Don’t panic and other tips for staying safe from scareware

September 30, 2024

For both individuals and enterprises, fear is quite a reasonable reaction to the discovery of a compromise. Malware on a computer can in fact do serious damage. However, the reaction of fear is itself an attack vector for certain threat actors, who take advantage of the fear of others through the technique known as scareware. Scareware is a social engineering method that gets around the need for complex malware as an initial infection vector, instead using the threat of it to convince a user that they have already been compromised, and to download an attacker-provided anti-virus tool that is itself malware.

Scareware usually comes from one of a few vectors, most of which are rather impersonal. The simplest vector is pop-up ads. These can be effective, especially when crafted to masquerade as an existing anti-virus software. Phishing emails and social media messages can work on the same principle. Perhaps the most dangerous form, and the most involved, is the tech support scam. Occasionally, users are called directly by a threat actor purporting to be a tech support representative, claiming that the user’s device is infected with some malware, and asking the user to download remote access software in order for them to allegedly fix the problem. They will then use this access to exfiltrate personal data and install malware on the target device.

Scareware, like many forms of social engineering, depends on people’s ignorance to be successful. In order to be resistant to it, the most important thing is to be aware that it exists, and to take note of the signs that show someone is trying to deceive you. Since it depends on creating a sense of urgency, anything that demands you act immediately should be considered suspect. Before installing any antivirus software, verify that it comes from a known and trusted source.

More from Blackwired

April 16, 2025

The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders

Precision-validated phishing targets specific emails, blocking others, evading detection and complicating traditional defenses.

Read more
April 9, 2025

Hunters International Dumps Ransomware, Goes Full-on Extortion

Ransomware groups shift to data privacy extortion as law enforcement and reduced profits make double-extortion less viable.

Read more
April 2, 2025

How SSL Misconfigurations Impact Your Attack Surface

SSL misconfigurations increase cyber risks. EASM platforms offer continuous monitoring to detect and address vulnerabilities effectively.

Read more