Redirect and HTML Security Essentials clone...

GZ

Visiting Expert
Joined
Apr 8, 2012
Posts
1,304
Location
New Jersey
I was just hit by a redirect... I was not fooled by it for two reasons... One, I am at work and we use Endpoint... Two, it didn't act like MSE.

Either way, it is convincing enough that many people would be fooled into infecting their computers.

I was browsing images with Google when I clicked on one of the photos, that is when the redirect hit.

Untitled.png

Just a heads up. I doubt it is new, but hey... Who knows. This is the first time I have seen it.
 
That is the way the rogues operate. Please note, however, that clicking the OK or X to close is the same as giving approval to install. The only way to avoid that is via Task Manager or the keyboard combination ALT+F4. There are times when it is necessary to repeat ALT+F4 to close all of the windows.
 
Don't worry... I'm all good here... I used Task Manager to kill iexplore.exe then ran Endpoint to be sure.

I uploaded the photo... Perhaps one of us can use it in a "How to identify Rogues" type article.
 
Yes recognizing spoof software is very important, but difficult for the vast majority and unfortunately they're only likely to read our help after the damage is done.

It's a two-pronged issue as recognizing and dealing with rogue software are fairly different approaches.
 
ProcExp was written & is maintained by Mark Russinovich, Microsoft TechNet.
 
But our friend Mark Russinovich has not made it standard in Windows operating systems, instead of the task manager that we have now, which is what I was trying to say.
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top