|Back to Back Issues Page
Watch For Scams Newsletter. Beta Bot malware blocks users anti-virus programs
October 10, 2013
Beta Bot Malware Blocks Users Anti-virus Programs
Watch For Scams is dedicated to helping you avoid becoming a victim of fraud.
If you like this ezine, do a friend a big favor and forward this to them. If a friend forwarded this to you, and if you like what you read, please subscribe by visiting the link below:
Beta Bot Malware Blocks Users Anti-virus ProgramsThere is a new type of malware known as Beta Bot. Cyber criminals use Beta Bot to target financial institutions, e-commerce sites, online payment platforms, and social networking sites to steal sensitive data such as log-in credentials and financial information.
Beta Bot blocks computer users’ access to security websites and disables anti-virus programs, leaving computers vulnerable to compromise.
Beta Bot infection routes include a fake but official looking Microsoft Windows message box named “User Account Control” that requests a user’s permission to allow the “Windows Command Processor” to modify the user’s computer settings (see an image of this by logging in to our website and looking under the 'Scam Alerts' section).
If the user complies with the request, the hackers are able to extract data from the computer. Beta Bot is also spread via USB thumb drives or online via Skype, where it redirects the user to compromised websites.
Although Beta Box masquerades as the “User Account Control” message box, it is also able to perform modifications to a user’s computer. If the above pop-up message or a similar prompt appears on your computer and you did not request it or are not making modifications to your system’s configuration, do not authorize “Windows Command Processor” to make any changes.
To remove the Beta Bot infection run a full system scan with up-to-date anti-virus software on the infected computer. If Beta Bot blocks access to security sites, download the latest anti-virus updates or a whole new anti-virus program onto an uninfected computer, save it to a USB drive and load and run it on the infected computer.
It is advisable to subsequently re-format the USB drive to remove any traces of the malware.
If you believe you have been a victim of this type of scam you should promptly report it to the IC3's website at www.IC3.gov. The IC3's complaint database links complaints together to refer them to the appropriate law enforcement agency for case consideration.
Remember - always watch for scams!
|Back to Back Issues Page