{"id":19309,"date":"2012-10-11T10:56:50","date_gmt":"2012-10-11T17:56:50","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=19309"},"modified":"2025-06-02T21:00:40","modified_gmt":"2025-06-03T04:00:40","slug":"multiplatform-fake-av-uses-different-guis","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/","title":{"rendered":"Multiplatform Fake AV Uses Different GUIs"},"content":{"rendered":"<p>Since the beginning of October we have seen a variant of fake antivirus malware that belongs to the FakeRean family of rogue security products. FakeRean is distributed by drive-by downloads or is dropped and executed by another malware. It blocks victims from accessing any other legitimate application on an infected machine. Like other fake AV products, it claims to detect infections and displays alerts to scare users into purchasing \u201cprotection.\u201d In reality this program does not scan your computer. These rogue malware extort money from PC owners to \u201cfix\u201d their systems. This malware also blocks users from accessing or executing any .exe file on the victim&#8217;s machine.<\/p>\n<p>The main difference with this rogue is that it brings up a different GUI depending on the version of Windows it infects.<\/p>\n<p>We can see some GUIs below:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=19312\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19312\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/1.png\" alt=\"\" width=\"605\" height=\"432\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/1.png 605w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/1-300x214.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=19313\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19313\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/2.png\" alt=\"\" width=\"602\" height=\"430\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/2.png 602w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/2-300x214.png 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=19314\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19314\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/3.png\" alt=\"\" width=\"739\" height=\"529\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/3.png 739w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/3-300x214.png 300w\" sizes=\"auto, (max-width: 739px) 100vw, 739px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Once executed, the Trojan disables the security system on the victim\u2019s machine.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=19315\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19315\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/4.png\" alt=\"\" width=\"605\" height=\"206\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/4.png 605w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/4-300x102.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/a><\/p>\n<p>Like other infections of rogue security products, this variant scares its victims and steals money if they pay for protection. The malware tricks the victims into purchasing the \u201cfull\u201d version.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=19316\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19316\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/5.png\" alt=\"\" width=\"600\" height=\"431\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/5.png 600w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/5-300x215.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>Victims can regain control of their machines by clicking the Manual Activation tab, as shown below, and entering the activation code <strong>3425-814615-3990<\/strong>. This will not remove the malware but it will allow users to work again.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=19317\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19317\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/6.png\" alt=\"\" width=\"592\" height=\"434\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/6.png 592w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/6-300x219.png 300w\" sizes=\"auto, (max-width: 592px) 100vw, 592px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=19318\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19318\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/7.png\" alt=\"\" width=\"395\" height=\"236\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/7.png 395w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/7-300x179.png 300w\" sizes=\"auto, (max-width: 395px) 100vw, 395px\" \/><\/a><\/p>\n<p>A series of fraudulent progressive bars and scans will show up when the victim clicks Continue.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=19319\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19319\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/8.png\" alt=\"\" width=\"604\" height=\"434\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/8.png 604w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/8-300x215.png 300w\" sizes=\"auto, (max-width: 604px) 100vw, 604px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=19320\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19320\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/9.png\" alt=\"\" width=\"603\" height=\"433\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/9.png 603w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/9-300x215.png 300w\" sizes=\"auto, (max-width: 603px) 100vw, 603px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=19321\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19321\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/10.png\" alt=\"\" width=\"399\" height=\"175\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/10.png 399w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/10-300x131.png 300w\" sizes=\"auto, (max-width: 399px) 100vw, 399px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=19322\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19322\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/11.png\" alt=\"\" width=\"401\" height=\"171\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/11.png 401w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/11-300x127.png 300w\" sizes=\"auto, (max-width: 401px) 100vw, 401px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=19323\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19323\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/12.png\" alt=\"\" width=\"602\" height=\"400\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/12.png 602w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/12-300x199.png 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/a><\/p>\n<p>After the fake updates have been \u201cdownloaded,\u201d a victim\u2019s Internet browser will work normally.<\/p>\n<p>The malware is designed to select the color radiant of the GUI that it uses.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=19324\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19324\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/13.png\" alt=\"\" width=\"224\" height=\"79\" \/><\/a><\/p>\n<p>The Trojan enumerates the running processes, looking out for AV and security-related services. If found, it terminates them.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=19325\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19325\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/14.png\" alt=\"\" width=\"130\" height=\"295\" \/><\/a><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=19326\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19326\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/15.png\" alt=\"\" width=\"605\" height=\"266\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/15.png 605w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/15-300x131.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/a><\/p>\n<p>A new UPX-packed file is written in memory and executed.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=19329\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19329\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/161.png\" alt=\"\" width=\"39\" height=\"40\" \/><\/a><\/p>\n<p>After we unpacked the file, we found many strings that appear on the fake AV GUI.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=19328\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19328\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/17.png\" alt=\"\" width=\"604\" height=\"396\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/17.png 604w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/17-300x196.png 300w\" sizes=\"auto, (max-width: 604px) 100vw, 604px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=19330\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19330\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/18.png\" alt=\"\" width=\"605\" height=\"245\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/18.png 605w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/18-300x121.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/a><\/p>\n<h2><strong>Advice to Customers<\/strong><\/h2>\n<p>Keep your systems updated with the latest patches. Insure your antimalware software is updated with the latest DATs. Always run a reputable firewall on your machines. And beware of drive-by downloads when visiting any new websites.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div>\n<hr align=\"left\" size=\"1\" width=\"33%\" \/>\n<\/div>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since the beginning of October we have seen a variant of fake antivirus malware that belongs to the FakeRean family&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[3973],"class_list":["post-19309","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Multiplatform Fake AV Uses Different GUIs | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Since the beginning of October we have seen a variant of fake antivirus malware that belongs to the FakeRean family of rogue security products. FakeRean\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Multiplatform Fake AV Uses Different GUIs | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Since the beginning of October we have seen a variant of fake antivirus malware that belongs to the FakeRean family of rogue security products. FakeRean\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2012-10-11T17:56:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T04:00:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"605\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Multiplatform Fake AV Uses Different GUIs\",\"datePublished\":\"2012-10-11T17:56:50+00:00\",\"dateModified\":\"2025-06-03T04:00:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/\"},\"wordCount\":360,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/1.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/\",\"name\":\"Multiplatform Fake AV Uses Different GUIs | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/1.png\",\"datePublished\":\"2012-10-11T17:56:50+00:00\",\"dateModified\":\"2025-06-03T04:00:40+00:00\",\"description\":\"Since the beginning of October we have seen a variant of fake antivirus malware that belongs to the FakeRean family of rogue security products. FakeRean\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/1.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Multiplatform Fake AV Uses Different GUIs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Multiplatform Fake AV Uses Different GUIs | McAfee Blog","description":"Since the beginning of October we have seen a variant of fake antivirus malware that belongs to the FakeRean family of rogue security products. FakeRean","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Multiplatform Fake AV Uses Different GUIs | McAfee Blog","og_description":"Since the beginning of October we have seen a variant of fake antivirus malware that belongs to the FakeRean family of rogue security products. FakeRean","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2012-10-11T17:56:50+00:00","article_modified_time":"2025-06-03T04:00:40+00:00","og_image":[{"width":605,"height":432,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/10\/1.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Multiplatform Fake AV Uses Different GUIs","datePublished":"2012-10-11T17:56:50+00:00","dateModified":"2025-06-03T04:00:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/"},"wordCount":360,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/1.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/","name":"Multiplatform Fake AV Uses Different GUIs | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/1.png","datePublished":"2012-10-11T17:56:50+00:00","dateModified":"2025-06-03T04:00:40+00:00","description":"Since the beginning of October we have seen a variant of fake antivirus malware that belongs to the FakeRean family of rogue security products. FakeRean","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/1.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2012\/10\/1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/multiplatform-fake-av-uses-different-guis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Multiplatform Fake AV Uses Different GUIs"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/19309","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=19309"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/19309\/revisions"}],"predecessor-version":[{"id":214991,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/19309\/revisions\/214991"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=19309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=19309"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=19309"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=19309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}