ScareWare By Aviral Srivastava

What Is A Scareware?


Scareware is malicious software that tricks computer users into visiting malware-infested websites. Also known as deception software, rogue scanner software or fraudware, scareware may come in the form of pop-ups.


How Is A Scareware Used?


Typically through pop-up ads from rogue security providers that may sound legitimate but are fake. For example, rogue scareware or fake software names to watch out for include Advanced Cleaner, System Defender, and Ultimate Cleaner.

Scareware ads, which pop up in front of open applications and browsers, aim to scare computer users into thinking they have a major problem with their device. The hackrs uses pop-up warnings to tell them their computer has been infected with dangerous viruses that could cause it to malfunction or crash. Some scareware ads also purport to be scanning the user’s device, then showing them hundreds of viruses that are supposedly present but are actually fake results. Typically, the more menacing or shocking an ad pop-up sounds, the more likely the claims being made are scareware.

Another key feature of scareware is urgency. Hackers attempt to convince users that the supposed device problem requires immediate action and then prompt them to install the program as quickly as possible. Therefore, always be careful with any ad that demands the user to act immediately. It is most likely scareware.


Man-in-middel Attack??

What Is A Man-In-The-Browser Attack? 


With a man-in-the-browser attack (MITB), an attacker needs a way to inject malicious software, or malware, into the victim’s computer or mobile device. One of the ways this can be achieved is by phishing.

Phishing is when a fraudster sends an email or text message to a user that appears to originate from trusted source, such as a bank, as in our original example. By clicking on a link or opening an attachment in the phishing message, the user can unwittingly load malware onto their device.

The malware then installs itself on the browser without the user’s knowledge. The malware records the data sent between the victim and specific targeted websites, such as financial institutions, and transmits it to the attacker.


How To Help Protect Against A Man-In-The-Middle Attack? 


With the amount of tools readily available to cybercriminals for carrying out man-in-the-middle attacks, it makes sense to take steps to help protect your devices, your data, and your connections. Here are just a few.

? Make sure “HTTPS” — with the S — is always in the URL bar of the websites you visit.

? Be wary of potential phishing emails from attackers asking you to update your password or any other login credentials. Instead of clicking on the link provided in the email, manually type the website address into your browser.

? Never connect to public Wi-Fi routers directly, if possible. A VPN encrypts your internet connection on public hotspots to protect the private data you send and receive while using public Wi-Fi, like passwords or credit card information.

? Since MITB attacks primarily use malware for execution, you should install a comprehensive internet security solution, such as Norton Security, on your computer. Always keep the security software up to date.

? Be sure that your home Wi-Fi network is secure. Update all of the default usernames and passwords on your home router and all connected devices to strong, unique passwords.


Aviral Srivastava

Create your website with
Get started