A dialer (fraudulent version) is a program that uses computer’s modem to establish a dialup connection over the Internet and make the money from calls. A connection is made by dialing a predetermined phone number and connecting to an international or premium rate local phone numbers. Dialers are capable of making an unauthorized connection and bypassing the local Internet service provider. After performing these activities, victims lose the money by receiving increased phone bills.
The most of dialers are malicious programs that work in the same manner as regular computer viruses. Therefore, they change system’s essential dialup and networking settings without user’s consent and approval. A typical dialer runs on every computer startup and attempts to hide its presence on the system. A parasite doesn’t affect computer’s performance and doesn’t leave any clues like unexpected advertisements or third-party toolbars, so its activity can hardly be easily noticed. Users of broadband lines, such as DSL, LAN or similar, cannot be affected because their computers have no modems installed.
Some dialers are legitimate applications developed by Internet service providers and certain companies. Their task is to ease the process of setting up an Internet connection or to perform marketing campaigns of third parties. Such parties provide their users with the license agreement and inform them about the installation of a dialer. Nevertheless, such programs are quite rare.
Activities that characterize dialers
- Using a compromised computer to connect to the high-cost phone numbers.
- Promoting potentially unsafe web sites with pornographic, advertising or other similar content.
- Causing system modification and altering essential dialup and networking settings. This is done by the dialer for registering itself as a default Internet connection service and connecting a compromised computer over the Internet.
- Changing web browser’s settings. You can notice changes in your home page and default search engine. In addition, you can be prevented from restoring these settings.
- Creating numerous links that could lead people to potentially insecure web sites. In addition, a victim may also notice unknown desktop shortcuts to suspicious sites, unknown bookmarks and new entries in his/hers Favorites list.
- Provides no removal feature.
Infiltration techniques that are used by dialiers
Although the most dialers are very similar to regular viruses, their distribution methods are quite different. They do not spread like other types of malware. In most of the cases, people have to install them on the system as any other software. This can be done either with or without user’s content. More information about the major distributors that have been used for the unnoticed installation of dialer parasites is provided below.
- Pornographic and illegal websites. Sites that are filled with adult-oriented content, illegal music and video files and similar offers should be avoided. Otherwise, they can trick the user to download and manually install a particular dialer on the system. No matter that it is declared that this should be done for getting an ability to receive an access to desired constant, you should not agree with such installation. Such dialers not only fail to provide the uninstaller, but can also lead you to the loss of your money by making Internet connections through high-cost phone numbers.
- System vulnerabilities. The biggest amount of malicious dialers get into the system by exploiting certain vulnerabilities. Such security holes may appear by failing to update anti-virus/anti-spyware software or web browser. In addition, the malicious dialer may appear on your computer by running into an insecure web site that is filled with the malicious code or by clicking on an unsafe pop-up ad. The affected user cannot notice anything suspicious, as parasites do not display any setup wizards, dialogs or warnings.
- Spam and malicious email messages. Some dialers are secretly installed on the system by opening spam or malicious e-mail messages. Some part of such parasites arrives to the target PC system as legitimate e-mail attachments. Their installation is made without user’s consent and approval.
The most popular examples of dialers
There are lots of different dialers that are considered malicious. The following examples illustrate their behavior on the affected PC system.
661-748-0240 offers access to the Internet via high-cost telephone numbers. It redirects a web browser to certain Internet resources and changes default home page without asking for user permission. This dialer can be secretly installed while visiting some unsafe web sites. The parasite alters the registry, so the threat runs on every Windows startup, and creates a desktop shortcut named Click Me!!!. Most dialers are quite similar to this example and do not pose any threat to the system, but severely violate the privacy of the user.
Trojan.Dialer.yz connects its victim’s computer to the Internet through expensive phone number. It is capable of accessing a predefined Internet resource on required domain without asking a permission from the user. This threat silently erases the web browser’s cache and history. The parasite gets into the system from some insecure web sites. The dialer complicates its detection and removal and doesn’t have the functional uninstaller.
Trafficadvance is a way more harmful dialer that not only connects a compromised computer to the Internet using a premium rate phone number, but also terminates some running applications and steals system information. Once executed, it modifies the Windows registry to register itself as a primary Internet connection service. This means that all further Internet connections will be made through expensive phone number instead of local lnternet service provider’s default one. Such activity results in receiving enormous phone bills.
Removing dialer from the PC system
As it was said above, the most of dialers work in the same manner as the computer viruses and, therefore, can be found and removed with the help of reliable anti-spyware program. We can recommend FortectIntego or SpyHunter 5Combo Cleaner that have showed great results when removing dialer from the system.
Beware that in some cases even the most antivirus or spyware remover can fail to get rid of a particular dialer. That is why there are Internet resources such as 2-Spyware.com, which provide manual malware removal instructions. These instructions allow the user to manually delete all the files, directories, registry entries and other objects that belong to a parasite. However, manual removal requires fair system knowledge and therefore can be a quite difficult and tedious task for novices.
Latest dialers added to the database
Information updated: 2017-05-11