{"id":2817,"date":"2011-05-27T10:22:14","date_gmt":"2011-05-27T17:22:14","guid":{"rendered":"http:\/\/blog.intego.com\/?p=2817"},"modified":"2016-02-12T09:53:31","modified_gmt":"2016-02-12T17:53:31","slug":"whos-behind-the-fake-antiviruses-targeting-mac-users","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/","title":{"rendered":"Who&#8217;s Behind the Fake Antiviruses Targeting Mac Users?"},"content":{"rendered":"<p>With yet <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-new-mac-defender-variant-macguard-doesnt-require-password-for-installation\/\">another version of the Mac Defender fake antivirus discovered<\/a>, one may wonder who is behind this rash of attacks targeting Mac users. <\/p>\n<p>Microsoft <a href=\"http:\/\/blogs.technet.com\/b\/mmpc\/archive\/2011\/05\/17\/winwebsec-gang-responsible-for-fakemacdef.aspx\">published an analysis of the malware and the URLs it uses<\/a> and suggests it is created by the &#8220;Winwebsec&#8221; gang. The noted the similarity between web pages used to collect credit card numbers. And, they also said, <\/p>\n<blockquote><p>\nIn addition to using similar UIs, we noticed that they even share the same payment gateway (this is the site where users are duped into giving the criminals their credit card information). Simply changing the file name from &#8220;buy.php&#8221; to &#8220;mac.php&#8221; causes the &#8216;branding&#8217; to change from the Windows version to the Mac version&#8230;\n<\/p><\/blockquote>\n<p>Journalist Brian Krebs, in <a href=\"http:\/\/krebsonsecurity.com\/2011\/05\/chronopay-fueling-mac-scareware-scams\/\">an article on his Krebs on Security blog<\/a>, claims that ChronoPay, &#8220;Russia\u2019s largest online payment processor and something of a pioneer in the rogue anti-virus business,&#8221; is involved in this scamware. He examined domain name registrations, and traced them back to ChronoPay, noting that this company was the &#8220;core processor for trafficconverter.biz, the rogue anti-virus affiliate program that was designed to be the beneficiary of the first strain of the Conficker worm, a menacing contagion that still infects millions of PCs worldwide.&#8221; In addition, this company seems to be behind &#8220;a scam site that targeted filesharing users and stole victims\u2019 money by bullying them into paying a &#8216;pre-trial settlement&#8217; to cover a &#8216;Copyright holder fine.'&#8221; <\/p>\n<p>As we have often pointed out, malware is not written by script kiddies looking to see how many computers they can infect just for fun, but by efficient criminal organizations creating malware with the express goal of scamming people. While more information may be found linking specific companies to such malware, they remain hard to prosecute. <\/p>\n<div class=\"blog-download\">\n<p class=\"button\"><a href=\"https:\/\/www.intego.com\/demo?blog2\">Download 30-day free trial<\/a><\/p>\n<h4><a href=\"https:\/\/www.intego.com\/demo?blog2\">Protect your Mac from malware<\/a><\/h4>\n<p><a href=\"https:\/\/www.intego.com\/demo?blog2\">Download a free 30-day trial version of VirusBarrier X6 and save $5<\/a><\/p>\n<div class=\"clear\"><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Investigations suggest that the people behind the recent spate of fake antiviruses targeting Mac users are the same who have been running similar scams against Windows users for years.<\/p>\n","protected":false},"author":3,"featured_media":2784,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[54,86],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Investigations suggest that the people behind the recent spate of fake antiviruses targeting Mac users are the same who have been running similar scams against Windows users for years.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Who&#039;s Behind the Fake Antiviruses Targeting Mac Users? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Investigations suggest that the people behind the recent spate of fake antiviruses targeting Mac users are the same who have been running similar scams against Windows users for years.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2011-05-27T17:22:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T17:53:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/05\/malware-icon.png\" \/>\n\t<meta property=\"og:image:width\" content=\"128\" \/>\n\t<meta property=\"og:image:height\" content=\"128\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/05\/malware-icon.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/05\/malware-icon.png\",\"width\":\"128\",\"height\":\"128\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/\",\"name\":\"Who's Behind the Fake Antiviruses Targeting Mac Users? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/#primaryimage\"},\"datePublished\":\"2011-05-27T17:22:14+00:00\",\"dateModified\":\"2016-02-12T17:53:31+00:00\",\"description\":\"Investigations suggest that the people behind the recent spate of fake antiviruses targeting Mac users are the same who have been running similar scams against Windows users for years.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Who&#8217;s Behind the Fake Antiviruses Targeting Mac Users?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Who&#8217;s Behind the Fake Antiviruses Targeting Mac Users?\",\"datePublished\":\"2011-05-27T17:22:14+00:00\",\"dateModified\":\"2016-02-12T17:53:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/#webpage\"},\"wordCount\":324,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/05\/malware-icon.png\",\"keywords\":[\"Fake Antivirus\",\"Malware\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Investigations suggest that the people behind the recent spate of fake antiviruses targeting Mac users are the same who have been running similar scams against Windows users for years.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/","og_locale":"en_US","og_type":"article","og_title":"Who's Behind the Fake Antiviruses Targeting Mac Users? - The Mac Security Blog","og_description":"Investigations suggest that the people behind the recent spate of fake antiviruses targeting Mac users are the same who have been running similar scams against Windows users for years.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/","og_site_name":"The Mac Security Blog","article_published_time":"2011-05-27T17:22:14+00:00","article_modified_time":"2016-02-12T17:53:31+00:00","og_image":[{"width":"128","height":"128","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/05\/malware-icon.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/05\/malware-icon.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/05\/malware-icon.png","width":"128","height":"128"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/","name":"Who's Behind the Fake Antiviruses Targeting Mac Users? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/#primaryimage"},"datePublished":"2011-05-27T17:22:14+00:00","dateModified":"2016-02-12T17:53:31+00:00","description":"Investigations suggest that the people behind the recent spate of fake antiviruses targeting Mac users are the same who have been running similar scams against Windows users for years.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Who&#8217;s Behind the Fake Antiviruses Targeting Mac Users?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Who&#8217;s Behind the Fake Antiviruses Targeting Mac Users?","datePublished":"2011-05-27T17:22:14+00:00","dateModified":"2016-02-12T17:53:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/#webpage"},"wordCount":324,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/05\/malware-icon.png","keywords":["Fake Antivirus","Malware"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/whos-behind-the-fake-antiviruses-targeting-mac-users\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/05\/malware-icon.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-Jr","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2817"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=2817"}],"version-history":[{"count":2,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2817\/revisions"}],"predecessor-version":[{"id":50077,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2817\/revisions\/50077"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/2784"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=2817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=2817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=2817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}