YOU’RE NOT VIEWING PANDA SECURITY USA. CLICK TO IMPROVE YOUR EXPERIENCE
VISIT PANDA SECURITY USA

Hello!

You’re about to visit our web page in English
Would you like to continue?

Yes, I want to visit the web page in English No, I want to visit the web page in

If this is not what you’re looking for,

Visit our Welcome Page!

x
48-HOUR OFFER
50%
RENEWALS
Home users only
RENEW AT A DISCOUNT
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET 50% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET 50% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET 50% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET 50% OFF
x
UP TO
-60%
BUY NOW
x
UP TO
-60%
BUY NOW
$ 70.99|https://store.pandasecurity.com/300/purl-dome-y?currencies=USS&x-track=55499&cart=iA01YPDA0S01&language=en&quantity=1&enablecoupon=false&coupon=1STMOFFPD&x-coupon=1STMOFFPD&x-market=usa&x-track=190884|$ 53.24|$;PREFIX;.;,;70;99;53;24

What is rogueware?

The term rogueware, rogue software, or rogue security software, refers to a form of malicious software that misleads users into believing there is a virus on their computer. Next, they demand money in exchange for providing a fake malware removal tool, which actually introduces malware to the computer.

Rogueware can be considered a form of ransomware and is often linked to large cybercrime networks, in which hackers distribute Trojan kits and are paid a fee for every successful installation.

Infection vectors

Rogue software exploits human errors and manipulation to bypass security measures. When the victim visits a specially crafted website, a dialog box is displayed warning them of a virus infection and offering a (fake) antivirus solution to resolve the problem. This aims to alarm the victim and elicit a hasty, careless response from them: purchasing the solution.

Some malware distributors use black hat search engine optimization (SEO) techniques to push infected URLs to the top of search engine results about recent news events. In those cases, if the victim clicks a malicious URL, they are redirected through a series of sites before arriving at a landing page that says that their machine is infected and pushes a download to a "trial" of the rogue program.

Some rogue security software, however, propagate onto users' computers as drive-by downloads which exploit security vulnerabilities in Web browsers, PDF viewers, or email clients.

Cold-calling through services such as Skype has also become a vector for distribution of this type of malware, with callers often claiming to be from "Microsoft Support" or another legitimate organization.

How rogueware works

Once installed, rogue security software may attempt to entice the user into purchasing a service or additional software by:

  • Alerting the user with the fake or simulated detection of malware or pornography on their computer's hard drive or IP address.
  • Displaying a message simulating a system crash and reboot.
  • Selectively disabling parts of the system to prevent the user from uninstalling the malware or to ensure it is immediately reinstalled.
  • Some rogueware variants may also prevent anti-malware programs from running and disable automatic system software updates.

Desktop pop-ups or pop-unders are no longer a regular feature of operating systems. If pop-ups appear even when the user is not active on the computer, that’s a definite red flag.

Rogueware and scareware

Some rogue security software overlaps in function with scareware or ransomware by presenting offers to fix urgent performance problems or perform essential housekeeping on the computer, as well as scaring the user by presenting authentic-looking pop-up warnings which may mimic actual system notices.

NEXT-GENERATION ANTIVIRUS

PANDA DOME

Keep all your devices safe with Panda Dome antivirus and anti-malware.

Subscribe now and secure an unlimited* number of devices: from laptops to smartphones, tablets and smartwatches.

Protect yourself with Panda Security