Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: How Hackers are Scamming Users With Fake IT Support Hotline

b2ap3_thumbnail_malware_lock_up_400.jpgThere’s a wicked string of malware on the Internet that locks users out of their browser and directs them to call a phone number. That phone number reaches hackers who have set up a subterfuge as an IT support company. If this happens to you, even if you are in the middle of something important, do not call the phone number.

This particular piece of malware startles the user by blocking their progress within their web browser, suggesting them to contact a fake tech support hotline to “fix” their computer. It will show a screen that’s similar to the Windows fatal system error blue screen, along with a fake technical support message that pops up, informing the user of the “problem.” As you can see by the provided screenshot, this blue screen of death is deceptive because it’s only displayed within the browser, instead of taking up the entire screen like Microsoft’s real blue screen of death.

blue screen

Whatever you do, DON’T CALL THE PROVIDED PHONE NUMBER. The blog Delete Malware explains: “If you call [the number] they won't actually remove adware from your computer. They will hijack your computer and steal all of your bank information and passwords. They are crooks, don't call them!”

Fortunately, this error isn’t as critical as what it seems. In fact, this is a common tactic of social engineering: make the problem seem much worse than it is, causing the victim to flip out and do something rash--like call the fake IT support phone number.

What then are you supposed to do? You can make the issue go away simply by closing the browser via task manager (Ctrl + Alt + Delete), or rebooting the PC. However, it’s still annoying to deal with because you’ll lose any unsaved data, along with any progress made to whatever project you’re working on. Plus, rebooting your system won’t technically solve the problem; the malware will still be embedded in your system, waiting for another chance to strike.

Therefore, to get down to the root of this problem, you’re going to want to isolate and properly delete the malicious file. For this level of real IT support, you’re going to want to call the trained professionals at Total Tech Care. We’ve got the tools needed to find and eliminate such threats, and even block them from hitting your system in the first place with a Unified Threat Management solution.

Lastly, we’d like to point out that the perpetrators of this hack are relying on the fact that the user doesn't know who to call for IT support in a crisis situation. It’s reasons like this why you and your staff need to be familiar with who to call in an emergency IT situation, like Total Tech Care at 866-348-2602. When it comes to taking care of IT issues, we’re the real deal, and we take offense that hackers these days are posing as trustworthy IT technicians in order to get at a user's personal data. It’s an unsettling trend that will only be brought down by companies being vigilant about their network security.

To that end, Total Tech Care can help. Call us today to find out how we can protect you from the worst of the web.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Business Continuity Communication IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Business Management Users Managed IT Services Windows Phishing Upgrade Data Backup Outsourced IT Ransomware Windows 10 Save Money Data Recovery Office Cloud Computing Server Windows 10 Passwords Chrome Gadgets Virtualization Saving Money Holiday Tech Term Social Media Managed IT Services Microsoft Office Managed Service Automation Operating System Cybercrime Artificial Intelligence Computers Facebook Health Internet of Things Hacking Wi-Fi BYOD Mobile Device Management Networking IT Support Managed Service Provider Alert Spam Office 365 Remote Information Telephone Systems Information Technology Covid-19 Recovery Employer-Employee Relationship BDR Social Engineering Mobility Bandwidth Router Big Data Law Enforcement Data Breach Human Resources Remote Monitoring Password Mobile Computing Money Application App Encryption History Applications Private Cloud Remote Computing Managed IT Mobile Office Blockchain Apps How To Paperless Office Office Tips Training Data Storage Patch Management VPN Government Avoiding Downtime Two-factor Authentication Servers Mouse Flexibility HaaS Data Security Bring Your Own Device Marketing Data Management Work/Life Balance WiFi IT solutions Entertainment Website Budget Wireless Infrastructure Google Drive Voice over Internet Protocol Gmail Vulnerability Windows 7 Settings Word Firewall Employee/Employer Relationship RMM Data Protection Vendor Management Virtual Reality Apple Save Time Social User Error Cleaning Meetings Telephone System Staff Software as a Service Machine Learning Risk Management USB End of Support Remote Work Hacker Connectivity Education Physical Security Safety Vendor The Internet of Things Sports HIPAA Lithium-ion battery Managed Services Redundancy Conferencing Display Keyboard Scam IT Management Hard Drive YouTube Remote Worker Black Market Fax Server Cryptocurrency Botnet IT Plan Computing SaaS Document Management Solid State Drive Unsupported Software Wireless Technology Comparison How to Downtime Virus Charger Network Congestion CES eWaste Unified Threat Management Data storage Computer Accessories Digital Signage Compliance Computer Care Business Technology Content Management Automobile OneNote Current Events Access Control Telephony Samsung Virtual Assistant Computing Infrastructure Procurement Going Green Wearable Technology Authentication Retail Hard Drives Workplace Strategy Printer Net Neutrality Value Instant Messaging Bluetooth Excel Help Desk Robot Battery Printing Spam Blocking Electronic Medical Records Shadow IT Biometrics Update Legal Virtual Desktop Hiring/Firing Managed Services Provider Internet Exlporer Google Docs IT Consultant Identity Theft DDoS Database PDF Humor SharePoint Remote Workers Business Intelligence Processor Proactive IT Augmented Reality Fraud Customer Service Best Practice Worker Environment Audit Peripheral Public Computer Antivirus Smart Tech Experience Trending Amazon Windows 8 Digital Security Cameras Scalability Regulations Best Available Using Data Transportation Addiction 5G Rootkit IT service Recycling Business Owner WIndows 7 Copiers Computer Fan Quick Tip NarrowBand Wiring Practices Amazon Web Services Tablet Ergonomics Search Workers Smartwatch Benefits Cache OLED Safe Mode Domains Criminal Development iPhone FENG PCI DSS Virtual Machine IBM GDPR Hosted Computing Maintenance Online Shopping 2FA Flash Fiber Optics IaaS Employee Smart Technology Wireless Internet PowerPoint Cabling File Sharing Windows Media Player Bloatware User Messaging Files Policy Software Tips Hypervisor Chromecast Supercomputer Camera Inventory Specifications Evernote Tablets Dark mode Sync Trend Micro Emails Wire Default App Uninterrupted Power Supply Entrepreneur Travel Managing Stress SMS Colocation Procedure Saving Time Printers Millennials Shortcut Wireless Charging dark theme Shopping Monitor Netflix Cameras Google Search Two Factor Authentication Smart Office IT Infrastructure Cost Management AI Root Cause Analysis FinTech HBO Knowledge Virtual Private Network Bing Music Social Networking Workforce Cables Skype Social Network Reputation Streaming Media Investment Tech Support Content Data loss Employees Techology Outlook Employee/Employer Relationships Laptop Leadership Project Management Running Cable Troubleshooting Nanotechnology Telecommuting Cortana Memory Windows 365 Start Menu Customers Printer Server ISP ROI Loyalty Digital Signature Audiobook Video Conferencing Screen Mirroring Sales Frequently Asked Questions Bitcoin Touchpad Warranty Shortcuts Books HVAC Google Apps Point of Sale Mobile Personal Windows 10s Cryptomining Cast Analysis Politics Supply Chain Management Advertising Science Monitoring Tip of the week Batteries webinar Administrator Emergency Devices Employer Employee Relationship Enterprise Content Management Windows 8.1 Professional Services Digitize Public Cloud Notifications Windows Server 2008 R2 Assessment MSP Accountants Credit Cards Customer relationships Windows Server 2008 Microchip Distributed Denial of Service Thought Leadership Customer Relationship Management Password Management Password Manager Analyitcs Email Best Practices Tools IT Assessment Relocation Manufacturing Television Programming Multi-Factor Security Computer Tips Video Games Consultant Managed IT Service Search Engine Security Cameras Twitter NIST Business Mangement Virtual CIO Worker Commute OneDrive Analytics Biometric Security

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code