;
  • Report:  #72425

Complaint Review: Alyon - New Jersey

Reported By:
- Philadelphia, Pennsylvania,
Submitted:
Updated:

Alyon
New Jersey, U.S.A.
Web:
N/A
Categories:
Tell us has your experience with this business or person been good? What's this?
Once again, I woke up this AM to a bright blue & white "e" icon on my desktop entitled "NoCreditCard"

Which means I had to spend more time cleaning up my system & searching my registry for their auto-downloaded/auto-installed crap.

This is easily the 5th time, in probably the past year, that I have had to clean their $hit off my computer. After receiving their first 2 bills for hundreds of dollars months ago, and doing all the necessary paperwork/phonecalls/etc, they are still finding ways to violate & harrass me. No, I NEVER sent them any payment, and I have not recieved anymore mail from them regarding payment or collection agencies, etc.

I have cancelled all long distance services on my home telephone. And I now unplug the modem every time I finish using the internet. I even use a pop-up stopper from Panicware (obvisously these vicious Alyon-related porn sites are immune to it).

Hopefully, even though they've managed to repeatedly install their auto-dialer on my computer, they will not be able to actually place calls with it.

For novices searching their computer for these files, one easy way is to check the properties of the new icon you see on your desktop. Check the date on it, then do a search from your start menu (Windows platform) for any files modified on that same date. Along with normal files, you will find all the auto-dialer files & directories... and you can easily delete them from there.

This time, in addition to their multiple shortcut icons installed on the desktop & start menu, they installed the following:

C:\Program Files\Instant Access

C:\Program Files\Instant Access\Center

C:\Program Files\Instant Access\Center\NoCreditCard shortcut

C:\Program Files\Instant Access\Dialer

C:\Program Files\Instant Access\Dialer\HTM_g2F3FQoQAQZ7FSmSwdGREwX

C:\Program Files\Instant Access\Dialer\HTM_g2F3FQoQAQZ7FSmSwdGREwX\Common

C:\Program Files\Instant Access\Dialer\HTM_g2F3FQoQAQZ7FSmSwdGREwX\Common\module.php

C:\Program Files\Instant Access\Dialer\HTM_g2F3FQoQAQZ7FSmSwdGREwX\Common\show_module.php

C:\Program Files\Instant Access\Dialer\HTM_g2F3FQoQAQZ7FSmSwdGREwX\ExitTraffic

C:\Program Files\Instant Access\Dialer\HTM_g2F3FQoQAQZ7FSmSwdGREwX\ExitTraffic\exit.php

C:\Program Files\Instant Access\Dialer\HTM_g2F3FQoQAQZ7FSmSwdGREwX\img

C:\Program Files\Instant Access\Dialer\HTM_g2F3FQoQAQZ7FSmSwdGREwX\img\banner.bmp

C:\Program Files\Instant Access\Dialer\HTM_g2F3FQoQAQZ7FSmSwdGREwX\img\ncc.ico

I did not see anything suspicious in the registry this time, though i believe that may be due to the fact that they couldn't actually place any outgoing calls with the modem, thus they were unable to be connected directly to my pc so they could download more $hit.

Previous times I had files & directories installed with the name "Egroup" or somesuch thing, in addition to "Instant Access"

So, just be warned... even if you think you've seen the last of them after the first attack, they'll find a way to worm themselves back into your lives & onto your computer systems.

I copied all of these files to a CD-ROM, so that I do have proof, if I ever need it. I will continue to seach my computer for any files i may have initially missed, because they tend to have a way of hiding things.

Aprille

Philadelphia, Pennsylvania
U.S.A.


1 Updates & Rebuttals

Robert

Plainfield,
New Jersey,
U.S.A.
Other things to look for.. Alyon et al must be using new software because the old stuff used programs like minidialer, IE Access (or IEAccess or IEdisco) and the eGroup folder.

#2Consumer Comment

Wed, November 19, 2003

Alyon et al must be using new software because the old stuff used programs like minidialer, IE Access (or IEAccess or IEdisco) and the eGroup folder. There are other varients.

A couple of suggestions:

1. Patch your browser. If using Internet Explorer, look at Microsoft's website for patches that prevent this software from getting in and/or working

2. Increase the security of your connection. Look at the browser options (on toolbar) to increase the security of your system.

3. Using Windows explorer and setting view to details, look for any file that was created around the time the problem started. These can be suspected of being part of the "takeover" package. Use caution.

4. Go to websites that are listed in various messages and download virus search-and-destroy software. I've used stinger and it cleaned out a lot of junk.

5. When you're finished with your connection to the net, diconnect the phone line. When finished with the computer, SHUT IT DOWN. Many messages indicate that a lot of people have left there machines on over the course of days.....free time for the "virus" to work.

6. Contact the authorities. Give them evidence.
Call Alyon, Merchant Credit and give them hell. Certified mail with return receipt request in all mail correspondence. KEEP YOUR EVIDENCE. DON'T CAVE IN!

There are too many people not paying for them for those (censored)to sue them all in a reasonable amount of time......if they ever could. You are in the right. Never forget that.

Reports & Rebuttal
Respond to this report!
Also a victim?
Repair Your Reputation!
//