News

How to get Tech Support Scammers to Install Malware

The old tech support scam – criminals posing as technical support staff in order to con computer users into surrendering access to their computers or paying to unlock ransomware – is, like its ancestor, the Nigerian 419 fraud, one of the more unfortunate side effects of the modern internet.

While most eTeknix readers are unlikely to fall for such a rudimentary con, many more inexperienced computer users fall prey the scammers, who often pose as Microsoft employees. Thankfully, there are some out there who like to give these swindlers a taste of their own medicine. When French blogger Ivan discovered that his parents were panicking over a fake HTML page, made by such fraudsters, claiming that their computer had been infected by “Zeus”, he decided to contact the phone number on the page and have a little fun with them.

“I fire up an old Windows XP VM, and get in touch with the “tech support”,” Ivan writes. After getting through to a supposed tech support agent (a Microsoft premium partner, whatever that means) named Dileep, Ivan plays dumb; he goes along with Dileep’s assessment that his computer is infected and agrees to purchase “Tech Protection” for €299.99.

Feigning poor eyesight, Ivan offers to send Dileep a photo of his credit card for payment. Rather than send a real photo through the remote assistance client, though, Ivan has other ideas: “I open my “junk” e-mail folder where I find many samples of the latest Locky campaign – those .zip files containing a JS script which downloads ransomware. I grab one at random, drag it into the VM. The remote-assistance client I installed has a feature allowing me to send files to the operator.”

When the “tech support” agent opened the file, Ivan tried “[his] best not to burst out laughing.”

“In conclusion,” Ivan writes, “whenever one stumbles on an obvious scam, the civic thing to do is to act like you buy it. Rationale: scammers don’t have the time to separate legitimate mugus from the ones who just pretend. Their business model relies on the fact that only gullible people will reply. Now were they spammed back, their workload would increase so much that scamming wouldn’t be a profitable activity anymore.” A social policy that we can all surely condone.

Image courtesy of West Chester Technology Blog.

Ashley Allen

Disqus Comments Loading...

Recent Posts

Nvidia’s GeForce RTX 5090 Possible Price Revealed

According to a new report, the GeForce RTX 5090 GPU will be very expensive. It…

3 hours ago

AMD Krackan Processor with 6 Zen 5 and Zen 5c Cores for Budget AI Laptops Leaked

A new AMD processor in the form of an engineering model has been leaked in…

3 hours ago

SK Hynix Begins Production of First 321-Layer NAND Chips

SK Hynix has claimed to be the first company to mass-produce 321-layer NAND memory chips.…

3 hours ago

Trust Gaming GXT 609 Zoxa 2.0 PC Speakers

SOUNDS GREAT – Full stereo sound (12W peak power) gives your setup a booming audio…

7 hours ago

PowerA Wired Controller for Nintendo Switch

Special Edition Yoshi design Ergonomic controller shape with Nintendo Switch button layout Detachable 10ft (3m)…

7 hours ago

Logitech G Saitek PRO Flight Rudder Pedals

Fluid Motion: These flight rudder pedals are smooth and accurate that enable precise control over…

7 hours ago