![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4JqE05W9vj7qT99N4R5n_AVTbcG9pY_qf4SDydAWftngO8XN6KxTpli5YchY6V0rFWcYE4x4Yw7GW6M1Tz19XoIippLfhsVyMd1aV1z6YhRhvDapFKuPDHmjMto8UfY4RDqEsokVlxLg/s400/PeakProtection2010_GUI.jpg)
One way (there may be others) that Peak Protection 2010 is delivered is through a phony “Microsoft Security Essentials Alert” which is displayed by a Trojan.
Basically, it mimics the idea of VirusTotal, (http://www.virustotal.com/ ) a site which enables you to see how 40 legitimate security companies identify a sample of malicious code that you submit.
The downloader copies itself into multiple folders under different names. After five to 15 minutes it generates a fake alert pop-up window:
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtahEr5CbDjxSlaEbK_gZHjDcyyNgb-5RpGfNbUMzlnHtAK56OBgAgraypppV-73xS5XaDSJrAlqJgDQdj7YG2ZC43o5Il5EjmV2OGKDUijpDYFYSvhFBNuCQnt7oVBtjHVYZkq_uJgXQ/s400/MicrosoftSecurityEssentialsAlert_FakeAlert.jpg)
If you click ANY of the four buttons on the scary “Potential threat details” screen, it takes you to a web site that shows you how different anti-malware products allegedly identify the malware that is (not really) on your computer. It includes a long list of legitimate ones, which, oddly enough find no infection on your machine.
However, the display shows that some of them -- all of which are rogues -- have identified malicious files. They have a “free install” button listed next to their names. Clicking on the buttons installs the rogues.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWyCvj3Nx8ED7-10gibbmQsQjwSGX6zLE5M07TvxTWc7yYHwmJr-sQzF1TSjg8ROEKqS6BWr38TS6iZGkIQxk9Asau1Dy9-qpfRzWf6qDeLB0psbsngmw-EK6c8fZtzdzJN0H0lICPojQ/s400/PeakProtection_1.jpg)
To Remove Peak Protection:
If Peak Protection 2010 has infected your PC, you should remove it immediately. Click here to use VIPRE to remove Peak Protection 2010 from your computer now.
No comments:
Post a Comment