A shiver ran through the peer-to-peer (P2P) file sharing world as BitTorrent announced that it had been hacked by scareware mongers.
The BitTorrent blog announced: “This morning at approximately 4:20am Pacific Daylight Time (UTC -7), the µTorrent.com and BitTorrent.com Web servers were compromised. Our standard Windows software download was replaced with a type of fake antivirus ‘scareware’ program.”
This would have meant that anyone downloading the BitTorrent Mainline, µTorrent, or the beta of the Project Chrysalis Windows interfaces to the P2P network would have been infected with Security Shield malware. Fortunately, BitTorrent’s fears were unfounded and the only interface to be affected was the µTorrent download site.
BitTorrent updated its warning blog accordingly. In the UK, the critical time would have been between 12.20pm and 2:20pm on Wednesday 14 September.
The µTorrent Windows interface is still probably the most popular downloader for accessing P2P files so, even though there was only a two hour exposure, many users could have been inconvenienced.
Security Shield is a scareware product which throws up a pop-up screen warning the user that there is a nasty virus on the machine and offers to remove it for a price. In fact, there is nothing wrong with the “infected” computer but many users panic and pay up – hence the scareware name.
As this was a fairly simple hack, merely replacing the µTorrent client with the malware, it was quickly remedied and BitTorrent now claims its site is clean.
There has been a rash of fake antivirus attacks, especially through Facebook and from infected adverts on websites (malvertisements). The software must be removed but there are many sites with detailed instructions – or the Windows system can be restored to an earlier state in many cases using System Restore as a temporary fix.
Landmark ruling finds NSO Group liable on hacking charges in US federal court, after Pegasus…
Microsoft reportedly adding internal and third-party AI models to enterprise 365 Copilot offering as it…
Albania to ban access to TikTok for one year after schoolboy stabbed to death, as…
Shipments of foldable smartphones show dramatic slowdown in world's biggest smartphone market amidst broader growth…
Google proposes modest remedies to restore search competition, while decrying government overreach and planning appeal
Sega 'evaluating' starting its own game subscription service, as on-demand business model makes headway in…
View Comments
The credit card companies have had the power to shut down these criminal activities since they were concieved. All malware producers are after is money. Cut that line and they will go elsewhere.
What does it take to do that? Simply a filter to check the website and the statement going throught the system. Or perhaps a checking system like microsoft uses to check for MCP's where the user is given a password to a website that is trusted that verified the code with a database of letgitimate software.
I've occasionally got these "scare-ware" messages & they make me laugh when they show me a picture of "my" "Windows" computer directory's indicating how many Trojans & viruses there are in each location with flashing warnings; Because I'm always only using a Linux operating system.