Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Malware Locks Up Your PC and Offers Fake Tech Support Phone Number

b2ap3_thumbnail_hack_attack_400.jpgThere’s an intrusive malware on the Internet that locks a user out of their PC and directs them to a fake IT support phone number. In addition to being inconvenient, it can lead to the theft of sensitive information. If this happens to you, whatever you do, don’t call the fake phone number.

This attack is a classic phishing scam tactic; scare a user into contacting the hacker for the purpose of turning over their sensitive information. Typically, phishing scams involve spam emails and the information is transferred via an attachment, like a form. While this email tactic has tricked plenty of users, it’s not very effective because the scam is fairly easy to spot, and once the email is determined to be a phishing scam, it then gets deleted or ignored.

When activated, this particular malware is a virtually impossible to ignore. It will hit your PC without warning and even while you’re visiting a secure site (like Facebook or Google search). Once the malware is executed, the browser will display an image similar to the Windows blue screen of death. A fake technical support message will then be displayed, informing the user of the nature of the problem and directing them to call a bogus phone number.

aE8NvqV

Unfortunately, this blue screen can’t be closed out and easily ignored. The malware will completely freeze up your browser, meaning that the only way to get rid of this annoyance is to either manually close the browser via task manager (Ctrl + Alt + Delete), or reboot the computer entirely.

This type of tactic is called social engineering, and modern hackers utilize these tactics to assist them in getting past security by poking at weaknesses in end-users. By getting an emotional response, whether it be the frustration of malware or your empathy by say, pretending to be a friend of yours on social media, the hacker is much more likely to find their way into your computer.

Having to take such extreme measures is sure to put a damper on any project that you’re currently working on, cause downtime, and may even delete unsaved data. That’s not all; just because you’ve rebooted your system, doesn’t mean the malware is gone. Unless the malicious file is located and properly deleted, it will remain on the hard drive and pop up at another random time.

To reiterate; DON’T CALL THE PROVIDED PHONE NUMBER. The blog Delete Malware explains the risk: “If you call [the number] they won't actually remove adware from your computer. They will hijack your computer and steal all of your bank information and passwords. They are crooks, don't call them!”

Instead, call the real IT professionals at 800.618.9844. By calling the fake phone number, you’re only opening yourself up to being taken deeper by this scam. One thing that hackers like these are counting on is you or your staff not having a solid understanding of who’s responsible for maintaining your company’s IT. It’s their hope that you’ll experience an error, panic, and call the provided number for “help.”

Actually, hackers posing as IT professionals is a fairly common scam. They like to pretend to be IT support because they know that users will trust their sensitive data to IT personnel (these jerks are giving IT professionals the world over a bad name). Therefore, it’s important to familiarize your staff with exactly who is overseeing their IT, and how to contact them, and only them, if there’s ever an issue.

By monitoring your network for risks, comprehensive IT support from Voyage Technology can protect your business from scams such as this. We can remotely find and eliminate threats, as well as equip your business with powerful security tools to keep destructive malware out of your system. Call the real IT pros at 800.618.9844 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 29 March 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Data Productivity Software Hackers Innovation Business Network Security Cloud IT Support Hardware Internet User Tips Malware Email Efficiency Phishing Workplace Tips Computer Google Privacy Collaboration Hosted Solutions Users IT Services Cybersecurity Ransomware Quick Tips Microsoft Data Backup Communication Small Business Smartphones Mobile Device communications Android Business Management Mobile Devices Workplace Strategy Saving Money Smartphone VoIP Managed IT Services Microsoft Office Managed Service Browser Data Recovery Social Media Passwords Backup Disaster Recovery Network Upgrade Tech Term Internet of Things Automation Covid-19 Remote Cloud Computing Remote Work Artificial Intelligence Server Managed Service Provider Facebook Windows Miscellaneous Gadgets Spam Encryption Outsourced IT Employee/Employer Relationship Holiday Information Windows 10 Data Management Business Continuity Government Wi-Fi Windows 10 Productivity Blockchain Business Technology Two-factor Authentication Virtualization Data Security Apps Bandwidth Compliance Current Events Gmail Networking Chrome Employer-Employee Relationship Budget Apple Managed Services Office Voice over Internet Protocol App Mobile Device Management Vendor Applications Computing Information Technology Office 365 Conferencing How To BDR Hacker Avoiding Downtime Mobile Office Access Control Risk Management Retail Help Desk WiFi Big Data Analytics Office Tips Managed IT Services Augmented Reality Storage Password Bring Your Own Device Computers BYOD Virtual Private Network Training Website Marketing HIPAA Health Operating System Router Firewall Windows 7 Tip of the week Document Management Microsoft 365 AI Solutions The Internet of Things Monitoring Scam Data loss Social IT Support Telephone Patch Management Save Money Customer Service Remote Monitoring Vulnerability End of Support Cooperation Vendor Management Windows 11 Remote Workers Healthcare Display Printer Going Green Excel Paperless Office Infrastructure Free Resource Project Management Cybercrime YouTube Images 101 User Tip Machine Learning Modem Multi-Factor Authentication Processor Mobility Cryptocurrency Mobile Security Safety Virtual Desktop Maintenance Data Privacy Antivirus Data storage LiFi Smart Technology Employees Integration Outlook Saving Time Money Humor Managed IT Service Holidays Customer Relationship Management Downloads Data Storage Robot Sports Licensing Mouse Video Conferencing Managed Services Provider Entertainment Hacking Virtual Machines Professional Services Presentation Administration IT Management VPN Meetings Wireless Technology Telephone System 2FA Cost Management Supply Chain iPhone Computer Repair Settings Word Wireless Vulnerabilities Printing Content Filtering SharePoint IT Assessment Public Speaking Username Technology Care Electronic Medical Records Value Google Drive Lithium-ion battery Business Communications Knowledge Black Friday Flexibility Organization Lenovo Database Scams Writing Entrepreneur Virtual Reality IT Technicians 5G Digital Security Cameras Smart Devices Hybrid Work Server Management Memory Google Docs Proxy Server Private Cloud Unified Communications Cookies Human Resources Experience Cyber Monday Remote Working Superfish Data Breach Identity Theft Google Play Bitcoin Undo Tactics Cables Running Cable Hotspot Twitter Mirgation Videos Electronic Health Records Google Wallet Wasting Time Error Nanotechnology Google Apps Trend Micro Security Cameras Windows 8 Addiction IT Maintenance Social Engineering Laptop Language Business Intelligence Remote Computing Chatbots Software as a Service Drones Management Managing Costs Application Screen Reader Shortcuts Distributed Denial of Service eCommerce Tablet SSID Service Level Agreement Ransmoware Halloween Computing Infrastructure IBM Vendors Alert Identity Surveillance Virtual Assistant Managed IT Virtual Machine Bookmark File Sharing Smart Tech Be Proactive Dark Data Alerts Reviews Medical IT Hacks Download Workforce How To Scary Stories Transportation Threats Notifications Fun Development Hypervisor Browsers Travel Deep Learning Connectivity Workplace Strategies Break Fix Shopping Techology Optimization Google Maps PowerPoint Competition Upload Meta Employer/Employee Relationships Social Network Amazon Education Multi-Factor Security PCI DSS Unified Threat Management Navigation IoT Dark Web Gig Economy Unified Threat Management Mobile Computing Trends Outsource IT Teamwork Customer Resource management Environment User Regulations Media Search Google Calendar Internet Service Provider Regulations Compliance Data Analysis Evernote Best Practice Star Wars Network Congestion Microsoft Excel Buisness Staff User Error Memes Gamification Small Businesses Physical Security SQL Server Legal IP Address Displays IT solutions Social Networking Legislation Net Neutrality Financial Data History Fileless Malware Point of Sale Business Growth Wearable Technology Smartwatch IT Content Outsourcing Azure Health IT Tech Support Recovery Motherboard Cortana Comparison Procurement Network Management Telework Cyber security Directions Tech Alt Codes Hard Drives Assessment Workplace Monitors Permissions Downtime CES Communitications Domains Hiring/Firing Websites Hosted Solution Paperless Specifications Supply Chain Management FinTech Microchip Term Typing Refrigeration Internet Exlporer Co-managed IT Fraud

Blog Archive