It turns out that around 2,500 machines have, since 2012, installed a fake VPN application called S5Mark that, unbeknownst to the machines’ users, came bundled with this sophisticated bit of adware.
What to Do
Removing a Zacinlo infection is quite difficult, but a Bitdefender researcher told ZDNet that the best way would be to use an antivirus rescue disk, which uses a USB stick or optical disk to boot the infected machine into a specialized form of Linux that then scans the Windows drive without running Windows. Rescue disk images are offered for free by many antivirus vendors – Bitdefender has instructions on how to create one here (opens in new tab). MORE: Best Antivirus Software and Apps
Where Did Zacinlo Come From?
The masterminds behind Zacinlo have been spreading it since 2012 and are believed to have optimized it for Windows 10 sometime in the past two years. Zacinlo activity saw big spikes in 2014 and 2015, but the adware was most active late in 2017. Its victims are heavily concentrated in the U.S. and on Windows 10 machines – about 90 percent of Zacinlo-infected systems were running Windows 10. Two factors now make Zacinlo a bigger threat than it was a year ago. First, it can survive most traditional defenses against malware. The adware is able to upload your system’s configuration information to a remote command-and-control server for analysis. The command-and-control server can then instruct the adware to disable and uninstall other applications on your computer – namely, your antivirus and anti-malware programs, as well as competing strains of adware. Second, Zacinlo is now a rootkit, operating at the lowest level of the operating system, which makes it very hard to detect. It also writes reinstallation information to the Windows Registry so that it will survive reboots and perhaps even systems upgrades. Additionally, it’s dangerous. Zacinlo has (so far) mainly been deployed to inject ads into web pages and to run a “headless browser” (an invisible browser without a user interface) to click ads in the background of victims’ computers.
It Could Mess with Online Payments
But the adware is capable of more sinister business. Because it uses a stolen It’s also capable of intercepting even encrypted communication, which could enable it to view and tamper with your online payments. It can redirect browser requests, meaning it can load fake web pages that look exactly like the real thing. And it contains a module that can remotely take and transfer screenshots of your screen – which could compromise a lot of your personal information.
Bottom Line
This discovery should serve as a wake-up call: Don’t download shady software. Before installing VPN software, do your research and make sure it’s one you can trust.