Heart of Texas Network Consultants Blog

This Scammer Raid Proves Just How Useful Monitoring Can Be

This Scammer Raid Proves Just How Useful Monitoring Can Be

It can be easy to underestimate the importance of monitoring your solutions, to adopt an “out of sight, out of mind” mentality. However, the benefits of persistent monitoring were recently thrust into the spotlight, when 24 spammers were arrested in October by the Delhi Police’s cyber cell for impersonating Microsoft support staff and duping American citizens.

With the assistance of Microsoft’s Digital Crime Unit (based in Redmond, Washington, USA, and with offices around the globe) the authorities were able to leverage data analytics in order to bust multiple companies with illegal call centers. These call centers were running a tech support scam that targeted American Microsoft Windows users.

Typical of a tech support scam, the employees at these call centers would first send their targets a fraudulent notification that claimed that their systems had malware on them. They created websites to further convince their targets of their legitimacy. When a victim called the number provided, the cybercriminals would charge them a sum anywhere between $100 and $500 to “remedy” the apparent issue.

The scammers would steal data and install malware once they were given access.

It was through monitoring that an employee of Microsoft India, Nripenda Kashyap, was able to identify and report these activities to the DCU. His actions ultimately led to 10 call centers being raided and the arrest of 24 people, the owners of these businesses included.

There are a few lessons that you can take from these events.

First, you need to remember that no major technology company, like Microsoft, is ever going to reach out to you and inform you that your device is having issues. The only exception is if you’ve enlisted a service provider like Heart of Texas Network Consultants to actively monitor your computers and other devices. Otherwise, you’re essentially on your own.

Second, having your own IT monitored isn’t something that you should postpone. Tech support scams like these claim $1.5 billion each year from 3.3 million users (and that’s according to a lawsuit that the DCU filed… in 2014) While you may see the dozens of errors that your computer tracks as some kind of catastrophe, a professional IT resource will be able to tell if something is actually wrong.

When you do elect to have your devices monitored and maintained, try reaching out to us. We’ll work behind the scenes, actually preventing issues before they happen and identifying and mitigating threats.

If you’re interested in learning more about our services, including our remote monitoring and maintenance solutions, reach out to us at (254) 848-7100.

Those Irritating Spam Calls May Not Last Much Long...
Tip of the Week: Keyboard Shortcuts to Save You Ti...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, July 23 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Avoiding Downtime Cybercrime Facebook Hackers Shortcut Information Technology Hardware Employer-Employee Relationship Email Hacking Microsoft Gmail Data Business Customer Relationship Management Office VoIP Backup Remote Computing Holiday Windows 10 Windows Telephony Smartphones Business Computing Data Security Collaboration Password The Internet of Things Risk Management Managed IT User Error Best Practice Best Practices Search Computer Managed IT Services Hosted Solutions Tip of the Week Android Computers Social Media Cost Management Security Artificial Intelligence Productivity Passwords Automation Microsoft Office Chrome Browser Unified Threat Management Network Security Current Events Bandwidth Productivity Laptop Networking Internet of Things Communication Business Continuity Marketing Operating System User Tips Mobile Device Management Data Recovery Humor OneNote iPhone Malware Google Saving Money Paperless Office Update Information Application Maintenance Antivirus Users Technology Social Tech Term App Upgrade Efficiency Data Management Internet Politics Software Hard Drives Workplace Tips Mobility Education Wi-Fi Tablet Alert Wireless Going Green Virtualization IT Support Cybersecurity Cloud Computing Managed IT Services Lithium-ion battery Vulnerability Router Mobile Office WiFi Server History Office 365 Mobile Computing IT Support IT Services Spam BYOD Outsourced IT Tech Support Windows 10 Encryption Proactive IT Smartphone Data Backup Save Money Small Business PowerPoint Health Trending Bring Your Own Device Big Data Telephone Systems Quick Tips Gadgets Managed Service Provider Wireless Technology Google Drive Office Tips Vendor Management Disaster Recovery Innovation Business Management Privacy Miscellaneous Network Cloud BDR Windows 8 Ransomware Unsupported Software Two-factor Authentication Money communications Apps USB Mobile Devices Applications Printer Law Enforcement Government Phishing