Home > Threat descriptions >

Rogue antispyware/antivirus software


Category: Malware

Type: Rogue

Aliases: Rogue antispyware/antivirus software, Fraudtool.[variant], Fraudpack.[variant], Trojan.fakealert


Deceptive or fraudulent antispyware/antivirus software that uses misleading or high-pressure tactics (e.g., falsely claiming a malware infection or deliberately infecting the machine) to pressure users into installing or purchasing the software.


Automatic action

Once detected, the F-Secure security product will automatically handle a harmful program or file by either deleting or renaming it.

Further actions

In some cases, a rogue may have been silently installed on the system in a 'drive-by download'. In such cases, disinfection should be accompanied by a check to determine if any programs require updating or patching; if so, please refer to the program vendor's site for further details.

Knowledge Base

Find the latest advice in our Community Knowledge Base.

About the product

See the manual for your F-Secure product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details

Rogue antivirus/antispyware programs (generally known as 'rogueware' or 'rogues') are security applications that use misleading, high-pressure, fraudulent or malicious sales tactics to convince users into installing and/or purchasing the product.

The quality of the purchased software itself is also suspect; once installed, the product may not perform as expected. Some are simply substandard products that present false information or false positives due to bugs in the software's code, rather than because of an outright deception. Code corrections can move a suspect program off the rogueware detection lists. Other rogues however are intentionally malicious and either do not bring no benefit to the user, or actively interfere with the computer's operations or compromise the user's data.

Rogue antispyware or antivirus programs typically closely mimic legitimate applications, using similar (or even identical) styling and packaging to convey legitimacy. As such, it can be difficult for both technical and non-technical users to differentiate between legitimate and rogue applications.

For more information about rogues, please see Article: Rogues