Eclipse Integrated Systems Blog

Eclipse Integrated Systems has been serving the Bridgewater area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is It A Good Idea To Bait A Phishing Scam?

Is It A Good Idea To Bait A Phishing Scam?

Phishing scams have had a supporting role in many of the latest cyber threats, often as the means the attacker has used to start off their attack. This attack vector is relatively easy to avoid in most cases, but requires education for the end user.

If you see these malicious emails in your inbox, you might be tempted to give the attacker a piece of your mind (or simply mess with them). We’ve all been there.

So, is it a good idea to antagonize a cybercriminal who was targeting you?

In a word, no.

There are plenty of professionals who have experimented with this very concept, for the academic purpose of finding out how a cybercriminal will react. One such researcher, Jerome Segura of Malwarebytes, played though a scam in its entirety. What he encountered was a mixture of apparent helpfulness in finding a cache of issues in his ‘device’ -- actually a virtual machine rigged to record attacks -- and a decidedly less helpful, unpleasant tone,

A  ‘technician’ had Segura check his Microsoft Error reports, warning him that each and every error and warning he sees is a major problem that had already begun to corrupt his system. To reinforce the need for a ‘solution,’ Segura was told that his software warranty had expired and, once transferred to another ‘representative,’ that he needed to pay for a $299 renewal.

Instead of paying, Segura supplied incorrect payment credentials, knowing they would be rejected. Once they were, his computer was suddenly seized. The ‘technician’ deleted all of his files as well as the Ethernet adapter driver, and calling Segura a rude word before disconnecting.

This is a fairly tame account of what this sort of cybercriminal can do. A wildlife photographer named Jakob Dulisse received a call to his home in Nelson, British Columbia, Canada from “Windows Technical Support” in Los Angeles, California. Quickly deducing that this was an attempt to scam him, Dulisse played along at first, before calling the voice on the other end of the line, “a scammer, a thief, and a bad person.”

The scammer/thief/bad person did not react well, stating that their group had people in Canada that would kill Dulisse, going so far as to describe himself as a killer and referencing that people in his region cut people into pieces and rid themselves of them in the river.

Other professionals have simply found remote access software installed without their consent as they have ‘played along’ with scammers.

However, these are professionals, whose job it is to identify and publicize the attacks that cybercriminals are resorting to. As for the business user, their best bet is to report the attempt to the local authorities, as well as your managed service provider.

A managed service provider can help you ensure that you are both secured against, and well-versed, in the latest cyberattacks. Give Eclipse Integrated Systems a call at 800-340-0505 to get started.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 January 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Hackers Software Malware Google Business Computing Internet Microsoft Business Management Windows 10 Computer User Tips Backup Hosted Solutions Network Security Innovation Productivity Business Productivity Windows Hardware Email Smartphone Apps Cybersecurity Disaster Recovery Small Business Business Continuity Law Enforcement VoIP Cybercrime Mobile Devices Managed IT Services IT Support Virtualization Efficiency Browser Microsoft Office Data Backup Ransomware Money Mobility communications Chrome Office 365 Telephone Systems Quick Tips Miscellaneous Holiday Android Operating System Server Saving Money Health Information Technology Communication Collaboration Password Best Practice Unsupported Software Workplace Tips Social Google Drive Gadgets Outsourced IT App Application Government Mobile Device Management Data Recovery Smartphones Cloud Computing Wireless Passwords IT Services Work/Life Balance Phishing Office tips USB Wi-Fi Computers Alert Managed Service Provider Data Security Upgrade User Error Data Management Risk Management Politics Managed IT Facebook Current Events Social Media Windows 10 BDR Hacking Vulnerability Shortcut Identity Theft Save Money Cost Management iPhone Excel Computer Care Going Green Update Apple Artificial Intelligence Search Antivirus eWaste The Internet of Things WiFi Flexibility Office Google Docs Streaming Media Bandwidth Cleaning History IT Support End of Support Television Private Cloud Battery Sports Two-factor Authentication Recovery Users HaaS Save Time Employer-Employee Relationship Meetings Commerce Automation Personal Information Automobile Spam Cortana Proactive IT Transportation Hosted Solution Internet Exlporer DDoS Wireless Technology Mobile Computing Data Storage OneNote Encryption Samsung VPN Humor Telephony Managed IT Services Remote Computing Audit Settings Sales Managing Stress Company Culture Cast Budget Gmail Networking Electronic Medical Records Video Games Smart Technology Avoiding Downtime Wearable Technology Internet of Things Computer Fan Google Maps Retail BYOD Chromecast Workers Emails Sync Legal WannaCry Data Loss Conferencing Updates Webinar Virtual Reality Running Cable SharePoint Network Gifts HBO Entertainment Social Engineering Data storage Microsoft Word IT solutions Adobe Router Scalability Scam Education Nanotechnology Microsoft Excel Credit Cards Mobile Device Data Protection Administrator Maintenance Windows 10s Applications How To Employer Employee Relationship Root Cause Analysis File Sharing Teamwork IT Management Experience Access Data Solid State Drive Licensing Computer Accessories Point of Sale Augmented Reality Storage FAQ SaaS IT Solutions Advertising Phone System Tech Support Hard Disk Drive Travel Hacker Reputation Files Charger Unified Threat Management Music Laptop Tablets Keyboard Legislation Black Market Vendor Management Wireless Charging Upgrades WIndows Server 2008 Analytics Trending Robot Lithium-ion battery Touchpad NFL Comparison Distributed Denial of Service Bluetooth Screen Mirroring Data Breach Consultant Patch Management PDF Big Data Hiring/Firing Marketing iOS Word Specifications Instant Messaging Training Worker Commute Fax Server Evernote Touchscreen Outlook Text Messaging Books Benefits Operating Sysytem Uninterrupted Power Supply Windows Ink Cache Safety Remote Monitoring Emergency Disaster Monitors Worker Device Security Devices Spyware CrashOverride Relocation

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login