Internet Security Protection
Posted: June 14, 2013
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 2/10 |
---|---|
Infected PCs: | 49 |
First Seen: | June 14, 2013 |
---|---|
OS(es) Affected: | Windows |
Internet Security Protection is one of various members of FakeRean, a large group of fake anti-malware programs that can display inaccurate security information while also blocking you from using most other applications. Through fake firewall warnings, system scans and similar credentials, Internet Security Protection tries to convince victims that their PC has been infected by dozens of PC threats that must be removed by a premium-registered version of Internet Security Protection. For their part, SpywareRemove.com malware experts haven't seen any real PC security features in Internet Security Protection and discourage any effort to spend money on Internet Security Protection or give personal details to the fake company promoting Internet Security Protection. Rather than paying for protection that doesn't work, you should first disrupt Internet Security Protection's startup and then delete Internet Security Protection with whatever legitimate anti-malware product you happen to prefer.
Why Internet Security Protection's 'Protection' is as Useful as a Salt Shaker on an Ocean Raft
Internet Security Protection may be marketed as an independent security and anti-malware product, but, in reality, is a straight clone of many other members of FakeRean's scamware family. Some particularly closely-related members include Security Protection, Internet Security Premium and Privacy Protection, all of which are identical to Internet Security Protection in appearance while less-obvious relatives include Antivirus 2008 Pro, Antivirus XP 2008, Windows Antivirus 2008, Vista Antivirus 2008, PC Clean Pro, Antivirus Pro 2009, Rogue.Vista Antivirus 2008, AntiSpy Safeguard, ThinkPoint, Spyware Protection 2010, Internet Antivirus 2011, Palladium Pro, XP Anti-Virus 2011, CleanThis, XP Security 2012, XP Home Security 2012 and AntiVirus PRO 2015. It should be noted that while many members of Internet Security Protection's family have been known to change their brand names to match that of the infected operating system, Internet Security Protection has not shown any such functionality.
Internet Security Protection's foremost purpose relies around confusing you into believing that your computer is suffering from attacks and infections that aren't on your computer at all. To carry this ruse, Internet Security Protection creates fake system alerts of various formats, including some that imitate baseline Windows security programs or otherwise attempt to look like basic warnings from your operating system. Internet Security Protection also includes a fake system scanner that, of course, returns large amounts of negative results. SpywareRemove.com malware researchers warn that attempting to delete these files runs the risk of deleting normal files that aren't dangerous to your PC and may even be necessary for various programs to function.
Using Internet Security Protection to try to remove said infections will redirect you to a purchasable registration form, which, to the criminals profiteering through Internet Security Protection, is the entire point behind the whole exercise. Doing so not only wastes money, but also exposes confidential information to criminals – without benefiting your computer's security in any way.
Walking Away from Scam Security Towards the Real Deal
While Internet Security Protection's PC security scam categorizes Internet Security Protection as a rogue anti-malware program, SpywareRemove.com malware research team considers its defensive 'features' to be more dangerous than its fake information. By monitoring which programs you open and terminating the majority of applications unrelated to running Windows, Internet Security Protection constricts your software usage and even can block important security programs. Because Internet Security Protection automatically whitelists some crucial Windows programs, you may consider renaming a program file to work around Internet Security Protection's attack, although disabling Internet Security Protection completely (via Safe Mode and similar methods) usually is a more useful form of antidote.
Removing Internet Security Protection always should use appropriate anti-malware products, since Internet Security Protection and other versions of FakeRean scamware often are installed by secondary PC threats that also may be on your computer. In most cases, a PC threat that installs Internet Security Protection will be a simple Trojan dropper or downloader, but SpywareRemove.com malware analysts warn that similar scamware programs sometimes also are linked to high-level threats like rootkits and backdoor Trojans.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%AppData%\btdefender.exe
File name: %AppData%\btdefender.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
%Desktop%\Internet Security Protection.lnk
File name: %Desktop%\Internet Security Protection.lnkFile type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
Registry Modifications
HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Internet Security Protection
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.