?
Solved

How to report virus removal scam?

Posted on 2013-11-05
7
Medium Priority
?
545 Views
Last Modified: 2014-01-04
One of my users received an unsolicited call from someone claiming to be from "Global Computer Services" , claiming that her computer was infected and being controlled by hackers.  They wanted to talk her through some steps. She refused and  got their phone number.

I called back, pretending to be her husband.  They talked me through going into event viewer, and asked how many errors I saw. I said "5".  He said: "Oh my god, your computer is being accessed by hackers right now.

They wanted $80-$180 to remove the virus.

Their phone number is 866-539-8674.

To whom can I report these scam artists?

Any way to get their 800 line revoked?

Is there anything I can do?  I'm outraged!

Mike
0
Comment
Question by:mike2401
7 Comments
 
LVL 24

Expert Comment

by:aadih
ID: 39625475
Except ignoring, I am not sure of any effective action. You could lodge a complain with the "do not call list":

https://complaints.donotcall.gov/complaint/complaintcheck.aspx >
0
 
LVL 26

Assisted Solution

by:pony10us
pony10us earned 1000 total points
ID: 39625527
About a year ago the FTC was cracking down on just this type of scam.  Here is a link to an article on their site:  http://www.ftc.gov/opa/2012/10/pecon.shtm
0
 
LVL 8

Assisted Solution

by:Scott Thompson
Scott Thompson earned 1000 total points
ID: 39626244
We have had the same thing going on in our area.  I have had several customers and MYSELF recieve the phone call claiming my computer has issues.  What my phone company told me to do is to contact your local Attorney General's office and file an official complaint.  Most of the time they are calling illegally and this WILL get tracked down.
0
SMB Security Just Got a Layer Stronger

WatchGuard acquires Percipient Networks to extend protection to the DNS layer, further increasing the value of Total Security Suite.  Learn more about what this means for you and how you can improve your security with WatchGuard today!

 

Accepted Solution

by:
mike2401 earned 0 total points
ID: 39627636
Just because I'm a good citizen, I filed a complaint with:

http://www.ic3.gov/default.aspx

-------------------
The IC3 was established as a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C) to serve as a means to receive Internet related criminal complaints and to further research, develop, and refer the criminal complaints to federal, state, local, or international law enforcement and/or regulatory agencies for any investigation they deem to be appropriate. The IC3 was intended, and continues to emphasize, serving the broader law enforcement community to include federal, as well as state, local, and international agencies, which are combating Internet crime and, in many cases, participating in Cyber Crime Task Forces.

Since its inception, the IC3 has received complaints crossing the spectrum of cyber crime matters, to include online fraud in its many forms including Intellectual Property Rights (IPR) matters, Computer Intrusions (hacking), Economic Espionage (Theft of Trade Secrets), Online Extortion, International Money Laundering, Identity Theft, and a growing list of Internet facilitated crimes. Since June 2000, it has become increasingly evident that, regardless of the label placed on a cyber crime matter, the potential for it to overlap with another referred matter is substantial. Therefore, the IC3, formerly known as the Internet Fraud Complaint Center (Internet Fraud Complaint Center), was renamed in October 2003 to better reflect the broad character of such matters having an Internet, or cyber, nexus referred to the IC3, and to minimize the need for one to distinguish "Internet Fraud" from other potentially overlapping cyber crimes.

IC3 Mission Statement

The IC3's mission is to serve as a vehicle to receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime. The IC3 gives the victims of cyber crime a convenient and easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations. For law enforcement and regulatory agencies at the federal, state, local, and international level, the IC3 provides a central referral mechanism for complaints involving Internet related crimes.

Significant and supplemental to partnering with law enforcement and regulatory agencies, it will remain a priority objective of the IC3 to establish effective alliances with industry. Such alliances will enable the IC3 to leverage both intelligence and subject matter expert resources, pivotal in identifying and in crafting an aggressive, proactive approach to combating cyber crime.
0
 

Author Comment

by:mike2401
ID: 39633865
Thanks!
0
 

Author Closing Comment

by:mike2401
ID: 39644071
Thanks everyone!
0
 
LVL 7

Expert Comment

by:Lounge Fox
ID: 39756409
I got nuttin, just a bunch a bananas!
0

Featured Post

The Firewall Audit Checklist

Preparing for a firewall audit today is almost impossible.
AlgoSec, together with some of the largest global organizations and auditors, has created a checklist to follow when preparing for your firewall audit. Simplify risk mitigation while staying compliant all of the time!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The article explains the process to deploy a Self-Service password reset portal I developed a few years ago. Hopefully, it will prove useful to someone.  Any comments, bug reports etc. are welcome...
Feeling responsible for an unfortunate ransomware infection on my parent's network, persistence paid off as I was able to decrypt a strain of ransomware that was not previously (or at least publicly) cracked. I hope this helps others out there affec…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Get the source code for a fully functional Access application shell with several popular security features that Access VBA application developers desire, but find difficult or impossible to figure out how to code. You get the source code for managi…

593 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question