4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is It A Good Idea To Bait A Phishing Scam?

Is It A Good Idea To Bait A Phishing Scam?

Phishing scams have had a supporting role in many of the latest cyber threats, often as the means the attacker has used to start off their attack. This attack vector is relatively easy to avoid in most cases, but requires education for the end user.

If you see these malicious emails in your inbox, you might be tempted to give the attacker a piece of your mind (or simply mess with them). We’ve all been there.

So, is it a good idea to antagonize a cybercriminal who was targeting you?

In a word, no.

There are plenty of professionals who have experimented with this very concept, for the academic purpose of finding out how a cybercriminal will react. One such researcher, Jerome Segura of Malwarebytes, played though a scam in its entirety. What he encountered was a mixture of apparent helpfulness in finding a cache of issues in his ‘device’ -- actually a virtual machine rigged to record attacks -- and a decidedly less helpful, unpleasant tone,

A  ‘technician’ had Segura check his Microsoft Error reports, warning him that each and every error and warning he sees is a major problem that had already begun to corrupt his system. To reinforce the need for a ‘solution,’ Segura was told that his software warranty had expired and, once transferred to another ‘representative,’ that he needed to pay for a $299 renewal.

Instead of paying, Segura supplied incorrect payment credentials, knowing they would be rejected. Once they were, his computer was suddenly seized. The ‘technician’ deleted all of his files as well as the Ethernet adapter driver, and calling Segura a rude word before disconnecting.

This is a fairly tame account of what this sort of cybercriminal can do. A wildlife photographer named Jakob Dulisse received a call to his home in Nelson, British Columbia, Canada from “Windows Technical Support” in Los Angeles, California. Quickly deducing that this was an attempt to scam him, Dulisse played along at first, before calling the voice on the other end of the line, “a scammer, a thief, and a bad person.”

The scammer/thief/bad person did not react well, stating that their group had people in Canada that would kill Dulisse, going so far as to describe himself as a killer and referencing that people in his region cut people into pieces and rid themselves of them in the river.

Other professionals have simply found remote access software installed without their consent as they have ‘played along’ with scammers.

However, these are professionals, whose job it is to identify and publicize the attacks that cybercriminals are resorting to. As for the business user, their best bet is to report the attempt to the local authorities, as well as your managed service provider.

A managed service provider can help you ensure that you are both secured against, and well-versed, in the latest cyberattacks. Give 4IT a call at 305-278-7100 to get started.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 21 August 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Business Computing Internet software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware IT Services Business Google Efficiency Windows Innovation IT Support Hardware Disaster Recovery Workplace Tips Saving Money VoIP Business Continuity Virtualization Upgrade Computer Windows 10 Miscellaneous User Tips Data Mobile Devices Mobile Device Management Server Mobile Computing Email Communication Network Save Money Network Security Quick Tips Alert BYOD Going Green Mobile Office communications Information Technology Social Media Smartphones Microsoft Office Apps Small Business Health Office Smartphone Browser Android Application Gadgets Operating System Ransomware Outsourced IT Disaster Tablet Firewall Avoiding Downtime Managed IT Services IT Solutions Spam BDR Risk Management Mobility Search WiFi Holiday Chrome The Internet of Things Productivity Remote Computing Managed IT Unified Threat Management Passwords Vendor Management Hard Drives Hacking Saving Time Best Practice Data Management History Remote Monitoring Telephone Systems Employer-Employee Relationship Budget Facebook Automation Marketing Office Tips Cybersecurity Phishing Password Customer Relationship Management Cybercrime Hosted Solution Computers VPN Wireless Technology Apple Recovery Phone System Big Data Bring Your Own Device USB Content Filtering Analytics Law Enforcement Gmail Router Antivirus Proactive IT Humor Administration Social User Error Wearable Technology Lithium-ion battery iPhone Collaboration Maintenance PowerPoint Money Telephony Virus Current Events Printer Outlook Work/Life Balance Encryption HaaS Point of Sale IT COnsultant Office 365 Government App Shortcut Business Intelligence Computer Repair Cost Management Intranet Bandwidth Social Engineering Printer Server Laptop OneNote Wireless Unsupported Software Users Private Cloud Education Google Drive Trending Cloud Computing Net Neutrality Windows 8 Save Time Tech Support Data Storage Paperless Office Two-factor Authentication Flexibility Managing Stress Network Congestion SaaS Excel Fax Server Audit Help Desk Data Backup Workplace Samsung Streaming Media Uninterrupted Power Supply online currency Update Customer Service Biometrics Retail hacker Virtual Reality Personal Information Transportation Meetings Battery Robot Social Networking Computer Care Efficency Instant Messaging Emails IT Support Automobile HIPAA End of Support Entertainment Benefits DDoS Computer Accessories Internet Exlporer Display Mouse Compliance Internet of Things Identity Theft Augmented Reality Data Protection Solid State Drive Sports Employer Employee Relationship Regulations Worker Commute Operating Sysytem Ebay Debate Value PDF Dark Web Computing Scalability Screen Mirroring Files Cameras User Science Safety Text Messaging How To Cast Chromecast Virtual Desktop Presentation Upgrades Best Available Wi-Fi Windows 10s Bluetooth Nokia IT Technicians Emergency Travel Artificial Intelligence Nanotechnology Data Security Administrator Training SharePoint Consultant Applications Colocation Hard Disk Drive Twitter The Blindside Of Root Cause Analysis Black Market HBO Access Surge Protector Company Culture Teamwork Touchscreen Politics best practices Television IT Security Busines Continuity CrashOverride 3D Printing Near Field Communication IT Management Networking Cleaning Experience data breach Keyboard Avoid Downtime Settings IT consulting WIndows Server 2008 ISP Human Resources Running Cable Hard Drive Music risk management Hiring/Firing Reliable Computing Patch Management Programming Data storage Blogging Images Books Windows 10 Uograde Bloatware Smart Technology Video Games Commerce Document Management Regulation Website Data Breach Advertising Vulnerability Legal Data Recovery Sync OneDrive Touchpad Branding Mobile Device Distributed Denial of Service Managed Security iOS Amazon Managed IT Service Co-managed IT Scam Wiring WIndows 7 Managed IT Services Information eWaste Inbound Marketing Computer Fan Lifestyle Supercomputer Webinar IT service Electronic Medical Records IT Budget IT solutions Domains Reputation Tutorial Buisness Shadow IT Relocation Gift Giving Microblogging Youtube Sales Managed Service Provder Webinar Adobe Taxes Storage