FraudTool.YAC

Short bio

FraudTool.YAC is the detection name for Yet Another Cleaner, owned by Elex do Brasil Participações Ltda Technology Inc. It came to our attention after being notified that we were “affiliated” to the company in some way (which we are not).

Upon examination, we discovered similarities in naming conventions between Malwarebytes Anti-Malware and YAC, including fragments of file names and also a specific registry key, which we use to flag when someone has potentially stolen our property for use in another tool without permission.

Creating a false detection which did nothing besides opening a message box, we pushed it out at 4PM on March 1, 2015. Roughly two hours later, the file was detected by YAC, including the use of our intentionally misspelled detection name. This confirmed the use of portions of our technology without our permission, and we sent a letter from our legal team to Elex do Brasil Participações Ltda Technology Inc. with regard ceasing use of our stolen property.

Shortly after our investigation, YAC had their OPSWAT certification, which assures consumers that the products have been tested for interoperability and manageability with third party software, removed.

Type and source of infection

Voluntary download

  • The installer typically is obtained from the YAC homepage (yac(dot)mx) and download sites such as Softonic.

Avoidance advice:

  • Users are advised to either avoid downloading the program, or if it is already installed, to run Malwarebytes Anti-Malware, which will detect the file as FraudTool.YAC.

Protection

Malwarebytes protects users from FraudTool.YAC by using real-time protection.

block Fraudtool.YAC

Malwarebytes blocks Fraudtool.YAC

Remediation

Malwarebytes can detect and remove FraudTool.YAC without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program.
  3. Then click Finish.
  4. Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu.
  5. If another update of the definitions is available, it will be implemented before the rest of the scanning procedure.
  6. When the scan is complete, make sure that all Threats are selected, and click Remove Selected.
  7. Restart your computer when prompted to do so.

Screenshots

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language