Solved

How to report virus removal scam?

Posted on 2013-11-05
7
528 Views
Last Modified: 2014-01-04
One of my users received an unsolicited call from someone claiming to be from "Global Computer Services" , claiming that her computer was infected and being controlled by hackers.  They wanted to talk her through some steps. She refused and  got their phone number.

I called back, pretending to be her husband.  They talked me through going into event viewer, and asked how many errors I saw. I said "5".  He said: "Oh my god, your computer is being accessed by hackers right now.

They wanted $80-$180 to remove the virus.

Their phone number is 866-539-8674.

To whom can I report these scam artists?

Any way to get their 800 line revoked?

Is there anything I can do?  I'm outraged!

Mike
0
Comment
Question by:mike2401
7 Comments
 
LVL 24

Expert Comment

by:aadih
ID: 39625475
Except ignoring, I am not sure of any effective action. You could lodge a complain with the "do not call list":

https://complaints.donotcall.gov/complaint/complaintcheck.aspx >
0
 
LVL 26

Assisted Solution

by:pony10us
pony10us earned 250 total points
ID: 39625527
About a year ago the FTC was cracking down on just this type of scam.  Here is a link to an article on their site:  http://www.ftc.gov/opa/2012/10/pecon.shtm
0
 
LVL 8

Assisted Solution

by:Scott Thompson
Scott Thompson earned 250 total points
ID: 39626244
We have had the same thing going on in our area.  I have had several customers and MYSELF recieve the phone call claiming my computer has issues.  What my phone company told me to do is to contact your local Attorney General's office and file an official complaint.  Most of the time they are calling illegally and this WILL get tracked down.
0
Scale it in WD Gold

With up to ten times the workload capacity of desktop drives, WD Gold hard drives employ advanced technology to deliver among the best in reliability, capacity, power efficiency and performance.

 

Accepted Solution

by:
mike2401 earned 0 total points
ID: 39627636
Just because I'm a good citizen, I filed a complaint with:

http://www.ic3.gov/default.aspx

-------------------
The IC3 was established as a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C) to serve as a means to receive Internet related criminal complaints and to further research, develop, and refer the criminal complaints to federal, state, local, or international law enforcement and/or regulatory agencies for any investigation they deem to be appropriate. The IC3 was intended, and continues to emphasize, serving the broader law enforcement community to include federal, as well as state, local, and international agencies, which are combating Internet crime and, in many cases, participating in Cyber Crime Task Forces.

Since its inception, the IC3 has received complaints crossing the spectrum of cyber crime matters, to include online fraud in its many forms including Intellectual Property Rights (IPR) matters, Computer Intrusions (hacking), Economic Espionage (Theft of Trade Secrets), Online Extortion, International Money Laundering, Identity Theft, and a growing list of Internet facilitated crimes. Since June 2000, it has become increasingly evident that, regardless of the label placed on a cyber crime matter, the potential for it to overlap with another referred matter is substantial. Therefore, the IC3, formerly known as the Internet Fraud Complaint Center (Internet Fraud Complaint Center), was renamed in October 2003 to better reflect the broad character of such matters having an Internet, or cyber, nexus referred to the IC3, and to minimize the need for one to distinguish "Internet Fraud" from other potentially overlapping cyber crimes.

IC3 Mission Statement

The IC3's mission is to serve as a vehicle to receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime. The IC3 gives the victims of cyber crime a convenient and easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations. For law enforcement and regulatory agencies at the federal, state, local, and international level, the IC3 provides a central referral mechanism for complaints involving Internet related crimes.

Significant and supplemental to partnering with law enforcement and regulatory agencies, it will remain a priority objective of the IC3 to establish effective alliances with industry. Such alliances will enable the IC3 to leverage both intelligence and subject matter expert resources, pivotal in identifying and in crafting an aggressive, proactive approach to combating cyber crime.
0
 

Author Comment

by:mike2401
ID: 39633865
Thanks!
0
 

Author Closing Comment

by:mike2401
ID: 39644071
Thanks everyone!
0
 
LVL 7

Expert Comment

by:Lounge Fox
ID: 39756409
I got nuttin, just a bunch a bananas!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: btan
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
You may have a outside contractor who comes in once a week or seasonal to do some work in your office but you only want to give him access to the programs and files he needs and keep privet all other documents and programs, can you do this on a loca…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now