Some folks cruising the internet today were upset to learn that their computer was infected with a virus designed to extort money, block access to software programs, and quite generally fu** with their heads.
For instance, one victim was browsing over some material on a web site, when a dialogue box popped up and warned that their computer was infected.
Without their permission, the program - ironically named the "Security Tool" - began a scan.
During that unauthorized probe the user was startled to find that they were blocked from accessing software programs or conducting various functions on their PC.
In fact, when the individual attempted to launch their anti-virus software, the Security Tool blocked their access to the program on the grounds that myriad files were infected).
Then, the scan stopped, and issued an alert that there were 38 viruses and/or trojans threatening to damage their PC, steal credit card information, passwords, etc.
The software instructed the user to request a fix for the problem.
However, when the individual clicked on the link, he was transported to a suspicious-looking page that filled the whole screen.
Now, there was a demand for money to download the necessary "upgrade" to quarantine and remove the threatening intruders.
The shocked computer owner was asked to input his credit card number, home address, and so forth and so on.
Did the bozos think he was born yesterday?
For instance, one victim was browsing over some material on a web site, when a dialogue box popped up and warned that their computer was infected.
Without their permission, the program - ironically named the "Security Tool" - began a scan.
During that unauthorized probe the user was startled to find that they were blocked from accessing software programs or conducting various functions on their PC.
In fact, when the individual attempted to launch their anti-virus software, the Security Tool blocked their access to the program on the grounds that myriad files were infected).
Then, the scan stopped, and issued an alert that there were 38 viruses and/or trojans threatening to damage their PC, steal credit card information, passwords, etc.
The software instructed the user to request a fix for the problem.
However, when the individual clicked on the link, he was transported to a suspicious-looking page that filled the whole screen.
Now, there was a demand for money to download the necessary "upgrade" to quarantine and remove the threatening intruders.
The shocked computer owner was asked to input his credit card number, home address, and so forth and so on.
Did the bozos think he was born yesterday?
Curiously, there wasn't any "address" at the top of the page confirming the name of the software developer, their physical addresx, or where they could be contacted online, etc.
Weird, eh?
At this juncture, the victim clicked the X in the top right corner of the web page, to close the dialogue box and order form.
Guess what?
The pop-up box, and scanner, continued to bounce on and off the computer for the rest of the evening non-stop!
The user was also startled to spy an entry for "Security Tool" on the list of installed programs on the menu.
When the unhappy internet cruiser attempted to use the "uninstall program" function he was unable to.
Why?
Cleverly, the culprits at the back of the scam, programmed "Security Tool" so that it didn't show up on the program list where it should have been posted (thus preventing the victim from being able to uninstall the rogue virus).
Imagine that!
The user hadn't even downloaded (or ordered) the alleged anti-virus program.
After clicking on various links, the upset computer geek finally located a notice tucked away at the bottom of one page (in very fine print!) with insructions on how to remove the so-called soldier virus.
However, the link for the instructions failed to open, and the dialogue box continued to give alerts, blocks functions, and scan the computer!
At this juncture, the user scoured the order page, in a desperate effort to locate some individual, web address, or company entity to contact to resolve the problem.
Finally, he stumbled on a two-line notice that stated that if a party was having trouble removing the software program (Security Tool) that they should contact the following web site.
http://www.softsailor.com/how-to/9824-how-to-remove-uninstall-windows-soft-soldier-virus-removal-guide.html
At the web site instructions were provided on what action to take to expunge the offending intruder.
The steps that were mapped out have been posted below.
However, although the site explained in detail the nature of the malicious virus - and the damage it could cause to a laptop or regular desk PC - no "free assistance" was offered up.
No, sir!
The owners of this site were asking a hefty little sum for an anti-virus software program they asserted would remove the dangerous virus from computers.
My antennae went up!
Part of the elaborate scam?
News at 11!
________________________________________________
Info & Instructions
http://www.soldiervirus.com/
________________________________________________
If your computer got infected with the SoftSoldier rogue anti-malware (Scareware) this article will provide all the information about what SoftSoldier is as well as instructions on how to remove it and all related files from your computer.
Just like we stated above, SoftSoldier is a rogue anti-malware. Soft Soldier works in a way that is highly similar to the other rogue anti-malware we talked about in our past articles (Cyber Security, Trust Soldier, Windows Enterprise Defender).
This malware will take the form of video codecs required for an online video or flash updates to install itself on your compute
Once installed, Soft Soldier will create a bunch of files that have random names.
When you restart your computer, you will notice that Soft Soldier will automatically start a scan (it’s actually a fake scan) of your computer.
When this fake scan will be complete, Soft Soldier will tell you that these files are infections and that you need to buy the program to remove them from your computer.
This article is part of our “Malware Removal Tips” series of articles.
Click here for more articles.
These files will be placed in C:\Windows and C:\Windows\System 32.
You won’t know that these files are created.
When you restart your computer, you will notice that Soft Soldier will automatically start a scan (it’s actually a fake scan) of your computer.
When this fake scan will be complete, Soft Soldier will tell you that these files are infections and that you need to buy the program to remove them from your computer.
In addition, Soft Soldier will also display some security alerts stating that your computer is under attack and that malware has been detected.
It will even fake a Windows Security Center that advises you to buy Soft Soldier to protect your computer (the original windows security center does not recommend any program).
SoftSoldier is just a scam, so don’t buy it (contact your credit card company if you already did) and don’t believe the warnings it will give you.
Here is a quick guide on how to remove Soft Soldier from your computer.
Tip: you should print these instructions as you will be needed to close all windows a little later.
Make sure that you follow closely these instructions:
1.Click here to download Malwarebytes’ Anti-Malware (MBAM). Save the file on your desktop. Don’t run it yet.
2.Close all open windows and then run the setup file for Malwarebytes’ Anti-Malware.
3.Follow the wizard instructions and complete the install without changing any settings.
4.When the install is complete, leave both “Update Malwarebytes’ Anti-Malware” and “Launch Malwarebytes’ Anti-Malware” boxes checked before clicking Finish.
5.Go to the Scanner tab and select Perform quick scan. Now click on the scan button.
6.Wait for the scan to complete. When it is, click the OK button.
7.Go to the scanner screen and click on the Show Results button.
8.When taken at the screen that shows all detected infections, select them all and click Remove Selected.
9.Wait for MBAM to remove all the infections. Note that MBAM may ask for a restart in order to remove all threats. Allow it to do so if prompted.
10.When the scan is finished, a scan log will be opened. Close it when you are done reading it.
Now you should have removed SoftSoldier and any related files from your computer.
No comments:
Post a Comment