Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Someone’s Trying To Phish You… Do You Play Along?

Someone’s Trying To Phish You… Do You Play Along?

Phishing scams have been popping up for years--their most infamous attack vector has even become a punchline: some long-lost relative stuck in a far-off country suddenly reaches out, offering riches, but only if so-much money is provided first. People from all walks of life have been duped by these scams, and while not all of them are this transparent, most are pretty easy to spot.

There may be some temptation to strike back in retribution against the criminal who targeted you, in the form of driving them crazy by wasting their time. Unfortunately, as tempting as such activities may be, they are not a good idea. Take it from the cyber security researchers who have tried--cybercriminals do not take well to mockery, or having their time wasted. A researcher from Malwarebytes, Jerome Segura, found out firsthand when he used a virtual machine to follow a scam to see where it would lead.’

With his device recording everything that played out, Segura first interacted with a female who claimed to have found many, many issues on his device that needed to be resolved before his system was corrupted. Not only that, but Segura was told that his software warranty had recently expired, and he would have to pay the $299 renewal fee to another representative.

Of course, Segura didn’t supply the correct payment credentials, which tipped off the hackers. The hackers then seized control of Segura’s computer, deleting all of his files and his Ethernet adapter driver before calling Segura a rude word and disconnecting.

While these sorts of stories may seem comical in hindsight, they are no laughing matter. This is especially true when things get much more serious.

Take Jakob Dulisse’s story. The wildlife photographer received a call to his home in British Columbia from “Windows Technical Support” in Los Angeles. Coming to the conclusion that this was an attempt to scam him, Dulisse played along before accusing the caller of being “a scammer, a thief, and a bad person.”

The person on the line did not react well at all. Describing himself as a killer, the caller claimed that his group had people in Canada who would cut their victims into pieces and dispose of them in the river.

Other scammers will simply install remote access software as their target decides to mess with them, opening the door for them to come back later, as other cyber security professionals have found.

It is important to remember that these are, in fact, professionals, which means they are better equipped to deal with such threats. It is their job to discover what means of attack cyber criminals are using, and share the best response. This is not how the average business user should handle this situation, the business owner should file a report with the authorities and alert both their Internet service provider and their managed service provider.

An MSP can help make sure that you are fully prepared to handle any cyber security threat that darkens your business’ door. Give Total Tech Care a call at 866-348-2602 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services VoIP Disaster Recovery Android communications IT Support Business Continuity Smartphones Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Managed IT Services Windows Upgrade Phishing Outsourced IT Ransomware Data Backup Windows 10 Office Data Recovery Server Save Money Cloud Computing Passwords Windows 10 Chrome Tech Term Social Media Virtualization Saving Money Holiday Gadgets Managed IT Services Managed Service Automation Microsoft Office Cybercrime Computers Artificial Intelligence Operating System Facebook Health BYOD Mobile Device Management Internet of Things Networking IT Support Wi-Fi Hacking Remote Spam Office 365 Alert Covid-19 Information Telephone Systems Managed Service Provider Information Technology Recovery Employer-Employee Relationship Router BDR Bandwidth Social Engineering Mobility Encryption Applications Human Resources Data Breach Mobile Computing Application Law Enforcement Remote Monitoring App History Big Data Password Money Data Storage Patch Management VPN Remote Computing Government Mobile Office Blockchain Private Cloud Paperless Office How To Managed IT Office Tips Training Apps Gmail Vulnerability Settings Windows 7 Flexibility Word Marketing Google Drive Two-factor Authentication WiFi Servers IT solutions Entertainment Website Mouse Budget HaaS Avoiding Downtime Data Security Bring Your Own Device Data Management Wireless Work/Life Balance Infrastructure Voice over Internet Protocol Conferencing End of Support Education Physical Security Scam Firewall Safety Data Protection HIPAA Sports Redundancy Virtual Reality Apple Keyboard Vendor Management Social USB User Error Vendor Meetings Managed Services Staff Software as a Service Display Telephone System Save Time Machine Learning Risk Management Connectivity Hacker Remote Work Employee/Employer Relationship Cleaning The Internet of Things RMM Lithium-ion battery Battery Augmented Reality Virus Customer Service Shadow IT Fraud Unified Threat Management Legal Business Intelligence Environment Remote Worker Digital Signage Computer Accessories Fax Server Audit Internet Exlporer Worker IT Management Cryptocurrency SaaS Botnet PDF Procurement IT Plan Workplace Strategy Comparison Net Neutrality Printer Proactive IT Bluetooth CES Help Desk Network Congestion Unsupported Software Printing Best Practice eWaste YouTube Charger Black Market Content Management Business Technology Access Control Compliance OneNote Computer Care Managed Services Provider IT Consultant Current Events Virtual Assistant Document Management Telephony Authentication Database Wearable Technology Humor Retail Solid State Drive Hard Drives Wireless Technology Samsung Downtime Remote Workers How to Instant Messaging Robot Excel Value Processor Biometrics Data storage Update Automobile Virtual Desktop Spam Blocking Electronic Medical Records Hard Drive Google Docs DDoS Computing Infrastructure Hiring/Firing Identity Theft Going Green Computing SharePoint Techology Password Management PCI DSS Analyitcs Laptop Assessment Password Manager Virtual Machine Windows Server 2008 2FA Programming Customers Fiber Optics Multi-Factor Security Employee Windows Media Player Audiobook Tools Search Engine Twitter Messaging Cabling User PowerPoint Touchpad Television Business Mangement Hypervisor NIST Policy Dark mode Smart Tech Trend Micro Trending Antivirus Politics Advertising Addiction SMS Windows 8 Amazon Default App Managing Stress Public Computer Recycling Saving Time IT service Procedure Regulations Wiring dark theme Practices Shopping Notifications Transportation Google Search Cameras Computer Fan Cache AI Tablet Rootkit Amazon Web Services IT Infrastructure Criminal Bing Domains Safe Mode FinTech GDPR Relocation Workers Hosted Computing Social Network Benefits IaaS Maintenance FENG Wireless Internet Online Shopping Investment IBM Employee/Employer Relationships Video Games File Sharing Employees Bloatware Worker Commute Flash Camera Windows 365 Inventory Smart Technology Specifications ISP Printer Server Experience Wire Video Conferencing Tablets Evernote ROI Supercomputer Bitcoin Travel Shortcuts Scalability Software Tips Sales Entrepreneur Business Owner Sync Printers Point of Sale Emails Personal Millennials Cryptomining Shortcut Smart Office Supply Chain Management NarrowBand Wireless Charging Batteries Search Monitoring Cost Management Virtual Private Network Windows 8.1 Social Networking iPhone Netflix Digitize Two Factor Authentication Workforce Root Cause Analysis Cables Windows Server 2008 R2 Knowledge Music HBO Customer relationships Running Cable Skype Project Management Email Best Practices Files Nanotechnology IT Assessment Telecommuting Manufacturing Data loss Memory Chromecast Cortana Leadership Digital Signature Managed IT Service Troubleshooting Security Cameras Consultant Outlook Computer Tips Start Menu Warranty Virtual CIO Colocation OneDrive Uninterrupted Power Supply Biometric Security Analytics Screen Mirroring HVAC Peripheral Loyalty Google Apps Monitor Analysis Using Data Books Best Available Frequently Asked Questions Digital Security Cameras Mobile Administrator Windows 10s Devices Copiers Science 5G WIndows 7 Cast Enterprise Content Management Quick Tip Reputation webinar Accountants Streaming Media Emergency Smartwatch Tip of the week MSP Ergonomics Distributed Denial of Service Content Professional Services Microchip Customer Relationship Management Public Cloud Thought Leadership Development Tech Support Employer Employee Relationship Credit Cards OLED

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code