{"id":15719,"date":"2019-07-08T03:30:07","date_gmt":"2019-07-08T11:30:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/07\/08\/news-9466\/"},"modified":"2019-07-08T03:30:07","modified_gmt":"2019-07-08T11:30:07","slug":"news-9466","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/07\/08\/news-9466\/","title":{"rendered":"Remote access \u2014 for a scammer"},"content":{"rendered":"<p><strong>Credit to Author: Leonid Grustniy| Date: Mon, 08 Jul 2019 10:42:15 +0000<\/strong><\/p>\n<p>Paradoxical as it may sound, a polite request is one of the simplest ways to get access to your computer. Intruders will use all sorts of pretexts \u2014 from technical troubleshooting to (ironically) cybercrime investigation. Learn what tricks they may use and why they are never to be trusted.<\/p>\n<p> <a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/07\/08063047\/remote-access-scams-featured.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/07\/08063047\/remote-access-scams-featured.jpg\" alt=\"\" width=\"1460\" height=\"960\" class=\"aligncenter size-full wp-image-27553\" \/><\/a> <\/p>\n<h2>Fake tech support<\/h2>\n<p>One day you receive a phone call from someone addressing you by name and introducing themselves as a tech support specialist of a large software company. It turns out, they say, your computer has serious problems which must be dealt with urgently. For that purpose, you are to install a special utility program and give the caller remote access to your system. What could go wrong?<\/p>\n<p>Well, in the best-case scenario, such &#8220;support&#8221; will perform some facsimile of troubleshooting activity and then charge you a fortune, <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/indian-techsupport-scam\/13606\/\" rel=\"noopener noreferrer\">like some shrewd folks from India did a while ago<\/a>. Once remote access was established, they would install a useless piece of software on the target computer and demand to be paid for their &#8220;troubleshooting&#8221; work.<\/p>\n<p>The clients of the British provider BT were not as lucky: Criminals were <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2017\/09\/06\/bt_call_scam\/\" rel=\"noopener noreferrer\">stealing their financial data<\/a> and trying to withdraw money from their accounts. Curiously, in many cases scammers were targeting users who had really been plagued by connection problems and had previously contacted their provider for help. Sometimes the &#8220;tech support&#8221; would, for better leverage, wield their victims&#8217; names, addresses, phone numbers and other private info.<\/p>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-banking\" \/> <\/p>\n<p>Often enough, scammers do not call you but urge you to call them. For example, they may claim you need to <a target=\"_blank\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/mcafee-tech-support-scam-harvesting-credit-card-information\/\" rel=\"noopener noreferrer\">renew a subscription<\/a> for some of your software and then call support to help you install an update. And that&#8217;s to say nothing of the <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/fake-technical-support\/26500\/\" rel=\"noopener noreferrer\">fake websites<\/a> you may come across by mistake while looking for a solution to a real problem.<\/p>\n<h3>It&#8217;s the police, open remote access<\/h3>\n<p>Some scammers go even further and <a target=\"_blank\" href=\"https:\/\/www.scamwatch.gov.au\/news\/beware-scammers-wanting-access-to-your-computer-and-bank-account\" rel=\"noopener noreferrer\">impersonate police officers<\/a> in need of help to hunt down cybercriminals. They will claim your computer was used to send scam messages, and request access to your computer and online banking \u2014 allegedly to trap scammers. If you question their actions, they will threaten you with the consequences of disrupting the investigation.<\/p>\n<p>But if you yield to pressure and allow scammers into your computer and online banking, they will effectively purge your bank account. They will play their part to the last, too, telling you over and over that the money transfer is what they need to catch the criminals.<\/p>\n<h3>We are from the FTC (not)<\/h3>\n<p>Threats aren&#8217;t the only trick scammers use \u2014 some of them trap victims with promises of easy money. Last year, the US Federal Trade Commission was a popular guise, with fake employees promising to refund any money victims spent on &#8230; fake troubleshooting services provided by a certain Advanced Tech Support company. No prize for guessing what they had to do to get paid. That&#8217;s right \u2014 just grant them remote access to your computer.<\/p>\n<p>Now, the <a target=\"_blank\" href=\"https:\/\/www.ftc.gov\/enforcement\/cases-proceedings\/refunds\/advanced-tech-support-refunds\" rel=\"noopener noreferrer\">stolen money refund program<\/a> did exist, but real FTC employees never called anybody. And they never demanded access to users&#8217; devices. All they did was send written instructions to users&#8217; e-mail addresses on how to apply for compensation.<\/p>\n<p>The Federal Trade Commission did not disclose what exactly the scammers were doing when they gained access to target computers. Its employees limited themselves to a general comment about what the scammers could potentially do: trick users into useless purchases, steal personal data, or install malware on the devices.<\/p>\n<h2>To whom can one safely grant remote access?<\/h2>\n<p>Generally speaking, you should grant remote access to no one. In most cases, tech support reps will be able to solve your problem over the phone or through e-mail messaging. The police will never &#8220;search&#8221; your computer remotely. If you&#8217;re a suspect, they&#8217;ll visit you in person and with a warrant.<\/p>\n<p>If you yourself have contacted the tech support service of a company you trust 100%, you do have a problem you cannot solve on your own, and remote access help is the only option available \u2014 then you might consider making an exception and giving a remote access permission.<\/p>\n<p>But if someone calls you out of the blue and solicits access to your computer, you should never expect anything good to come out of it. Therefore:<\/p>\n<ul>\n<li>Never listen to scammers and never give credence to threats \u2014 feel free to say &#8220;no.&#8221;<\/li>\n<li>If advised about suspicious activity on your computer, scan it with a <a href=\"https:\/\/www.kaspersky.com\/internet-security?redef=1&#038;reseller=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\">reliable antivirus product<\/a> to locate and neutralize malware \u2014 if there is any.<\/li>\n<li>Record the phone numbers calling you. Google them: You are likely to find information about the criminals on the Internet. If they&#8217;re not already listed, you may add such phone numbers to the database of scam and spam numbers. By doing so, you will alert other users to fraud in time and help them to avoid being trapped by scammers.<\/li>\n<\/ul>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-cyberattacks\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/remote-access-scams\/27552\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Leonid Grustniy| Date: Mon, 08 Jul 2019 10:42:15 +0000<\/strong><\/p>\n<p>Using persuasion instead of viruses: How scammers talk people into granting remote access to their computers.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[9751,14563,5897,18137,3985,10510,10438],"class_list":["post-15719","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-fraud","tag-personal-data","tag-privacy","tag-remote-access","tag-scam","tag-social-engineering","tag-threats"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15719"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15719\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15719"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}