Malwareaware

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 18 May 2013

How a fake tech support scam works.

Posted on 09:08 by Unknown
We have discussed fake tech support hotlines before, and I have had quite a bit of fun at their expense. But we have talked very little about what actually happens if you let the "technician" have his/her way with the computer. This blog post will seek to remedy that.

The first part of the scam can happen before you even pick up the phone. There are a few websites that these companies have set up that claim that your computer "may" be infected with a piece of malware. These websites then beg you to call a number to get tech support.

I did this test on a fresh install of Windows XP with all updates applied, everything is working properly and there really is nothing wrong with the machine.

I called a tech support hotline and told them that my computer was running very slow, they remote connected to my computer via one of their tools to check and see what the issue was. Once the technician remote connected, he ran a "tool" that he claimed would find what the issue was as well as any other things wrong with my computer.

The tool claimed that there was no antivirus installed on the computer, there were not any system restore points, I did not have a firewall installed, and I did not have critical updates installed.

The fact that there was no antivirus installed was false, I did have an antivirus program on the machine I used in this ploy. So the software lied, Strike One.

I also know for a fact that there was at least one system restore point because Windows makes a system restore point from when it was first installed automatically. Another LIE, Strike 2.

I was using the outbound firewall included with Windows XP Service Pack 3. Lie, Strike 3.

As I said, I had all updates installed and I was using Windows XP Service Pack 3. So, four lies told by the piece of software that is supposed to help the person that needs help. Would you trust a piece of software like that? I wouldn't trust it.

I showed the technician that the software he was using was incorrect on the four points mentioned above. Even when there was ample evidence to the contrary, the technician still said that my computer had issues such as not having a system restore point installed. So the technician also attempted to lie to me even when I had shown him proof that he and his software were both lying to me.

Disregarding the proof that the software was lying, the technician still attempted to sell me a service package. Because otherwise, he would not fix my computer.

I knew I had to make it clear that I knew that it was a scam to get through to him. So I did two things. First, I directed him to the running programs on the computer. Because I was using a Virtual Machine, it showed up that I was running a Virtual Machine in the task manager. I then directed him to my blog where I revealed to him that he had attempted to scam the wrong person this time. Caught in a web of lies, he attempted to talk his way out by still claiming that there was something wrong with my computer. When I told him that he was only digging a bigger hole, he very rudely hung up on me and it was over.

I am not sure where the thought of fudging the results to sell more service packages came from. But I think it came from the fact that one tech support company decided to pay technicians by commission. In theory, this seemed like a good idea at the time. Pay workers for the work they do rather then by the hour. But then technicians decided to fudge the results of scanning in order to sell more packages and in turn, make more money. This can be done by people who need the extra money, so I try to give the benefit of the doubt there. But still, people work hard to get the money they are bulled into paying to the tech support company.

If you got pushed into paying for a service package you did not need, I'm not saying you are dumb or stupid, but you did get scammed and you need to take action.

Thanks for reading, hopefully this answers some questions you may have about these scams. As always, I invite you to comment below if you have any questions or comments.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • How to remove System Doctor 2014
    There is a new rogue AV making the rounds on the web called System Doctor 2014. For those that have just started reading my blog or for thos...
  • What are Bitcoin Miners?
    For my first post about Bitcoins, and for what I wish to be my last about the subject, we are going to be talking about what Bitcoin miners ...
  • How to keep spies from monitoring you through your computer or your phone.
    Those of you in The United States of America have most likely heard about that whole IRS scandal and the accompanying scandals of wiretappin...
  • Spotlight on Malware: The Gruel Worm.
    It's been around since Windows 2000, but there still is not a way to remove this worm without formatting the hard drive. I speak of the ...
  • I am going to be a billionaire!
    For those of you that have been reading my blog for some time, you know I like to mess with scammers, fake tech support and the like. But th...
  • Use VBScript to pull a joke on your friends.
    Do you want to play a trick on your friends, family, or coworkers? Well this one's for you. You can make a fake piece of malware on your...
  • Spotlight on Malware: MyDoom
    The MyDoom Windows worm, also known as Novarg, and Shimgapi will be the subject of our focus for this post. The MyDoom worm was first discov...
  • CryptoLocker as of 11/3/2013
    If you have read my other posts on this, you know. But for those of you who do not, there is a piece of ransomware that has been making the ...
  • The Big Game: Who's on our side?
    I recently helped a friend of mine remove malware from their computer when she be one mused on how lonely my job must be. "It must be s...
  • Java: No more coffee for you.
    Odds are that every blogger that has a tight focus on computer security has authored a blog post about Java. So why am I wasting your time? ...

Categories

  • Android
  • History Of
  • iOS
  • Java
  • Macs
  • Passwords
  • Removal Guides
  • Spotlight On Malware
  • The CryptoLocker Saga
  • What Does It Mean?
  • What's in a name?
  • Windows

Blog Archive

  • ▼  2013 (151)
    • ►  November (10)
    • ►  October (5)
    • ►  September (15)
    • ►  August (22)
    • ►  July (26)
    • ►  June (17)
    • ▼  May (25)
      • Update on the new blog.
      • What's In a name: Rogue Antivirus
      • A break from blogging.
      • Apparently, my computer loves me. (Surprise ending)
      • How to keep spies from monitoring you through your...
      • Malware In Space: Not A Science Fiction Drama Gone...
      • Greyware and the Babylon Toolbar.
      • Decrypt Protect Ransomware and how to fully remove...
      • Plug In to Plugins.
      • How a fake tech support scam works.
      • Mac Malware is now getting past Gatekeeper.
      • Spotlight On Malware: Bring On The Flame!
      • Attack Of The Clones: What is a clone rogue?
      • The Big Game: Who's on our side?
      • KeyScrambler: A preventive measure against keylogg...
      • Spotlight on Malware: MyDoom
      • Spotlight on Malware: The Gruel Worm.
      • How (Not) to Make Your Computer Run Faster With th...
      • A brief look at Windows 8.
      • A few jokes about computers.
      • Malware: It could happen to iOS too.
      • Android Malware: The robot can be infected.
      • "Stupid Malware! You made me drop my sandwich!"
      • How to remove Internet Security (Rogue)
      • Glipho
    • ►  April (15)
    • ►  March (7)
    • ►  February (6)
    • ►  January (3)
Powered by Blogger.

About Me

Unknown
View my complete profile