If your computer gets infected with a Trojan called the “MonaRonaDona virus,” be careful with what you use to wipe it off your computer, says antimalware software provider Kaspersky Lab. MonaRonaDona is part of an elaborate scam to sell fake antivirus software, Kaspersky researchers say.Unlike most viruses and Trojans which try to go about their evil task as invisibly as possible, the MonaDonaRona Trojan displays a broadly visibly message in front of the victim. It says, “Welcome to MonaRonaDona. I am a Virus & I am here to wreck your PC. If you observe strange behavior with your PC, like program Windows disappearing, etc., it’s me who’s doing this.” The message claims it’s all part of a human rights protest.But according to Kaspersky Lab researcher Roel Schouwenberg, MonaRonaDona is mainly a way to panic victims, who then may start a Web search to find out more about it, only to find fake online stories and bogus commentary that instruct victims to use fake antivirus tools — the prominent one being called Unigray, available from the Unigray.com Web site, for about US$39.00.“There was a link at Digg and at YouTube promoting it,” says Schouwenberg, who writes about it Monday in a Kaspersky Lab blog posting. While fake antivirus software scams have cropped up in the past, the MonaRonaDona scam may be unprecedented in terms of its reliance on social engineering in the online world to get victims to download software that removes the MonaRonaDona message but may still be in itself dangerous.As to how the MonaRonaDona Trojan manages to propagate, Kaspersky Lab sees a link with another piece of “fake” software called RegistryCleaner 2008. “We’re still researching this but it may be connected with this,” says Schouwenberg, who calls the MonaRonaDona Trojan of the past week to be among the most elaborately orchestrated scams he’s seen.The bottom line is to clean computers with software from valid antimalware vendors that can detect the bad code, he adds. (Compare Antivirus products.)By Ellen Messmer, Network World (US) Related content news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Advanced Persistent Threats Advanced Persistent Threats brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe