Print the value of index0
  • Report:  #393996

Complaint Review: Innovagest2000 OR Pandora Software

Innovagest2000 OR Pandora Software International scam Manhattan New York

  • Reported By:
    Knoxville Tennessee
  • Submitted:
    Sat, November 22, 2008
  • Updated:
    Sat, November 22, 2008
  • Innovagest2000 OR Pandora Software
    Manhattan, New York
    U.S.A.
  • Phone:
    646-233-2022
  • Category:

On September 11, 2008, at approximately 7 p.m., I was on-line. While on-line, up popped a window identical in every way to Microsoft's window indicating the firewall and something else were on, and that security was not up to date. It indicated there was a malware threat and that your computer is infected with Spyware. Something indicated Google A9loader-880488.exe. (Supposedly, this was a Microsoft product, but Microsoft's security window did not recognize it.) There was also googlescanners-360.com.

Several times, I attempted to close the window, so I could continue with what I was doing at the time. Underneath this window, in the bottom right corner, another window came up. As I was unable to move the original window up, down or sideways I was unable to read what the corner window contained. It was at some point that a message came up indicating a security breach containing: Spyware.IEMonster.b (critical); Zlob.PornAdvertiser.Xplisit (high); and Trojan.infostealer.banker.s (medium).

I believe it was in the same window indicating the security breach, that, software was offered to protect against these particular breaches. The only way to get this software was to buy the license to use it, at $50 for a year.

It was at this point I called a friend, who is exceptionally good with computers, as he has designed many computer programs as part of his employment. He could not find a way to close or move the window either. He made the decision to follow the instructions in the window to see where they took him. He tried the window containing the breaches and felt the only way I was going to be able to free my computer of the indicated viruses was to buy the license. The license cost $50 for one year and, I believe, $79.99 for three years.

I put the one year license purchase on my credit card and received the attached (exhibit A) as a receipt note the day and time it was printed versus the day and time on the receipt. With the license purchased, we downloaded and installed the software. While on-line, I went ahead and downloaded SP3 it was to install the next time the CPU was turned on.

I turned off the CPU or so I thought for the night. The next morning I found the CPU had been running all night clearly, that was the rogue software doing its terrible deeds by allowing all manner of security breaches to occur.

As my friend had instructed me, I turned off the CPU, by holding in the power button until it turned off, and unplugged the Internet line. It was at this point that I noticed, on the receipt, my card had been charged $94.85 and that the date and time were wrong.

It was at this point I called my bank. As of that time, the payment had not yet posted, but it was confirmed to me that there was a pending charge of $94.85. I gave the clerk the name of the merchant, as printed on the receipt www.innovagest2000.com. I was told it was a software store and I was given the telephone number: 1-646-233-2022 in Manhattan.

I was told this was not fraud {I vehemently disagree}, as I had freely given my credit card number. I was transferred to the billing disputes department. I explained everything again. I was told to wait until the charge posted, then call the merchant, explain what had happened and ask that the charges be reversed. After that I was to again call the billing disputes department at my bank and tell them what happened.

I turned the CPU back on. Immediately, a system threat test began to run I now know it was by the rogue software, Antivirus2009. It scanned for at least an hour. Again, this window was identical to Microsoft's.

On Friday, September 12, 2008, at 10:46 a.m., I called the merchant's number. It was an out-going message by a thick-tongued foreigner. The only words intelligible were that I was to leave a message. I left a message stating they are running a fraudulent operation and I was going to report them to the FCC, and the FTC and that my bank has them on fraud alert.

I called the Federal Communications Commission (FCC). I was told they do not handle fraudulent and deceptive trade practices.

I called the Federal Trade Commission (FTC) [1-800-876-7060] and spoke to a woman named Virginia. She praised me for getting all the proper information. I was given a case number of: ------------

I called the Attorney General for the State of Tennessee (((redated))). This number actually reaches the consumer affairs department which is another example of taxpayer waste. Someone is supposed to be sending a complaint form.

It was about this time that I realized the system threat test was just another way of installing more viruses.
I checked on Microsoft's Web site for information regarding the malware (Antivirus2009). Microsoft sells software to remove the malware, which I was not interested in buying.

I called Microsoft [1-800-642-7676] at approximately 11:20 a.m. and actually reached a person in its PC Safety Technical Support division. I spoke with a woman named Violet P. I explained everything to her and that this is a trademark infringement of Microsoft's logo and security window, of which she confirmed Microsoft corporate is already aware.

I also informed her I was not interested in buying Microsoft's software to remove the malware. Violet told me she could take care of cleaning out the malware over the telephone. She guided me to find the necessary software Microsoft Easy Assist which I needed to download/install, in order for her to clean out my CPU. The software enabled me to turn over control of my computer to Violet.

She proceeded to clean out all known codes for Antivirus2009. She also scanned with smitfraudfix.v2.349 to clean up any possible remaining viruses that may be hidden. She also did a disc clean-up. I expressed my concern about the system threat test being another way for the malware to install more viruses. She laughed and said it only appears to be doing something when, in reality, it is not scanning anything. All this took approximately 47 minutes. Violet followed up the call with an email and case ID: --------------

I printed out the email from Microsoft at 12:33 p.m. (Exhibit B). While I was checking my email, I found an email from the software company from which I purchased the license. I printed that out at 12:50 p.m. (Exhibit C).

I did a search for Antivirus2009 and printed out a description of it. (Exhibit D) The charge of $94.85 posted to my credit card account on September 13, 2008. The earliest evidence I can find of this malware problem is July 2008. That is when the first forum post appeared on cnet.com.

For the Attorneys General ensure your paralegals note the two (2) different Web sites, which automatically printed on the receipt. I believe the Web site at the top is what the foreigner was trying to say on the out-going message. It is not in English so, of course, I did not understand what was being said.

And, these thieves have my credit card number. I do not believe I have heard the last from these creeps. I would appreciate being kept apprised of any and all information you can find on these thieves. I thank you in advance for any help you may be able to provide.

Go to: nytimes.com/2008/10/30/technology/internet/30virus.html

Google: bakasoftware products

Go to: cnet.com - virus & security forum

Beentheredonethat
Knoxville, Tennessee
U.S.A.

CLICK here to see why Rip-off Report, as a matter of policy, deleted either a phone number, link or e-mail address from this Report.

Respond to this Report!