Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

This Scammer Raid Proves Just How Useful Monitoring Can Be

This Scammer Raid Proves Just How Useful Monitoring Can Be

It can be easy to underestimate the importance of monitoring your solutions, to adopt an “out of sight, out of mind” mentality. However, the benefits of persistent monitoring were recently thrust into the spotlight, when 24 spammers were arrested in October by the Delhi Police’s cyber cell for impersonating Microsoft support staff and duping American citizens.

With the assistance of Microsoft’s Digital Crime Unit (based in Redmond, Washington, USA, and with offices around the globe) the authorities were able to leverage data analytics in order to bust multiple companies with illegal call centers. These call centers were running a tech support scam that targeted American Microsoft Windows users.

Typical of a tech support scam, the employees at these call centers would first send their targets a fraudulent notification that claimed that their systems had malware on them. They created websites to further convince their targets of their legitimacy. When a victim called the number provided, the cybercriminals would charge them a sum anywhere between $100 and $500 to “remedy” the apparent issue.

The scammers would steal data and install malware once they were given access.

It was through monitoring that an employee of Microsoft India, Nripenda Kashyap, was able to identify and report these activities to the DCU. His actions ultimately led to 10 call centers being raided and the arrest of 24 people, the owners of these businesses included.

There are a few lessons that you can take from these events.

First, you need to remember that no major technology company, like Microsoft, is ever going to reach out to you and inform you that your device is having issues. The only exception is if you’ve enlisted a service provider like FRS Pros to actively monitor your computers and other devices. Otherwise, you’re essentially on your own.

Second, having your own IT monitored isn’t something that you should postpone. Tech support scams like these claim $1.5 billion each year from 3.3 million users (and that’s according to a lawsuit that the DCU filed… in 2014) While you may see the dozens of errors that your computer tracks as some kind of catastrophe, a professional IT resource will be able to tell if something is actually wrong.

When you do elect to have your devices monitored and maintained, try reaching out to us. We’ll work behind the scenes, actually preventing issues before they happen and identifying and mitigating threats.

If you’re interested in learning more about our services, including our remote monitoring and maintenance solutions, reach out to us at 561-795-2000.

Those Irritating Spam Calls May Not Last Much Long...
Tip of the Week: Keyboard Shortcuts to Save You Ti...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, May 22 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Computing Productivity Google Cloud User Tips Business Management Tech Term Microsoft Hackers Innovation Hardware Software Mobile Devices Efficiency Windows 10 Browser Computer Hosted Solutions Malware Data Backup Data Recovery Smartphones Cybersecurity Smartphone IT Services Data Office 365 Windows Apps Data Security Internet of Things Android Email IT Support Backup Outsourced IT Upgrade Communication Cybercrime Workplace Tips Communications VoIP Operating System Network Disaster Recovery Business Continuity Mobile Device Management Money Users Business Vulnerability Server Alert Gadgets Law Enforcement Phishing Ransomware Small Business Saving Money Chrome Virtualization Cloud Computing Spam Information Artificial Intelligence Managed IT Services Collaboration Microsoft Office Passwords Best Practice Miscellaneous Social Media Automation Employer-Employee Relationship Applications Managed IT Services Wireless IT Support Computers App Bring Your Own Device Blockchain Information Technology Telephone Systems Tech Support Two-factor Authentication OneNote Holiday Managed Service Provider Facebook Networking Health Router Managed IT Word Windows 10 Save Money Google Drive Unsupported Software Google Docs Project Management Search WannaCry Patch Management Wireless Charging Avoiding Downtime Mobility Commerce Devices BDR Budget Managed Service Access Control Data Breach Printing Wireless Technology Proactive IT Mobile Security SaaS Data Management Application Government Travel Productivity File Sharing Excel Google Assistant Encryption Touchscreen Data Storage Fraud Hybrid Cloud Robot Safety WiFi Sports Mobile Device The Internet of Things Telephony Evernote User Error Risk Management VPN iPhone Audit Password Data Protection Business Technology Meetings Cortana Wi-Fi Hacking Quick Tips IT Management Conferencing Update Cost Management Gmail Shortcut Hosted Solution Politics Augmented Reality Alexa for Business Payment Cards Vendor Management DDoS Chromebook Co-Managed Services Files Windows Ink Financial Payroll Transportation Scam IT Solutions Recovery Sabotage Gifts Computing Camera Laptop Disaster Education Private Cloud Webinar Comparison Employees Licensing Updates Management Microsoft Excel IT budget Employee Samsung Outlook Telephone Consultant Google Maps Spyware Security Cameras Going Green Social Administrator PC Credit Cards App store Projects Touchpad Remote Monitoring PowerPoint Admin IT solutions Streaming Media Specifications Virus Vendor OneDrive Legal Lithium-ion battery Microsoft Word Break/Fix Antivirus Hyperlink Apple Machine Learning iOS WIndows Server 2008 Access Paperless Office Identity Humor Maintenance Wireless Internet Saving Time Battery Windows 10s HBO Chromecast Sales Proactive Employee-Employer Relationship Voice over Internet Protocol Tablets Personal Information Screen Mirroring Storage Social Engineering Medical IT Computer Care Nanotechnology Sync Value Wasting Time Hacker Edge Amazon Downtime Internet Exlporer FAQ Data Privacy Windows 7 Emergency Unified Threat Management NFL eWaste Gamification Keyboard Shortcuts Point of Sale Reputation Solid State Drive Retail Websites History Emails Cast Identities Software as a Service 5G Entertainment Data storage Root Cause Analysis Uninterrupted Power Supply Accessory Data Loss Ciminal Virtual Assistant E-Commerce Remote Computing Identity Theft Computer Fan Charger Hard Drive Display Upgrades Device Security Memory Human Resources Office Hard Disk Drive Data Theft Testing Marketing BYOD Legislation Language Bandwidth YouTube Settings Adobe Workers Computer Forensics Peripheral USB Worker How To Books Office tips Cache Hiring/Firing Video Games Experience Advertising Work/Life Balance Training Monitors Virtual Reality Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Benefits Phone System Television CrashOverride Compliance Company Culture End of Support Thank You es Save Time HaaS Computer Accessories Relocation Printers Smart Technology Flexibility Music Regulation Congratulations Instant Messaging Scalability Analytics PDF Keyboard Mobile Computing Twitter Black Market Cleaning Automobile Big Data Text Messaging Managing Stress