Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Is It A Good Idea To Bait A Phishing Scam?

Is It A Good Idea To Bait A Phishing Scam?

Phishing scams have had a supporting role in many of the latest cyber threats, often as the means the attacker has used to start off their attack. This attack vector is relatively easy to avoid in most cases, but requires education for the end user.

If you see these malicious emails in your inbox, you might be tempted to give the attacker a piece of your mind (or simply mess with them). We’ve all been there.

So, is it a good idea to antagonize a cybercriminal who was targeting you?

In a word, no.

There are plenty of professionals who have experimented with this very concept, for the academic purpose of finding out how a cybercriminal will react. One such researcher, Jerome Segura of Malwarebytes, played though a scam in its entirety. What he encountered was a mixture of apparent helpfulness in finding a cache of issues in his ‘device’ -- actually a virtual machine rigged to record attacks -- and a decidedly less helpful, unpleasant tone,

A  ‘technician’ had Segura check his Microsoft Error reports, warning him that each and every error and warning he sees is a major problem that had already begun to corrupt his system. To reinforce the need for a ‘solution,’ Segura was told that his software warranty had expired and, once transferred to another ‘representative,’ that he needed to pay for a $299 renewal.

Instead of paying, Segura supplied incorrect payment credentials, knowing they would be rejected. Once they were, his computer was suddenly seized. The ‘technician’ deleted all of his files as well as the Ethernet adapter driver, and calling Segura a rude word before disconnecting.

This is a fairly tame account of what this sort of cybercriminal can do. A wildlife photographer named Jakob Dulisse received a call to his home in Nelson, British Columbia, Canada from “Windows Technical Support” in Los Angeles, California. Quickly deducing that this was an attempt to scam him, Dulisse played along at first, before calling the voice on the other end of the line, “a scammer, a thief, and a bad person.”

The scammer/thief/bad person did not react well, stating that their group had people in Canada that would kill Dulisse, going so far as to describe himself as a killer and referencing that people in his region cut people into pieces and rid themselves of them in the river.

Other professionals have simply found remote access software installed without their consent as they have ‘played along’ with scammers.

However, these are professionals, whose job it is to identify and publicize the attacks that cybercriminals are resorting to. As for the business user, their best bet is to report the attempt to the local authorities, as well as your managed service provider.

A managed service provider can help you ensure that you are both secured against, and well-versed, in the latest cyberattacks. Give FRS Pros a call at 561-795-2000 to get started.

Tip of the Week: 3 Better Ways To Use Excel
If Your Business Could Talk, It’d Complain About S...

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Network Security Business Computing Productivity Privacy Internet Hackers Google User Tips Software Business Management Cloud Microsoft Hardware Computer Tech Term Innovation Efficiency Data Backup Mobile Devices Data Malware Hosted Solutions Smartphones Office 365 Browser Windows 10 Data Recovery Smartphone Android IT Services Cybersecurity Gadgets Backup Windows Communication Email Upgrade Internet of Things IT Support Outsourced IT Business Small Business Apps Workplace Tips Data Security Cybercrime Communications Disaster Recovery VoIP Network Phishing Business Continuity Mobile Device Management Ransomware Operating System Employer-Employee Relationship OneNote Users Money Artificial Intelligence Alert Saving Money Law Enforcement Cloud Computing Information Vulnerability Server Health Applications Wireless Best Practice Chrome Automation Microsoft Office Managed IT Services Managed IT Services Blockchain Passwords Managed Service Virtualization Spam Miscellaneous Social Media IT Support Collaboration Facebook Networking Router Telephone Systems Tech Support Word Google Drive Password Managed Service Provider Managed IT Holiday Hacking Unsupported Software Windows 10 BYOD Information Technology Save Money Computers App Two-factor Authentication Bring Your Own Device Data Storage WiFi Productivity Cortana Quick Tips Mobile Device Sports Data Loss Windows 7 Settings Conferencing Hosted Solution Application Search Avoiding Downtime Mobility Business Technology Telephony Audit Meetings Google Docs Project Management Data Protection Encryption Patch Management Wireless Charging Hard Drive Display Devices Safety Data Breach Cost Management IT Management Government Gmail Augmented Reality Risk Management Travel Commerce WannaCry Excel Robot Access Control File Sharing Printing Wi-Fi Fraud The Internet of Things Budget Update Mobile Security Shortcut Evernote VPN iPhone SaaS Wireless Technology Politics Proactive IT Google Assistant Data Management User Error BDR Hybrid Cloud Touchscreen Education Sabotage Remote Computing Wireless Internet Saving Time Identities Employee-Employer Relationship Voice over Internet Protocol iOS WIndows Server 2008 Value Wasting Time Samsung Business Intelligence Ciminal Medical IT Windows 10s Access HBO Charger Data Privacy Computer Care Nanotechnology ROI Device Security Amazon Downtime Chromecast Screen Mirroring Data Theft Adobe PC Workers Gamification Keyboard Shortcuts Unified Threat Management Legal Legislation Language Transportation Accessory Antivirus Digital Signage Laptop Software as a Service 5G Internet Exlporer Solid State Drive Private Cloud Root Cause Analysis Windows Ink Windows Server 2008 R2 Virtual Assistant E-Commerce Emails Cast Gifts Computing Battery Licensing Paperless Office Updates Memory Human Resources Upgrades Comparison Testing Uninterrupted Power Supply Computer Fan Outlook Going Green Social Computer Forensics Peripheral Microsoft Excel Firewall IT budget Touchpad Bandwidth YouTube Hard Disk Drive Instant Messaging Hacker Chromebook Co-Managed Services Google Maps Mobile Office Spyware Alexa for Business Payment Cards Marketing Emergency Credit Cards App store Point of Sale Smartwatch Microsoft Word Financial Payroll Specifications Virus Camera Management Files Entertainment Processor Humor Employees DDoS IT Solutions Telephone Disaster Identity Theft Apple Development Employee Recovery Webinar Office Tablets Server Maintenance Maintenance Security Cameras Consultant Sales Proactive Personal Information Projects Sync PowerPoint Admin Remote Monitoring Storage Benchmarks Social Engineering Vendor OneDrive Reputation Hyperlink Vendor Management Micrsosoft Edge Break/Fix IT solutions Administrator FAQ Lithium-ion battery Scam NFL Investment eWaste Data storage Machine Learning Streaming Media Retail Websites History Identity Hiring/Firing Video Games Experience Thank You Work/Life Balance Text Messaging Regulation Virtual Reality Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Benefits Phone System Congratulations Twitter Office tips Save Time Computer Accessories Advertising Smart Technology Flexibility Music End of Support Scalability Analytics HaaS Keyboard es Relocation Cache Black Market Cleaning Training Monitors Automobile Big Data Managing Stress Television CrashOverride PDF Compliance USB Worker Company Culture How To Books Mobile Computing Printers