Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Someone’s Trying To Phish You… Do You Play Along?

Someone’s Trying To Phish You… Do You Play Along?

Phishing scams have been popping up for years--their most infamous attack vector has even become a punchline: some long-lost relative stuck in a far-off country suddenly reaches out, offering riches, but only if so-much money is provided first. People from all walks of life have been duped by these scams, and while not all of them are this transparent, most are pretty easy to spot.

There may be some temptation to strike back in retribution against the criminal who targeted you, in the form of driving them crazy by wasting their time. Unfortunately, as tempting as such activities may be, they are not a good idea. Take it from the cyber security researchers who have tried--cybercriminals do not take well to mockery, or having their time wasted. A researcher from Malwarebytes, Jerome Segura, found out firsthand when he used a virtual machine to follow a scam to see where it would lead.’

With his device recording everything that played out, Segura first interacted with a female who claimed to have found many, many issues on his device that needed to be resolved before his system was corrupted. Not only that, but Segura was told that his software warranty had recently expired, and he would have to pay the $299 renewal fee to another representative.

Of course, Segura didn’t supply the correct payment credentials, which tipped off the hackers. The hackers then seized control of Segura’s computer, deleting all of his files and his Ethernet adapter driver before calling Segura a rude word and disconnecting.

While these sorts of stories may seem comical in hindsight, they are no laughing matter. This is especially true when things get much more serious.

Take Jakob Dulisse’s story. The wildlife photographer received a call to his home in British Columbia from “Windows Technical Support” in Los Angeles. Coming to the conclusion that this was an attempt to scam him, Dulisse played along before accusing the caller of being “a scammer, a thief, and a bad person.”

The person on the line did not react well at all. Describing himself as a killer, the caller claimed that his group had people in Canada who would cut their victims into pieces and dispose of them in the river.

Other scammers will simply install remote access software as their target decides to mess with them, opening the door for them to come back later, as other cyber security professionals have found.

It is important to remember that these are, in fact, professionals, which means they are better equipped to deal with such threats. It is their job to discover what means of attack cyber criminals are using, and share the best response. This is not how the average business user should handle this situation, the business owner should file a report with the authorities and alert both their Internet service provider and their managed service provider.

An MSP can help make sure that you are fully prepared to handle any cyber security threat that darkens your business’ door. Give Total Tech Care a call at 866-348-2602 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 24 April 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications IT Support Smartphones Business Continuity Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Cybersecurity Quick Tips Users Business Management Windows Managed IT Services Upgrade Phishing Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Office Server Save Money Cloud Computing Windows 10 Passwords Chrome Virtualization Gadgets Tech Term Saving Money Holiday Social Media Microsoft Office Managed IT Services Managed Service Automation Operating System Computers Facebook Artificial Intelligence Cybercrime Hacking Internet of Things BYOD Mobile Device Management Wi-Fi Networking IT Support Health Covid-19 Spam Information Office 365 Telephone Systems Alert Remote Information Technology Managed Service Provider Social Engineering Mobility Router BDR Bandwidth Recovery Employer-Employee Relationship Big Data Encryption Applications Remote Monitoring Data Breach Law Enforcement Mobile Computing App History Application Password Money Human Resources Data Storage Remote Computing Patch Management Blockchain Paperless Office Mobile Office Government Private Cloud Office Tips Managed IT Training How To VPN Apps Two-factor Authentication Google Drive Vulnerability Mouse HaaS Windows 7 Word Flexibility Avoiding Downtime Marketing Servers WiFi IT solutions Infrastructure Entertainment Website Voice over Internet Protocol Budget Wireless Data Security Bring Your Own Device Data Management Work/Life Balance Gmail Settings Education Physical Security Virtual Reality Apple Safety Conferencing Sports HIPAA Social Employee/Employer Relationship Redundancy Scam RMM Telephone System Staff Software as a Service Keyboard User Error Machine Learning Meetings Remote Work Connectivity Vendor Management Risk Management Hacker Save Time USB The Internet of Things Lithium-ion battery Cleaning Data Protection Vendor Firewall End of Support Managed Services Display SaaS Processor Business Technology Internet Exlporer Content Management Access Control Hard Drive PDF Virtual Assistant Network Congestion eWaste Business Intelligence Authentication Virus Audit Proactive IT Worker Unified Threat Management Computing IT Management Computer Accessories Best Practice YouTube Update Botnet Wearable Technology IT Plan Black Market Hard Drives Retail Instant Messaging Google Docs Identity Theft Unsupported Software Robot Digital Signage Excel Printer Document Management Bluetooth Solid State Drive Biometrics Wireless Technology Charger How to Virtual Desktop Downtime Compliance Procurement OneNote Augmented Reality Computer Care Fraud Workplace Strategy DDoS Net Neutrality Data storage Current Events Automobile Telephony IT Consultant SharePoint Remote Worker Help Desk Samsung Printing Computing Infrastructure Cryptocurrency Humor Going Green Value Customer Service Spam Blocking Environment Electronic Medical Records Managed Services Provider Comparison Battery Fax Server Database Shadow IT Hiring/Firing CES Remote Workers Legal Emergency Evernote Email Best Practices IT Assessment Tip of the week Manufacturing WIndows 7 webinar Tablet Wire Advertising Public Cloud Employer Employee Relationship Travel Politics Professional Services Domains Computer Tips Managed IT Service Printers Security Cameras Assessment Millennials Smart Office Notifications Wireless Charging Virtual CIO IaaS OneDrive Windows Server 2008 Maintenance Biometric Security Bloatware Peripheral Tools Workforce Digital Security Cameras Using Data Virtual Private Network Television PowerPoint Cables Windows Media Player Copiers 5G User Relocation Tablets Entrepreneur Quick Tip Telecommuting Ergonomics Video Games Project Management Smartwatch Public Computer Nanotechnology Transportation Cortana Development Worker Commute Regulations Shortcut OLED Managing Stress Virtual Machine Computer Fan Cost Management Rootkit Digital Signature PCI DSS Experience 2FA Fiber Optics Scalability Social Networking Warranty Employee Cameras HVAC Benefits Google Apps Messaging Business Owner Cabling Workers Hypervisor FENG NarrowBand Analysis Policy Dark mode Running Cable Trend Micro Search Administrator IBM Devices Memory Enterprise Content Management Smart Technology SMS Flash Default App iPhone Saving Time MSP Accountants Procedure Credit Cards dark theme Shopping Software Tips Microchip Google Search Supercomputer Thought Leadership Printer Server Emails Password Management Password Manager AI Sync IT Infrastructure Files Bing Chromecast Multi-Factor Security FinTech Social Network Search Engine Science Twitter Netflix NIST Uninterrupted Power Supply Two Factor Authentication Business Mangement Investment Colocation Employee/Employer Relationships Root Cause Analysis Smart Tech Trending Employees Music Amazon Windows 365 Distributed Denial of Service HBO Customer Relationship Management ISP Monitor Knowledge Addiction Analyitcs Recycling Video Conferencing Skype ROI Bitcoin Data loss Programming Wiring Shortcuts Practices Sales Streaming Media Troubleshooting Amazon Web Services Point of Sale Personal Outlook Cryptomining Reputation Leadership Cache Safe Mode Tech Support Criminal Supply Chain Management Content Start Menu Monitoring Antivirus Batteries Techology Screen Mirroring GDPR Consultant Laptop Loyalty Hosted Computing Books Online Shopping Windows 8.1 Digitize Frequently Asked Questions Customers Windows 8 Wireless Internet Analytics Windows Server 2008 R2 Windows 10s File Sharing Audiobook Mobile IT service Customer relationships Cast Camera Best Available Touchpad Inventory Specifications

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code