{"id":7861,"date":"2017-06-07T07:10:22","date_gmt":"2017-06-07T15:10:22","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/06\/07\/news-1643\/"},"modified":"2017-06-07T07:10:22","modified_gmt":"2017-06-07T15:10:22","slug":"news-1643","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/06\/07\/news-1643\/","title":{"rendered":"Tech support scams: what are other people doing?"},"content":{"rendered":"<p><strong>Credit to Author: William Tsing| Date: Wed, 07 Jun 2017 14:00:38 +0000<\/strong><\/p>\n<p>We\u2019ve talked a lot about tech support scams over the past few years, typically focused on what we see ourselves, and the scammers who like to pose as Malwarebytes. But tech support scams are much bigger than that, targeting every tech company under the sun. So what are other people doing about it?\u00a0Let&#8217;s take a look at some of the other players working to keep you safe.<\/p>\n<h3>IT Advocate<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-18179\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/ITadvocate-600x133.png\" alt=\"\" width=\"600\" height=\"133\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/ITadvocate-600x133.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/ITadvocate-300x66.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Independent researchers will occasionally conduct sting calls based on a combination of victim complaints and their own research. IT Advocate presents some of the most thorough research and professional videos in this genre, providing context to each company before they make the call.<\/p>\n<p>Others who refer to themselves as \u201cscam baiters\u201d will present calls on Youtube, typically designed to waste the scammer\u2019s time, or execute a practical joke. These are amusing, but also frustrating because they aren&#8217;t useful; most videos don&#8217;t disclose where they got the number, what their specific setup is, or any specific details on the company. IT Advocate, in contrast, focuses on collecting hard, actionable evidence that can be used in takedown requests to keep users safe. They publish fairly frequently and you can find their YouTube channel <a href=\"https:\/\/www.youtube.com\/channel\/UCAf6Q_sHACA__65xc37waLQ\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h3>Fatsecurity.com<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-18180\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/fatsecurity-600x115.png\" alt=\"\" width=\"600\" height=\"115\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/fatsecurity-600x115.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/fatsecurity-300x58.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>An occasional problem defenders run into is how to effectively execute a takedown, in particular, an advertisement takedown for a fraudulent company. Scammers will register a corporate presence in the United States, set up several money mule accounts here as \u201cpayment processors\u201d, and use US dollars to buy ads. As a result, it can be tough for an advertising company like Google to distinguish these ads from those of a legitimate tech support company. Fat Security is attacking this issue from an interesting angle, as you can see <a href=\"https:\/\/fatsecurity.com\/activism\/report-a-scam\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. Rather than crowdsourcing victim reports, which can be vague or incomplete, they are crowdsourcing <em>reporting<\/em> \u2013 users who sign up will be informed of identified scams and how to report them to the proper authorities. The idea being one researcher\u2019s report can be ignored; ten thousand users reporting the same scam demands a response. It\u2019s a novel idea and we look forward to seeing how it turns out.<\/p>\n<h3>The Big\u2019uns<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18178 size-medium\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/1-300x300.jpeg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/1-300x300.jpeg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/1-150x150.jpeg 150w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/1-600x600.jpeg 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Microsoft is arguably one of the most abused companies in a tech support scammer\u2019s pitch. So how are they fighting back? They have extensive coverage of tech support scams in their blog, as well as a consumer education sheet with useful info <a href=\"https:\/\/www.microsoft.com\/en-us\/safety\/online-privacy\/avoid-phone-scams.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. (<a href=\"https:\/\/blog.malwarebytes.com\/tech-support-scams\/\" target=\"_blank\" rel=\"noopener noreferrer\">Here\u2019s ours, by the way<\/a>.)<\/p>\n<p>What a lot of folks don\u2019t realize is that they also have a reporting tool for victims and researchers to report a scam directly to them: <a href=\"https:\/\/www.microsoft.com\/en-us\/reportascam\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.microsoft.com\/en-us\/reportascam<\/a>. When conducting threat analysis, more data tends to make for better judgments, so these types of reporting tools tend to yield good intelligence.<\/p>\n<p>Symantec provides a public resource page <a href=\"https:\/\/www.symantec.com\/en\/ca\/about\/legal\/anti-piracy\/tech-support-scams\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>,\u00a0as well as a reporting tool, although it appears to be a catch-all for abuse of their intellectual property.<\/p>\n<p>Teamviewer is the tool of choice for scammers to gain access to your computer. Their resource page for victims <a href=\"https:\/\/community.teamviewer.com\/t5\/Knowledge-Base\/TeamViewer-and-scamming\/ta-p\/4715\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>\u00a0offers some good tips on how to secure your account if you have one and provides an email address to report fraudulent use of their product.<\/p>\n<p>In short, there&#8217;s a wide range of researchers working hard to keep you safe from tech support scams, from the biggest names in the industry, down to single individuals working as an avocation. The more of us who pitch in makes it more likely that you won&#8217;t have to deal with a scammer. And if you&#8217;ve ever thought you were talking to Malwarebytes and gotten someone unsavory instead, please post to the comments below.<\/p>\n<p>Some resources mentioned above:<\/p>\n<ul>\n<li>Malwarebytes scam resource page:\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/tech-support-scams\/\" target=\"_blank\" rel=\"noopener noreferrer\">blog.malwarebytes.com\/tech-support-scams<\/a><\/li>\n<li>Microsoft reporting tool: <a href=\"http:\/\/www.microsoft.com\/en-us\/reportascam\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.microsoft.com\/en-us\/reportascam\/<\/a><\/li>\n<li>Microsoft resource page:\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/safety\/online-privacy\/avoid-phone-scams.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">microsoft.com\/\u2026acy\/avoid-phone-scams.aspx<\/a><\/li>\n<li>Symantec resource page:<a href=\"https:\/\/www.symantec.com\/en\/ca\/about\/legal\/anti-piracy\/tech-support-scams\" target=\"_blank\" rel=\"noopener noreferrer\">symantec.com\/\u2026i-piracy\/tech-support-scams<\/a><\/li>\n<li>Fatsecurity.com resource page:\u00a0<a href=\"https:\/\/fatsecurity.com\/activism\/report-a-scam\" target=\"_blank\" rel=\"noopener noreferrer\">fatsecurity.com\/activism\/report-a-scam<\/a><\/li>\n<li>IT Advocate:\u00a0<a href=\"https:\/\/www.youtube.com\/channel\/UCAf6Q_sHACA__65xc37waLQ\" target=\"_blank\" rel=\"noopener noreferrer\">youtube.com\/\u2026nel\/UCAf6Q_sHACA__65xc37waLQ<\/a><\/li>\n<\/ul>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/06\/tech-support-scams-what-are-other-people-doing\/\">Tech support scams: what are other people doing?<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/06\/tech-support-scams-what-are-other-people-doing\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: William Tsing| Date: Wed, 07 Jun 2017 14:00:38 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/06\/tech-support-scams-what-are-other-people-doing\/' title='Tech support scams: what are other people doing?'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/06\/people-coffee-tea-meeting-feature.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We\u2019ve talked a lot about tech support scams over the past few years, typically focused on what we see ourselves, and the scammers who like to pose as Malwarebytes. But tech support scams are much bigger than that, targeting every tech company under the sun. So what are other people doing about it? Let&#8217;s take a look at some of the other players working to keep you safe.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/social-engineering-cybercrime\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/fatsecurity-com\/\" rel=\"tag\">Fatsecurity.com<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/it-advocate\/\" rel=\"tag\">IT Advocate<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/microsoft\/\" rel=\"tag\">microsoft<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/scam\/\" rel=\"tag\">scam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/symantec\/\" rel=\"tag\">symantec<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tech-support-scam\/\" rel=\"tag\">tech support scam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/threat-intel\/\" rel=\"tag\">Threat Intel<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tss\/\" rel=\"tag\">TSS<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/06\/tech-support-scams-what-are-other-people-doing\/' title='Tech support scams: what are other people doing?'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/06\/tech-support-scams-what-are-other-people-doing\/\">Tech support scams: what are other people doing?<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[4503,12563,12564,10516,3985,10510,11715,10544,11143,10545],"class_list":["post-7861","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cybercrime","tag-fatsecurity-com","tag-it-advocate","tag-microsoft","tag-scam","tag-social-engineering","tag-symantec","tag-tech-support-scam","tag-threat-intel","tag-tss"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7861"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7861\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7861"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}