marți, 13 aprilie 2010

Windows7 – How to Install MS Security Essentials – and Warning: Watch for ScareWare

Microsoft Security Essentials  is a free download available from Microsoft; it installs easily, it can be used without training, and it is kept up to date with the latest definitions available. Once you installed it and run your scan the software will tell you if you are secure or not.

Microsoft Security Essentials runs in the background while you are using your Windows PC without interruptions or long computer wait times. Here are the steps necessary to bring it on line.

Once you have downloaded the program, run the setup program.

The Welcome Screen

[2]

View and Accept the License Agreement

[3]

An Important Step: Validate Your Windows Copy

[4]

The Passed Validation Screen Notice

[5]

The Software is Now Ready To Install

[6]

Installation Status

[7]

Completing The Installation Process

[8]

A Status Review is Performed to Identify the Security Status of the PC

[9]

When the Scan is Complete the Security Status is Upgraded to Secure

[10]

Settings Can Be Modified

ScareWare

Microsoft has identified a rogue piece of scareware that claims to be the Official Security Essentials suite. The rogue anti-malware client that sits on your screen lists a collection of infections. To remove them, it asks the user to pay a small fee to obtain the “fullly functioing” non-trial version of Security Essentials. Remember Security Essentials is FREE

Here is what the “Security Essentials” screen looks like. Remember this is malware!

Rogue Security Essentials

1

Trial Version

What does Security Essentials 2010 do?

The Malware program, Security Essentials 2010, is the Trojan:Win32/Fakeinit, that infects Windows PCs, and, on the contrary it does not remove malware. In fact it truly is scareware because it not only installs the fake scanner component, then it also monitors other running processes and it attempts to terminate the ones it doesn’t like. So your malware prevention programs could be turned off.

  • It changes the registry by lowering a number of security settings.
  • It displays an disturbing message and changes the desktop background.
  • It attempts to lock in this desktop background by modifing the registry.
  • It also downloads and installs a Win32/Alureon component, (Win32/Alureon is a family of data-stealing trojans. They intercept incoming and outgoing Web traffic in order to steal personal data such as user names, passwords, and credit card data.)
  • It downloads a Layered Service Provider (LSP) element, also part of the Trojan:Win32/Fakeinit trojan. This LSP monitors the Internet traffic used by various Web browsers that might have installed, and blocks traffic to certain domains. It also blocks access to a number of popular video websites, which includes Facebook, eBay, and YouTube, amont others.

This program is ingenious because it pretends to be a legitimate Microsoft product. It does several things; it warns you of infections, it installs trojans, it collects personal information, it blocks Internet access to certain websites, and it asks for money to remove the infections. If you run the scan, or launch the program in any way, it infects your PC. In fact, the infection comes at the instigation of the user. So even if you do pay the fee for the “full-version” to keep the infection from occurring it will infect your computer anyway, and it will not remove the infections that you have on your computer. For that, you will have to get a malware removal program.

Source: MicroSoft Security Essentials

Source: Microsoft Malware Protection Center