New versions are still coming out, but distribution is not as aggressive anymore The frequency of attacks that distribute fake antivirus software, a long-time pillar of the underground economy, has decreased considerably in recent months. However, security researchers warn that the industry is not yet dead and new versions of attacks continue to be released.According to a new report from antivirus vendor Kaspersky Lab, the rate of fake antivirus attacks in June was somewhere between 50,000 and 60,000 per day, but their frequency has dropped to under 10,000 a day.The impressive drop is the result of several factors, including law enforcement efforts, improvements in search engine filtering algorithms, and actions undertaken by the security community to disrupt cybercriminal distribution networks.“This decline is related to some good job done by the law enforcement and security industry in this field, shutting down some of the networks they were using,” said Luis Corrons, technical director of Panda Security’s threat research laboratory. His opinion is shared by Sean Sullivan, a senior security advisor at Finnish antivirus vendor F-Secure. “They were shut down and an investigation was launched,” he said referring to recent international law enforcement actions that targeted major scareware operations.Back in June, authorities in Russia arrested Pavel Vrublevsky, the co-founder of Russian payment processor ChronoPay, who has long been suspected of running one of the biggest fake antivirus affiliate programs. At around the same time, authorities in the U.S., Ukraine and several other countries seized computer servers and other equipment used for scareware distribution, some believed to be linked to the infamous Conficker worm.However, according to Bogdan Botezatu, a researcher with antivirus company BitDefender, this is not the only reason for the changes seen on the scareware market. “The decline in Fake AV attacks is probably related to the fact that search engines have improved their filtering algorithms in order to prevent poisoned search results from showing on top,” he said.“We have been closely monitoring this issue in intervals where specific searches spiked (such as the death of Gaddafi or the alleged death or President Barrack Obama) and we didn’t see any attacks involving rogue AV,” the researcher added.Black hat search engine optimization (BHSEO), or search-result poisoning attacks, leverage the page rank of legitimate, but compromised, websites to push malicious links at the top of search results. This has been one of the primary methods of getting users to fake antivirus websites for a long time.Botezatu believes that some scareware gangs have already moved to something else, like the Facebook survey scams, which require less investment and are easier to maintain. However, Botezatu and Corrons agree that this fortunate turn of events is only temporary.In fact, Kaspersky Lab’s Vyacheslav Zakorzhevsky warns that new scareware variants and even new affiliate programs have already appeared. “New versions of this type of malware continue to emerge. […] We discovered an affiliate program called ‘Money Racing AV’,” he announced Thursday in a post on the company’s blog. Even if the risk of encountering such threats is now lower and the methods of distribution are limited, users should continue to scrutinize unexpected security alerts for legitimacy. “Don’t pay for any solution arriving unannounced over the Internet and make sure you install a genuine security product,” Zakorzhevsky stressed. Related content news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe