{"id":6335,"date":"2017-01-23T15:50:25","date_gmt":"2017-01-23T23:50:25","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-173\/"},"modified":"2017-01-23T15:50:25","modified_gmt":"2017-01-23T23:50:25","slug":"news-173","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-173\/","title":{"rendered":"Beware of Hicurdismos: It\u2019s a fake Microsoft Security Essentials installer that can lead to a support call scam"},"content":{"rendered":"<p><span>Wouldn\u2019t it be a shame if, in trying to secure your PC, you inadvertently install malware and <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/portal\/threat\/supportscams.aspx\">run the risk of being scammed<\/a>?<\/span><\/p>\n<p><span>We recently discovered a threat detected as <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=SupportScam:MSIL\/Hicurdismos.A\">SupportScam:MSIL\/Hicurdismos.A<\/a> that pretends to be a <a href=\"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=5201\">Microsoft Security Essentials<\/a> installer. Microsoft Security Essentials is <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/portal\/mmpc\/products\/choices.aspx\">our antimalware product for Windows 7 and earlier<\/a>. In Windows 10 and Windows 8, Windows Defender provides antimalware protection and is installed and enabled by default when Windows is installed. However, some users may believe they also need to download and install Microsoft Security Essentials.<\/span><\/p>\n<p><span><a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=SupportScam:MSIL\/Hicurdismos.A\">Hicurdismos<\/a> uses a fake Windows error message (sometimes called a \u201cblue screen of death\u201d, or BSoD) to launch a technical support scam. A real BSoD is a fatal error in which the screen turns blue and the computer crashes. Recovery from a BSoD error typically requires the user to reboot the computer.<\/span><\/p>\n<p><span>The fake BSoD screen includes a note to contact technical support. Calling the indicated support number will not fix the BSoD, but may lead to users being encouraged to download more malware under the guise of support tools or software that is supposed to fix a problem that doesn\u2019t exist.<\/span><\/p>\n<p><span>Interestingly, the fake BSoD screen used by <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=SupportScam:MSIL\/Hicurdismos.A\">Hicurdismos<\/a> mimics an error message used in Windows 8 and Windows 10, so users of these new Windows versions could also be at risk of being tricked by <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=SupportScam:MSIL\/Hicurdismos.A\">Hicurdismos<\/a>.<\/span><\/p>\n<p><span>The threat of <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/portal\/threat\/supportscams.aspx\">technical support scams<\/a> has been around for years, but it\u2019s recently been observed to be growing. We\u2019ve seen attackers becoming more sophisticated with their social engineering tactics to try to mislead users into calling for technical support and then they are asked for payment to \u201cfix the problem\u201d on the PC that does not exist. Real error messages from Microsoft do not include support contact details. See the bottom of this blog for links and information on how to contact Microsoft Support.<\/span><\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/Hic1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"640\" class=\"alignnone wp-image-9115 size-large\" alt=\"Hicurdismos displays a fake BSoD message that has contact details for fake support. Note: The real messages do not include support contact details, nor when you call for support are you asked for payment.\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/Hic1-1024x640.png\" \/><\/a><\/p>\n<p><em>Figure 1. Hicurdismos displays a fake BSoD message that has contact details for fake support. Note: The real messages do not include support contact details, nor when you call for support are you asked for payment.<\/em><\/p>\n<p><span><a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=SupportScam:MSIL\/Hicurdismos.A\">Hicurdismos<\/a> is an installer that arrives via a <a href=\"https:\/\/www.microsoft.com\/security\/portal\/mmpc\/shared\/glossary.aspx#drive-by\">drive-by download<\/a>. <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/17443\/windows-internet-explorer-smartscreen-filter-faq\">SmartScreen Filter<\/a> in Internet Explorer and Microsoft Edge flags this threat using the below prompts cautioning the user to not run or save the malware:<\/span><\/p>\n<p><span>You will not get warnings like these when downloading and installing legitimate programs from Microsoft.<\/span><\/p>\n<p><span>If the malicious installer is downloaded on the computer, it mimics the real Microsoft Security Essentials installer by using a similar icon. However, closer inspection will reveal differences in the file properties, including the filename. <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=SupportScam:MSIL\/Hicurdismos.A\">Hicurdismos<\/a> uses the file name <em>setup.exe<\/em>. <\/span><\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/Hic2.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"584\" height=\"85\" class=\"alignnone wp-image-9125 size-full\" alt=\"Screenshot of the SmartScreen message checking the user whether they really intend to run the executable file\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/Hic2.jpg\" \/><\/a><\/p>\n<p><em>Figure 2. SmartScreen message notifying you about running an executable file that could harm your PC.<\/em><\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/Hic3.png\"><img loading=\"lazy\" decoding=\"async\" width=\"585\" height=\"96\" class=\"alignnone size-full wp-image-9135\" alt=\"A screenshot of the SmartScreen message notifying the user that the publisher of the executable can't be verified and checking whether they would still want to run it\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/Hic3.png\" \/><\/a><\/p>\n<p><em>Figure 3. SmartScreen message notifying you that the program you are about to run hasn\u2019t been verified, and doing an extra check of whether you\u2019d still run it.<\/em><\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/Hic4.png\"><img loading=\"lazy\" decoding=\"async\" width=\"419\" height=\"237\" class=\"alignnone size-full wp-image-9165\" alt=\"The Hicurdismos installer (left) attempts to mimic the icon of the real Microsoft Security Essentials installer (right), but file properties reveal that it is not the same.\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/Hic4.png\" \/><\/a><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/Hic5.png\"><\/a><\/p>\n<p><em>Figure 4. The <\/em><span><a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=SupportScam:MSIL\/Hicurdismos.A\"><em>Hicurdismos<\/em><\/a><\/span> <em>installer (right) attempts to mimic the icon of the real Microsoft Security Essentials installer (left), but file properties reveal that it is not the same.<\/em><\/p>\n<p><span>The file <em>setup.exe<\/em> is a SmartInstaller package, which contains a malicious file that pretends to be Microsoft Security Essentials. Unlike the installer, the malicious file has the same file property information as the legitimate Microsoft Security Essentials executable: <\/span><\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/Hic5.png\"><img loading=\"lazy\" decoding=\"async\" width=\"603\" height=\"222\" class=\"alignnone size-full wp-image-9156\" alt=\"The file property information of Hicurdismos has the same details as Microsoft Security Essentials.\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/Hic5.png\" \/><\/a><\/p>\n<p><em>Figure 5. The file property information of <\/em><span><a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=SupportScam:MSIL\/Hicurdismos.A\"><em>Hicurdismos<\/em><\/a><\/span><em> has the same details as Microsoft Security Essentials.<\/em><\/p>\n<p><span>When run, the malware immediately renders the fake BSoD experience. To do so, it performs the following:<\/span><\/p>\n<ul>\n<li><span>Hides the mouse cursor (to make the user think the system is not responding)<\/span><\/li>\n<li><span>Disables <strong>Task Manager<\/strong> (to prevent the user from terminating the process)<\/span><\/li>\n<li><span>Displays the BSoD image, which occupies the entire screen (to prevent the user from using the PC)<\/span><\/li>\n<\/ul>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/Hic6.png\"><img loading=\"lazy\" decoding=\"async\" width=\"939\" height=\"274\" class=\"alignnone size-full wp-image-9175\" alt=\"Disassembly shows how the malware hides the cursor and disables Task Manager\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/Hic6.png\" \/><\/a><\/p>\n<p><em>Figure 6. Disassembly shows how the malware hides the cursor and disables Task Manager<\/em><\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/Hic7.png\"><img loading=\"lazy\" decoding=\"async\" width=\"939\" height=\"143\" class=\"alignnone size-full wp-image-9155\" alt=\"Disassembly shows how the malware displays the fake BSoD\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/Hic7.png\" \/><\/a><\/p>\n<p><em>Figure 7. Disassembly shows how the malware displays the fake BSoD<\/em><\/p>\n<p><span>The malware drops a copy of itself in the following path:<\/span><\/p>\n<p><span>\u00a0\u00a0\u00a0 &#8220;<a href=\"https:\/\/www.microsoft.com\/security\/portal\/mmpc\/shared\/variables.aspx#systemroot\"><em>%SystemRoot%<\/em><\/a><em>bluesquarez llcsysprotectormicrosoft security essentials.exe<\/em>&#8220;<\/span><\/p>\n<p><span>It also creates an auto start launch point in the registry:<\/span><\/p>\n<p><span>\u00a0\u00a0 In subkey: <em>HKEY_USERS&lt;SID\/user&gt;SoftwareMicrosoftWindowsCurrentVersionRun <\/em><\/span><\/p>\n<p><span>\u00a0\u00a0 Sets value: &#8220;<em>Sysprotector<\/em>&#8221; <\/span><\/p>\n<p><span>\u00a0\u00a0 With data: &#8220;<a href=\"https:\/\/www.microsoft.com\/security\/portal\/mmpc\/shared\/variables.aspx#systemroot\"><em>%SystemRoot%<\/em><\/a><em>bluesquarez llcsysprotectormicrosoft security essentials.exe<\/em>&#8221; <\/span><\/p>\n<p><span>\u00a0<\/span><\/p>\n<h1><span>Mitigation and Prevention<\/span><\/h1>\n<p><span><a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=SupportScam:MSIL\/Hicurdismos.A\">Hicurdismos<\/a> misleads users and lures them into calling a number that can lead to a fake technical support scam. Like most social engineering techniques, it can be avoided by knowledge and alertness. Some important things to note:<\/span><\/p>\n<ul>\n<li><span>Real error message screens do not include a support phone number, instead they will provide you with an error code and instructions to search for more information.<\/span><\/li>\n<li><span>On Windows 10, <a href=\"https:\/\/support.microsoft.com\/en-au\/help\/17464\/windows-defender-help-protect-computer#1TC=windows-10\">Windows Defender<\/a> is built-in, so there is no need to install Microsoft Security Essentials. <\/span><\/li>\n<li><span>Microsoft installers are signed by a Microsoft certificate.<\/span><\/li>\n<\/ul>\n<p><span>If you are infected with this scam, use <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/17466\/windows-defender-offline-help-protect-my-pc\">Windows Defender Offline<\/a> to scan your PC.<\/span><\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/Hic8.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1291\" height=\"422\" class=\"alignnone size-full wp-image-9145\" alt=\"Comparing the real BSoD screen (left) and the fake BSoD (right) side-by-side shows the additional line that contains the fake support contact details\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/Hic8.png\" \/><\/a><\/p>\n<p><em>Figure 8. Comparing the real BSoD screen (left) and the fake BSoD (right) side-by-side shows the additional line that contains the fake support contact details<\/em><\/p>\n<p><span>\u00a0<\/span><\/p>\n<p><span><a href=\"http:\/\/support.microsoft.com\/reportascam\">Report the incident to Microsoft<\/a> and contact your local scam-reporting organization. Organizations for the United States, Canada, United Kingdom, and Australia include: <\/span><\/p>\n<ul>\n<li><span>In the United States, use the <a href=\"https:\/\/www.ftccomplaintassistant.gov\/#crnt&amp;panel1-1\">FTC Complaint Assistant form<\/a>. <\/span><\/li>\n<li><span>In Canada, the <a href=\"http:\/\/www.antifraudcentre-centreantifraude.ca\/\">Canadian Anti-Fraud Centre<\/a> can provide support. <\/span><\/li>\n<li><span>In the United Kingdom, you can report <a href=\"http:\/\/www.actionfraud.police.uk\/\">fraud<\/a> as well as <a href=\"http:\/\/www.tpsonline.org.uk\/tps\/\">unsolicited calls<\/a>. <\/span><\/li>\n<li><span>In Australia, you can use the <a href=\"https:\/\/www.scamwatch.gov.au\/report-a-scam\">ScamWatch<\/a> website to report a scam. <\/span><\/li>\n<\/ul>\n<p><span>When you receive a phone call or see a pop-up window on your PC and you are uncertain whether it is from someone at Microsoft, don\u2019t take the risk. Reach out directly to one of our technical support experts dedicated to helping you at the <a href=\"https:\/\/support.microsoft.com\/en-us\/contactus\/\">Microsoft Answer Desk<\/a>.<\/span><\/p>\n<p><span>In case you have already engaged with and paid for a fake support:<\/span><\/p>\n<ul>\n<li><span>Apply all security <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/portal\/mmpc\/help\/updatefaqs.aspx\">updates<\/a> as soon as they are available. Do a full scan to remove the threat.<\/span><\/li>\n<li><span>Change your passwords.<\/span><\/li>\n<li><span>Call your credit card provider to reverse the charges, if you have already paid.<\/span><\/li>\n<li><span>Monitor anomalous logon activity. Block traffic to services that you would not normally access.<\/span><\/li>\n<\/ul>\n<p><span>Reference SHA1: e1e78701049a5e883a722a98cdab6198f7bd53a1<\/span><\/p>\n<p><em><span>\u00a0<\/span><\/em><\/p>\n<p><em><span>Francis Tan Seng and Alden Pornasdoro<\/span><\/em><\/p>\n<p><em>MMPC<\/em><\/p>\n<p><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/10\/21\/beware-of-hicurdismos-its-a-fake-microsoft-security-essentials-installer-that-can-lead-to-a-support-call-scam\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wouldn\u2019t it be a shame if, in trying to secure your PC, you inadvertently install malware and run the risk of being scammed? We recently discovered a threat detected as SupportScam:MSIL\/Hicurdismos.A that pretends to be a Microsoft Security Essentials installer. Microsoft Security Essentials is our antimalware product for Windows 7 and earlier. In Windows 10&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[10760,10978,10979,10980,10981,10977,10982,10983,10984,10762,10787],"class_list":["post-6335","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-antimalware-research-for-it-pros-and-enthusiasts","tag-fake-bsosd","tag-hicurdismos","tag-how-to-spot-a-fake-bsod","tag-report-tech-support-scam","tag-supportscam","tag-supportscammsilhicurdismos-a","tag-tech-support-scam-mimics-bsod","tag-technical-support-scam","tag-windows-defender","tag-windows-defender-for-windows-10"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6335","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6335"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6335\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6335"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6335"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}