Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Windows 10 Email Scam Isn’t The Upgrade You’re Looking For

b2ap3_thumbnail_windows_10_email_scam_400.jpgFor those of you who don’t yet have Windows 10, don’t panic. It’s not going anywhere, and you’ll get it soon enough. In the meantime, it’s important that you don’t get impatient and hastily open suspicious emails containing what appears to be a launcher for your Windows 10 download. Hackers are using ransomware to extort money from unsuspecting users who just want their new operating system already.

For some, the fault might lie with Microsoft because of the way they’ve decided to deploy Windows 10. Making people wait even more for a product that already exists is somewhat maddening, and hackers are taking advantage of this impatience to strike. CTB-Locker is a ransomware similar to Cryptolocker, in which it encrypts information locally on your PC, and offers a decryption key in exchange for a hefty price.

This ransomware spreads via email. Victims will receive a message in their inbox which appears to be from Microsoft detailing how they can bypass the wait for Windows 10, and prompts them to download what appears to be a launcher for the new operating system. Once the user downloads the executable file, the malware starts encrypting data on the PC. The user is locked out of their PC until they pay the ransom.

Furthermore, if the user wants to regain access to their files, the ransom must be paid in Bitcoin, a cryptocurrency which is known for its anonymity and difficulty to trace. Adding to the difficulty is that the hackers are using the Tor anonymity network to communicate, which makes catching the clowns behind this act difficult at best. Ransomware is an increasingly popular problem, and according to ZDNet, it can cost users anywhere from $200 to $10,000 for each occurrence, leading to ultimate costs of up to $18 million. That’s a lot of cash that’s been extorted from some 1,000 users in 2015 alone.

windows10scam

Of course, with a good email solution you won’t be receiving this message. A powerful spam blocking solution is capable of keeping spam messages out of your inbox almost indefinitely, meaning that you have little to worry about from the average phishing attack. Still, if a hacker wants to scam you bad enough, they’ll find a way to get through your security measures and attack you directly, in the form of a targeted spear phishing attack.

Therefore, the best way you can protect yourself from threats like CTB-Locker is to keep an eye on your inbox for any suspicious messages, and to never, ever, download attachments from unknown senders. Augment caution with a powerful spam filter and you’ll have all you need to keep phishing attacks at bay. Give Total Tech Care a call at 866-348-2602 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Google Business Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity Smartphones IT Support Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Windows Phishing Upgrade Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Office Cloud Computing Server Save Money Windows 10 Passwords Virtualization Social Media Saving Money Holiday Tech Term Gadgets Chrome Automation Managed Service Managed IT Services Microsoft Office Facebook Artificial Intelligence Computers Cybercrime Operating System Wi-Fi Health BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Remote Information Technology Covid-19 Information Spam Managed Service Provider Office 365 Telephone Systems Alert Employer-Employee Relationship Recovery Bandwidth Router BDR Social Engineering Mobility Data Breach Password Money Mobile Computing Human Resources Encryption Application Applications Remote Monitoring Law Enforcement Big Data App History Managed IT Training VPN Apps Blockchain Paperless Office How To Remote Computing Mobile Office Government Data Storage Patch Management Private Cloud Office Tips Bring Your Own Device Flexibility Servers Data Management Gmail Work/Life Balance Marketing WiFi Settings IT solutions Entertainment Website Data Security Budget Two-factor Authentication Google Drive Mouse HaaS Infrastructure Avoiding Downtime Voice over Internet Protocol Vulnerability Windows 7 Word Wireless The Internet of Things Lithium-ion battery Vendor Management Cleaning Vendor Firewall Managed Services End of Support Display USB Education Physical Security Telephone System Staff Virtual Reality Software as a Service Safety Apple Machine Learning Sports HIPAA Employee/Employer Relationship Redundancy Connectivity Social Remote Work Keyboard RMM User Error Meetings Conferencing Scam Risk Management Hacker Save Time Data Protection Workplace Strategy Botnet Net Neutrality Data storage DDoS Automobile IT Plan Unified Threat Management Computer Accessories Help Desk SharePoint Comparison Printing CES Unsupported Software Computing Infrastructure Going Green Customer Service Charger Business Technology Content Management Environment Managed Services Provider Printer Compliance Access Control Fax Server Bluetooth Battery OneNote Database Computer Care Shadow IT Virtual Assistant Current Events Remote Workers Legal Authentication Telephony Samsung SaaS Internet Exlporer Processor IT Consultant Value Network Congestion Update Hard Drive PDF Spam Blocking Electronic Medical Records eWaste Humor Proactive IT Google Docs Computing Hiring/Firing Identity Theft Best Practice YouTube Black Market Wearable Technology Retail Hard Drives Augmented Reality Instant Messaging Fraud Excel Digital Signage Robot Document Management Business Intelligence Solid State Drive Wireless Technology Remote Worker Biometrics How to Audit Downtime Worker Virtual Desktop Cryptocurrency IT Management Procurement Virus Amazon Web Services User Science Social Network PowerPoint Computer Fan Windows Media Player Rootkit Cache Uninterrupted Power Supply Safe Mode Criminal Investment Colocation Employee/Employer Relationships Workers Benefits GDPR Hosted Computing Employees Windows 365 Online Shopping Managing Stress FENG ISP Monitor Distributed Denial of Service Wireless Internet Customer Relationship Management File Sharing Analyitcs Video Conferencing ROI IBM Bitcoin Cameras Shortcuts Smart Technology Camera Inventory Programming Sales Specifications Flash Point of Sale Evernote Personal Cryptomining Reputation Streaming Media Wire Tech Support Supply Chain Management Travel Content Software Tips Supercomputer Batteries Techology Emails Laptop Printers Antivirus Monitoring Millennials Sync Windows 8.1 Wireless Charging Windows 8 Digitize Customers Smart Office IT service Audiobook Windows Server 2008 R2 Printer Server Netflix Touchpad Two Factor Authentication Virtual Private Network Customer relationships Workforce Email Best Practices Cables Tablet IT Assessment Root Cause Analysis Manufacturing Music Domains Politics HBO Advertising Knowledge Managed IT Service Security Cameras Project Management Nanotechnology Computer Tips Telecommuting Skype Maintenance Virtual CIO Cortana OneDrive Data loss Biometric Security IaaS Notifications Troubleshooting Digital Signature Bloatware Peripheral Outlook Leadership Using Data Warranty Digital Security Cameras Start Menu Google Apps Tablets Copiers Screen Mirroring 5G Relocation Loyalty HVAC Books Analysis Entrepreneur Quick Tip Frequently Asked Questions Mobile Video Games Windows 10s Smartwatch Administrator Devices Ergonomics Enterprise Content Management Shortcut Development Worker Commute Cast OLED webinar Emergency MSP Accountants Cost Management PCI DSS Experience Consultant Tip of the week Virtual Machine Credit Cards Professional Services Fiber Optics Scalability Analytics Public Cloud Employee Employer Employee Relationship Microchip Thought Leadership Social Networking 2FA Password Management Password Manager Messaging Business Owner Cabling Assessment NarrowBand Policy Multi-Factor Security Best Available Windows Server 2008 Hypervisor WIndows 7 Tools Trend Micro Search Search Engine Running Cable Twitter Dark mode NIST Business Mangement Memory SMS Default App iPhone Television Smart Tech Procedure Trending Saving Time dark theme Amazon Shopping Google Search Addiction Recycling AI IT Infrastructure Files Public Computer Bing Chromecast Transportation Wiring Practices FinTech Regulations

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code