newsletter banner

ISSUE 21.24.F • 2024-06-10 • Text Alerts!Gift Certificates
You’re reading the FREE newsletter

Susan Bradley

You’ll immediately gain access to the longer, better version of the newsletter when you make a donation and become a Plus Member. You’ll receive all the articles shown in the table of contents below, plus access to all our premium content for the next 12 months. And you’ll have access to our complete newsletter archive!

Upgrade to Plus membership today and enjoy all the Plus benefits!

In this issue

PUBLIC DEFENDER: Your ‘free’ VPN may actually be a malware bot

Additional articles in the PLUS issue

SOFTWARE: Snagit for great screenshots

PATCH WATCH: Should you trust that tech info?

COMMENTARY: The software subscription model


ADVERTISEMENT
VideoProc Converter AI

VideoProc Converter AI – Mega Upgrade and Giveaway

VideoProc Converter AI V7.0 introduces two new AI models that upscale low-quality videos and images to 4K/8K much faster, intelligently generating high-res details for skin, hair, and textures while de-noising, de-blurring, and correcting flaws. Plus, enjoy enhanced video downloading, converting, compressing, editing, and recording.

Special Offer and Giveaway: Save 60% on a Lifetime Licensed Version, enjoy unlimited access to full features and lifetime free upgrades. Alternatively, grab a free copy of VideoProc Converter AI V6.4 in the time-limited giveaway.


PUBLIC DEFENDER

Your ‘free’ VPN may actually be a malware bot

Brian Livingston

By Brian Livingston Comment about this article

Law-enforcement authorities, coordinating the US Federal Bureau of Investigation and similar agencies in Germany, Singapore, and Thailand, have arrested the leaders of a worldwide botnet that relied on people downloading and installing software to create “free” virtual private networks (VPNs).

I’m putting “free” in quotes, because real VPNs make costly investments in equipment and expertise. Legit VPN services almost always charge at least a small monthly fee.

Before the arrests were announced on May 29, 2024, more than 19 million infected computers in some 190 countries were being used by hackers for credit-card fraud, Dark Web operations, and a lot else. Jailing the so-called 911 S5 organizers and shutting them down dismantled what FBI director Christopher Wray described as “likely the world’s largest botnet ever.”

The network was taken down, but malware may still be in your system

In a coordinated effort using the code name Operation Tunnel RAT — Rapid Action Team — law enforcement seized scores of botnet servers. The authorities immediately changed the malware website’s home page into a fearsome warning to hackers everywhere. (See Figure 1.)

911 S5 botnet taken down by FBI
Figure 1. When the US Department of Justice seized the servers that ran the so-called “911 S5” botnet, authorities replaced the original home page with this warning about the allegedly illegal operation.Source: US Department of Justice

The following three individuals have been identified by the US Department of the Treasury as the primary actors in the 911 S5 botnet, according to a Treasury press release:

  • YunHe Wang, 35, a national of China, is accused of being the primary administrator of the botnet. He also has citizenship status in St. Kitts & Nevis, a Caribbean island nation, after purchasing a “golden visa” (a six-figure investment in government-approved projects).
  • Jingping Liu allegedly laundered some of the $99 million that Wang is reported to have received from malicious users of the botnet since 2018. (The 911 S5 name was briefly rebranded by the principals as Cloudrouter in 2023.)
  • Yanni Zheng is alleged to have acted as a power of attorney for Wang and one of his companies, Spicy Code Co. Ltd., in numerous financial transactions.

Wang was apprehended in Singapore and is expected to be extradited to the US. He faces 65 years in prison if convicted of all charges.

Former home page of 911 S5 service
Figure 2. Before it was shut down, the 911 S5 botnet organization had a professional-looking website. For a fee, the portal gave hackers access to 19 million infected PCs around the world to be used for cybercrimes.Source: Radio Free Asia article

What harm did the botnet do before it was taken down by authorities? Hackers reportedly used the network to hide their identities while carrying out the following exploits, according to a Justice Department press release:

  • Stealing $5.9 billion from unemployment insurance programs in the US. Hackers filed 560,000 bogus claims, using the IP addresses of PCs that were running the malware.
  • Filing 47,000 fraudulent applications to the US Economic Injury Disaster Loan program. This COVID-19 relief effort distributed payments of up to $2 million to more than 10 million small businesses. The total outlay exceeded $1 trillion. A sample of just 155 verified frauds cost the program $188 million, a US Government Accountability Office report says.
  • Placing 2,500 bogus orders totaling $5.5 million through ShopMyExchange, an ecommerce platform run by the US Army & Air Force Exchange Service. The hackers weren’t quite as clever in this heist — fraud-detection systems reduced the attempted credit-card thefts to a loss of “only” $250,000.

The above is just a partial list of the ways the botnet was used. The Justice Department also accuses the principals of renting access to the infected computers for billions of dollars of bank-fraud transactions, transmission of bomb threats, distribution of child-abuse materials, and more.

Besides offering “free” VPN software for Windows, the hackers also bundled the malware VPNs with other software packages, such as fake “updates” for Adobe Flash Player.

Infected programs include the following brand names, according to an FBI statement:

  • DewVPN
  • MaskVPN
  • PaladinVPN
  • ProxyGate
  • ShieldVPN
  • ShineVPN

There may be additional names that the 911 S5 botnet apps used. We may never know the full extent of the infected products that were downloaded by unsuspecting computer users.

Authorities have by now seized approximately $30 million worth of the principals’ assets. That includes 70 servers and 23 domain names that enabled the scheme. If those seizures have shut down the botnet, do the malware-containing VPNs still threaten you and your computer?

I can’t guarantee that some hacker won’t figure out a way to reactivate at least some parts of the botnet for nefarious purposes. That would make your home or office IP address appear to be the origin of fraudulent credit-card transactions or any of the other vile acts that aroused the FBI’s attention. At a minimum, the VPN software you installed may now fail to work — if it ever worked.

Later, I’ll tell you how to determine whether your PC has one of these malware apps installed and, if so, how to remove it.

First, let’s make it clear how you should use VPN software safely and ethically.

If you need a VPN, make it a good one, not a ‘free’ one

There are both legitimate reasons and questionable reasons for individuals and companies to use virtual private networks:

  • Some of the legitimate reasons include using VPNs to protect Internet connections on public Wi-Fi networks and to make remote access to private servers more secure.
  • Questionable reasons (which people may defend as simply exercising their privacy rights) include posing as a user in a different country than the actual location. Concealing your true location may also be required to access the Dark Web for stolen products or services.

An example of the second kind of use is signing into a Netflix account while running a VPN program. The user’s VPN software attempts to convince Netflix that the user is in a country where the service offers certain videos. For some content, Netflix may not have a license to stream a movie to every country.

Using a VPN to fake your location violates Netflix’s terms of service. The company does everything it can to identify and block VPN connections. Despite this, many respected VPN offerings — none of which is free — do succeed in tricking Netflix. Several such programs are given 1-to-5-star ratings in tests such as a recent TechRadar review.

Many tech companies, not just Netflix, offer the greatest breadth of service to customers in the United States. This explains why people in some 190 other countries were eager to download the botnet’s “free” VPN software. With these Trojan-horse VPNs, users could get services that are not ordinarily available in their own countries. (See Figure 3.)

Using a VPN to view Netflix UK from the US
Figure 3. In this example, a tester uses a VPN to view Netflix UK content from a location in the US.Source: Security.org review

Our own tech maven, Susan Bradley, has for years advised against “free” VPNs. Maintaining a worldwide VPN costs money, as Susan aptly points out. There’s hardware to maintain, communication links to keep up, the salaries for the tech staffers who make it all run, and more.

Susan has most recently stated her view in an AskWoody post. And in a May 13, 2024, article on antivirus products, she also explained that VPN users need a health-checking app. Such services verify that the IP address your VPN assigned to you is “healthy.” (That is, it doesn’t have a bad reputation, which would block you from various websites, including AskWoody.)

“Free” VPNs are something of an oxymoron, if you want something that isn’t crapware or outright malware.

The latest rankings of respected VPN programs — and their costs — are available at the following expert sites. Each reviewer recommends several VPNs, all of which have various pros and cons:

  • Security.org: NordVPN, Surfshark, Private Internet Access (PIA, review)
  • CNET: ExpressVPN, Surfshark, NordVPN, ProtonVPN, PIA (review)
  • PCWorld: Express VPN, NordVPN, Mullvad, IVPN, Hotspot Shield, PIA, AirVPN, CyberGhost, Surfshark, AVG Secure, Windscribe Pro, ProtonVPN, PersonalVPN (review)
  • Engadget: Proton VPN, Windscribe, ExpressVPN, CyberGhost, Surfshark (review)
  • Tom’s Guide: NordVPN, ExpressVPN, Surfshark, PIA (review)
  • ZDNET: ExpressVPN, Surfshark, NordVPN, PIA, Proton VPN (review)

If you’re considering a VPN, which one is right for you? That depends on which quality you value most: the tightest security, the fastest throughput speed, or the lowest monthly cost.

Determine your priority, and then look into the above reviews, which sort the contenders by those qualities. The ratings can help you pick the one VPN that best meets your needs.

How to find malware VPNs in your system and remove them

There’s no way to ever be sure you’ve discovered and deleted all the malware from your PC. Fortunately, the FBI has published a three-page explanation of the steps you should take if you suspect that a 911 S5 VPN program may be living on your system.

It’s important to follow the agency’s detailed instructions, because you might not be able to merely delete a VPN’s folder to kill it. The app may be “protecting” its files from simple deletion.

Task Manager Processes tab reveals a malware app
Figure 4. In this case, the Task Manager’s Processes tab reveals that this PC is running ShieldVPN, one of the botnet’s malware apps.Source: FBI article

You should read the FBI’s complete series of steps to detect and remove any of 911 S5’s malware that may be on your system. But I can summarize the agency’s recommended search-and-destroy mission in just the following two points:

  • Press Ctrl+Alt+Delete and select Task Manager. Check the Processes tab for the names of any of the “free” VPNs that I listed earlier. (See Figure 4.)
  • Right-click the app’s name and select End Task. Then you can delete the folder that bears the same name as the app, whether it is “ShieldVPN,” “MaskVPN,” or one of the other names these programs go by. (See the sidebar image on the left below.)

It’s criminal that we law-abiding computer users have to defend ourselves against malware that silently corrupts the integrity of our systems.

Task Manager End Task option

So, I innocently installed a free app, and now you tell me the IP address of my PC is being identified as the source of multiple fraudulent credit-card transactions? What a world we live in.

After you’ve read the FBI’s instructions, you may want more details on the botware network and what law enforcement intends to do about it.

To understand the legal proceedings, read the Justice Department’s 22-page indictment of Wang and the others (PDF).

For a true-crime look at the $30 million in servers and other assets the FBI says it’s impounded from the botnet operators so far, see the agency’s 118-page warrant for the seizure (PDF).

It seems that no matter how safe we try to keep our computing habits, there’s always another exploit just around the corner. Perhaps artificial intelligence will soon be able to predict the scams being planned by these lowlifes and get them thrown into the pokey before they can ruin our lives on a global scale.

Talk Bubbles post comment button Contribute your thoughts
in this article’s forum!
send tip button Do you know something we all should know?
Send your story to Brian in confidence!

The PUBLIC DEFENDER column is Brian Livingston’s campaign to give you consumer protection from tech. If it’s irritating you, and it has an “on” switch, he’ll take the case! Brian is a successful dot-com entrepreneur, author or co-author of 11 Windows Secrets books, and author of the fintech book Muscular Portfolios.


ADVERTISEMENT


Here are the other stories in this week’s Plus Newsletter

SOFTWARE

Peter Deegan

Snagit for great screenshots

By Peter Deegan

Snagit is the Rolls-Royce of screen-capture tools.

If you take a lot of screen images for documents or presentations, then Snagit is the tool with the most options for both capturing an image/video and enhancing it.

PATCH WATCH

Susan Bradley

Should you trust that tech info?

By Susan Bradley

Getting help with technology has always been a bit difficult. Lately, it’s becoming a bit dangerous.

Once upon a time, vendor support was more obvious and easier to find, and it provided more documentation. I’d argue that Apple still has the best consumer support for its products. But when it comes to business support, neither Microsoft nor Apple provides its customers with appropriate, high-quality, and affordable support.

COMMENTARY

Will Fastie

The software subscription model

By Will Fastie

My data is being held hostage.

A recent email from TechSmith, the maker of Camtasia and Snagit, rubbed me the wrong way. This came on the heels of an annoying experience trying to activate Adobe Creative Suite 3 (CS3, from 2006) on my newest computer. I admit to knowing, in advance, that I would be annoyed.

I then started thinking about software subscription plans and their pros and cons.


Know anyone who would benefit from this information? Please share!
Forward the email and encourage them to sign up via the online form — our public newsletter is free!


Enjoying the newsletter?

Become a PLUS member and get it all!

RoboForm box

Don’t miss any of our great content about Windows, Microsoft, Office, 365, PCs, hardware, software, privacy, security, safety, useful and safe freeware, important news, analysis, and Susan Bradley’s popular and sought-after patch advice.

PLUS, these exclusive benefits:

  • Every article, delivered to your inbox
  • Four bonus issues per year, with original content
  • MS-DEFCON Alerts, delivered to your inbox
  • MS-DEFCON Alerts available via TEXT message
  • Special Plus Alerts, delivered to your inbox
  • Access to the complete archive of nearly two decades of newsletters
  • Identification as a Plus member in our popular forums
  • No ads

We’re supported by donations — choose any amount of $6 or more for a one-year membership.

Join Today buttonGift Certificate button

The AskWoody Newsletters are published by AskWoody Tech LLC, Fresno, CA USA.

Your subscription:

Microsoft and Windows are registered trademarks of Microsoft Corporation. AskWoody, AskWoody.com, Windows Secrets Newsletter, WindowsSecrets.com, WinFind, Windows Gizmos, Security Baseline, Perimeter Scan, Wacky Web Week, the Windows Secrets Logo Design (W, S or road, and Star), and the slogan Everything Microsoft Forgot to Mention all are trademarks and service marks of AskWoody Tech LLC. All other marks are the trademarks or service marks of their respective owners.

Copyright ©2024 AskWoody Tech LLC. All rights reserved.