April 30, 2013Roy Tobin By Roy Tobin

Fake Microsoft Security Scam

Recently we have seen an increase in fake Microsoft scams, which function by tricking people into thinking that their PC is infected.  With these types of scams there are a number of things to remember.

1.       Microsoft will never call you telling you that your PC is infected
2.       Never allow strangers to connect to your PC
3.       Do not give any credit card info to somebody claiming to be from Microsoft
4.       If in doubt, shut down your PC and call Webroot

The current scam will display a webpage that is very similar to the one in Figure 1. There are a number of ways to figure out that this is a false alert. The first is that it’s a website message and not a program; the second is that location of the web site will be a random string of letters.

More details:

These websites will normally only stay active for 24-48hrs before they are pulled down. The websites’ primary function is to get you to run a “removal tool” called “security cleaner”. This file is the infection and, if ran, will infect the PC and start displaying pop-ups (like the one in Figure 2).


Figure 1: Fake Alert

At this stage, the PC is not infected so it’s safe to close the browser and ignore any alerts from the website. Noting the website that displayed the message is good idea as you can notify the webmaster (if it’s a legitimate website).

I have seen examples of this type of fake webpage being linked from advertising links. Using a browser that has a pop-up blocker will reduce the likelihood of encountering a bad advertising link. With scams like this, the most important way to stop getting infected is to be diligent when you’re online.

If a website asks you to run a file that you haven’t asked for, be extremely cautious. The same goes for emails (even from friends). Do not open executable files unless you are 100% sure they are good.


Figure 2: Fake AV Pop-up


The info below is only a guideline as the payload can change. However, it follows the same pattern of dropping a fake AV that stops you from opening most programs.

  • Drops a randomly named file in the current users folder (Fake AV payload)
  • Creates a service for the above file
  • Disables Windows Firewall or modifies the settings to allow the file full access to the PC
  • Creates a number of files in the windows recycler folder (usually Zero Access)
  • Flags any opened program as an infection (by modifying the open shell reg key)
  • Fake AV will then prompt the user to pay to remove the detected “infections”

Webroot Detection logs:
Infection detected:
c:usersownerappdatalocalmicrosoftwindowstemporary internet filescontent.ie5wckxi56gsecurity_cleaner[1].exe

MD5: 68D9F9C6741CCF4ED9F77EE0275ACDA9
Detection rate of the file 28/46 Vendors on Virus Total.

Registry Changes:
Below is an example of some of the changes. The first shows how it modifies the open shell command so when you open any file it will run the Fake AV. The second shows the security center notifications that are disabled.

HKLMSOFTWAREMicrosoftSecurity Center  AntiVirusDisableNotify   00000001
HKLMSOFTWAREMicrosoftSecurity Center  AntiVirusOverride   00000001

How to protect yourself from these scams:

There are a number of ways to ensure your PC is protected from these types of scams. The first step is simply being aware that these scams exist! Also, make sure to:

  • Use Webroot Secure Anywhere
  • Keep Windows updates turned on and set them to automatically update
  • Use a modern secure browser like Firefox  or Chrome
  • Update any 3rd party plugins (Java/Adobe Reader/Flash player)
  • Use an ad-blocker add-on in Firefox/Chrome

I have seen a number of infections that would have been prevented if Windows was up to date. Microsoft is constantly updating Windows to patch various security updates.


Webroot SecureAnywhere automatically blocks the installation of the infection so it won’t even run (Figure 3).  If the PC has no AV software installed, booting into Safe Mode with networking and installing Webroot Secure Anywhere will remove the threat.  Manually removing this threat is possible; however, there may be some system damage that will need to be repaired.

Webroot support is always available to help with removal and questions regarding this infection.  Please visit the Webroot support web site for more detail at: http://www.webroot.com/support/.


Figure 3: SecureAnywhere Removal



Share Button

11 Responses to Fake Microsoft Security Scam

  1. Pingback: Fake AV scammers impersonate MicrosoftInformation security & technology news

  2. Pingback: Estafadores suplantan el Antivirus de Microsoft

    • David,

      The best thing to do in this scenario would be to request a refund from the company that scammed you and then report them to the proper channels. If you believe you are infected, and use Webroot, you can reach out to our support team and we would be happy to take a look at this for you.

      Support Number: 1-866-612-4227
      Support Ticket: https://detail.webrootanywhere.com/servicewelcome.asp

    • Hello,

      We do not stop the webpage because that’s not a virus. We stop the infection that tries to load. In the blog post we even provide the MD5. Please see “Infection detected:
      c:usersownerappdatalocalmicrosoftwindowstemporary internet filescontent.ie5wckxi56gsecurity_cleaner[1].exe” Basically when you first see this you just close the browser then no other steps need to be taken. Using an ad blocker can also help to prevent these sort of popups.

  3. My wife’s computer said that it found malicious malware via Microsoft Windows , and said to fix call support team. When we did the guy said to enter http://www.support.me then he just hung up. The next time she called it was a guy named Neal, who told her to enter another site giving her access to her computer. He told her for $299 he could remove it via a store. My wife said she couldn’t pay and he knocked it down to $99 . She still could not pay , so somehow he made her computer work again. Was he a scammer , and should she reset her pc? I have a bad feeling she almost got scammed , and he may have screwed with her harddrive . Any help on this wether good or bad would be helpful , thank you.

    • Hi, Robert. I can understand your concern after letting an unknown individual into your computer. Typically they don’t do anything to harm your information or files. In my experience (coming from Technical Support), they mostly just leave a notepad document on the Desktop with their contact info, and sometimes they also leave the Remote Software they used to “assist” customers (GoToAssist, LogMeIn, etc).

      The messages prompting you to contact “Microsoft” are illegitimate and could be caused by software on your System potentially. If you reach out to our Technical Support team directly, they can remotely check out your Computer, as sometimes having your Peace of Mind is the most important thing 🙂

      Support Number: 1-866-612-4227 M-F 7am−6pm MT
      Send us a Support Ticket: https://detail.webrootanywhere.com/servicewelcome.asp

      Warm Regards,
      Josh P.
      Webroot Community Support

Leave a Reply

Your email address will not be published. Required fields are marked *