CDS Help

brucake

Banned User - player fraud - flaming troll
Joined
Mar 28, 2011
Location
Kintston-upon-Thames
I was trying to file a complaint to CDS about friends casino. The friends casino site does not have a working CDS link. There is a CDS sign but it isn't a working link. When I go to CDS it only offers 3 casinos. How do you find the right place so that I can file a complaint?
Also, is this a worthwhile casino to PaB? It is not listed on the accredited list here.
 
I was trying to file a complaint to CDS about friends casino. The friends casino site does not have a working CDS link. There is a CDS sign but it isn't a working link. When I go to CDS it only offers 3 casinos. How do you find the right place so that I can file a complaint?
Also, is this a worthwhile casino to PaB? It is not listed on the accredited list here.

They are most likely rogue, as you are ONLY meant to submit a CDS complaint through the link on the casino site, so they have made sure you CAN'T submit a CDS complaint. In other words, they won't even let you complain to the mailman, let alone a licensing authority.

They wouldn't also happen to be "legally licensed and insured", and based somewhere like Costa Rica or Panama?
 
I know nothing about friends casino, but was looking around their site and discovered something interesting I thought might be worth sharing.

One of their partners (for credit card processing) is running a VERY shady business:

The following site is directly connected to their processor:
www . printer4u . biz
(I deliberately put SPACES in between above. Proceed to this URL at your OWN RISK!!)

This site takes you to a Fake Malware Scanner, which is designed to trick webusers into paying for an anti-virus scanner to get rid of a virus which doesn't even exist (at least not, before the user browsed their site...)

this is what you'll get:
Capture.jpg

I know this doesn't answer the OP's question, but should help others to make their conclusion on this outfit.
 
your root kit is fucked :s
try to get as much info and then reinstall your OS .. your cached memory ( prob 8k,16 or 32k ) space as well.
after that i would re-config my router ( call your ISP, better safe then.. )

Ubuntu 10.10... is bootable from your cd drive. ( it's a linux OS, but very simple )
If you have time, give it try before you format.. you could prob save some stuff and TRACE that shit :)
 
your root kit is fucked :s
try to get as much info and then reinstall your OS .. your cached memory ( prob 8k,16 or 32k ) space as well.
after that i would re-config my router ( call your ISP, better safe then.. )

Ubuntu 10.10... is bootable from your cd drive. ( it's a linux OS, but very simple )
If you have time, give it try before you format.. you could prob save some stuff and TRACE that shit :)

It may not be that bad. The point of these fake scanners is blackmail. The user will be asked to "upgrade" to a paid version in order to have the threats removed. In the mean time, a package would have been left behind that constantly reminds the user of these uncleared threats every time they use their PC.

A friend of mine got one of these, and I was able to identify and remove it using some online research and an appropriate tool from a well respected vendor.

The step by step removal guide is not for the faint hearted though, and some steps are not needed depending upon the exact variant installed.

One trick is that some files are held by an active process, and cannot simply be deleted. This has to be done either by adding script to "autoexec.bat" (which the tools can do for you), or booting from a CD or rescue disk. These then allow removal of the files at boot up.

If a rootkit has been sneaked in, this can be detected by the newer security packages, and removed.

One sign of a rootkit, or something else, remaining is that the scanner will find it's way back onto the PC after a couple more reboots.

At the very least, there is an opportunity to rescue your data before reinstalling the OS. The rescued data should then be subjected to a deep scan by a good security product before being allowed back onto the clean install.

Good security in the first place would normally prevent this scanner from installing it's package, but it might still try it on by showing a webpage that looked like a warning from your OS.
Security packages have a list of known websites like this, and create a blacklist in the registry which prevents these known sites putting ANYTHING on your PC, as well as giving a clear warning before allowing the browser to load the pages.
 
It may not be that bad. The point of these fake scanners is blackmail. The user will be asked to "upgrade" to a paid version in order to have the threats removed. In the mean time, a package would have been left behind that constantly reminds the user of these uncleared threats every time they use their PC.

A friend of mine got one of these, and I was able to identify and remove it using some online research and an appropriate tool from a well respected vendor.

The step by step removal guide is not for the faint hearted though, and some steps are not needed depending upon the exact variant installed.

One trick is that some files are held by an active process, and cannot simply be deleted. This has to be done either by adding script to "autoexec.bat" (which the tools can do for you), or booting from a CD or rescue disk. These then allow removal of the files at boot up.

If a rootkit has been sneaked in, this can be detected by the newer security packages, and removed.

One sign of a rootkit, or something else, remaining is that the scanner will find it's way back onto the PC after a couple more reboots.

At the very least, there is an opportunity to rescue your data before reinstalling the OS. The rescued data should then be subjected to a deep scan by a good security product before being allowed back onto the clean install.

Good security in the first place would normally prevent this scanner from installing it's package, but it might still try it on by showing a webpage that looked like a warning from your OS.
Security packages have a list of known websites like this, and create a blacklist in the registry which prevents these known sites putting ANYTHING on your PC, as well as giving a clear warning before allowing the browser to load the pages.


ok it's just that experiences in the past made me a bit paranoid :p
he has a good point :) try that first :D


... altough if he can: dual booting with something like ubuntu is not that drastic, to save your files..
i don't think he has a legal ***** cd , cause the new genuine firewall would have fixed it, what do you think?
 
Thanks for the feedback and suggestions guys.

My machine is actually fine and not infected with any unwanted software at all. Sorry, my original post wasn't that clear on this.

The screenshot I posted is actually just the webpage served when browsing the mentioned URL.
This webpage just looks like a standard windows control and security alert trying to trick the unexperienced user to click "Remove all" or "Start protection" (which I didn't), which in turn then will install the fake malware scanner.

They have put a lot of effort into making this site appear like a real threat. Unfortunately these guys are wasting their creative energy on the dark side..
 
Thanks for the feedback and suggestions guys.

My machine is actually fine and not infected with any unwanted software at all. Sorry, my original post wasn't that clear on this.

The screenshot I posted is actually just the webpage served when browsing the mentioned URL.
This webpage just looks like a standard windows control and security alert trying to trick the unexperienced user to click "Remove all" or "Start protection" (which I didn't), which in turn then will install the fake malware scanner.

They have put a lot of effort into making this site appear like a real threat. Unfortunately these guys are wasting their creative energy on the dark side..

Just as well. This is how my friend got caught, clicked "Start Protection" and THEN found out a bit later that something nasty had gotten onto the machine, and kept on mimicking a standard Windows system tray alert, which when clicked went to a site asking for payment to remove the threats.
 

Users who are viewing this thread

Meister Ratings

Back
Top