AV Security Suite
It is proposed that this article be deleted because of the following concern:
If you can address this concern by improving, copyediting, sourcing, renaming, or merging the page, please edit this page and do so. You may remove this message if you improve the article or otherwise object to deletion for any reason. Although not required, you are encouraged to explain why you object to the deletion, either in your edit summary or on the talk page. If this template is removed, do not replace it. The article may be deleted if this message remains in place for seven days, i.e., after 14:35, 4 May 2024 (UTC). Find sources: "AV Security Suite" – news · newspapers · books · scholar · JSTOR Nominator: Please consider notifying the author/project: {{subst:proposed deletion notify|AV Security Suite|concern=Run-of-the-mill malware with no evidence of notability}} ~~~~ |
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)
|
AV Security Suite is a type of rogue security software, commonly categorized as scareware and malware, which masquerades as a legitimate virus scanner on the victim's Microsoft Windows system. While it is predominantly observed on Windows platforms, it may adopt alternative names on other operating systems to better integrate itself within their interfaces, thereby enhancing its deceptive nature. In the task manager, the program typically appears as a series of seemingly random characters followed by identifiers such as "tssd.exe" or "shdw.exe," a tactic aimed at complicating detection and removal efforts.
Methods[edit]
Upon infiltrating a target system, AV Security Suite initiates its deceptive maneuvers by issuing simulated virus alerts through pop-up windows emerging from the taskbar's rightmost section. These notifications adopt a guise akin to genuine Windows alerts, potentially misleading users unfamiliar with Windows' native virus reporting style, particularly that of Windows Defender. Presenting the outcomes of a fictitious virus scan under its own moniker, AV Security Suite dupes users into believing their system is riddled with infections. Employing an array of messages, some mimicking Windows and others utilizing its actual name, the software coerces users to upgrade to its full version purportedly for virus removal. Subsequently, it fabricates the presence of unspecified viruses through actions like obstructing program execution, including access to Windows Task Manager,[1] and impeding internet connectivity. Effectively rendering the system nearly inoperable, AV Security Suite operates under the guise of an antivirus program, evading classification as a virus by conventional antivirus or antispyware utilities.
Infection[edit]
AV Security Suite can infect computers using Adobe Flash or other Adobe components found in regular websites, and so does not require a voluntary download of software by the user. It has also been known to attack using Java software. There are currently no effective tools available to remove it, though some that claim to be able to do so are questionable in authenticity. Very few virus scanners are capable of detecting and removing the program. Norton and AVG Free Edition have been reported not to detect it. The paid edition of Malwarebytes' Anti-Malware has detected and removed it while the system is in safe mode, however, a few months later the messages and program had come up again. While an operating system is infected, the malware will notify the user of infected system files and change the proxy server settings of the user's web browser so that the user will be under the false perception of no longer having Internet access. In addition, two websites that were not manufactured by the company will spontaneously pop up on the user's computer. One of these websites is for the erectile dysfunction drug Viagra, and the other is a pornographic website. Users are advised to dispose of the AV Security Suite virus immediately after their computer becomes infected, as the virus is possibly dangerous for younger users.
Developers[edit]
An analysis of the virus' graphical user interface, actions (dropping malware that attempts to send users to the same exact adult websites), and method of infection reveals it is likely that this piece of malware was developed or at least inspired by the same group which developed the fraudulent Antivirus System PRO, Antispyware Soft, Antivirus Center and Antivirus Live along with a number of other rogue antivirus applications. The claim on AV Security Suite's website however states that the developers of the program are based in London.