SpySheriff is
malware
Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, de ...
that
disguises itself as
anti-spyware
Spyware (a portmanteau for spying software) is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privac ...
software. It attempts to mislead the user with false security alerts, threatening them into buying the program.
Like other rogue antiviruses, after producing a list of false
threats
A threat is a communication of intent to inflict harm or loss on another person. Intimidation is a tactic used between conflicting parties to make the other timid or psychologically insecure for coercion or control. The act of intimidation for co ...
, it prompts the user to pay to remove them. The software is particularly difficult to remove,
since it nests its components in System Restore folders, and also blocks some system management tools. However, SpySheriff can be removed by an experienced user,
antivirus software
Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
Antivirus software was originally developed to detect and remove computer viruses, hence the name ...
, or by using a rescue disk.
Websites
SpySheriff was hosted at both www.spysheriff.com and www.spy-sheriff.com,
which operated from 2005 until their shutdown in 2008. Both domains are now parked. Several other similarly-named websites also hosted the program, but have all been shut down. Several
typosquatted websites also attempted to automatically install SpySheriff, including a fake version of
Google.com called Goggle.com. From 2015 Goggle.com, which had changed ownership following a lawsuit by Google, hosted a survey scam and displayed links to
Amazon
Amazon most often refers to:
* Amazons, a tribe of female warriors in Greek mythology
* Amazon rainforest, a rainforest covering most of the Amazon basin
* Amazon River, in South America
* Amazon (company), an American multinational technolog ...
items. In 2017, the domain hosted a blank page, with only the word "goggle" present in its HTML script. At the beginning of 2018, the site redirected to the scam site tango-deg.com and others, but from October 2018 it existed as a simple HTML markup with a top-level heading reading "Goggle.com Inc.". In late 2019, the website became a
WordPress
WordPress (WP or WordPress.org) is a free and open-source software, free and open-source content management system (CMS) written in PHP, hypertext preprocessor language and paired with a MySQL or MariaDB database with supported secure hypert ...
blog about the
2020 United States presidential election. The blog credits itself with accurately predicting the outcome of the election.
Features of a SpySheriff infection
* SpySheriff is designed to behave like genuine antispyware software. Its user interface features a
and counts allegedly found threats, but its scan results are deliberately false, with cryptic names such as "Trojan VX …" to mislead and scare the user.
* Removal attempts may be unsuccessful and SpySheriff may reinstall itself.
* The desktop background may be replaced with an image resembling a
Blue Screen of Death, or a notice reading, "SPYWARE INFECTION! Your system is infected with spyware. Windows recommends that you use a spyware removal tool to prevent loss of data. Using this PC before having it cleaned of spyware threats is highly discouraged."
* Attempts to remove SpySheriff via
Add or Remove Programs in Control Panel either fails or causes the computer to restart unexpectedly.
* Attempts to connect to the
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a ''internetworking, network of networks'' that consists ...
in any
Web browser
A web browser is application software for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's screen. Browsers are used on ...
is blocked by SpySheriff. Spy-Sheriff.com becomes the only accessible website, and can be opened through the program's control panel.
* Attempts to remove SpySheriff via
System Restore
System Restore is a feature in Microsoft Windows that allows the user to revert their computer's state (including system files, installed applications, Windows Registry, and system settings) to that of a previous point in time, which can be used ...
are blocked as it prevents the
calendar and restore points from loading. Users can overcome this by undoing the previous restore operation, after which the system will restore itself, allowing for easier removal of SpySheriff.
* SpySheriff can detect certain antispyware and antivirus programs running on the machine, and disable them by ending their processes as soon as it detects them. This may prevent its detection and removal by legitimate antivirus programs.
* SpySheriff can disable
Task Manager
In operating systems, a task manager is a system monitor program used to provide information about the processes and applications running on a computer, as well as the general status of the computer. Some implementations can also be used to ...
and
Registry Editor
The Windows Registry is a hierarchical database that stores low-level settings for the Microsoft Windows operating system and for applications that opt to use the registry. The kernel, device drivers, services, Security Accounts Manager, and u ...
, preventing the user from ending its active process or removing its registry entries from Windows. Renaming the 'regedit' and 'taskmgr' executables will solve this problem.
See also
*
Rogue security software
Rogue security software is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and aims to convince them to pay for a fake malware removal tool that actually installs malware on ...
*
Trojan horse (computing)
In computing, a Trojan horse is any malware that misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.
Trojans generally spread by some form ...
Notes
References
External links
*
* http://www.bleepingcomputer.com/forums/topic22402.html
* https://web.archive.org/web/20120401221555/http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Program%3AWin32%2FSpySheriff
{{DEFAULTSORT:Spysheriff
Windows trojans
Scareware