4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is It A Good Idea To Bait A Phishing Scam?

Is It A Good Idea To Bait A Phishing Scam?

Phishing scams have had a supporting role in many of the latest cyber threats, often as the means the attacker has used to start off their attack. This attack vector is relatively easy to avoid in most cases, but requires education for the end user.

If you see these malicious emails in your inbox, you might be tempted to give the attacker a piece of your mind (or simply mess with them). We’ve all been there.

So, is it a good idea to antagonize a cybercriminal who was targeting you?

In a word, no.

There are plenty of professionals who have experimented with this very concept, for the academic purpose of finding out how a cybercriminal will react. One such researcher, Jerome Segura of Malwarebytes, played though a scam in its entirety. What he encountered was a mixture of apparent helpfulness in finding a cache of issues in his ‘device’ -- actually a virtual machine rigged to record attacks -- and a decidedly less helpful, unpleasant tone,

A  ‘technician’ had Segura check his Microsoft Error reports, warning him that each and every error and warning he sees is a major problem that had already begun to corrupt his system. To reinforce the need for a ‘solution,’ Segura was told that his software warranty had expired and, once transferred to another ‘representative,’ that he needed to pay for a $299 renewal.

Instead of paying, Segura supplied incorrect payment credentials, knowing they would be rejected. Once they were, his computer was suddenly seized. The ‘technician’ deleted all of his files as well as the Ethernet adapter driver, and calling Segura a rude word before disconnecting.

This is a fairly tame account of what this sort of cybercriminal can do. A wildlife photographer named Jakob Dulisse received a call to his home in Nelson, British Columbia, Canada from “Windows Technical Support” in Los Angeles, California. Quickly deducing that this was an attempt to scam him, Dulisse played along at first, before calling the voice on the other end of the line, “a scammer, a thief, and a bad person.”

The scammer/thief/bad person did not react well, stating that their group had people in Canada that would kill Dulisse, going so far as to describe himself as a killer and referencing that people in his region cut people into pieces and rid themselves of them in the river.

Other professionals have simply found remote access software installed without their consent as they have ‘played along’ with scammers.

However, these are professionals, whose job it is to identify and publicize the attacks that cybercriminals are resorting to. As for the business user, their best bet is to report the attempt to the local authorities, as well as your managed service provider.

A managed service provider can help you ensure that you are both secured against, and well-versed, in the latest cyberattacks. Give 4IT a call at 305-278-7100 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 17 March 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Internet software Business Computing Business Management Hackers Backup Productivity Hosted Solutions Managed Service Provider Malware Google Business IT Services Efficiency Windows IT Support Disaster Recovery Innovation Hardware VoIP Business Continuity Network Security Workplace Tips Mobile Devices User Tips Saving Money Computer Upgrade Miscellaneous Mobile Device Management Virtualization Windows 10 Data Server Email communications Alert Mobile Computing Small Business Communication Network Save Money Microsoft Office Apps Social Media Managed IT Services Outsourced IT Smartphones Quick Tips Smartphone Mobile Office Browser Information Technology Productivity BYOD Going Green Health Holiday Gadgets Cybercrime Android Office Operating System Chrome Managed IT Application Ransomware Cybersecurity Mobility Risk Management Tablet Best Practice WiFi Firewall The Internet of Things Avoiding Downtime Data Backup Passwords Disaster Search Collaboration Data Recovery History Data Management Remote Computing Internet of Things Unified Threat Management IT Solutions Telephone Systems Spam BDR Automation User Error Hacking Remote Monitoring Wireless Technology VPN Phishing Facebook Apple Employer-Employee Relationship Hard Drives Budget Vendor Management Marketing Saving Time Office Tips iPhone Vulnerability Customer Relationship Management Money Maintenance Password Hosted Solution Big Data Computers Data Security Content Filtering Law Enforcement Recovery Phone System Proactive IT Office 365 IT Support Humor Two-factor Authentication Administration Intranet Lithium-ion battery Wearable Technology Antivirus OneNote PowerPoint Shortcut Virus Current Events Social Google Drive Social Engineering Printer Tech Support Telephony USB Bring Your Own Device Analytics Encryption Work/Life Balance Gmail Router Government App Cost Management Computer Repair Politics SaaS Personal Information Excel Windows 10 Bandwidth Audit Printer Server HaaS Laptop Wireless Business Intelligence Unsupported Software Education Cloud Computing Trending Users Retail Net Neutrality Data Breach Windows 8 Save Time Identity Theft Data Protection Flexibility Outlook Private Cloud Point of Sale IT COnsultant online currency Applications eWaste hacker Managing Stress Blockchain Commerce Transportation Computer Care Battery Robot Efficency Social Networking Data Loss Travel Automobile End of Support Managed IT Services Update Customer Service Google Docs Biometrics Data Storage Redundancy Legal Virtual Reality Internet Exlporer Display Networking Meetings Augmented Reality Solid State Drive Paperless Office Instant Messaging Sports Emails HIPAA Fax Server Entertainment Network Congestion Benefits DDoS Computer Accessories Workplace Samsung Cortana Streaming Media Help Desk Wi-Fi Emergency Artificial Intelligence Project Management Mouse Compliance Uninterrupted Power Supply Colocation Evernote WIndows 7 WIndows Server 2008 Nokia Consultant Twitter The Blindside Of MSP Storage Windows Ink Inbound Marketing risk management Regulations Company Culture Black Market Surge Protector Access Comparison Workers Patch Management Touchscreen Television IT Security Google Maps Value 3D Printing Cameras Cleaning Specifications Updates User Regulation Experience Keyboard Avoid Downtime Identities Science Software as a Service Presentation ISP Virtual Desktop Conferencing Bluetooth Microsoft Word Best Available Sync Music Hiring/Firing IT Technicians IoT iOS Managed IT Service Programming Blogging Hard Drive Data storage Gifts SharePoint Device Security Adobe Books Smart Technology Video Games Computer Fan Uograde Website Images Document Management Teamwork Advertising Devices Licensing Sales Microsoft Excel Busines Continuity Dark Web Credit Cards Near Field Communication Screen Mirroring OneDrive Mobile Device Touchpad Spyware Amazon Managed Security Scam Co-managed IT File Sharing FAQ IT consulting Cast Human Resources Running Cable Fraud Windows 10s Nanotechnology Employer Employee Relationship Wiring Lifestyle systems Operating Sysytem Charger Reliable Computing Information Ebay Worker Commute PDF Edge Tablets Hard Disk Drive Computing Root Cause Analysis Debate Scalability Bloatware Files hack Wireless Charging HBO IT Budget Safety Text Messaging Ciminal NFL best practices CrashOverride How To Chromecast Branding WannaCry IT Management Upgrades Distributed Denial of Service Word data breach Settings Training Administrator Legislation IT service Shadow IT Domains Relocation Gift Giving Microblogging Youtube Language Buisness Webinar Tech Term Managed Service Provder Mobile IT solutions Webinar Proactive Taxes Professional Services Websites Supercomputer Electronic Medical Records Reputation Tutorial