{"id":7173,"date":"2017-03-30T08:10:42","date_gmt":"2017-03-30T16:10:42","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/30\/news-964\/"},"modified":"2017-03-30T08:10:42","modified_gmt":"2017-03-30T16:10:42","slug":"news-964","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/03\/30\/news-964\/","title":{"rendered":"Tech support scammers and their banking woes"},"content":{"rendered":"<p><strong>Credit to Author: William Tsing| Date: Thu, 30 Mar 2017 15:00:54 +0000<\/strong><\/p>\n<p>We all know about tech support scams by this point. We know how they cold call, lie their way into your computer, and steal your money. Unfortunately for the scammers, banks know this as well, making it quite difficult at times to maintain an account to store the criminal\u2019s ill-gotten gains. So how does the enterprising criminal cash out with your money? Let\u2019s take a look.<\/p>\n<h3>High-risk payment processors<\/h3>\n<p>When a business owner is involved with a line of work that traditional payment processors don\u2019t want to be involved with\u2014typically pornography, pharma, and gambling\u2014they use high-risk processors. In exchange for the perceived higher risk of processing payments in industries known for fraudulent activity, the processor takes a higher fee. The traditional tech support scam model used to rely heavily on these companies, typically through an Indian intermediary to offer an extra layer of anonymity.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-16860\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/paymentprocessor-600x376.png\" alt=\"\" width=\"600\" height=\"376\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/paymentprocessor-600x376.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/paymentprocessor-300x188.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/paymentprocessor.png 1104w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>However, as the spotlight on tech support scams grew brighter and victims increasingly initiated chargebacks, high-risk processors have\u00a0increasingly dropped overseas tech support companies in order to protect their relationships with more legitimate businesses, as well as the credit card companies who monitor customer chargeback rates. The processors that haven\u2019t given up tech support yet tend to levy extra restrictions against overseas customers in their contractual agreements, as demonstrated in the example\u00a0contract below.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-16859 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/agreement1-600x508.png\" alt=\"\" width=\"600\" height=\"508\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/agreement1-600x508.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/agreement1-300x254.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-16861\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/agreement-copy-600x340.png\" alt=\"\" width=\"600\" height=\"340\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/agreement-copy-600x340.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/agreement-copy-300x170.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/agreement-copy.png 1540w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>So barred from traditional banks and losing access to high-risk processors, tech support scammers have gotten a little creative. An increasingly common method we\u2019ve seen for payment is Apple or iTunes gift cards. The idea being the scammer gets a commodity that is easily laundered on the dark web and the victim sees Apple on their credit card statement, rather than FAKE COMPANY XYZ. This has the added benefit of making it extra tough for the victim to produce evidence that ties back to the scammer.<\/p>\n<p>Apple has some pretty good advice on the subject <a href=\"https:\/\/support.apple.com\/itunes-gift-card-scams\" target=\"_blank\">here<\/a>.<\/p>\n<p>Suffice it to say, legitimate tech support companies do not do this. Malwarebytes has observed tech support scammers using Apple\/iTunes gift cards, Amazon gift cards, Bitcoin, and even sending a FedEx guy to physically pick up a check. Non-standard payment methods like these are usually a pretty good signal that the tech support business in question has a hard time getting access to a credit card processor and you probably shouldn\u2019t do business with them.<\/p>\n<p>Lastly, scammers might collect payment using\u00a0direct bank transfers via Automated Clearing House (ACH). Criminals love this method because it only requires two pieces of information to work\u2014you account number and a routing number. Also, non-business victims only have 60 days to report losses in order to recover funds. More on ACH fraud <a href=\"http:\/\/www.csoonline.com\/article\/2125833\/cyber-attacks-espionage\/malware-cybercrime-ach-fraud-why-criminals-love-this-con.html\" target=\"_blank\">here<\/a>.<\/p>\n<p>So if you\u2019re ever on the phone with a support company that is insistent that you pay with third party gift cards, ask the operator, \u201cWhy can\u2019t I use my credit card?\u201d You might get some very creative answers. But the best defense when encountering this is to simply hang up the phone. If you&#8217;ve allowed the scammer remote access to your computer, close the window as well, or just disconnect your internet. For more on how to stay safe from tech support scams or find out more on what to do if you&#8217;ve had a run-in with them, check out our post <a href=\"https:\/\/blog.malwarebytes.com\/tech-support-scams\/\" target=\"_blank\">here<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/03\/tech-support-scammers-and-their-banking-woes\/\">Tech support scammers and their banking woes<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/03\/tech-support-scammers-and-their-banking-woes\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: William Tsing| Date: Thu, 30 Mar 2017 15:00:54 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/03\/tech-support-scammers-and-their-banking-woes\/' title='Tech support scammers and their banking woes'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/photodune-6761646-gift-card-l.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We all know about tech support scams by this point. Unfortunately for the scammers, banks know this as well, making it quite difficult at times to maintain an account to store the criminal\u2019s ill-gotten gains. So how does the enterprising criminal cash out with your money? Let\u2019s take a look.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/social-engineering-cybercrime\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/fraud\/\" rel=\"tag\">fraud<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/scam\/\" rel=\"tag\">scam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tech-support\/\" rel=\"tag\">tech support<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tech-support-scams\/\" rel=\"tag\">tech support scams<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tss\/\" rel=\"tag\">TSS<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/03\/tech-support-scammers-and-their-banking-woes\/' title='Tech support scammers and their banking woes'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/03\/tech-support-scammers-and-their-banking-woes\/\">Tech support scammers and their banking woes<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[4503,9751,3985,10510,10536,10577,10545],"class_list":["post-7173","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cybercrime","tag-fraud","tag-scam","tag-social-engineering","tag-tech-support","tag-tech-support-scams","tag-tss"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7173"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7173\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7173"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}