|Total Sales per Day (USD)||Total Sales per Year (USD)||Infection¹ rate (no. users per day)||Infection¹ rate (no. users per year)||Purchase² rate (no. users per day)||Purchase² rate (no. users per year)||Average Selling Price (USD)||Conversion Rate³|
¹ Infection refers to users who have installed the Fake Anti Virus software trial, but not necessarily purchased it.
² Purchase refers to users who have both installed the Fake Anti Virus software trial, and then purchased a license for it.
³ Conversion Rate refers to the number of purchases as a percentage of the number of infections.
They uncovered a sophisticated method of flying under the radar of credit card fraud detection by minimising chargebacks (credit card refunds) which in turn meant that no suspicion would be raised by the victim's bank or credit card company. They did this simply by maintaining a 24/7 support hotline, thereby keeping a track of the customer's suspicions, and when necessary, issuing refunds directly back to the customer. Fewer than 10% of all victims asked for a refund, meaning that the cybercriminals could issue a full refund to all complainants, and still make massive profits. But in fact the criminals only issued enough refunds to keep their chargeback ratio under the suspicious limit (such as 3%) thereby squeezing the maximum amount of cash from their victims.
|The flow of money in the Fake Anti Virus Business Model|
|A typical Fake Anti Virus popup that leads to the initial infection|
Subscribe to posts via RSS