{"id":7464,"date":"2017-04-27T08:10:46","date_gmt":"2017-04-27T16:10:46","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/27\/news-1255\/"},"modified":"2017-04-27T08:10:46","modified_gmt":"2017-04-27T16:10:46","slug":"news-1255","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/04\/27\/news-1255\/","title":{"rendered":"System optimizers turning to Tech Support Scams"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Thu, 27 Apr 2017 15:00:25 +0000<\/strong><\/p>\n<p>A new trend, which was also pointed out in our <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/cybercrime-tactics-techniques-report-for-q1-2017\/\" target=\"_blank\">Q1 cybercrime report<\/a>, is the combination of PUPs and Tech Support Scams. Most of these PUPs are so-called system optimizers. This is worrying as the damage done by PUPs was limited or we would have marked them as malware. By adding Tech Support Scams to their portfolio the possible damages have increased considerably.<\/p>\n<h3>How are system optimizers\u00a0combining the two?<\/h3>\n<p>The easiest way to spot this connection is by looking at the use of telephone numbers in the GUI of system optimizers. Get this straight, we\u2019re not saying that every company that does this is actively out to scam its customers, but the increase of telephone numbers on applications that were installed by bundlers has been notable. And, let\u2019s face it: why would I want to call a company that puts their software on my computer without my consent? Oh well, besides to yell at them.<\/p>\n<p>But the people that make those calls in good faith, do end up paying for the potentially unwanted programs and anything else the scammers manage to sell them.<\/p>\n<p>For example when one of our investigators called the number showing on the PUP working under the name \u201c<a href=\"https:\/\/forums.malwarebytes.com\/topic\/199296-removal-instructions-for-registry-scanner\/\" target=\"_blank\">Registry Scanner<\/a>\u201d which hails from the domain lishbos[.]com \u2013<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-17537\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/Registryscanner.png\" alt=\"\" width=\"800\" height=\"533\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/Registryscanner.png 800w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/Registryscanner-300x200.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/Registryscanner-600x400.png 600w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>&#8212; he was sold a two-year subscription to a \u201cGold Offer\u201d from epicsofts[.]com for the amount of $99 and the remote support technician downloaded yet another \u201cSystem Cleanup\u201d utility to his system.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-17535\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/GoldOffer.png\" alt=\"\" width=\"798\" height=\"237\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/GoldOffer.png 798w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/GoldOffer-300x89.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/GoldOffer-600x178.png 600w\" sizes=\"auto, (max-width: 798px) 100vw, 798px\" \/><\/p>\n<p>Of course, that utility turned out to be <a href=\"https:\/\/forums.malwarebytes.com\/topic\/199513-removal-instructions-for-system-cleanup\/\" target=\"_blank\">yet another PUP<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-17536\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/mainw.png\" alt=\"\" width=\"800\" height=\"488\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/mainw.png 800w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/mainw-300x183.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/mainw-600x366.png 600w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<h3>Our fight against Tech Support Scammers<\/h3>\n<p>As an anti-malware company, there is little for us to gain by fighting Tech Support Scammers. But unfortunately \u00a0there is no security program that can protect you from being scammed, besides informing potential victims about the risks. \u00a0But as a company that cares about its customers, we have always actively committed to this fight in the past and we will continue to do so in the future. And hearing that people have paid hundreds of dollars for OUR software and then sometimes ended up with a key that doesn\u2019t work, hurts our feelings, and it could cost us potential customers.<\/p>\n<h3>How we fight Tech Support Scammers<\/h3>\n<p>At Malwarebytes, we have a dedicated team that performs research into Tech Support Scammers and works with the authorities to get them shut down. In cases where legal action is not possible, due to their location outside of our legal reach, we try to work through other channels like:<\/p>\n<ul>\n<li>ISPs, if they are willing to take down the scammers\u2019 website, which slows down the scammers, but usually only for a while.<\/li>\n<li>Payment processors, to cripple their ability to work with reputable payment processors will <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/03\/tech-support-scammers-and-their-banking-woes\/\" target=\"_blank\">force them to us much less convenient alternatives<\/a>.<\/li>\n<li>Search engines, to get their advertisements removed. They pay a lot of money to get at the top of your search results.<\/li>\n<li>Foreign authorities, we hand over the evidence we have gathered and have to hope that something gets done about it.<\/li>\n<li>Name and shame, when all of the above fails we <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/03\/advanis-tech-support-screenlocker\/\" target=\"_blank\">publish the information we have gathered<\/a> and hope that the scammers\u2019 business associates will no longer want to do work with them.<\/li>\n<\/ul>\n<h3>Related posts<\/h3>\n<ul>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2016\/10\/report-the-anatomy-of-tech-support-scams\/\" target=\"_blank\">Report: the anatomy of tech support scams<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/criminals\/2016\/05\/the-hunt-for-tech-support-scammers\/\" target=\"_blank\">The hunt for tech support scammers<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/tech-support-scams\/\" target=\"_blank\">Tech Support Scams \u2013 Help &amp; Resource Page<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em>Pieter Arntz<\/em><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/system-optimizers-turning-tech-support-scams\/\">System optimizers turning to Tech Support Scams<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/system-optimizers-turning-tech-support-scams\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Thu, 27 Apr 2017 15:00:25 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/system-optimizers-turning-tech-support-scams\/' title='System optimizers turning to Tech Support Scams'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/shutterstock_219218611-1.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>PUPs and more specifically system optimizers have been found turning to tech support scams to increase the amount of money they can take from their unsuspecting customers.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/puppum\/\" rel=\"category tag\">PUP<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/potentially-unwanted-programs\/\" rel=\"tag\">potentially unwanted programs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pup\/\" rel=\"tag\">PUP<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/system-optimizer\/\" rel=\"tag\">system optimizer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tech-support\/\" rel=\"tag\">tech support<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tech-support-scam\/\" rel=\"tag\">tech support scam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tss\/\" rel=\"tag\">TSS<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/system-optimizers-turning-tech-support-scams\/' title='System optimizers turning to Tech Support Scams'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/system-optimizers-turning-tech-support-scams\/\">System optimizers turning to Tech Support Scams<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[4503,11279,10566,12106,10536,10544,10545],"class_list":["post-7464","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cybercrime","tag-potentially-unwanted-programs","tag-pup","tag-system-optimizer","tag-tech-support","tag-tech-support-scam","tag-tss"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7464"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7464\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}