Solved

SPAM Tech calls to clients say they see their computer serial number

Posted on 2014-09-05
4
433 Views
Last Modified: 2014-09-07
I have a client I have been out to a couple of times to do cleanup.  They have had a couple of SPAM Tech calls saying that they can see their computer is having trouble & that they can fix.  She seems to only have trouble with her computer & then they call.

I usually go in & cleanup the computer using:  Malwarebytes / IOBIT Malware Fighter / SuperAntiSpyware / AdwareCleaner / just started using Junkware Removal / TDSSkiller / CCleaner / make sure all win updates are done / flash updates / java updates / etc.  I cover everything I can.  I ALWAYS REMOVE ALL OF THIS FREEWARE SOFTWARE WHEN I AM COMPLETE WITH THE JOB.

Am I missing something?  

Can they really see her serial number or is this just a ploy?  I think it is (just to sound more believable)

Does these programs scan for key loggers?  

Am I missing anything else I should be performing on these machines for removal of malware & viruses?

Thanks for all your input!
0
Comment
Question by:etronics6
4 Comments
 
LVL 14

Accepted Solution

by:
Brad Groux earned 167 total points
ID: 40306369
No, they can't see her system - they are "cold calling" people. They generally follow the call up with an email, "click here so I can help you" which then installs the malware onto their systems. You delete all of the malware, and they simply call her back knowing that she fell for it before.

Simple way to fix this. Tell your user to NEVER receive tech support over the phone or speak to anyone over the phone (except you) regarding tech support.

News stories covering these sorts of scams -
http://news.yahoo.com/video/cold-call-scammers-target-valley-084212451.html
http://www.youtube.com/watch?v=viwtWBeotCQ
0
 
LVL 9

Assisted Solution

by:macarrillo1
macarrillo1 earned 167 total points
ID: 40306407
I agree.  Although you could test the caller by
1. asking for the callers phone number and you call them back.
2. If they can see your computer then they can see the file on my desktop called 'Accounts'.  Please read the first line to me inside that file.  File does not exist of course.

Tech people don't just call people out of the blue.  Does she have some kind of 24 hour support  and monitoring service?

No, They are trying to SCAM her.
0
 
LVL 15

Assisted Solution

by:Perarduaadastra
Perarduaadastra earned 166 total points
ID: 40306423
The first thing to do is advise the customer (indeed, any customer) that any cold calls purporting to know details about her computer, or any problems it may have, are certainly bogus.  Explain that falling for such fraudulent calls allows the criminal callers (for that is what they are) to not only obtain the information that they pretended they had to begin with, but also to install software that will obtain passwords and other credentials, and/or install backdoor software for other malicious software. Also, when the customer pays for these supposed "services" they will have her financial details as well.

A couple of things not on your list are:

Backing up the customer's data before starting work, in case something goes horribly wrong. The customer should have their own backup but if they don't, who do you think they'll blame?

A full anti-virus scan, using the customer's own AV software.

To your list of software tools I would add the excellent Combofix by sUBs, but only if you have a good backup of the customer's data. I've never had a problem with it, but it is very thorough and if something does go wrong during its operation then it may not be easily fixable. It's easily uninstalled afterwards, but the logs it leaves behind can be tricky to remove.
0
 

Author Closing Comment

by:etronics6
ID: 40309240
Thanks guys!  I thought I was on the right track, but just wanted to double check my practices!  Appreciate your help!  :-)
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article summarizes using a simple matrix to map the different type of phishing attempts and its targeted victims. It also run through many scam scheme scenario with "real" phished emails. There are safeguards highlighted to stay vigilance and h…
A brand new malware strain was recently discovered by security researchers at Palo Alto Networks dubbed “AceDeceiver.” This new strain of iOS malware can successfully infect non-jailbroken devices and jailbroken devices alike.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question