Europol’s Hunt Begins for Emotet Malware Mastermind
International law enforcement Operation Endgame shifts its crackdown to focus on individual adversaries.
darkreading – Read More
International law enforcement Operation Endgame shifts its crackdown to focus on individual adversaries.
darkreading – Read More
As always, Russian APTs are hoping to foment unrest by stoking existing societal divides and fears, this time around the Olympics and EU politics; and, concerns remain around physical disruption.
darkreading – Read More
Post Content
darkreading – Read More
Concerned about viruses on your Linux computer? I tested Kaspersky’s new Virus Removal Tool for Linux. Here’s what you need to know about it.
Latest stories for ZDNET in Security – Read More
Ticketmaster parent Live Nation has filed a voluntary SEC data breach notification, while one of its cloud providers, Snowflake, also confirmed targeted cyberactivity against some of its customers.
darkreading – Read More
We tested the best Bluetooth trackers (including AirTags and Tile trackers) to keep tabs on your belongings, whether you use iOS or Android.
Latest stories for ZDNET in Security – Read More
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
darkreading – Read More
Fastly researchers discover unauthenticated stored XSS attacks plaguing WordPress Plugins including WP Meta SEO, and the popular WP…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
According to the FBI’s 2023 Internet Crime Report, more than 37,500 complaints about fake tech-support scams were reported in the U.S. last year alone — resulting in over $924 million in losses. In this post, we discuss how these scams work, the dangers they pose, and how to protect yourself from this type of fraud.
In this scheme, scammers typically impersonate technical or customer-support staff of major companies — most often in the tech industry. This allows the cybercriminals to use impressive-sounding terms and technical details that are incomprehensible to the average user.
The most common pretext under which fake tech-support scammers initiate contact with potential victims is by claiming to have detected some problem on the latter’s computer. For example, fake employees of a software developer or well-known antivirus company call you with a made-up story about their having detected malware on your computer.
Scammers thus overwhelm their victims, instilling panic and a sense of helplessness. The scammers then manipulate these emotions to build trust — these schemes are usually designed to ensure the victim has no choice but to trust the scammer. It’s this trust that the scammers ultimately exploit to achieve their goals.
To make initial contact with the potential victim, tech-support scammers use a variety of tricks. But in general there are three basic scenarios.
Some scammers create web pages or social media accounts that mimic those of legitimate companies. They may also use search engine or social media ads to promote these fake resources, hoping that potential victims will come to them looking for help with technical issues.
To carry out the attack, the scammers need to be in continuous contact with the victim. For this reason, they usually come up with some pretext to switch communication to phone calls or messaging apps.
Another popular scenario for this scam involves using pop-up windows and notifications that mimic operating system or antivirus warnings. These notifications, usually alarmingly red or orange in color, warn that something is wrong with the victim’s computer — most often that there’s a virus.
Again, since the scammers need to actively communicate with the victim, they usually provide a phone number to call in order to resolve the detected problem.
Finally, the most popular method of contacting victims is direct phone calls. These can be roughly divided into “cold” and “warm” calls. In the former case, fake tech-support scammers simply dial random numbers, often posing as representatives of major companies whose products are widely used. For example, you don’t have to try very hard to find a Windows user.
Warm calls involve using information obtained through breaches or leaks of customer data from certain companies. Naturally, knowing the victim’s name and the products they use gives the scammers more credibility, increasing their chances of success.
Looking closer at the figures we started this post with, you’ll notice that tech-support scams aren’t about small charges for non-existent services. The average reported loss is almost $25,000.
This highlights the main danger of fake tech-support: scammers don’t settle for small profits, but instead try to extract as much from their victims as possible. To do this they devise intricate schemes and utilize social engineering techniques.
In particular, tech-support scammers often pressure victims into installing remote-access or screen-sharing software, disclosing or exposing passwords for financial accounts, and sharing one-time transaction confirmation codes. They might even stage elaborate performances involving multiple phone calls from various “company employees”, “financial institutions”, or “government agencies”.
If someone contacts you claiming to be from tech support, warns you of some danger, and asserts that action must be taken immediately — most likely it’s a fake tech-support scammer.
Try not to panic, and avoid doing anything you might regret later. It’s better to discuss what’s happening with someone else, as this can help you identify inconsistencies and holes in the scammer’s story. To buy time, ask them to call you back — say that you’re busy, you have another call, your phone has low battery, or simply pretend to get cut off.
In addition, to protect against scammers, you can take the following measures:
Install a reliable security solution on all your devices and trust its warnings.
Never enter your login credentials while someone else is watching, for example while you’re screen sharing or if someone has remote access to your computer.
Avoid installing remote access software on your computer, and certainly never grant access to strangers. By the way, our protection can warn you about such dangers.
It’s also worth remembering that the people particularly vulnerable to tech-support scams are the elderly. They may not be particularly cyber-savvy, so they need reliable protection more than anyone.
Kaspersky official blog – Read More
Law enforcement authorities behind Operation Endgame are seeking information related to an individual who goes by the name Odd and is allegedly the mastermind behind the Emotet malware.
Odd is also said to go by the nicknames Aron, C700, Cbd748, Ivanov Odd, Mors, Morse, Veron over the past few years, according to a video released by the agencies.
“Who is he working with? What is his
The Hacker News – Read More