System Smart Security
Posted: June 7, 2011
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 55 |
First Seen: | June 8, 2011 |
---|---|
OS(es) Affected: | Windows |
System Smart Security is a rogue security program that borrows the interface and attack techniques of similar rogue security programs. Rogue security programs in the System Smart Security family are known to create fake infection warnings and system errors, hijack web browsers and block applications and executable files. System Smart Security may look like a normal security program but is incapable of finding or removing threats from your computer. You should remove System Smart Security by using an anti-malware program, as soon as you can.
The Litany of System Smart Security's Fake Alerts
System Smart Security and similar threats from its family, the FakeVimes family, are distributed by Trojans that attack computers through browser security exploits. Other rogue security programs that are closely related to System Smart Security include Privacy Guard Pro, PrivacyGuard Pro 2.0, Extra Antivirus, Fast Antivirus 2009, Presto TuneUp, Windows Security Suite, Smart Virus Eliminator, Packed.Generic.245, Volcano Security Suite, Windows Enterprise Suite, Enterprise Suite, Additional Guard, Live PC Care, PC Live Guard, Live Enterprise Suite, Security Antivirus, My Security Wall, CleanUp Antivirus and Smart Security. These rogue security programs use a similar interface, and attack your PC in the same ways, although security software that can detect a System Smart Security clone may still be unable to detect System Smart Security.
After System Smart Security is installed, you'll notice that System Smart Security runs whenever Windows starts. System Smart Security may even remain active as a memory process even if you try to shut System Smart Security down. This lets System Smart Security create pop-up errors like the following, whenever System Smart Security wants:
System warning!
Continue working in unprotected mode is very dangerous. Viruses can damage your confidential data and work on your computer. Click here to protect your computer.
System warning!
Security Essentials Ultimate Pack software detects programs that may compromise your privacy and harm your systems. It is highly recommended you scan your PC right now. Click here to start.
Security Alert!
Your computer is being attacked from a remote machine !
Block Internet access to your computer to prevent system infection.
Critical Warning!
Critical System Warning! Your system is probably infected with a version of Trojan-Spy.HTML.Visafraud.a. This may result in website access passwords being stolen from Internet Explorer, Mozilla Firefox, Outlook etc. Click Yes to scan and remove threats.(recommended)
These fake alerts don't detect real threats on your PC, since System Smart Security can only create false positives. Following their instructions may redirect you to malicious websites like System Smart Security's homepage that attempt to steal your credit card information, or attack your PC with other threats.
Other System Smart Security Perils to Keep Your Eyes Peeled For
System Smart Security may also engage in other attacks in an attempt to fool you into believing that your PC is much more dysfunctional than it really is. The two primary and more serious System Smart Security attacks are:
- Browser hijacks that change your homepage, redirect you to harmful websites or block you from visiting helpful websites. Hijacks by System Smart Security may also create fake errors that make it look like a website is unsafe or use links that redirect you to malicious sites.
- System Smart Security may also block applications, most notably programs related to security or system maintenance. Windows Task Manager, MSConfig and similar default programs may be blocked, as well as well-known anti-virus scanners.
Removing System Smart Security will solve all of these issues, but improperly deleting System Smart Security can harm your Internet connectivity and other aspects of your PC. To remove System Smart Security with no side effects, consider using a good anti-malware program to scan your entire system once System Smart Security has been shut down.
File System Modifications
- The following files were created in the system:
# File Name 1 %Documents and Settings%\All Users\Application Data\[RANDOM CHARACTERS]\ 2 %Documents and Settings%\All Users\Application Data\[RANDOM CHARACTERS]\[RANDOM CHARACTERS].dll 3 %Documents and Settings%\All Users\Application Data\[RANDOM CHARACTERS]\[RANDOM CHARACTERS].exe 4 %Documents and Settings%\All Users\Application Data\[RANDOM CHARACTERS]\[RANDOM CHARACTERS].mof 5 %Documents and Settings%\All Users\Application Data\[RANDOM CHARACTERS]\[RANDOM CHARACTERS].ocx 6 %Documents and Settings%\All Users\Application Data\[RANDOM CHARACTERS]\[RANDOM CHARACTERS]\ 7 %UserProfile%\Application Data\System Smart Security\ 8 %UserProfile%\Application Data\System Smart Security\cookies.sqlite 9 %UserProfile%\Application Data\System Smart Security\Instructions.ini
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.