Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

This Scammer Raid Proves Just How Useful Monitoring Can Be

This Scammer Raid Proves Just How Useful Monitoring Can Be

It can be easy to underestimate the importance of monitoring your solutions, to adopt an “out of sight, out of mind” mentality. However, the benefits of persistent monitoring were recently thrust into the spotlight, when 24 spammers were arrested in October by the Delhi Police’s cyber cell for impersonating Microsoft support staff and duping American citizens.

With the assistance of Microsoft’s Digital Crime Unit (based in Redmond, Washington, USA, and with offices around the globe) the authorities were able to leverage data analytics in order to bust multiple companies with illegal call centers. These call centers were running a tech support scam that targeted American Microsoft Windows users.

Typical of a tech support scam, the employees at these call centers would first send their targets a fraudulent notification that claimed that their systems had malware on them. They created websites to further convince their targets of their legitimacy. When a victim called the number provided, the cybercriminals would charge them a sum anywhere between $100 and $500 to “remedy” the apparent issue.

The scammers would steal data and install malware once they were given access.

It was through monitoring that an employee of Microsoft India, Nripenda Kashyap, was able to identify and report these activities to the DCU. His actions ultimately led to 10 call centers being raided and the arrest of 24 people, the owners of these businesses included.

There are a few lessons that you can take from these events.

First, you need to remember that no major technology company, like Microsoft, is ever going to reach out to you and inform you that your device is having issues. The only exception is if you’ve enlisted a service provider like FRS Pros to actively monitor your computers and other devices. Otherwise, you’re essentially on your own.

Second, having your own IT monitored isn’t something that you should postpone. Tech support scams like these claim $1.5 billion each year from 3.3 million users (and that’s according to a lawsuit that the DCU filed… in 2014) While you may see the dozens of errors that your computer tracks as some kind of catastrophe, a professional IT resource will be able to tell if something is actually wrong.

When you do elect to have your devices monitored and maintained, try reaching out to us. We’ll work behind the scenes, actually preventing issues before they happen and identifying and mitigating threats.

If you’re interested in learning more about our services, including our remote monitoring and maintenance solutions, reach out to us at 561-795-2000.

Those Irritating Spam Calls May Not Last Much Long...
Tip of the Week: Keyboard Shortcuts to Save You Ti...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, December 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Cloud Business Computing Tech Term Business Management Google Hardware Software User Tips Hackers Microsoft Computer Malware Productivity Browser Efficiency Data Backup Cybersecurity Hosted Solutions Mobile Devices Windows Smartphone IT Services Innovation Cybercrime Data Recovery Office 365 Data Security Apps Internet of Things Android Windows 10 Business Continuity Upgrade Email Data Operating System Smartphones IT Support Outsourced IT Backup Mobile Device Management Vulnerability VoIP Money Business Phishing Alert Disaster Recovery Law Enforcement Ransomware Employer-Employee Relationship Spam Microsoft Office Saving Money Applications Chrome Collaboration Network Server Managed IT Services IT Support Workplace Tips Best Practice Small Business Communications Information App Windows 10 Router Cloud Computing Google Drive Computers Holiday Virtualization Blockchain OneNote Two-factor Authentication Telephone Systems Information Technology Tech Support Gadgets Passwords Managed Service Provider Miscellaneous Managed IT Networking Unsupported Software Application Hacking Facebook Google Docs Project Management Bring Your Own Device Gmail Patch Management Wireless Charging Mobile Security Encryption Devices Safety Quick Tips Save Money Google Assistant Proactive IT Hosted Solution SaaS Avoiding Downtime Data Breach Touchscreen Data Storage Risk Management Budget Travel Wireless Technology WiFi Data Management Communication Mobile Device Excel Fraud Wi-Fi Artificial Intelligence Business Technology Audit Update Government Productivity Shortcut Data Protection Politics Sports Evernote User Error Robot BDR The Internet of Things Social Media Automation Cortana Password Cost Management Managed IT Services Augmented Reality Users VPN iPhone Word WannaCry Managed Service Commerce Data storage IT Solutions Legislation Language Legal History Adobe Workers Printing Telephone Health Webinar Antivirus Projects Remote Computing Consultant Windows Ink PowerPoint Admin Gifts Computing Vendor Hyperlink DDoS Settings Comparison Files Wireless Remote Monitoring Licensing Updates Recovery Search IT solutions Microsoft Excel IT budget Hybrid Cloud Disaster Mobility Outlook Identity Google Maps Spyware Wireless Internet Saving Time Laptop Credit Cards App store Employee-Employer Relationship Emergency Transportation Microsoft Word Value Wasting Time Point of Sale iOS WIndows Server 2008 Specifications Virus Private Cloud Administrator Windows 10s HBO File Sharing Amazon Data Privacy Windows 7 Screen Mirroring Apple Gamification Keyboard Shortcuts Identity Theft Lithium-ion battery Touchpad Computer Care Nanotechnology Going Green Social Streaming Media Tablets Maintenance Accessory Sales Proactive Software as a Service Unified Threat Management Access Solid State Drive Storage Social Engineering Virtual Assistant Meetings Sync Hard Drive Display Emails Cast Edge Memory Human Resources Vendor Management Humor Root Cause Analysis FAQ Testing Chromecast NFL eWaste Computer Forensics Peripheral Scam Telephony Computer Fan Retail Websites Bandwidth Upgrades Internet Exlporer Hard Disk Drive IT Management Identities Alexa for Business Chromebook Co-Managed Services Marketing BYOD Data Loss Ciminal Financial Payroll Samsung Charger Camera Device Security Management Access Control Uninterrupted Power Supply Conferencing Data Theft Reputation Benefits Phone System Mobile Computing Cache Save Time Computer Accessories Text Messaging Training Monitors Battery Smart Technology Compliance Flexibility Music Television CrashOverride Printers Instant Messaging Hacker Office tips Company Culture Advertising Regulation Scalability Analytics Entertainment es Keyboard Black Market Cleaning Twitter Automobile Office Thank You Big Data End of Support HaaS Managing Stress USB Worker Relocation Congratulations How To Books Education Hiring/Firing Video Games Experience Personal Information Work/Life Balance Virtual Reality Crowdsourcing Employer Employee Relationship PDF Current Events Electronic Medical Records