<P> Cold - calling has also become a vector for distribution of this type of malware, with callers often claiming to be from "Microsoft Support" or another legitimate organization . </P> <P> Black Hat search engine optimization (SEO) is a technique used to trick search engines into displaying malicious URLs in search results . The malicious webpages are filled with popular keywords in order to achieve a higher ranking in the search results . When the end user searches the web, one of these infected webpages is returned . Usually the most popular keywords from services such as Google Trends are used to generate webpages via PHP scripts placed on the compromised website . These PHP scripts will then monitor for search engine crawlers and feed them with specially crafted webpages that are then listed in the search results . Then, when the user searches for their keyword or images and clicks on the malicious link, they will be redirected to the Rogue security software payload . </P> <P> Most websites usually employ third - party services for advertising on their webpages . If one of these advertising services is compromised, they may end up inadvertently infecting all of the websites using their service by advertising rogue security software . </P> <P> Spam messages that include malicious attachments, links to binaries and drive - by download sites are another common mechanism for distributing rogue security software . Spam emails are often sent with content associated with typical day - to - day activities such as parcel deliveries, or taxation documents, designed to entice users to click on links or run attachments . When users succumb to these kinds of social engineering tricks they are quickly infected either directly via the attachment, or indirectly via a malicious website . This is known as a drive - by download . Usually in drive - by download attacks the malware is installed on the victim's machine without any interaction or awareness and occurs simply by visiting the website . </P>

Software that is disguised as a legitimate application