Feeds

Looking for code work? Write fake anti-virus scripts

Scammer job ads move mainstream

Intelligent flash storage arrays

Updated A scareware purveyor has brazenly advertised for recruits on a mainstream job market website.

A job ad on Freelancer.com offers work for a coder prepared to turn his hand to the creation of fake anti-virus website redirection scripts. However, prospective applicants are warned not to expect a big payday - the budget for the whole project is between $30 and $250.

On the plus side the prospective employer, redlinecl, has 100 per cent positive feedback from previous coding lackeys. One said: "Nice buyer, hope can work for him again in the future."

Of course when the job involves tricking the unsuspecting into visiting scareware portals in order to flog software of little or no utility it's probably wise to take these glowing reviews with a pinch of salt.

The ad, posted on Monday (screenshot here), was spotted by security researcher Patrik Runald of Websense, who notes that the same chap was previously involved in fake PayPal pages, spam campaigns and other forms of malfeasance.

Runald described the ad campaign as an amateurish wannabe cyber criminal, based not least on his previous postings. "This guy seem to have no clue what he's doing," Runald told El Reg. "The Fake AV [anti-virus] business is based on affiliates which means that the company providing the software has people doing the fake AV scanning pages as well."

Adverts on Freelancer.com are largely legitimate but sometimes cross over the line into more questionable enterprises.

"Freelancer.com typically has jobs for creating websites, logos, writing help etc but there are lots of shadier once too, like making a voting bot," Runald explained.

The market for scareware is booming. Shysters involved in the business are increasingly adopting the business structures of mainstream security firms - even to the point of running call centres designed to persuade people not to try to apply for refunds, and recruitment programs.

redlinecl's project is on a much smaller scale than some of the Ukranian and Russian operations we've heard of, but it does illustrate the increased openness of those involved in the trade, who seem to feel little need to be discreet about their activities. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
China is ALREADY spying on Apple iCloud users, claims watchdog
Attack harvests users' info at iPhone 6 launch
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.