TR/FakeAV

What is TR/FakeAV?

TR/FakeAV is a generic term referring to an extensive variety of computer programs that are designed to provide a computer user with misinformation about the security status of the operating system. As the term implies, an unsuspecting computer user is provided with a fake security application, which means that the victim is shown fake system scans, fake pop-up alerts as well as fake scan results. This is done for the purpose of convincing the user that his or her operating system is infected. As a result, the user is supposed to invest in the bogus product, which leads to money and data loss.

If the user has no knowledge about different types of malware programs, he or she may not suspect that that the program he or she is dealing with is malicious. The interfaces of so-called TR/FakeAV programs resemble the interfaces of reliable security programs, which is a key factor in this type of online deception.

How do TR/FakeAV programs get onto a computer?

There are many ways to infect an operating system, especially if it is not shielded from malware and spyware programs. Let use discuss one malware family which has recently attracted a lot of attention. The family is referred to as Win32/FakeRean, or simply FakeRean. Programs belonging to this group of malware are known to be installed onto a PC by exploit kits such as Blacole or Incognito, or by downloading other malware programs. For example, some of the programs that can install a FakeRean program are as follows: Win32/Brelab, TrojanDownloader:Win32/Cbeplay.I (spread via emails), TrojanDropper:Win32/Holi.gen!A, Win32/Oficla, Win32/Rorpian, Win32/Rugzip, etc.

A computer can get infected with a TR/FakeAV program when browsing unreliable website, upon clicking on a pop-up alert, video or corrupt link. It is also advisable to ignore and delete spam emails and those emails that are sent from unknown senders or have suspect subject lines.

FakeRean programs can be categorized into brands, because their interfaces have been observed to be modified from time to time. Nevertheless, they exhibit the same behavior; i.e., they change the name according to the targeted operating system and attempt to prompt the victim to spend a certain amount of money on the so-called full version of the program. It is crucial to remove such programs as they do not help to enhance the performance of the computer and protect you against malware threats.

How to remove TR/FakeAV programs?

Some malware researchers suggest that the users of afflicted computers access the Windows Control Panel and look for the uninstaller of the TR/FakeAV program. However, the vast majority of fake AV programs do not create their uninstallers. The removal of a fake security program requires a lot of attention and skills; hence, it is highly advisable to rely on a powerful malware and spyware prevention program. Our team at Anti-Spyware-101.com recommends using SpyHunter, which thoroughly analyses the system and easily terminates FakeRean malware, VirusDoctor malware, and many other misleading applications. In case you suspect that your computer is corrupted by a program that could be regarded as TR/FakeAV, feel free to contact our team for advice. 100% FREE spyware scan and
tested removal of TR/FakeAV*

Disclaimer
Disclaimer

Leave a Comment

Enter the numbers in the box to the right *