Skype Malware Now Attacks Apple?
Chat Message Scares Reader Into Installing Malware
Surprise! Today I was reminded that criminals are once again using Skype to send phishing “chats” in an attempt to defraud you and trick you into installing a virus. So, I am – again – re-posting this article. It is the exact same ruse I first warned of in early 2008, but (again) the name has changed, as well as a few other details…. see if you can spot them.
Today a Skype chat window opened on my machine, and presented me with a dire warning from someone named “Software Update”, “Registry Scan Online®”, “OnlineUpdate.org”, “OnlineRegistry®” Today’s flavor (I think it was “Update Instructions”..).
It said that “WINDOWS SYSTEM REQUIRES IMMEDIATE ATTENTION” and, it provided me with a solution… a “repair utility”.
Please, folks, tell me you have spotted this for what it is. Please tell me that you knew –instantly– that this is a cybercrime attempt; that it is Phraud-ulent. (I mean.. there are clues aplenty!)
Please tell me that you know what will happen if the link provided in this message is clicked; and, please, please, please tell me you would never click the link.
This “hacker” criminal attack will reappear every so often (roughly every 90 30 days) with a slightly different name and URL… It is a classic scareware attack. They just send these chats to all the Skype users whose name starts with A.. then to the B’s, then C’s.. etc.
Just in case you aren’t sure:
* “Software Update”, “Registry Scan Online ®”, Today’s flavor, doesn’t exist.
* “http://www.onlinemonitor.info”, “http://www.registryscan.com”, Today’s flavor, is not registered in ARIN (the registry of Internet addresses).
* clicking the link will allow scripts to run, and/or take you to a poisoned Website which will install malware on your machine, or/and it may take you to a site that will sell you a rogue anti-spyware program (please read my article, Is that antispyware program really spyware?).
* Microsoft DOES NOT alert you via Instant Messaging. No legitimate company does. Period. Ever!
This is a classic example of a hacker’s attempt to get you to click their link.
All of this so they can rip you off. It’s these cyber-criminal’s full time job.
Please point your less-savvy friends and family to this article and educate them to the dangers of spam (unsolicited) messages and tell them– NEVER CLICK THE LINK. (Yes, I am shouting. 2010 is days away 2011 is here, and I still have to say this everyday.. Sigh.)
Note: while this article directly references the (VoIP client) Skype, you may see this type of thing in other Instant Messaging/Chat programs, and social networking communications.
[addenda: Peter Parkes (Skype Blogger) wrote and asked me to remind my readers to, quote, “Please report users who send these messages to abuse@skype.net – that will help us to block them where appropriate.”]
… Folks.. well, let me put it to you this way: if this concept is new to you, and comes as a surprise; if you never heard of such a thing .. that someone could make a window pop open, and tries to scare you into providing your credit card number, and will put viruses on your machine.. if you “googled it” because you were not sure if this “alert” was ‘legit’, I am going to do you a favor: I am going to suggest to you that you seriously reconsider the nature of the Internet. And suggest you subscribe to my email newsletter. (This stuff is so old now, and so well known, I almost don’t bother to post it. Where have you been?)
IRS phishing already??? “Please Update Your Details”
These guys never quit, folks. ‘Cuz there’s a sucker born every minute. Please don’t be one: use some good, healthy “paranoid common sense” when online.
BTW — if something works on Windows, it ain’t gonna work on Apple (and visa versa). That’s a clue..!
Today’s recommended reading: A FREE Way to Monitor Your Kids Online Activity
“If you are a parent who has children who use the computer to access the internet it is very important that you educate yourself and your child about the dangers of the internet. It is important to have strict guidelines in place on their computer usage and a method to supervise and monitor their online activities.”
Today’s free downloads(s): I have assembled on my Website a collection of links to the best free anti-malware programs to help you prevent infection.. and clean up if you’ve been infected. To see them, click here.
Copyright 2007-2011 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
January 24, 2011 Posted by techpaul | computers | Apple, chat, fake, infect, Leopard, Mac, message, Phishing, rogue, ruse, Skype, snow leopard, system needs immediate attention, techpaul, tiger, trick, window | 14 Comments
Questions From Apple Users*
Today I am going to answer a few questions submitted by readers, in the Q’s and their A’s format.
Q: Will the programs I have on my old Mac run on a new “Leopard” system?
A: There are enough differences in the new OS X 10.5 that some programs may need to be replaced with the latest versions that are “Leopard-compatible” (Norton AV often needs this, for example) to run at their best. The keyword is “may”: most programs will work just fine once you visit Apple Update.
Please note– if you intend to migrate your programs and data from an old machine to the new Leopard machine, make sure you have updated all the software (programs) on the old machine before initiating the migration. Leopard will/can refuse to accept programs that aren’t current.
Q: I am thinking about buying a new iMac and I was told Apple runs on Intel circuits now. Does this mean I would be vulnerable to viruses, worms and spyware like Windows? What security programs would I need?
A: While it is true that Apple runs on the same type of “circuits” as Windows PC’s now, it is not (generally) your hardware that is vulnerable to malware and hackers, but the lines of software “code” (programming) that make up your applications/programs.
Now to the second part of your question… The lines of code that make up the Mac operating system (the most recent being OSX 10.5 “Leopard”) are not currently being targeted by the bad guys.. simply because there’s too few machines running it (and the ones that are [generally] do not contain credit card number databases). However, some of the programs you would have on your Mac are being targeted for exploits– Adobe Reader, QuickTime (a media format/player) and the Safari browser, notably. (None of which you need, btw.)
And now the last part: as things stand, today, there have been worms distributed via P2P “file sharing”, rogue “cleaners”, and there’s now an “iBotnet” of infected Macs. This new trend will only increase as Apple’s marketshare grows. Mac users should not think themselves immune.
Today’s free link: There’s been some nifty new features added to Gmail, which has been getting some attention. The Official Gmail Blog has the details.
Today’s free download: I’m keeping with a Macintosh theme today, and so today’s app is for Apple users. I don’t want it said that I never think of you guys! Watch TV on your iMac with Miro, a C/Net Editor’s Choice. Description: “Democracy Player is a free and open source internet TV/video podcast application, with a beautiful, easy to use interface. You can subscribe to any Internet TV channel, including video podcasts, video RSS feeds, bittorrent feeds, and video blogs. A built-in Channel Guide lists hundreds of channels of all types, all free to subscribe to. Browse videos, download, and watch fullscreen– all in the same application.“
* Folks, please don’t write to tell me “Norton is evil”. Read the reviews for NIS 2008 [and NIS 2009]. It may open your eyes.
* Orig post 09/18/08
Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
April 28, 2009 Posted by techpaul | advice, Apple, computers, how to, PC, security, tech | 10.4, 10.5, Apple, backwards compatibility, compatibility, iBotnet, installed programs, leapard, Mac, migrating, new, operating systems, OS X, os x 10.5, techpaul, tiger | Leave a comment
• About Tech Paul
I am a Retired computer & network technician. I used to think the machines were pretty cool. Now I don’t.
They’re anything but.
I regularly posted how-to’s and tricks & tips and general computing advice here starting in 2007. (Use the Search tool to find answers. But be aware, many are rather dated.) Sometimes I answered (your) specific questions in an article if I believed the answer was generally helpful to “everyone”. All the writing you see was my own, typos and all. There always is/was an implied “IMHO” in what you see here.
Note: You are responsible for using this blog and its content. I am in no way liable for any losses caused by user error, viruses and/or other malware, hardware or software failure, or any other conceivable reason.
-
Recent Posts
- Merry Christmas
- Just one reason I walked away..
- Use a cellphone? Read this
- A great How To guide for Online Privacy
- “Medicaid Database Department” phone scam
- Yet another major theft..
- How to erase yourself from the Internet
- Accept these two realities
- Remove yourself from people search sites and erase your online presence
- 12 Simple Steps..
Blogroll
- * 100 Incredibly Useful and Interesting Web Sites
- * 15 Mobile Security Tools (smart phones/tablets)
- * AnandTech
- * Best Antivirus 2018 (comparison)
- * Best Free Antivirus 2018 (comparison)
- * Best Free Software
- * Best Internet Security Suites 2016
- * CNet's Security & Antivirus Center
- * Cult of Mac
- * CyberSafe (Kids) – How To Talk To Your Kids (Video Learning)
- * How to erase yourself from the Internet
- * How to remove yourself from Internet search results and hide your identity
- * How To Stay Anonymous Online
- * iLounge
- * Laptop Magazine (part of Tom's Guide)
- * Online Safety and Privacy Education
- * Paul Thurrott's SuperSite for Windows
- * Practical advice for greater online safety
- * Practical Advice for Parents: Computer Use
- * Pulp Tech
- * startpage (the world's most private search engine)
- * The Verge
- * TNW (The Next Web.com)
- * TWiT.TV
- * What's On My PC?
- * Z – MORE READING RECO'S
- How to stop Google from tracking you
Visitors to date
- 4,161,591
-
-
Pages
Recent Comments
Previous Tips & Answers (aka Search This Site)
-
Or use keyword(s)
April 2023 M T W T F S S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 A Winner’s Blueprint for Achievement
BELIEVE while others are doubting.
PLAN while others are playing.
STUDY while others are sleeping.
DECIDE while others are delaying.
PREPARE while others are daydreaming.
BEGIN while others are procrastinating.
WORK while others are wishing.
SAVE while others are wasting.
LISTEN while others are talking.
SMILE while others are frowning.
COMMEND while others are criticizing.
PERSIST while others are quitting.~ William Arthur Ward