Cybercrooks posing as tech support steal data: Report

Abp Live Tech

Tech / Abp Live Tech 885 Views comments

Kaura said advanced criminal attack groups are now echoing the skill sets of nation-state attackers. Kaura said advanced criminal attack groups are now echoing the skill sets of nation-state attackers. (Reuters)

With more and more people worldwide preferring online transactions, cyber criminals are using the ‘fake technical support’ model to steal consumer data, says a report by security software firm Symantec.

According to the report, fake technical support scams saw a 200 percent increase globally in 2015.

“With close to 5 lakh attacks last year, India ranked 11 amongst countries targeted the most by tech support scams… The countries targeted the most by tech support scams were the US, the UK, France, Australia and Germany,” Symantec Director Solution Product Management Asia Pacific and Japan Tarun Kaura told PTI.

He added that the difference now is that scammers send fake warning messages to devices like smartphones to prompt people to call attackers directly in order to dupe them into buying useless services or even install malware.

“In total, Symantec blocked more than 100 million tech support scams last year (globally),” he said.

Kaura said advanced criminal attack groups are now echoing the skill sets of nation-state attackers.

“They have extensive resources and a highly-skilled technical staff that operate with efficiency,” he added.

Asked what consumers can do to protect themselves, Kaura said they should use strong and unique passwords for their accounts, which are changed every three months.

“Also, they should think before clicking. Opening the wrong attachment can introduce malware to users’ system. Never view, open, or copy email attachments unless you are expecting the email and trust the sender,” he said.

Kaura said users should also not disclose personal information or account details to someone calls claiming to be from a financial institution or tech support.

“Also, users should be wary of versions of software that claim to be free. These could expose them to malware. Social engineering and ransomware attacks will also attempt to trick users into thinking their computer is infected and get them to buy useless software or pay money directly to have it removed,” he added.

Besides, users should try and limit the amount of personal information they share on social networks and online, including login information and birth dates.

Please Wait while comments are loading...


Whoops, looks like something went wrong.

1/1 ErrorException in Filesystem.php line 81: file_put_contents(/home/mcinews/public_html/storage/framework/sessions/e7999ffbec8cffc3fb07b1dd968f16b4ed16c38f): failed to open stream: Disk quota exceeded

  1. in Filesystem.php line 81
  2. at HandleExceptions->handleError('2', 'file_put_contents(/home/mcinews/public_html/storage/framework/sessions/e7999ffbec8cffc3fb07b1dd968f16b4ed16c38f): failed to open stream: Disk quota exceeded', '/home/mcinews/public_html/vendor/laravel/framework/src/Illuminate/Filesystem/Filesystem.php', '81', array('path' => '/home/mcinews/public_html/storage/framework/sessions/e7999ffbec8cffc3fb07b1dd968f16b4ed16c38f', 'contents' => 'a:4:{s:6:"_token";s:40:"ZMKkaC2MW8Kuf4fgeip9yaY24WxL8uUt3qo0wEaP";s:9:"_previous";a:1:{s:3:"url";s:72:"";}s:9:"_sf2_meta";a:3:{s:1:"u";i:1510965716;s:1:"c";i:1510965716;s:1:"l";s:1:"0";}s:5:"flash";a:2:{s:3:"old";a:0:{}s:3:"new";a:0:{}}}', 'lock' => true))
  3. at file_put_contents('/home/mcinews/public_html/storage/framework/sessions/e7999ffbec8cffc3fb07b1dd968f16b4ed16c38f', 'a:4:{s:6:"_token";s:40:"ZMKkaC2MW8Kuf4fgeip9yaY24WxL8uUt3qo0wEaP";s:9:"_previous";a:1:{s:3:"url";s:72:"";}s:9:"_sf2_meta";a:3:{s:1:"u";i:1510965716;s:1:"c";i:1510965716;s:1:"l";s:1:"0";}s:5:"flash";a:2:{s:3:"old";a:0:{}s:3:"new";a:0:{}}}', '2') in Filesystem.php line 81
  4. at Filesystem->put('/home/mcinews/public_html/storage/framework/sessions/e7999ffbec8cffc3fb07b1dd968f16b4ed16c38f', 'a:4:{s:6:"_token";s:40:"ZMKkaC2MW8Kuf4fgeip9yaY24WxL8uUt3qo0wEaP";s:9:"_previous";a:1:{s:3:"url";s:72:"";}s:9:"_sf2_meta";a:3:{s:1:"u";i:1510965716;s:1:"c";i:1510965716;s:1:"l";s:1:"0";}s:5:"flash";a:2:{s:3:"old";a:0:{}s:3:"new";a:0:{}}}', true) in FileSessionHandler.php line 71
  5. at FileSessionHandler->write('e7999ffbec8cffc3fb07b1dd968f16b4ed16c38f', 'a:4:{s:6:"_token";s:40:"ZMKkaC2MW8Kuf4fgeip9yaY24WxL8uUt3qo0wEaP";s:9:"_previous";a:1:{s:3:"url";s:72:"";}s:9:"_sf2_meta";a:3:{s:1:"u";i:1510965716;s:1:"c";i:1510965716;s:1:"l";s:1:"0";}s:5:"flash";a:2:{s:3:"old";a:0:{}s:3:"new";a:0:{}}}') in Store.php line 262
  6. at Store->save() in StartSession.php line 88
  7. at StartSession->terminate(object(Request), object(Response)) in Kernel.php line 145
  8. at Kernel->terminate(object(Request), object(Response)) in index.php line 58