Support Scam after manipulating contact details
A new malware is here. This adware crusader is currently spreading as a browser extension and manipulates the contact details of security providers in the search results. Sometimes Crusader will also show as a pop-up to lure you to dangerous websites.
Read on to find out what consequences this could have, where the adware comes from and how you can recognise Crusader.
Adware Crusader will try to overrun your browser
Crusader originally meant Crusaders. In the second world war an English tank with this name overcame its enemies. Currently, the Adware Crusader overrides your browsers.
Adware Crusader manipulates contact details
The adware Crusader sneaks into your computer as a browser extension. As soon as you search for technical support with a search engine, Crusader manipulates the results for the contact details. If you then look for support, the wrong results will be sent to you – manipulated results. Currently security providers such as Norton or technology companies such as Dell are affected.
The alleged support staff of course have deceptive intentions. This is because they try to spy on account information. They want to access remote computers with remote maintenance software. This is to install additional malicious software. In our blog, we have already reported about Microsoft employees. They try to commit a similar fraud on the phone. In the most recent case however, you call the fraudsters themselves and are not called by them.
What is adware?
Adware is a composite word. It consists of the words advertisement and software. This is software that shows you additional advertising or software that displays advertising. It is usually free of charge and functionally unrestricted. It is also embedded in free software or support programs. But then it is especially difficult to see. Also malicious programs, which serve advertising purposes, are called adware.
Where does the Adware Crusader come from?
But where do you suddenly get the Adware Crusader from? It is usually spread over free software. The adware hides in extensions to the browsers Google Chrome and Firefox or camouflages itself as a browser helper object for Internet Explorer. Once you run the affected extensions and submit the requested permissions, Crusader will gain access to your traffic in the browser. It can now be manipulated by the hackers at will.
What protects you from Adware Crusader?
How can you protect yourself against the Adware Crusader? You are especially vulnerable if you like to download free software. You must pay attention to whether additional programs are offered during installation. If you are in doubt, you should do without them. Also check the usage and licensing conditions. Otherwise, you may unwittingly agree to the installation of additional software. And, of course, you should get free software directly from the developer or other trustworthy sources. For more information, see Crusader:Adware rewrites phone details for legitimate security software .
If you are not sure if you already have unwanted adware or malware on your computer, then quickly come to your local TrustATec partner. With our Security Check Consultation, we will find redundant software. With our professional virus removal, we remove every worm, virus and any malware from your computer.
Tags: adware crusader, contact data, support scam, wrong support staff