Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Windows 10 Email Scam Isn’t The Upgrade You’re Looking For

b2ap3_thumbnail_windows_10_email_scam_400.jpgFor those of you who don’t yet have Windows 10, don’t panic. It’s not going anywhere, and you’ll get it soon enough. In the meantime, it’s important that you don’t get impatient and hastily open suspicious emails containing what appears to be a launcher for your Windows 10 download. Hackers are using ransomware to extort money from unsuspecting users who just want their new operating system already.

For some, the fault might lie with Microsoft because of the way they’ve decided to deploy Windows 10. Making people wait even more for a product that already exists is somewhat maddening, and hackers are taking advantage of this impatience to strike. CTB-Locker is a ransomware similar to Cryptolocker, in which it encrypts information locally on your PC, and offers a decryption key in exchange for a hefty price.

This ransomware spreads via email. Victims will receive a message in their inbox which appears to be from Microsoft detailing how they can bypass the wait for Windows 10, and prompts them to download what appears to be a launcher for the new operating system. Once the user downloads the executable file, the malware starts encrypting data on the PC. The user is locked out of their PC until they pay the ransom.

Furthermore, if the user wants to regain access to their files, the ransom must be paid in Bitcoin, a cryptocurrency which is known for its anonymity and difficulty to trace. Adding to the difficulty is that the hackers are using the Tor anonymity network to communicate, which makes catching the clowns behind this act difficult at best. Ransomware is an increasingly popular problem, and according to ZDNet, it can cost users anywhere from $200 to $10,000 for each occurrence, leading to ultimate costs of up to $18 million. That’s a lot of cash that’s been extorted from some 1,000 users in 2015 alone.

windows10scam

Of course, with a good email solution you won’t be receiving this message. A powerful spam blocking solution is capable of keeping spam messages out of your inbox almost indefinitely, meaning that you have little to worry about from the average phishing attack. Still, if a hacker wants to scam you bad enough, they’ll find a way to get through your security measures and attack you directly, in the form of a targeted spear phishing attack.

Therefore, the best way you can protect yourself from threats like CTB-Locker is to keep an eye on your inbox for any suspicious messages, and to never, ever, download attachments from unknown senders. Augment caution with a powerful spam filter and you’ll have all you need to keep phishing attacks at bay. Give Total Tech Care a call at 866-348-2602 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Google Business Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Upgrade Managed IT Services Windows Phishing Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Data Recovery Office Cloud Computing Passwords Windows 10 Tech Term Chrome Virtualization Social Media Gadgets Saving Money Holiday Microsoft Office Automation Managed IT Services Managed Service Operating System Facebook Computers Cybercrime Artificial Intelligence IT Support Hacking Internet of Things Health BYOD Mobile Device Management Wi-Fi Networking Spam Managed Service Provider Office 365 Telephone Systems Remote Information Technology Alert Covid-19 Information Social Engineering Mobility Router BDR Recovery Employer-Employee Relationship Bandwidth Remote Monitoring Encryption Big Data Applications Data Breach App History Law Enforcement Mobile Computing Human Resources Application Password Money Data Storage Patch Management Office Tips Training Government VPN Blockchain Private Cloud Paperless Office How To Managed IT Remote Computing Apps Mobile Office Vulnerability Windows 7 Word Google Drive Servers Wireless Avoiding Downtime Flexibility Gmail Marketing Data Security WiFi Settings IT solutions Entertainment Website Budget Two-factor Authentication Bring Your Own Device Data Management Work/Life Balance Mouse Infrastructure HaaS Voice over Internet Protocol User Error Conferencing End of Support Meetings Scam Education Physical Security Safety Data Protection Sports Risk Management HIPAA Hacker Redundancy Vendor Management Keyboard The Internet of Things Lithium-ion battery Vendor Managed Services Staff Firewall Software as a Service Display Telephone System Save Time Machine Learning USB Connectivity Remote Work Virtual Reality Apple Employee/Employer Relationship Cleaning Social RMM Battery Augmented Reality Shadow IT Fraud Wearable Technology Legal Business Intelligence Digital Signage Retail Hard Drives Remote Worker Instant Messaging Audit Internet Exlporer Worker Robot IT Management Excel Cryptocurrency Biometrics PDF Botnet Procurement Virtual Desktop IT Plan Workplace Strategy Comparison Net Neutrality Proactive IT Virus CES DDoS Help Desk Unsupported Software Best Practice Printing Unified Threat Management YouTube Charger SharePoint Computer Accessories Content Management Black Market Business Technology Compliance Access Control OneNote Computer Care Managed Services Provider Customer Service Current Events Virtual Assistant Authentication Database Document Management Telephony Environment Solid State Drive Wireless Technology Samsung Printer Remote Workers Fax Server How to Downtime Bluetooth Value Processor SaaS Update Data storage Spam Blocking Electronic Medical Records Automobile Hard Drive IT Consultant Google Docs Computing Infrastructure Hiring/Firing Identity Theft Network Congestion Going Green eWaste Computing Humor Techology Laptop Assessment Password Management PCI DSS Password Manager Virtual Machine Fiber Optics Multi-Factor Security Employee Shortcut Windows Server 2008 Customers 2FA Cost Management Search Engine Twitter Messaging Consultant Cabling Audiobook Tools Analytics Social Networking Touchpad Television NIST Policy Business Mangement Hypervisor Smart Tech Trend Micro Trending Dark mode Advertising Addiction SMS Best Available Amazon Default App Politics Running Cable Public Computer Procedure WIndows 7 Recycling Saving Time Wiring dark theme Notifications Transportation Practices Shopping Google Search Regulations Memory Computer Fan Rootkit Cache AI Amazon Web Services IT Infrastructure Criminal Bing Safe Mode FinTech GDPR Benefits Hosted Computing Social Network Relocation Workers FENG Wireless Internet Online Shopping Investment Employee/Employer Relationships PowerPoint Windows Media Player Video Games Science IBM File Sharing Employees User Camera Windows 365 Smart Technology Inventory Specifications ISP Worker Commute Flash Experience Wire Video Conferencing Evernote ROI Bitcoin Distributed Denial of Service Travel Shortcuts Customer Relationship Management Scalability Software Tips Supercomputer Sales Managing Stress Emails Printers Point of Sale Personal Millennials Cryptomining Business Owner Sync Analyitcs Programming NarrowBand Smart Office Supply Chain Management Wireless Charging Cameras Batteries Search Monitoring iPhone Netflix Virtual Private Network Windows 8.1 Two Factor Authentication Digitize Workforce Root Cause Analysis Cables Windows Server 2008 R2 Antivirus Music HBO Windows 8 Knowledge Customer relationships Files Project Management Email Best Practices Nanotechnology IT Assessment Telecommuting Manufacturing IT service Skype Data loss Chromecast Cortana Printer Server Troubleshooting Digital Signature Managed IT Service Security Cameras Outlook Tablet Leadership Computer Tips Colocation Warranty Virtual CIO Uninterrupted Power Supply OneDrive Biometric Security Domains Start Menu Screen Mirroring Loyalty HVAC Peripheral Google Apps Books Analysis Using Data IaaS Maintenance Frequently Asked Questions Monitor Digital Security Cameras Windows 10s Administrator Devices Copiers 5G Mobile Bloatware Cast Enterprise Content Management Quick Tip Streaming Media Emergency Accountants Smartwatch Tip of the week Tablets Reputation webinar MSP Ergonomics Public Cloud Microchip Tech Support Employer Employee Relationship Thought Leadership Development Credit Cards OLED Content Professional Services Entrepreneur

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code