Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Windows 10 Email Scam Isn’t The Upgrade You’re Looking For

b2ap3_thumbnail_windows_10_email_scam_400.jpgFor those of you who don’t yet have Windows 10, don’t panic. It’s not going anywhere, and you’ll get it soon enough. In the meantime, it’s important that you don’t get impatient and hastily open suspicious emails containing what appears to be a launcher for your Windows 10 download. Hackers are using ransomware to extort money from unsuspecting users who just want their new operating system already.

For some, the fault might lie with Microsoft because of the way they’ve decided to deploy Windows 10. Making people wait even more for a product that already exists is somewhat maddening, and hackers are taking advantage of this impatience to strike. CTB-Locker is a ransomware similar to Cryptolocker, in which it encrypts information locally on your PC, and offers a decryption key in exchange for a hefty price.

This ransomware spreads via email. Victims will receive a message in their inbox which appears to be from Microsoft detailing how they can bypass the wait for Windows 10, and prompts them to download what appears to be a launcher for the new operating system. Once the user downloads the executable file, the malware starts encrypting data on the PC. The user is locked out of their PC until they pay the ransom.

Furthermore, if the user wants to regain access to their files, the ransom must be paid in Bitcoin, a cryptocurrency which is known for its anonymity and difficulty to trace. Adding to the difficulty is that the hackers are using the Tor anonymity network to communicate, which makes catching the clowns behind this act difficult at best. Ransomware is an increasingly popular problem, and according to ZDNet, it can cost users anywhere from $200 to $10,000 for each occurrence, leading to ultimate costs of up to $18 million. That’s a lot of cash that’s been extorted from some 1,000 users in 2015 alone.

windows10scam

Of course, with a good email solution you won’t be receiving this message. A powerful spam blocking solution is capable of keeping spam messages out of your inbox almost indefinitely, meaning that you have little to worry about from the average phishing attack. Still, if a hacker wants to scam you bad enough, they’ll find a way to get through your security measures and attack you directly, in the form of a targeted spear phishing attack.

Therefore, the best way you can protect yourself from threats like CTB-Locker is to keep an eye on your inbox for any suspicious messages, and to never, ever, download attachments from unknown senders. Augment caution with a powerful spam filter and you’ll have all you need to keep phishing attacks at bay. Give Total Tech Care a call at 866-348-2602 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Google Business Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Small Business Network Browser Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Upgrade Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Cloud Computing Office Server Save Money Passwords Windows 10 Virtualization Saving Money Holiday Social Media Tech Term Gadgets Chrome Automation Managed Service Managed IT Services Microsoft Office Computers Facebook Cybercrime Operating System Artificial Intelligence BYOD Mobile Device Management Networking IT Support Health Internet of Things Hacking Wi-Fi Office 365 Telephone Systems Remote Information Technology Information Covid-19 Managed Service Provider Alert Spam Router Bandwidth Recovery Employer-Employee Relationship BDR Social Engineering Mobility Money Mobile Computing App Encryption History Applications Application Law Enforcement Human Resources Data Breach Big Data Remote Monitoring Password Apps How To Office Tips Blockchain Training Paperless Office VPN Data Storage Government Patch Management Private Cloud Remote Computing Managed IT Mobile Office Data Security Flexibility Marketing WiFi IT solutions Wireless Entertainment Website Google Drive Budget Gmail Settings Vulnerability Avoiding Downtime Windows 7 Infrastructure Word Voice over Internet Protocol Two-factor Authentication Servers Mouse HaaS Bring Your Own Device Data Management Work/Life Balance Risk Management End of Support Hacker Education Physical Security Safety The Internet of Things Sports USB HIPAA Lithium-ion battery Telephone System Staff Redundancy Software as a Service Vendor Keyboard Machine Learning Managed Services Conferencing Connectivity Display Remote Work Firewall Scam Virtual Reality Employee/Employer Relationship Apple RMM Save Time Vendor Management Social User Error Data Protection Meetings Cleaning Computer Accessories Hard Drives Current Events Comparison Retail Instant Messaging Telephony Samsung CES Robot Excel Battery Procurement Shadow IT Biometrics Workplace Strategy Net Neutrality Legal Value Content Management Virtual Desktop Business Technology Printer Access Control Help Desk Internet Exlporer Bluetooth Printing Spam Blocking Electronic Medical Records DDoS Virtual Assistant Authentication SharePoint PDF Hiring/Firing Managed Services Provider Proactive IT IT Consultant Database Update Customer Service Environment Remote Workers Best Practice YouTube Humor Business Intelligence Processor Black Market Google Docs Fax Server Identity Theft Worker Audit IT Management Hard Drive SaaS Document Management Wireless Technology Botnet Solid State Drive IT Plan Augmented Reality How to Downtime Network Congestion Computing Fraud eWaste Unsupported Software Remote Worker Data storage Automobile Charger Cryptocurrency Virus Computing Infrastructure Digital Signage Compliance Computer Care Going Green Wearable Technology Unified Threat Management OneNote Procedure GDPR Saving Time Hosted Computing Reputation Streaming Media Managing Stress dark theme Content Shopping Netflix Wireless Internet Google Search Two Factor Authentication Online Shopping Tech Support Techology IT Infrastructure Laptop Running Cable AI Root Cause Analysis File Sharing Cameras Memory FinTech HBO Camera Knowledge Inventory Customers Bing Music Specifications Skype Audiobook Social Network Wire Evernote Investment Touchpad Travel Data loss Employees Outlook Printers Employee/Employer Relationships Leadership Troubleshooting Millennials Windows 365 Start Menu Politics Smart Office Advertising ISP Wireless Charging ROI Loyalty Science Video Conferencing Screen Mirroring Printer Server Sales Frequently Asked Questions Virtual Private Network Bitcoin Shortcuts Books Workforce Notifications Point of Sale Mobile Personal Windows 10s Cryptomining Cables Distributed Denial of Service Customer Relationship Management Supply Chain Management Cast Analyitcs Monitoring Tip of the week Project Management Batteries webinar Nanotechnology Relocation Emergency Telecommuting Cortana Programming Windows 8.1 Professional Services Digitize Public Cloud Employer Employee Relationship Video Games Windows Server 2008 R2 Assessment Digital Signature Customer relationships Windows Server 2008 Warranty Worker Commute Google Apps Antivirus Email Best Practices Tools Experience IT Assessment HVAC Manufacturing Scalability Television Analysis Windows 8 Computer Tips Administrator Business Owner Managed IT Service Devices Security Cameras IT service Biometric Security NarrowBand Virtual CIO OneDrive Enterprise Content Management Peripheral MSP Search Public Computer Accountants Consultant Tablet Domains Analytics Digital Security Cameras Regulations Microchip Using Data Thought Leadership iPhone Transportation Credit Cards 5G Rootkit Password Manager Copiers Computer Fan Password Management Quick Tip IaaS Multi-Factor Security Best Available Maintenance WIndows 7 Bloatware Ergonomics Search Engine Workers Twitter Files Smartwatch Benefits OLED Business Mangement Chromecast Development FENG NIST Tablets PCI DSS Virtual Machine IBM Smart Tech Trending Entrepreneur 2FA Flash Fiber Optics Addiction Colocation Employee Smart Technology Amazon Uninterrupted Power Supply Cabling Recycling Messaging Policy Software Tips Wiring Hypervisor Supercomputer Practices Monitor Shortcut User PowerPoint Cost Management Dark mode Sync Windows Media Player Trend Micro Emails Cache Amazon Web Services Default App Criminal Social Networking SMS Safe Mode

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code