Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 17 March 2011

Fraudsters Use Bogus Support Calls to Try and Hijack Peoples PCs

Posted on 05:47 by Unknown

Submitted by Mickey Boodaei, Trusteer CEO

With nearly 100 banks that offer Trusteer’s Rapport for secure web access we are now reaching 20 million installations.  Our large install base and the level of trust people have developed in our brand provide us with a unique view of new types of fraud as users contact our free 24x7 support center to get advice. One of these recent interesting incidents described here remind us that fraud can take many shapes and forms

We recently received a report from a concerned Rapport user who said she had a phone call from someone claiming to be from Microsoft Windows Solutions saying that, because of error messages from her computer, he was tasked to help fix any problems she had.  In fact he was not from Microsoft and tricked her into letting him connect to her PC and then tried to con her into buying bogus security products.

The recipient of the call initially thought the call was genuine and allowed the caller to remote access her computer - and show her the "viruses which had infected my system."

"When he tried to sell me some software I ended the call and did not give him any personal details, credit card or otherwise. Nevertheless, I'm worried that my computer may be vulnerable to future attack", she told our help desk, asking for assistance.

According to our Rapport user, the telephone caller led her to a Web site that allowed her to download a free remote access application that allowed him to access her computer.

"He then showed me a long list of files - all viruses, he said, and some very dangerous. I told him that I had good security on my computer", she said, adding I could not understand how that could happen.

"He said he was transferring me to his supervisor who would solve these problems. The supervisor showed me yet more virus files, which he said were located in a hidden part of the computer and he couldn't therefore clean it up without Windows 7 being installed (I run Vista) and some new security software," she said.

Whilst it does not appear the scam artists behind this call infected our Rapport user, they then tried to sell her a £300 security application, which they could offer her much more cheaply.

"As he rang off, he warned me that my computer was in very bad shape and would crash any day. The call lasted around 20 minutes and I feel like such an idiot to have been taken in for that length of time, and very nervous that they had all the time in the world to infect my computer," the Rapport user told our researchers. 

Well, the good news is that our support team was able to work with this lady and ensure that her machine was not infected. 

We searched our support database for similar incidents and indeed we do see users coming in with similar reports from time to time. From that we can conclude that this is indeed a common method of fraud that users should be aware of and avoid. It’s easy to think that you’d never fall for this type of fraud. But keep in mind that these fraudsters are very experienced and good in what they do. If it’s not you than it could be your friend, your parents, or your spouse who may be taken in by this sort of plausible-sounding `security support calls. 

We’ve recently added an awareness center to our Rapport secure web access software. The awareness center gives you information about recent scams and security alerts that you should be aware of. It’s incorporated into the Rapport console and you can choose whether to visit it yourself or set it to pop up an alert when a new report is available. We believe this tool could be useful in keeping you in the know and providing you with tips on how to avoid new types of threats.

Every little bit helps. As the popular supermarket slogan says, and this is no less true in the IT security space. 

Say safe when using the Internet.

For more information see http://www.trusteer.com/blog

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ▼  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ▼  March (14)
      • Origin Storage says Canadian health data theft hig...
      • Venafi survey reveals enterprises plagued by epide...
      • There are no zombies in Denver, Colorado says Secu...
      • Idappcom blames hacktivists for SpyEye DDoS enhanc...
      • ISACA’s EuroCACS Conference Demystifies the Cloud
      • Metro Bank Provide Innovative Approach to Banking ...
      • BitDefender warns Facebook scammers are targeting ...
      • Analyst report outlines the importance of metadata...
      • DES Launches New DESlock+ Enterprise Server
      • Malware on the Decline? Or Is Evasion on the Rise?
      • Fraudsters Use Bogus Support Calls to Try and Hija...
      • ISACA expert claims virtualisation dates back to 1...
      • 400 percent increase in USBs left at the dry cleaners
      • Use your smartphone to log into cloud and secure s...
    • ►  February (30)
    • ►  January (21)
  • ►  2010 (192)
    • ►  December (20)
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ►  May (13)
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ►  January (27)
  • ►  2009 (240)
    • ►  December (25)
    • ►  November (9)
    • ►  October (21)
    • ►  September (19)
    • ►  August (30)
    • ►  July (35)
    • ►  June (30)
    • ►  May (21)
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile