Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Is It A Good Idea To Bait A Phishing Scam?

Is It A Good Idea To Bait A Phishing Scam?

Phishing scams have had a supporting role in many of the latest cyber threats, often as the means the attacker has used to start off their attack. This attack vector is relatively easy to avoid in most cases, but requires education for the end user.

If you see these malicious emails in your inbox, you might be tempted to give the attacker a piece of your mind (or simply mess with them). We’ve all been there.

So, is it a good idea to antagonize a cybercriminal who was targeting you?

In a word, no.

There are plenty of professionals who have experimented with this very concept, for the academic purpose of finding out how a cybercriminal will react. One such researcher, Jerome Segura of Malwarebytes, played though a scam in its entirety. What he encountered was a mixture of apparent helpfulness in finding a cache of issues in his ‘device’ -- actually a virtual machine rigged to record attacks -- and a decidedly less helpful, unpleasant tone,

A  ‘technician’ had Segura check his Microsoft Error reports, warning him that each and every error and warning he sees is a major problem that had already begun to corrupt his system. To reinforce the need for a ‘solution,’ Segura was told that his software warranty had expired and, once transferred to another ‘representative,’ that he needed to pay for a $299 renewal.

Instead of paying, Segura supplied incorrect payment credentials, knowing they would be rejected. Once they were, his computer was suddenly seized. The ‘technician’ deleted all of his files as well as the Ethernet adapter driver, and calling Segura a rude word before disconnecting.

This is a fairly tame account of what this sort of cybercriminal can do. A wildlife photographer named Jakob Dulisse received a call to his home in Nelson, British Columbia, Canada from “Windows Technical Support” in Los Angeles, California. Quickly deducing that this was an attempt to scam him, Dulisse played along at first, before calling the voice on the other end of the line, “a scammer, a thief, and a bad person.”

The scammer/thief/bad person did not react well, stating that their group had people in Canada that would kill Dulisse, going so far as to describe himself as a killer and referencing that people in his region cut people into pieces and rid themselves of them in the river.

Other professionals have simply found remote access software installed without their consent as they have ‘played along’ with scammers.

However, these are professionals, whose job it is to identify and publicize the attacks that cybercriminals are resorting to. As for the business user, their best bet is to report the attempt to the local authorities, as well as your managed service provider.

A managed service provider can help you ensure that you are both secured against, and well-versed, in the latest cyberattacks. Give FRS Pros a call at 561-795-2000 to get started.

Tip of the Week: 3 Better Ways To Use Excel
If Your Business Could Talk, It’d Complain About S...

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Network Security Productivity Privacy Business Computing Hackers Internet Software User Tips Microsoft Google Cloud Innovation Business Management Hardware Computer Efficiency Windows 10 Email Tech Term Data Smartphones Cybersecurity Data Backup Hosted Solutions Communication Malware Mobile Devices IT Support IT Services Office 365 Data Recovery Upgrade Android Smartphone Outsourced IT Browser Internet of Things Gadgets Backup Business Apps VoIP Windows Small Business Data Security Phishing Workplace Tips Communications Disaster Recovery Users Cybercrime Business Continuity Managed IT Services Saving Money Mobile Device Management Cloud Computing Operating System Information Ransomware Network Facebook Automation Artificial Intelligence Two-factor Authentication Alert Managed Service Vulnerability Server Passwords Law Enforcement Miscellaneous Social Media OneNote Employer-Employee Relationship Money Microsoft Office Virtualization Blockchain Managed IT Services Spam Holiday Collaboration Networking Best Practice IT Support Health Applications Wireless Chrome Managed IT Bandwidth App Information Technology Access Control Printing Retail Telephone Systems Bring Your Own Device Data Storage Tech Support Mobile Device Word Password Router Quick Tips Patch Management Project Management Windows 7 Managed Service Provider Google Drive Settings Hacking Windows 10 Data Breach Gmail BYOD Save Money Unsupported Software Augmented Reality Computers Safety Going Green Social Excel File Sharing Budget Government Fraud Payment Cards Wireless Technology Proactive IT Robot Paperless Office Evernote SaaS Risk Management Data Management User Error Productivity Mobile Security The Internet of Things Touchscreen Vendor VPN iPhone WiFi Wi-Fi Sports Cortana Update Google Assistant Data Loss Politics History Conferencing Shortcut Telephony Hybrid Cloud Voice over Internet Protocol Audit Data Protection Wireless Charging Meetings BDR Google Docs Hosted Solution Devices Business Technology Search Avoiding Downtime Mobility Software as a Service IT Management Cost Management Marketing Hard Drive Display Application WannaCry Encryption Travel Commerce YouTube IT Solutions Recovery PC CRM Computer Forensics Peripheral Disaster Touchpad Threats Webinar Inventory Chromebook Co-Managed Services Battery Digital Signage Apple Alexa for Business Facebook Privacy Sales Proactive Camera Instant Messaging Hacker Windows Server 2008 R2 Tablets Maintenance Financial Payroll Consultant Employees Emergency Administrator Sync Management Remote Monitoring Humor Scams Storage Social Engineering Employee IT solutions Streaming Media FAQ Telephone Point of Sale Lithium-ion battery Firewall Edge eCommerce Personal Information Websites Projects Keyboard Mobile Office NFL eWaste Security Cameras Entertainment Identities OneDrive iOS WIndows Server 2008 Smartwatch Access PowerPoint Admin Identity Theft Virtual Private Network Break/Fix Windows 10s HBO Chromecast Reputation Hosted Desktop Charger Hyperlink Office Processor Ciminal Fiber Optics Data Theft Identity Printers Computer Care Nanotechnology Data storage Development Device Security Machine Learning Screen Mirroring Legislation Language Employee-Employer Relationship Internet Exlporer Remote Computing Server Maintenance Adobe Workers Wireless Internet Saving Time Unified Threat Management Vendor Management Remote Workers Medical IT Solid State Drive Smart Devices Value Wasting Time Scam Benchmarks Cast Holidays Gifts Computing Data Privacy Root Cause Analysis Education Uninterrupted Power Supply Micrsosoft Windows Ink Amazon Downtime Emails Comparison Computer Fan Investment Licensing Updates Gamification Keyboard Shortcuts Upgrades Samsung Managed IT Service 5G Hard Disk Drive Transportation Sabotage Troubleshooting Outlook Accessory Laptop Myths Microsoft Excel IT budget Legal Private Cloud Copiers Credit Cards App store Business Intelligence Google Maps Spyware Virtual Assistant E-Commerce Specifications Virus Testing DDoS ROI Microsoft Word Memory Human Resources Antivirus Files Managed Services Provider es Cache Computer Accessories Flexibility Music Smart Technology HaaS Training Monitors End of Support Relocation Scalability Analytics Communitications Television CrashOverride Company Culture Thank You Black Market Cleaning Compliance Big Data Automobile PDF Mobile Computing Managing Stress Congratulations USB Worker Regulation How To Books Text Messaging Video Games Experience Hiring/Firing Virtual Reality Work/Life Balance Current Events Electronic Medical Records Twitter Crowdsourcing Employer Employee Relationship Office tips Phone System Benefits Advertising Save Time