also, it attracts other viruses to your pitiful system: malware, trojans, adware etc.

Get Adware.Amonetize closer

This is what 255335e18ca3b54c7872f31603de52d527da69c93b485c5aa1e70f2052192ac5.exe (Sx3qqqq.exe) looks like.

Loads the specified manifest resource from this assembly.

Take a look at this command more detailed.
Assembly assembly = Assembly.Load(Convert.FromBase64String(Encoding.Default.GetString(new TripleDESCryptoServiceProvider(). CreateDecryptor(Convert.FromBase64String(gr8AA.vferv58rv85rvrvrvergv),
Convert.FromBase64String(gr8AA.scsce8f7er)).TransformFinalBlock(inputBuffer, 0, inputBuffer.Length))));

To make understanding more easy lets disassemble in parts.


string st = Encoding.Default.GetString(new TripleDESCryptoServiceProvider().CreateDecryptor(KEY, IV).TransformFinalBlock(inputBuffer, 0, inputBuffer.Length));

It creates a symmetric TripleDES decryption object with the specified key (Key) and the initialization vector (IV). With the help of TransformFinalBlock it converts the previously read block of data from the manifest. At the end, it converts everything into a string. The result is an executable file.

How adware.amonetize slipped into your system?

As we already said the most popular way of spreading it is installing alongside with free software. We recommend to be careful and read Terms of Agreement before clicking on “Next” button in a hurry.

[contact-form]

The post New Times, New Threats: Adware.Amonetize investigation appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/new-times-new-threats-adware-amonetize-investigation/feed/ 0 1317
Microsoft Tech Support Scam Affiliate Program https://gridinsoft.com/blogs/microsoft-tech-support-scam-affiliate-program/ https://gridinsoft.com/blogs/microsoft-tech-support-scam-affiliate-program/#respond Wed, 01 Mar 2017 14:16:08 +0000 https://blog.gridinsoft.com/?p=119 The Microsoft Tech Support Scam has recently gained popularity as a new sector of cyber attacks. Scammers, masquerading as Microsoft Technical Support, pressure internet users into calling a supposedly toll-free phone number. Contrary to their claims, this number incurs significant charges, enabling fraudsters to profit from each call made. Responding to numerous claims from our… Continue reading Microsoft Tech Support Scam Affiliate Program

The post Microsoft Tech Support Scam Affiliate Program appeared first on Gridinsoft Blog.

]]>
The Microsoft Tech Support Scam has recently gained popularity as a new sector of cyber attacks. Scammers, masquerading as Microsoft Technical Support, pressure internet users into calling a supposedly toll-free phone number. Contrary to their claims, this number incurs significant charges, enabling fraudsters to profit from each call made.

Responding to numerous claims from our users about these cyber attacks, we have conducted a detailed investigation into this fraudulent scheme. In this post, we will answer the most frequently asked questions about Microsoft Tech Support scammers. Being forewarned is being forearmed! We encourage you to stay vigilant to the signs and protect your safety while browsing. Do not allow scammers to exploit your fears!

Microsoft Tech Support scam
Tech Support Scam landing page example

How Do Scammers Intimidate People?

Hackers employ various tactics to intimidate their victims, aiming primarily to profit. Fraudulent landing pages can switch to full-screen mode, disable main keys, and prevent the context menu from opening. Scammers can easily execute these actions using the following JavaScript code:

Toggle the full-screen mode
Toggle the full-screen mode
context menu is blocked
Code using for menu blocking
locked keys
Locking the main keys

Interestingly, fraudsters even integrate Google Analytics into their malicious web pages!

scammers google analytics
Google Analytics on scammers landings

The horrible text messages are not the only thing which scammers are using to terrify their victims. There are also threatening voice notifications played. Usually, they are stored here:

However, terrifying text messages are not the only tool scammers use to intimidate their victims. They also employ threatening voice notifications. Typically, these audio files, such as alert messages, are hosted at URLs like this:

MALICIOUS_URL/chrm/alert2.mp3

If you ever come across these scare tactics, remain calm and recognize that there is no real danger as long as you avoid calling the “free” phone number provided by the fake technical support team.

Microsoft Tech Support Scam: Scam-as-a-Service

The landing pages that our users unfortunately encountered are just the tip of the iceberg. In the world of cybercrime, Malware-as-a-Service has flourished for a long time. These newer scam techniques can aptly be termed Scam-as-a-Service.

On a recently discovered semi-private Russian underground forum, exploit.in, we came across a description of an affiliate program:

scam support
Scam support affiliate program

English translation:

The private affiliate program of the tech support hires new publishers. Our landing page aggressively convinces people to call on your unique phone number (free), and you get a commission from each call. The standard rate is $ 4.5 per call. For the major partners with good quality and volume, the tariff is discussed individually.

  • Always provide clean landings and domains.
  • Accept all browsers for the Windows desktop.
  • Accepted countries: US, CA
  • All subjects are suitable, the main thing was that the traffic was alive.
  • Handy admin panel with the instant statistics of calls and conversion.
  • The ability to make multiple streams and their conversion’s comparison.

Conversion, as elsewhere, depends on the traffic’s quality. If the quality is good, the popunder and the redirect bring from 2 to 5 calls from 1k unique visitors. The search and scrap bring up to 30 calls from the 1k unique visitors, depending on the subject and the audience. You’ll get your payments every day or O/R – BTC. The usual working time is from 19:00 to 02:00. But, it’s highly recommended to ask the support if it has changed each time before delivering the traffic.

As you can see from the description, the scheme is quite straightforward: the creators of the affiliate program provide publishers with domains, admin panels with statistics, and payments through BTC, which has become the standard currency in the cyber underworld. Publishers simply need to direct traffic to these affiliate domains and then wait for their profits.

Could Google Eliminate Microsoft Tech Support Scam Fraud?

Google can effectively mitigate such aggressive scams by adding fraudulent landing pages to its Google Safe Browsing filters. However, scammers are relentless. They frequently register a large number of similar domains with names that subtly reference Microsoft to perpetuate their schemes:

Popular malicious domain names
Scam domain list

It is important to remember that the lifespan of individual scam pages is usually very short. They should not cause undue alarm.

What Happens to Those Who Made the Call?

All scam pages involved in this scheme share the same phone number: +1-844-713-3460. We have collected typical user complaints about this number:

A message popped up on my computer: “Microsoft-error4113.xyz says: *** YOUR COMPUTER HAS BEEN BLOCKED ***” and it warned that personal information was being stolen, including my photos. It threatened to disable my computer within five minutes and provided this number to call. This is a SCAM! The signs include Microsoft spelled in lowercase, an error code that doesn’t align with legitimate ones, and the overt threat. When I researched this number on another reporting site, I found a person who mentioned that his mother had made the mistake of calling and allowing them remote access to her computer—they changed her passwords and hijacked it, demanding money to release it! BAD MOJO!!!

While using my computer, this number appeared with a message saying, “Critical Alert from Microsoft.” I called the number back, and the person on the line wanted access to my computer to ‘fix’ the problem, threatening to shut down my computer if I did not comply. We denied access. The error message linked to this number was Microsoft error 3111.xyz.

As the complaints suggest, the scammers’ objective is to coerce victims into granting them full access to their computers for further intimidation. You should never allow access to your system to anyone you don’t know, especially if they are performing these questionable activities independently.

Microsoft Tech Support Scam Affiliate Program

Conclusion

The Microsoft Tech Support Scam is a new, widespread scheme in the cybercrime world. Scammers capitalize on users’ fears by employing simple scare tactics, typically involving disabled keys, full-screen modes, and alarming audio messages. We hope this information convinces you to not give in to such threats. Such deceptive and rudimentary schemes do not deserve your attention or financial support!

The post Microsoft Tech Support Scam Affiliate Program appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/microsoft-tech-support-scam-affiliate-program/feed/ 0 119