{"id":12320,"date":"2018-05-17T08:10:13","date_gmt":"2018-05-17T16:10:13","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/05\/17\/news-6089\/"},"modified":"2018-05-17T08:10:13","modified_gmt":"2018-05-17T16:10:13","slug":"news-6089","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/05\/17\/news-6089\/","title":{"rendered":"Fake Malwarebytes helpline scammer caught in the act"},"content":{"rendered":"<p><strong>Credit to Author: Charles Campenni| Date: Thu, 17 May 2018 15:00:00 +0000<\/strong><\/p>\n<p>An estimated one in every 10 American adults lost money in a cyber scam in the past 12 months, according to a report released by the FTC earlier in the month. On average, each scam victim lost $430, totaling about $9.5 billion overall.<\/p>\n<p>To put this in perspective, that\u2019s over 22 million Americans scammed for $26 million a day, more than $1 million an hour, $18,000 per second.<\/p>\n<p>No one is immune, and now more than ever there is a need to be vigilant. Being taken by a scam can ruin lives or damage the reputation of legitimate companies. No one is excluded\u2014not Amazon, Dell, Malwarebytes, or you.<\/p>\n<p>In the example below, we\u2019ll show how scammers Blue Eye Ventures, LCC, tried to imitate Malwarebytes in order to trick people out of money. Now, more than ever, it\u2019s important to be vigilant in order to tell the good guys from the bad.<\/p>\n<h3>Malwarebytes helpline scam<\/h3>\n<p>Using a modern web design aesthetic, Blue Eye Ventures makes a reasonably good impression of a company looking to help its clients. They advertise that they are a Malwarebytes helpline. <strong>But they are not.<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23818\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/fake-malwarebytes-helpline-scammer-caught-act\/attachment\/website-17\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/website-3.png\" data-orig-size=\"750,420\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"website\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/website-3-300x168.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/website-3-600x336.png\" class=\"aligncenter size-large wp-image-23818\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/website-3-600x336.png\" alt=\"\" width=\"600\" height=\"336\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/website-3-600x336.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/website-3-300x168.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/website-3-400x225.png 400w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/website-3.png 750w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>In order to catch these guys in the act, I called the toll-free number asking for help, telling them I wasn&#8217;t sure my Malwarebytes software was working properly. I allowed the technician to have access to my computer. He opened up my Malwarebytes software.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23819\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/fake-malwarebytes-helpline-scammer-caught-act\/attachment\/mbgui\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/mbgui.png\" data-orig-size=\"750,420\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"mbgui\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/mbgui-300x168.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/mbgui-600x336.png\" class=\"aligncenter size-large wp-image-23819\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/mbgui-600x336.png\" alt=\"\" width=\"600\" height=\"336\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/mbgui-600x336.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/mbgui-300x168.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/mbgui-400x225.png 400w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/mbgui.png 750w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<h3>I&#8217;m sorry sir, this is fake software<\/h3>\n<p>The technician on the phone advised me that the (legitimate) Malwarebytes software I was running was fake. Now, I knew that it was not fake. I ran it minutes earlier and it worked perfectly.<\/p>\n<p>Next thing I knew, he ran a tree command. Tree is a recursive <a href=\"https:\/\/en.wikipedia.org\/wiki\/Directory_(file_systems)\" target=\"_blank\" rel=\"noopener\">directory<\/a> listing program that produces a depth-indented listing of files. This is not a diagnose tool.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23822\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/fake-malwarebytes-helpline-scammer-caught-act\/attachment\/treeresults\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/treeresults.png\" data-orig-size=\"750,420\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"treeresults\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/treeresults-300x168.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/treeresults-600x336.png\" class=\"aligncenter size-large wp-image-23822\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/treeresults-600x336.png\" alt=\"\" width=\"600\" height=\"336\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/treeresults-600x336.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/treeresults-300x168.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/treeresults-400x225.png 400w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/treeresults.png 750w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>These are the results he produced:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23823\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/fake-malwarebytes-helpline-scammer-caught-act\/attachment\/results2-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/results2.png\" data-orig-size=\"750,420\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"results2\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/results2-300x168.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/results2-600x336.png\" class=\"aligncenter size-large wp-image-23823\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/results2-600x336.png\" alt=\"\" width=\"600\" height=\"336\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/results2-600x336.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/results2-300x168.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/results2-400x225.png 400w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/results2.png 750w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>At the bottom of the tree command, he typed \u201cSecurity Breach\u201d to scare me into believing that my computer was being hacked.<\/p>\n<h3>More scare tactics<\/h3>\n<p>He then checked my System Configuration:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23824\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/fake-malwarebytes-helpline-scammer-caught-act\/attachment\/sysconf\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/sysconf.png\" data-orig-size=\"750,420\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"sysconf\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/sysconf-300x168.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/sysconf-600x336.png\" class=\"aligncenter size-large wp-image-23824\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/sysconf-600x336.png\" alt=\"\" width=\"600\" height=\"336\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/sysconf-600x336.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/sysconf-300x168.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/sysconf-400x225.png 400w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/sysconf.png 750w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>The tech told me that all my software wasn\u2019t running. &#8220;It&#8217;s stopped.&#8221; This was to scare me into believing that my system wasn\u2019t working. Again, he wasn\u2019t using any tools to diagnose hacking or infections.<\/p>\n<p>He then pulled up Resource Monitor:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23825\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/fake-malwarebytes-helpline-scammer-caught-act\/attachment\/crssexe\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/crssexe.png\" data-orig-size=\"750,420\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"crssexe\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/crssexe-300x168.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/crssexe-600x336.png\" class=\"aligncenter size-large wp-image-23825\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/crssexe-600x336.png\" alt=\"\" width=\"600\" height=\"336\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/crssexe-600x336.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/crssexe-300x168.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/crssexe-400x225.png 400w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/crssexe.png 750w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>The tech asked me, \u201cDo you know what crss.exe means?\u201d I told him I don\u2019t, even though I do.<\/p>\n<p>The csrss.exe file located in C:WindowsSystem32 is a real file, and removing it will cause problems with your PC. If someone tells you it&#8217;s a virus, that\u2019s a hoax.<\/p>\n<p>Case in point, to further scare me into believing my computer was infected, the tech asked me to read the description he pulled up on Google about the csrss.exe file being a Trojan horse or virus.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23826\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/fake-malwarebytes-helpline-scammer-caught-act\/attachment\/google-6\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/google.png\" data-orig-size=\"750,420\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"google\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/google-300x168.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/google-600x336.png\" class=\"aligncenter size-large wp-image-23826\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/google-600x336.png\" alt=\"\" width=\"600\" height=\"336\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/google-600x336.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/google-300x168.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/google-400x225.png 400w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/google.png 750w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>The Google result pulls information from an unreliable and untrustworthy source. For example, the article linked here recommends users remove this &#8220;malware&#8221; from their Mac systems. Any file with .exe is a Windows executable.<\/p>\n<p>Meanwhile, the scammer<em>\u00a0still<\/em> hadn&#8217;t checked my system with any real tools to find problems. He was only there to scare me into purchasing his plans.<\/p>\n<h3>Do not purchase<\/h3>\n<p>Below are the plans he offered me, from one year of support for $200 to a lifetime plan for $700. I was instructed to pay Blue Eye Ventures, LLC, by check. Or I could use my credit card at Easy-installatio.com (phone number +120-3354649). This is a Canadian number\u2014and Malwarebytes\u2019 HQ is in the United States.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23827\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/fake-malwarebytes-helpline-scammer-caught-act\/attachment\/plans\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/plans.png\" data-orig-size=\"750,420\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"plans\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/plans-300x168.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/plans-600x336.png\" class=\"aligncenter size-large wp-image-23827\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/plans-600x336.png\" alt=\"\" width=\"600\" height=\"336\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/plans-600x336.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/plans-300x168.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/plans-400x225.png 400w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/plans.png 750w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>How do you think a real customer would feel? They purchased Malwarebytes and now they are being told that they purchased phony software, their computer is infected, and it&#8217;s going cost them hundreds of dollars to repair. Scammers are not only ruining the reputation of legitimate companies, but they are ripping customers off in the process.<\/p>\n<p>At Malwarebytes, we are always working to expose fraud and educate consumers. We will never sell phony software. We will never charge you hundreds of dollars to fix your computer. And we will teach you how to spot the companies who do.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/fake-malwarebytes-helpline-scammer-caught-act\/\">Fake Malwarebytes helpline scammer caught in the act<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/fake-malwarebytes-helpline-scammer-caught-act\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Charles Campenni| Date: Thu, 17 May 2018 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/fake-malwarebytes-helpline-scammer-caught-act\/' title='Fake Malwarebytes helpline scammer caught in the act'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/shutterstock_748949569.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>In this blog, we take you through a phone call to a fake Malwarebytes helpline run by Blue Eye Ventures, and show you how to spot the scam in action.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/social-engineering-cybercrime\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/blue-eye-ventures\/\" rel=\"tag\">Blue Eye Ventures<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malwarebytes-helpline\/\" rel=\"tag\">malwarebytes helpline<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malwarebytes-tech-support-scam\/\" rel=\"tag\">malwarebytes tech support scam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/scam\/\" rel=\"tag\">scam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tech-support-scam\/\" rel=\"tag\">tech support scam<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/fake-malwarebytes-helpline-scammer-caught-act\/' title='Fake Malwarebytes helpline scammer caught in the act'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/fake-malwarebytes-helpline-scammer-caught-act\/\">Fake Malwarebytes helpline scammer caught in the act<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[18450,4503,18451,18452,3985,10510,10544],"class_list":["post-12320","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-blue-eye-ventures","tag-cybercrime","tag-malwarebytes-helpline","tag-malwarebytes-tech-support-scam","tag-scam","tag-social-engineering","tag-tech-support-scam"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12320"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12320\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12320"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}