Eclipse Integrated Systems Blog

Eclipse Integrated Systems has been serving the Bridgewater area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is It A Good Idea To Bait A Phishing Scam?

Is It A Good Idea To Bait A Phishing Scam?

Phishing scams have had a supporting role in many of the latest cyber threats, often as the means the attacker has used to start off their attack. This attack vector is relatively easy to avoid in most cases, but requires education for the end user.

If you see these malicious emails in your inbox, you might be tempted to give the attacker a piece of your mind (or simply mess with them). We’ve all been there.

So, is it a good idea to antagonize a cybercriminal who was targeting you?

In a word, no.

There are plenty of professionals who have experimented with this very concept, for the academic purpose of finding out how a cybercriminal will react. One such researcher, Jerome Segura of Malwarebytes, played though a scam in its entirety. What he encountered was a mixture of apparent helpfulness in finding a cache of issues in his ‘device’ -- actually a virtual machine rigged to record attacks -- and a decidedly less helpful, unpleasant tone,

A  ‘technician’ had Segura check his Microsoft Error reports, warning him that each and every error and warning he sees is a major problem that had already begun to corrupt his system. To reinforce the need for a ‘solution,’ Segura was told that his software warranty had expired and, once transferred to another ‘representative,’ that he needed to pay for a $299 renewal.

Instead of paying, Segura supplied incorrect payment credentials, knowing they would be rejected. Once they were, his computer was suddenly seized. The ‘technician’ deleted all of his files as well as the Ethernet adapter driver, and calling Segura a rude word before disconnecting.

This is a fairly tame account of what this sort of cybercriminal can do. A wildlife photographer named Jakob Dulisse received a call to his home in Nelson, British Columbia, Canada from “Windows Technical Support” in Los Angeles, California. Quickly deducing that this was an attempt to scam him, Dulisse played along at first, before calling the voice on the other end of the line, “a scammer, a thief, and a bad person.”

The scammer/thief/bad person did not react well, stating that their group had people in Canada that would kill Dulisse, going so far as to describe himself as a killer and referencing that people in his region cut people into pieces and rid themselves of them in the river.

Other professionals have simply found remote access software installed without their consent as they have ‘played along’ with scammers.

However, these are professionals, whose job it is to identify and publicize the attacks that cybercriminals are resorting to. As for the business user, their best bet is to report the attempt to the local authorities, as well as your managed service provider.

A managed service provider can help you ensure that you are both secured against, and well-versed, in the latest cyberattacks. Give Eclipse Integrated Systems a call at 800-340-0505 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 21 May 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Hackers Internet Business Computing Malware Business Management Software Google Network Security Microsoft Windows 10 Computer Innovation User Tips Backup Hosted Solutions Productivity Productivity Business Mobile Devices Apps Cybersecurity Windows Email Efficiency Hardware Smartphone Cybercrime Disaster Recovery Managed IT Services Operating System Virtualization Browser Saving Money Law Enforcement Smartphones Android IT Support Data Security Data Backup Ransomware Small Business Business Continuity Tech Term VoIP Office 365 Telephone Systems Mobile Device Management Wireless Quick Tips Miscellaneous Passwords Holiday Server Internet of Things Microsoft Office Data Recovery Money Mobility communications Chrome Phishing Cloud Computing Unsupported Software IT Services IT Support Outsourced IT Cost Management Health Information Technology Update Communication Collaboration BDR Password Best Practice Vulnerability Risk Management Workplace Tips Google Drive Gadgets Social App Wi-Fi Application Government Antivirus Managed Service Provider Hacking Politics Save Money Managed IT Office tips USB Spam Computers Alert Windows 10 Shortcut Upgrade Two-factor Authentication Identity Theft User Error Data Management Facebook Work/Life Balance Data Current Events Employer-Employee Relationship Social Media Patch Management Transportation Hosted Solution Internet Exlporer DDoS Wireless Technology Mobile Computing Office Network Encryption Cleaning Excel VPN Humor Telephony Remote Computing Battery Save Time iPhone Mobile Security Blockchain Google Docs Commerce Going Green Apple Artificial Intelligence Automobile Legal Data Protection Search eWaste The Internet of Things Maintenance WiFi Flexibility Data Storage Streaming Media Bandwidth OneNote Samsung Router Social Engineering History End of Support Television Devices Managed IT Services Private Cloud Sports Cortana Proactive IT Audit Recovery Users HaaS Meetings Automation Wireless Charging Fraud Tech Support Computer Care Personal Information Emails Safety Reputation Websites Files Comparison WannaCry Value Data Breach Laptop Edge Word Webinar Black Market Data Theft Specifications Evernote Outlook Trending Virtual Reality Robot Lithium-ion battery Entertainment Touchpad Ciminal Windows Ink Cast IT solutions Computing Distributed Denial of Service Sales Bluetooth Networking Nanotechnology Scam PDF Internet Explorer Education Project Management Google Maps Marketing Mobile Device BYOD Windows 10s Instant Messaging App store Retail Fax Server Workers Sync Root Cause Analysis Employer Employee Relationship Text Messaging Threat Experience Operating Sysytem IT budget Uninterrupted Power Supply Data Loss Solid State Drive Managing Stress Budget Conferencing Updates Augmented Reality Computer Accessories Gmail Point of Sale Video Games Phone System Avoiding Downtime Wearable Technology SaaS HBO Hard Disk Drive Hacker Identity Chromecast Gifts Microsoft Word Adobe Unified Threat Management Music Identities Microsoft Excel Keyboard Data Privacy Credit Cards Applications Vendor Management Upgrades Analytics Language Running Cable File Sharing IT Management Hard Drive SharePoint Data storage Device Security Licensing Consultant Scalability Big Data Storage Screen Mirroring IT Solutions iOS Hiring/Firing Chromebook Administrator FAQ Worker Commute Travel Training Touchscreen How To Books Virus Benefits Printing Access Charger Teamwork Spyware Tablets Settings Company Culture Electronic Medical Records Proactive Legislation WIndows Server 2008 Computer Fan Smart Technology Advertising Google Assistant NFL Remote Monitoring Emergency Monitors Twitter Worker Relocation PowerPoint Connectivity CrashOverride Disaster Cache

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login