(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Someone’s Trying To Phish You… Do You Play Along?

Someone’s Trying To Phish You… Do You Play Along?

Phishing scams have been popping up for years--their most infamous attack vector has even become a punchline: some long-lost relative stuck in a far-off country suddenly reaches out, offering riches, but only if so-much money is provided first. People from all walks of life have been duped by these scams, and while not all of them are this transparent, most are pretty easy to spot.

There may be some temptation to strike back in retribution against the criminal who targeted you, in the form of driving them crazy by wasting their time. Unfortunately, as tempting as such activities may be, they are not a good idea. Take it from the cyber security researchers who have tried--cybercriminals do not take well to mockery, or having their time wasted. A researcher from Malwarebytes, Jerome Segura, found out firsthand when he used a virtual machine to follow a scam to see where it would lead.’

With his device recording everything that played out, Segura first interacted with a female who claimed to have found many, many issues on his device that needed to be resolved before his system was corrupted. Not only that, but Segura was told that his software warranty had recently expired, and he would have to pay the $299 renewal fee to another representative.

Of course, Segura didn’t supply the correct payment credentials, which tipped off the hackers. The hackers then seized control of Segura’s computer, deleting all of his files and his Ethernet adapter driver before calling Segura a rude word and disconnecting.

While these sorts of stories may seem comical in hindsight, they are no laughing matter. This is especially true when things get much more serious.

Take Jakob Dulisse’s story. The wildlife photographer received a call to his home in British Columbia from “Windows Technical Support” in Los Angeles. Coming to the conclusion that this was an attempt to scam him, Dulisse played along before accusing the caller of being “a scammer, a thief, and a bad person.”

The person on the line did not react well at all. Describing himself as a killer, the caller claimed that his group had people in Canada who would cut their victims into pieces and dispose of them in the river.

Other scammers will simply install remote access software as their target decides to mess with them, opening the door for them to come back later, as other cyber security professionals have found.

It is important to remember that these are, in fact, professionals, which means they are better equipped to deal with such threats. It is their job to discover what means of attack cyber criminals are using, and share the best response. This is not how the average business user should handle this situation, the business owner should file a report with the authorities and alert both their Internet service provider and their managed service provider.

An MSP can help make sure that you are fully prepared to handle any cyber security threat that darkens your business’ door. Give NTConnections a call at (703) 288-9767 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Mobile Devices Google Efficiency VoIP Business IT Support Miscellaneous IT Services Managed Service Provider Email Server Disaster Recovery Business Continuity Workplace Tips Network Innovation Data Windows Upgrade Software Hardware Business Management Communication Computer Save Money Network Security Saving Money Mobile Device Management Smartphones Android Microsoft Office communications Managed IT Services Virtualization Smartphone Browser Holiday User Tips Windows 10 WiFi Outsourced IT Small Business BYOD Social Media Operating System Mobile Computing Data Backup Computers Hacking Chrome Application Apple Proactive IT Remote Monitoring Avoiding Downtime IT Solutions Cybercrime Alert Automation Information Technology Managed IT Services Passwords Office Marketing Ransomware Budget Collaboration Social Engineering The Internet of Things Big Data Employer-Employee Relationship Quick Tips spam Gadgets Going Green Remote Computing Recovery Health Mobility Bring Your Own Device VPN Telephone Systems Data Recovery iPhone How To Save Time Firewall Managed IT Cloud Computing Two-factor Authentication Bandwidth Compliance Wireless Technology User Error Cybersecurity App Vendor Management BDR Phone System Private Cloud Antivirus Money Content Filtering Vulnerability Downtime Mouse History Tablet Analytics Router Redundancy Value Office 365 Memory IT Support Retail Search Internet of Things Artificial Intelligence Networking Windows 10 Office Tips Lithium-ion battery Risk Management Gmail PowerPoint Website Excel Phishing Flexibility SaaS Identity Theft Data Security Current Events Safety Administration Government Maintenance Credit Cards Entertainment Meetings Running Cable HaaS Unified Threat Management Fax Server Skype Law Enforcement Black Market Mobile Office Data Management Solid State Drive Customer Relationship Management Intranet Data Storage Internet Exlporer Best Available People Workers Word Data storage Business Intelligence Programming Biometrics Business Owner Network Congestion Trending OneNote Apps IT Consultant Hard Drives IT Management Humor Work/Life Balance Facebook Saving Time Statistics Document Management DDoS Online Currency Physical Security Unsupported Software Robot Outlook Public Cloud Environment Printer Google Drive Remote Work Charger Software Tips Virtual Desktop IT service Human Resources Unified Communications Telephony Touchpad Relocation Hybrid Cloud Virtual Reality Print Server Google Docs Computer Care Windows Media Player Uninterrupted Power Supply Training Domains Theft Start Menu HIPAA Audit IaaS Bloatware Spam Blocking Voice over Internet Protocol HBO Cleaning Net Neutrality Hiring/Firing Customer Service Computer Repair Cortana Mobile WIndows 7 Keyboard Screen Mirroring Entrepreneur Multi-Factor Security Fraud Frequently Asked Questions Tech Support Hacker Google Apps Professional Services Managing Stress Cast Cost Management Computer Fan Lifestyle Amazon Tip of the week Virus Shadow IT Applications Touchscreen LinkedIn Wireless Files Science Infrastructure Tools Productivity Streaming Media Password Debate Instant Messaging FENG Data Protection Amazon Web Services Windows Server 2008 Computer Accessories Wi-Fi Shortcut SharePoint Colocation Windows 8 Password Manager Encryption Comparison Bluetooth Online Shopping Windows 7 Cameras Sports Video Surveillance eWaste Computing Infrastructure Tablets Botnet Consultant Monitor Hosted Solution Data Warehousing Notifications Education Specifications USB Evernote Regulations Printer Server YouTube Wearable Technology End of Support Travel Reputation Worker Commute Mobile Device Piracy Social Millennials Wireless Charging Servers NarrowBand Internet exploMicrosoft User Customers Workforce IT Plan Best Practice Company Culture Licensing Social Networking Root Cause Analysis Windows 8.1 Update Samsung Fiber-Optic Flash Chromecast Twitter Advertising Analyitcs Software as a Service Patch Management Data loss Telecommuting Crowdfunding Cables Sync Laptop Settings Scam Distributed Denial of Service Update Scalability Politics Transportation How to webinar Benefits PDF Users Loyalty Conferencing Smart Technology Windows 10s Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Electronic Medical Records Techology Public Computer Business Mangement Employer Employee Relationship Legal Data Breach Automobile Recycling Emails Books CrashOverride IBM Webinar Emergency Worker Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix