Velocity Technology Partners Blog

Velocity Technology Partners has been serving Athens, Gainesville and North Georgia since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is It A Good Idea To Bait A Phishing Scam?

Is It A Good Idea To Bait A Phishing Scam?

Phishing scams have had a supporting role in many of the latest cyber threats, often as the means the attacker has used to start off their attack. This attack vector is relatively easy to avoid in most cases, but requires education for the end user.

If you see these malicious emails in your inbox, you might be tempted to give the attacker a piece of your mind (or simply mess with them). We’ve all been there.

So, is it a good idea to antagonize a cybercriminal who was targeting you?

In a word, no.

There are plenty of professionals who have experimented with this very concept, for the academic purpose of finding out how a cybercriminal will react. One such researcher, Jerome Segura of Malwarebytes, played though a scam in its entirety. What he encountered was a mixture of apparent helpfulness in finding a cache of issues in his ‘device’ -- actually a virtual machine rigged to record attacks -- and a decidedly less helpful, unpleasant tone,

A  ‘technician’ had Segura check his Microsoft Error reports, warning him that each and every error and warning he sees is a major problem that had already begun to corrupt his system. To reinforce the need for a ‘solution,’ Segura was told that his software warranty had expired and, once transferred to another ‘representative,’ that he needed to pay for a $299 renewal.

Instead of paying, Segura supplied incorrect payment credentials, knowing they would be rejected. Once they were, his computer was suddenly seized. The ‘technician’ deleted all of his files as well as the Ethernet adapter driver, and calling Segura a rude word before disconnecting.

This is a fairly tame account of what this sort of cybercriminal can do. A wildlife photographer named Jakob Dulisse received a call to his home in Nelson, British Columbia, Canada from “Windows Technical Support” in Los Angeles, California. Quickly deducing that this was an attempt to scam him, Dulisse played along at first, before calling the voice on the other end of the line, “a scammer, a thief, and a bad person.”

The scammer/thief/bad person did not react well, stating that their group had people in Canada that would kill Dulisse, going so far as to describe himself as a killer and referencing that people in his region cut people into pieces and rid themselves of them in the river.

Other professionals have simply found remote access software installed without their consent as they have ‘played along’ with scammers.

However, these are professionals, whose job it is to identify and publicize the attacks that cybercriminals are resorting to. As for the business user, their best bet is to report the attempt to the local authorities, as well as your managed service provider.

A managed service provider can help you ensure that you are both secured against, and well-versed, in the latest cyberattacks. Give Velocity Technology Partners a call at (800) - 983 - 5765 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, July 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Congratulations Innovation Managed IT Software as a Service Mobility HBO Data Backup Network Cleaning Maintenance Software Retail IT support Lifestyle IT Support Antivirus Identities Google Windows IT Management Small Business Proactive VPN Content Filter WannaCry Risk Management FAQ Telephone Tech Term Data Security intranet Patch Management Disaster Recovery Sync Backup Privacy Emergency Apple Managing Stress Cloud Remote Computing Device Security Marketing Screen Mirroring Shortcut Office 365 Bring Your Own Device Microsoft Office Excel Data Breach Mobile Devices Language Edge Cortana Thank You Data Loss Memory Financial Licensing Wireless Internet Tech Support Spam Softphones Smart Tech Apps Politics Education Router The Internet of Things Updates Business Social Media Productivity Phishing Virus WIndows Server 2008 Windows Ink Printing Microsoft Evernote Data Recovery Hosted Solutions Microsoft Word Google Docs Communication Chromebook User Error Flexibility Managed IT Services Outsourced IT Cloud Computing Cost Management File Sharing Devices Students Data Theft History Gmail Business Continuity Ciminal Sales Gamification Project Management Cybersecurity Server Wireless Charging Monitoring Content Filtering PowerPoint Sports Value Tablets Cybercrime WiFi App OneNote Google Maps Spyware Mobile Security Malware Automation Adobe Tip of the Week Wi-Fi Data Protection Passwords Applications Microsoft Excel Windows 10 Computer BYOD Chrome Hard Drive Technology Best Practice Saving Money Managed Service Provider Fraud Management Best Practices Charger Data Management Collaboration Business Management Managed IT services IT Services Update Legal Data IoT Money App store Network Security Company Culture Work/Life Balance Conferencing Networking Internet Google Assistant Word Vulnerability Wireless Technology Communications Security Efficiency Financial Technology Hosted Solution Employer-Employee Relationship Analysis Cast Encryption Outlook Travel Law Enforcement Virtualization BDR Connectivity Hybrid Cloud MSP Holiday VoIp Storage SaaS Data Storage Internet of Things Specifications Email Artificial Intelligence Comparison Alert Streaming Media Browser Big Data Application Proactive IT User Tips Twitter Audit Legislation Credit Cards NFL Google Drive Business Computing Operating System Gifts Blockchain Government Redundancy Hardware Computing Social Engineering Safety Ransomware Computers Two-factor Authentication Commerce Mobile Device Management Compliance Unified Communications Identity Gadgets iPhone eWaste Websites Computer Forensics Vendor Management Smartphone Personal Information Telephone Systems Smartphones Data Privacy IT Solutions Unsupported Software Workers Identity Theft Android Hackers Remote Monitoring IT budget