Scareware Tops Security Threats List

"Some situations and some programs do nothing but scare people and use an exploit to get on a screen and present an alert to users," says Jimmy Kuo, principle architect at the Microsoft Malware Protection Center and principle researcher of the study. “It usually does nothing; it takes advantage of name squatting and lands you […]

Written By: Lawrence Walsh
Apr 8, 2009
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

"Some situations and some programs do nothing but scare people and use an exploit to get on a screen and present an alert to users," says Jimmy Kuo, principle architect at the Microsoft Malware Protection Center and principle researcher of the study. “It usually does nothing; it takes advantage of name squatting and lands you on a page.”

Many states attorneys general have moved against rogue software distributors in their jurisdictions; the Microsoft study shows that the tactic for duping unwitting users into shelling out money—typically with credit cards—is increasing rapidly. In December, the Federal Trade Commission blocked the operations of Innovative Marketing and ByteHosting Internet Services for engaging in deceptive tactics to sell useless anti-virus applications.

More disturbing but not an immediate threat is the residual code left on a machine by the scareware distributor. Microsoft says rogue software distributors often use a downloader application to deliver their scareware. The downloader, Win32/Renos, is a kin to a Trojan that could enable the scareware distributors to return with malicious payloads at a future date.

"Renos has the ability to do other things, so people had better beware," Kuo says. "When rogue security software loses its allure, the distributors will look to use Renos in other ways."

Kuo believes rogue security software will remain a serious threat through 2009 before enough public awareness forces distributors to change their tactics.

When scareware distributors change tactics, they could find the crop of vulnerable machines ripe for exploitation. The Microsoft study found that 91.3 percent of the attacks against Microsoft Office were for a single vulnerability that was patched more than two years ago. The volume and severity of the attack shows systems—particularly among consumers and non-business users—are not being updated and patched consistently.

Kuo says the Microsoft Security Intelligence Report data also shows that home users are far more vulnerable to adware and software droppers, while corporate environments are more susceptible to worms and self-replicating malware. Security experts agreed that the recent Conficker worm presented a serious threat to business environments because the malware thrived in networked environments, but didn’t pose as serious a threat to individual PCs used by consumers.

Small and midsize businesses are at serious risk to malware, according to a separate report released by Symantec today. According to Symantec’s study, one-third of SMB organizations globally do not have any anti-virus applications running on their PCs and networks, and one in four have no anti-spam or server backup and recovery applications.

"There’s a lack of understanding of the consequences," says Kevin Murray, senior director of security marketing at Symantec. "The data is at risk, but it comes back to they don’t have the training to do [security] right."

The Microsoft and Symantec security studies concur on the types of breaches affecting users. According to the Microsoft report, stolen equipment, hackers, and advance breaches and lost equipment top the lists of breaches. Symantec’s breach list was led by system failures, lost or stolen equipment and human error.

"It looks like a great opportunity for a VAR to come in and help businesses be aware and stay on top of their security," says Murray.

Recommended for you...

Concentric AI Adds Integrations to Data Governance Platform

Concentric AI adds Wiz, Salesforce, and GitHub integrations to boost Semantic Intelligence platform’s AI-driven data governance and security capabilities.

Jordan Smith
Aug 15, 2025
Brivo Launching New Solution to Boost Security Suite

Brivo and Envoy partner to unify access control & visitor management, delivering scalable, compliant, and secure workplace experiences.

Jordan Smith
Aug 13, 2025
GitHub CEO Steps Down as Microsoft Tightens AI Integration

GitHub CEO Thomas Dohmke to step down in 2025 as Microsoft moves platform into CoreAI, deepening its role in the company’s AI development strategy.

Allison Francis
Aug 13, 2025
Backblaze CEO on GTM Strategy & AI Demand on M&E Datasets

Backblaze CEO on record growth, AI and M&E wins, and how new products and partnerships are driving enterprise cloud storage adoption.

Jordan Smith
Aug 13, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.