FacebookTwitterLinkedIn

Zorton Win 8 Protection 2014

Also Known As: Zorton Win 8 Protection 2014 scam
Damage level: High

What is Zorton Win 8 Protection 2014?

Zorton Win 8 Protection 2014 is a fake security scanner originating from a family of rogue antivirus software called Braviax/FakeRean.

This program was developed by cyber criminals to scare PC users into believing that their computers are infected with high-risk malware and then coerce them into purchasing a 'full version' of Zorton Win 8 Protection 2014 to supposedly eliminate the threats.

This rogue program performs no scans for computer security infections - it merely imitates this process and then displays a false detection list. Furthermore, this malicious software modifies the operating system, disables execution of installed programs, and disables the Task Manager.

When computers are infected with Zorton Win 8 Protection 2014, users are unable to access Internet - this rogue program blocks access to websites, reports that they are infected, and then offers to run a security scan.

zorton win8 protection 2014 main window

This program has a professional-look user interface, however, any similarities with legitimate antivirus programs end at this point. Zorton Win 8 Protection 2014 holds no virus scan engine or virus definition database - it simply generates and displays identical virus detection lists and warning pop-ups on all computers infiltrated.

This fake security scanner is capable of changing its name (all rogue antivirus programs from the Braviax/FakeRean family have this ability). For example, an infected computer running the Windows 7 operating system will appear as Zorton Win 7 Antivirus 2014 or Zorton Win 7 Protection 2014.

Zorton Win 8 Protection 2014 is a scam created by cyber criminals, the sole purpose of which is to sell a useless license key, which supposedly eliminates security infections (that do not actually exist on the user's computer).

None of the information displayed by this program should be trusted (including fake security scans, fake malware detection lists, or fake security warning messages). Commonly, bogus antivirus programs from the Braviax/FakeRean family are proliferated using Trojans and fake online security scanners.

If you discover a website displaying a security warning message or security scan claiming that your PC is infected, do not download any software offered - this is a popular method employed by cyber criminals to distribute their rogue antivirus programs.

If your PC is infiltrated with Zorton Win 8 Protection 2014, use the removal guide provided to eliminate this scam from your computer.

Examples of fake security warning messages displayed by Zorton Win 8 Protection 2014:

“System security threat was detected. Viruses and/or spyware may be damaging your system now. Prevent infection and data loss or stealing by running a free security scan”

“Zorton Win 8 Protection 2014 has blocked a program from accessing the internet - This program is infected with Trojan-BNK.Win32.Keylogger.gen Private data can be stolen by third parties, including credit card details and passwords”

“Zorton Win 8 Protection 2014 Alert - System Hacked! Unknown program is scanning your system registry right now! Identity theft detected”

“Tracking software found! Your PC activity is being monitored. Possible spyware infection. Your data security may be compromised. Sensitive data can be stolen. Prevent damage now by completing a security scan”

Zorton Win 8 Protection 2014 rogue antivirus software performing a fake computer security scan:

zorton win8 protection 2014 performing a fake computer security scan

Zorton Win 8 Protection 2014 blocking Internet access:

Internet Explorer alert. Visiting this site may pose a security threat to your system!
Possible reasons include:


Dangerous code found in this site’s pages which installs unwanted software into your system.
Suspicious and potentially unwanted network activity detected.
Spyware infection in your system.
Complaints from other users about this site.
Port and system scans performed by the site being visited.

Things you can do:


Get a copy of “Zorton Win 8 Protection 2014” to safeguard your PC while surfing the web (RECOMMENDED)
Run a spyware, virus and malware scan
Continue surfing without any security measures (DANGEROUS)

zorton win8 protection 2014 blocking Internet access

Zorton Win 8 Protection 2014 blocking execution of installed programs:

Zorton Win 8 Protection 2014 has blocked a program from accessing the Internet. This program is infected with Trojan-BNK.Win32.Keylogger.gen Private data can be stolen by third parties, including credit card detail and passwords.

zorton win8 protection 2014 blocking execution of installed programs

Zorton Win 8 Protection 2014 displaying a fake Windows Action Center:

Action Center has detected one or more issues for you to review. Windows Defender and Zorton Win 8 Protection 2014 are both turned off.

 zorton win8 protection 2014 displaying a fake Windows action center

A website used by cyber criminals to scam computer users into purchasing a license key for the Zorton Win 8 Protection 2014 fake antivirus program:

rogue website used for collecting payments for the fake licence keys of zorton win8 protection 2014

Instant automatic malware removal: Manual threat removal might be a lengthy and complicated process that requires advanced IT skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of malware. Download it by clicking the button below:
▼ DOWNLOAD Combo Cleaner By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.

Quick menu:

Zorton Win 8 Protection 2014 removal:

Go to the Windows 8 Start Screen, type Advanced. In the search results, select Settings. Click Advanced Startup options. In the opened "General PC Settings" window, select Advanced Startup. Click the "Restart now" button. Your computer will now restart into the "Advanced Startup options menu".

Click the "Troubleshoot" button, then click the "Advanced options" button. In the advanced option screen, click "Startup settings". Click the "Restart" button. Your PC will restart into the Startup Settings screen. Press "5" to boot in Safe Mode with Networking.

Windows 8 Safe Mode with networking

Video showing how to start Windows 8 in "Safe Mode with Networking":

After booting your computer in Safe Mode with Networking, try downloading and running the recommended antimalware software. If the download is blocked, follow the instructions presented below.

IMPORTANT! Zorton Win 8 Protection 2014 rogue antivirus damages Windows Security Center and Windows Defender services. After removing this fake antivirus program, download the registry fixes presented below. After downloading, double-click each and click Yes (when asked to merge data).

Windows 8 braviax/fakerean registry fix

NOTE: If you cannot run the remover, try to right-click over it and select "Run as administrator". If the installation of the malware remover fails, or you cannot open the .exe files, try one of the alternative download locations below:

  • Location 1 (the file is renamed to "iexplore.exe", since most spyware does not block this file)
  • Location 2

If, after or before, removal of this fake antivirus program, you are unable to run any of your installed software, Zorton Win 8 Protection 2014 has modified your operating system's .exe file associations.

To fix this, download the registry fix (link below). Save it to your computer, double click it, click "Yes", and then "OK". After rebooting your PC, file associations should function normally.

If you cannot open your browser (Internet Explorer,  Mozilla Firefox, Google Chrome):

Zorton Win 8 Protection 2014 hijacks Internet browsers, modifies registry settings, and disables execution of programs. In these cases, our developers have created a custom installer - useful when you are unable to browse the Internet or execute .exe files. It starts like an MS-Dos program, runs some registry fixes, and then initiates execution of an installer.

This installer was tested on the Windows 7, Windows Vista, and XP operating systems infected with the most common spyware infections.

To use this installer, right-click in the lower left corner of the screen, in the Quick Access Menu, select Run.

Windows 8 accessing

In the Search field, enter this link: www.pcrisk.com/installer.com and then press ENTER.

Windows 8 downloading installer using Run command


Zorton Win 8 Protection 2014 generates a fake warning after pressing ENTER. Please ignore this and click "No, stay unprotected..." on this message.

File download dialogue will appear reporting that you are downloading the file, installer.com. Click Run, wait for download to complete, and then follow the on-screen instructions. Windows may warn you that opening unknown files may be unsafe. Please ignore these warnings.

If your Internet browsers work, you can use this button to download the customized installer.

IMPORTANT! Zorton Win 8 Protection 2014 rogue antivirus damages Windows Security Center and Windows Defender services. After removing this fake antivirus program, download the registry fixes presented below. After downloading, double-click each and click Yes (when asked to merge data).

 

If installation or downloading fails:

If you are still unable to run or download the removal tool, download the registry fix file. It enables normal execution of applications and fixes web browser errors. Click on the link below, and when download completes, click run, click yes, and then OK.

If installation of the malware remover fails, try our Customized installer built by our technicians to bypass infections and install removers regardless.

If you cannot access your Internet browsers using the infected computer, use a clean system to download this remover and use removable media (such as a CD, USB, etc.) to transfer it to the infected PC.

Note that this rogue also blocks execution of programs. If you are using a clean PC to download the remover, also download the registry fix (download link below) provided. Transfer both files to the infected machine, first run the registry fix, and then run the full scan with the recommended remover.

Zorton Win 8 Protection 2014 removal (optional method):

Zorton Win 8 Protection 2014 rogue program blocks execution of all installed software - this makes its removal complicated. The best way to eliminate this rogue is to login to an unaffected user account and run a security scan from it. If available, login to a "Guest" account and follow the removal steps provided below. If your "Guest" user account is not activated, follow these steps:

Right-click in the lower left corner of the screen, in the Quick Access Menu, select Control Panel.

Turning on guest user on Windows 8 step 1 - accessing Control Panel

In the opened window, click "Change account type" (under "User Accounts and Family Safety").

Turning on guest user on Windows 8 step 2 - clicking Change account type in User accounts and Family Safety section

In the opened window, click "Guest".

Turning on Guest user in Windows 8 step 3 - clicking

In the next window, click the "Turn On" button.

Turning on Guest user in Windows 8 step 4 - clicking

Restart your PC, when the Windows logon screen appears, select the "Guest" user, then continue with the removal steps provided below.

After logging into your Guest account, download recommended malware removal software and run a full system scan to completely eliminate this fake antivirus software from your PC.

Manual Zorton Win 8 Protection 2014 removal instructions

Some spyware can block downloading of spyware removers. If you cannot download it using the default location, try one of the alternative download locations below:

  • Location 1 (the file is renamed to "iexplore.exe", since most spyware does not block this file)
  • Location 2

If installation of the remover fails, try downloading the customized installer built by our technicians to bypass spyware infections. Download customized installer

If you still cannot download or run the spyware removing software, perform these steps:

Step 1
Download the registry fix for Zorton Win 8 Protection 2014 malware. This fix removes registry entries that disallow execution of programs in some variants of this spyware. To download it, click the link below. After downloading, double click win8_av_fix.reg file, click Yes, and then click OK.

Step 2
Some variants of this spyware modify the system proxy settings so that you are unable to access the Internet (or website addresses are redirected to malicious or phishing websites). To reset the proxy settings to default, download and run this tool:

Step 3
Zorton Win 8 Protection 2014 modifies the system Hosts file. The Hosts file is used to resolve canonical names of websites to IP addresses. When it is changed, the user may be redirected to malicious sites, despite seeing legitimate URLs in the address bar. It is difficult to determine if sites are genuine when the Hosts file is modified.

To fix this, download the Microsoft Fix It tool, which restores your Hosts file to the Windows default. Run this tool when downloaded and follow the on-screen instructions. Download link below:

Step 4
That's It! You can now try to download the Malware remover or install and run it if already downloaded.

IMPORTANT! Zorton Win 8 Protection 2014 rogue antivirus damages Windows Security Center and Windows Defender services. After removing this fake antivirus program, download the registry fixes presented below. After downloading, double-click each and click Yes (when asked to merge data).

Windows 8 braviax/fakerean registry fix

Other tools known to remove Zorton Win 8 Protection 2014:

Summary:

The fake antivirus programs (also known as "rogue antivirus programs" or "scareware") are applications that tries to lure computer users into paying for their non-existent full versions to remove the supposedly detected security infections (although the computer is actually clean). These bogus programs are created by cyber criminals who design them to look as legitimate antivirus software. Most commonly rogue antivirus programs infiltrate user's computer using poop-up windows or alerts which appear when users surf the Internet. These deceptive messages trick users into downloading a rogue antivirus program on their computers. Other known tactics used to spread scareware include exploit kits, infected email messages, online ad networks, drive-by downloads, or even direct calls to user's offering free support.

A computer that is infected with a fake antivirus program might also have other malware installed on it as rogue antivirus programs often are bundled with Trojans and exploit kits. Noteworthy that additional malware that infiltrates user's operating system remains on victim's computer regardless of whether a payment for a non-existent full version of a fake antivirus program is made. Here are some examples of fake security warning messages that are used in fake antivirus distribution:

Fake pop-up used in rogue antivirus distribution example 1

Fake pop-up used in rogue antivirus distribution example 2

Computer users who are dealing with a rogue security software shouldn't buy it's full version. By paying for a license key of a fake antivirus program users would send their money and banking information to cyber criminals. Users who have already entered their credit card number (or other sensitive information) when asked by such bogus software should inform their credit card company that they have been tricked into buying a rogue security software. Screenshot of a web page used to lure computer users into paying for a non-existent full version of zorton win 8 protection 2014 scam and other rogue antivirus programs:

example of a webpage used to collect payments for fake antivirus programs

To protect your computer from zorton win 8 protection 2014 scam and other rogue antivirus programs users should:

  • Keep their operating system and all of the installed programs up-to-date.
  • Use legitimate antivirus and anti-spyware programs.
  • Use caution when clicking on links in social networking websites and email messages.
  • Don't trust online pop-up messages which state that your computer is infected and offers you to download security software.

Symptoms indicating that your operating system is infected with a fake antivirus program:

  • Intrusive security warning pop-up messages.
  • Alerts asking to upgrade to a paid version of a program to remove the supposedly detected malware.
  • Slow computer performance.
  • Disabled Windows updates.
  • Blocked Task Manager.
  • Blocked Internet browsers or inability to visit legitimate antivirus vendor websites.

If you have additional information on zorton win 8 protection 2014 scam or it's removal please share your knowledge in the comments section below.

▼ Show Discussion

About the author:

Tomas Meskauskas

Tomas Meskauskas - expert security researcher, professional malware analyst.

I am passionate about computer security and technology. I have an experience of over 10 years working in various companies related to computer technical issue solving and Internet security. I have been working as an author and editor for pcrisk.com since 2010. Follow me on Twitter and LinkedIn to stay informed about the latest online security threats. Contact Tomas Meskauskas.

PCrisk security portal is brought by a company RCS LT. Joined forces of security researchers help educate computer users about the latest online security threats. More information about the company RCS LT.

Our malware removal guides are free. However, if you want to support us you can send us a donation.

About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

QR Code
Zorton Win 8 Protection 2014 scam QR code
Scan this QR code to have an easy access removal guide of Zorton Win 8 Protection 2014 scam on your mobile device.
We Recommend:

Get rid of Windows malware infections today:

▼ REMOVE IT NOW
Download Combo Cleaner

Platform: Windows

Editors' Rating for Combo Cleaner:
Editors ratingOutstanding!

[Back to Top]

To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.