Hiya Members,
Came across this and wanted to warn members:
Security Operations is observing an aggressive FakeAV/RogueWare installation campaign utilizing banner ads on trusted websites. Some of the sites currently serving this malicious software include msnbc.com, youtube.com, and bing.com.
The Perimeter Security Operations Center has recently discovered that upon visiting these sites you may be presented with either a fake Adobe Reader 8 Install prompt or a Microsoft Security Essentials "Infection Found" pop-up window. Neither of these are legitimate.
This ad based drive-by download presents itself as ThinkPoint. The file may use a legitimate name such as hotfix.exe or mstsc.exe and is saved to a temp directory. It then picks out random files, claims they are infected and forces you to "clean" these false threats. ThinkPoint will state that you need a heuristic program to fix the problems and offers to sell one for $99.90. Do not purchase ThinkPoint; this program is fraudulent.
Antiviruses may detect this as FakeAV, FakeAlert, or a generic Trojan. A full list can be found here:
http://www.virustotal.com/file-scan/report.html?id=c049d274905ac80c9377e1cb0c291a5e67c33876ce256454db29dea953e44e4a-1287696527
Screenshots of the infection in progress:

There is a surprising lack of information about this trojan variant, considering how popular the sites are that are helping spread it. We have found one reputable antivirus vendor with insight:
http://www.f-secure.com/weblog/archives/00002053.html
For Perimeter's ITC customers we have added a Null Route to blacklist the IP address of the domain actually serving the malware. The advertising domain has also been submitted to Fortinet to be recategorized as Malware until this issue can be resolved by the primary domains using the advertisements.
For customer's using Fortigates, additional steps of preventing this kind of infection include subscribing to Web Content Filtering while blocking the Advertising and Unrated categories, and subscribing to network Antivirus with download of Executables blocked.
Lips
Caution Fake Banners on Trusted Sites
- 3,477
- views
- 6
- replies
lcb activities in the last 24 hours
Most viewed forum topics
Hello,
LCB has been made aware of this online scam/fraud tactic – 18th September 2025.
Domain: https://grivanto.com/ ( Registered On: 27.08.
Warning: grivanto.com
Dream Royale - Exclusive No Deposit Bonus
New players only - US OK!
Amount: $100 Chip
How to claim the bonus: Players need to sign up through our LINK, redeem the code in the...
Dream Royale Exclusive No Deposit Bonus
The LCB Awards are officially back for 2025!
Since launching our first-ever Awards in 2022, this event has grown into one of our community’s most exciting annual traditions, a moment...
LCB Awards 2025 $6,000 cash contest: Vote for Best in iGaming!

Share on
Twitter
Facebook
Delicious
Reddit
Copy Page URL