TY - GEN
T1 - Gone rogue: An analysis of rogue security software campaigns
AU - Cova, Marco
AU - Leita, Corrado
AU - Thonnard, Olivier
AU - Keromytis, Angelos
AU - Dacier, Marc
N1 - Generated from Scopus record by KAUST IRTS on 2022-09-12
PY - 2009/1/1
Y1 - 2009/1/1
N2 - In the past few years, Internet miscreants have developed a number of techniques to defraud and make a hefty profit out of their unsuspecting victims. A troubling, recent example of this trend is cybercriminals distributing rogue security software, that is malicious programs that, by pretending to be legitimate security tools (e.g., anti-virus or anti-spyware), deceive users into paying a substantial amount of money in exchange for little or no protection. While the technical and economical aspects of rogue security software (e.g., its distribution and monetization mechanisms) are relatively well-understood, much less is known about the campaigns through which this type of malware is distributed, that is what are the underlying techniques and coordinated efforts employed by cyber-criminals to spread their malware. In this paper, we present the techniques we used to analyze rogue security software campaigns, with an emphasis on the infrastructure employed in the campaign and the life-cycle of the clients that they infect. © 2009 IEEE.
AB - In the past few years, Internet miscreants have developed a number of techniques to defraud and make a hefty profit out of their unsuspecting victims. A troubling, recent example of this trend is cybercriminals distributing rogue security software, that is malicious programs that, by pretending to be legitimate security tools (e.g., anti-virus or anti-spyware), deceive users into paying a substantial amount of money in exchange for little or no protection. While the technical and economical aspects of rogue security software (e.g., its distribution and monetization mechanisms) are relatively well-understood, much less is known about the campaigns through which this type of malware is distributed, that is what are the underlying techniques and coordinated efforts employed by cyber-criminals to spread their malware. In this paper, we present the techniques we used to analyze rogue security software campaigns, with an emphasis on the infrastructure employed in the campaign and the life-cycle of the clients that they infect. © 2009 IEEE.
UR - http://ieeexplore.ieee.org/document/5494349/
UR - http://www.scopus.com/inward/record.url?scp=84869753428&partnerID=8YFLogxK
U2 - 10.1109/EC2ND.2009.8
DO - 10.1109/EC2ND.2009.8
M3 - Conference contribution
SN - 9780769539836
SP - 1
EP - 3
BT - EC2ND 2009 - European Conference on Computer Network Defense
PB - IEEE Computer [email protected]
ER -