Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

This Scammer Raid Proves Just How Useful Monitoring Can Be

This Scammer Raid Proves Just How Useful Monitoring Can Be

It can be easy to underestimate the importance of monitoring your solutions, to adopt an “out of sight, out of mind” mentality. However, the benefits of persistent monitoring were recently thrust into the spotlight, when 24 spammers were arrested in October by the Delhi Police’s cyber cell for impersonating Microsoft support staff and duping American citizens.

With the assistance of Microsoft’s Digital Crime Unit (based in Redmond, Washington, USA, and with offices around the globe) the authorities were able to leverage data analytics in order to bust multiple companies with illegal call centers. These call centers were running a tech support scam that targeted American Microsoft Windows users.

Typical of a tech support scam, the employees at these call centers would first send their targets a fraudulent notification that claimed that their systems had malware on them. They created websites to further convince their targets of their legitimacy. When a victim called the number provided, the cybercriminals would charge them a sum anywhere between $100 and $500 to “remedy” the apparent issue.

The scammers would steal data and install malware once they were given access.

It was through monitoring that an employee of Microsoft India, Nripenda Kashyap, was able to identify and report these activities to the DCU. His actions ultimately led to 10 call centers being raided and the arrest of 24 people, the owners of these businesses included.

There are a few lessons that you can take from these events.

First, you need to remember that no major technology company, like Microsoft, is ever going to reach out to you and inform you that your device is having issues. The only exception is if you’ve enlisted a service provider like FRS Pros to actively monitor your computers and other devices. Otherwise, you’re essentially on your own.

Second, having your own IT monitored isn’t something that you should postpone. Tech support scams like these claim $1.5 billion each year from 3.3 million users (and that’s according to a lawsuit that the DCU filed… in 2014) While you may see the dozens of errors that your computer tracks as some kind of catastrophe, a professional IT resource will be able to tell if something is actually wrong.

When you do elect to have your devices monitored and maintained, try reaching out to us. We’ll work behind the scenes, actually preventing issues before they happen and identifying and mitigating threats.

If you’re interested in learning more about our services, including our remote monitoring and maintenance solutions, reach out to us at 561-795-2000.

Those Irritating Spam Calls May Not Last Much Long...
Tip of the Week: Keyboard Shortcuts to Save You Ti...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, February 20 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Computing Google Cloud Business Management User Tips Tech Term Productivity Hackers Software Hardware Microsoft Computer Malware Mobile Devices Data Backup Smartphone Hosted Solutions Browser Cybersecurity Efficiency Windows 10 Windows Internet of Things Data Recovery Android Data Security IT Services Office 365 Data Innovation Cybercrime Outsourced IT Smartphones Upgrade Email Apps Backup Business Continuity IT Support VoIP Operating System Communications Mobile Device Management Vulnerability Small Business Phishing Business Money Saving Money Alert Disaster Recovery Law Enforcement Ransomware Server IT Support Spam Best Practice Employer-Employee Relationship Workplace Tips Applications Users Collaboration Chrome Network Microsoft Office Managed IT Services Virtualization Passwords Miscellaneous App Blockchain Telephone Systems Facebook Tech Support Two-factor Authentication Gadgets Cloud Computing Router Google Drive Automation Information Bring Your Own Device Networking OneNote Windows 10 Communication Artificial Intelligence Computers Holiday Managed Service Provider Information Technology Managed IT Managed IT Services Social Media Unsupported Software Commerce Wi-Fi WannaCry VPN iPhone Travel Excel Update Productivity Fraud Shortcut Politics Sports Health SaaS BDR Proactive IT Quick Tips Evernote Access Control User Error Managed Service Hosted Solution Password Touchscreen Data Storage Avoiding Downtime Mobility Search WiFi Cortana Mobile Security Mobile Device Application Hacking Word Encryption Gmail Google Assistant Safety Save Money Audit Google Docs Project Management Data Protection Government Patch Management Wireless Charging Devices Budget Risk Management Robot Cost Management IT Management Business Technology Data Breach Wireless Technology Data Management Augmented Reality The Internet of Things Microsoft Word Streaming Media Virtual Assistant E-Commerce Specifications Virus Lithium-ion battery Identity Theft Hard Drive Display Memory Human Resources File Sharing IT Solutions Testing Reputation Data storage Peripheral Apple Access Webinar Bandwidth History Computer Forensics Tablets Maintenance Chromecast Consultant Alexa for Business Payment Cards Sales Proactive Vendor Management Chromebook Remote Computing Co-Managed Services Remote Monitoring Financial Payroll Storage Social Engineering Telephony Scam Camera Sync Management Settings Edge Internet Exlporer IT solutions Wireless FAQ NFL eWaste Employee Retail Websites Samsung Printing Telephone Laptop Security Cameras Identities Uninterrupted Power Supply iOS WIndows Server 2008 Transportation Projects PowerPoint Admin Data Loss Ciminal Windows 10s HBO Vendor Private Cloud Charger Legal Device Security Screen Mirroring Conferencing Data Theft Antivirus Computer Care Nanotechnology Hyperlink Unified Threat Management Hybrid Cloud Touchpad Machine Learning Legislation Language Identity Going Green Social Adobe Workers Meetings Wireless Internet Saving Time DDoS Solid State Drive Employee-Employer Relationship Files Windows Ink Recovery Hacker Emails Cast Gifts Computing Disaster Root Cause Analysis Value Wasting Time Emergency Upgrades Amazon Humor Downtime Comparison Computer Fan Data Privacy Windows 7 Licensing Updates Gamification Keyboard Shortcuts Microsoft Excel IT budget Point of Sale Hard Disk Drive Outlook Google Maps Spyware Administrator Marketing BYOD Software as a Service Personal Information Credit Cards App store Entertainment Accessory Black Market Cleaning Cache PDF Thank You Automobile Office es Big Data Managing Stress Mobile Computing USB Worker Training Monitors Text Messaging Congratulations How To Books CrashOverride Education Hiring/Firing Video Games Experience Television Virtual Reality Work/Life Balance Company Culture Electronic Medical Records Office tips Crowdsourcing Employer Employee Relationship Current Events Advertising Benefits Phone System Save Time Compliance Computer Accessories Printers Battery Smart Technology Flexibility Music Instant Messaging Regulation HaaS End of Support Relocation Scalability Analytics Keyboard Twitter