Contact us today!
217-428-6449

Network Solutions Unlimited Blog

This Scammer Raid Proves Just How Useful Monitoring Can Be

This Scammer Raid Proves Just How Useful Monitoring Can Be

It can be easy to underestimate the importance of monitoring your solutions, to adopt an “out of sight, out of mind” mentality. However, the benefits of persistent monitoring were recently thrust into the spotlight, when 24 spammers were arrested in October by the Delhi Police’s cyber cell for impersonating Microsoft support staff and duping American citizens.

With the assistance of Microsoft’s Digital Crime Unit (based in Redmond, Washington, USA, and with offices around the globe) the authorities were able to leverage data analytics in order to bust multiple companies with illegal call centers. These call centers were running a tech support scam that targeted American Microsoft Windows users.

Typical of a tech support scam, the employees at these call centers would first send their targets a fraudulent notification that claimed that their systems had malware on them. They created websites to further convince their targets of their legitimacy. When a victim called the number provided, the cybercriminals would charge them a sum anywhere between $100 and $500 to “remedy” the apparent issue.

The scammers would steal data and install malware once they were given access.

It was through monitoring that an employee of Microsoft India, Nripenda Kashyap, was able to identify and report these activities to the DCU. His actions ultimately led to 10 call centers being raided and the arrest of 24 people, the owners of these businesses included.

There are a few lessons that you can take from these events.

First, you need to remember that no major technology company, like Microsoft, is ever going to reach out to you and inform you that your device is having issues. The only exception is if you’ve enlisted a service provider like Network Solutions Unlimited to actively monitor your computers and other devices. Otherwise, you’re essentially on your own.

Second, having your own IT monitored isn’t something that you should postpone. Tech support scams like these claim $1.5 billion each year from 3.3 million users (and that’s according to a lawsuit that the DCU filed… in 2014) While you may see the dozens of errors that your computer tracks as some kind of catastrophe, a professional IT resource will be able to tell if something is actually wrong.

When you do elect to have your devices monitored and maintained, try reaching out to us. We’ll work behind the scenes, actually preventing issues before they happen and identifying and mitigating threats.

If you’re interested in learning more about our services, including our remote monitoring and maintenance solutions, reach out to us at 217-428-6449.

Those Irritating Spam Calls May Not Last Much Long...
Tip of the Week: Keyboard Shortcuts to Save You Ti...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, March 20 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Data Backup HBO iOS Computer Information Telephone Personal Information eWaste Mobile Device Computer Forensics Best Practice Ciminal Hiring/Firing Applications Mobility Assessment The Internet of Things IT Services Remote Workers Saving Time Monitors Monitoring Patch Management Spam Blocking Conferencing BDR Computing Infrastructure Unified Threat Management NFL Automobile Microsoft Excel Application Worker Licensing Entertainment Content Filter Facebook Sports Health Windows 10s Best Practices Comparison Cast Gamification Social Engineering Storage Smartphones IT Management Data Protection Workers Smartphone Virtual Assistant Cybercrime Advertising Passwords Credit Cards Touchpad Data storage Wi-Fi Network Data Recovery Cost Management User Tips Google Assistant Innovation History Gadgets Collaboration Edge Business Owner Websites Information Technology Virtual Reality Computers Hyperlink Update Budget Evernote Business Continuity Emails Computer Fan Webinar Security Reputation Antivirus Small Business Screen Mirroring Apps Data Privacy Social Media Specifications Windows 10 IT Support Internet Exlporer Data Loss Amazon Television Streaming Media Identities Privacy Files Hard Disk Drive Congratulations Shortcut Hybrid Cloud Charger Cloud Computing WIndows Server 2008 BYOD Tech Term Rootkit Unified Communications Techology Cortana Virus Maintenance App Browser Computer Accessories Language Break/Fix Troubleshooting Proactive Wasting Money Google Maps VPN Smart Technology Cybersecurity Upgrades Quick Tips Chromebook Data Theft Vendor PowerPoint Accessory Hard Drive MSP Server Windows 7 Artificial Intelligence Remote Monitoring Managed IT Spam Search Tip of the Week Keyboard Shortcuts Hosted Solutions Proactive IT Microsoft Office Financial Technology Access Control Networking Managing Stress Paperless Office Managed IT Services App store Public Computer Laptop Managed IT Services Document Management Software Phone System Value Relocation Instant Messaging Workplace Tips Data Breach Internet Telephone Systems Business Public Cloud Regulation Big Data Password Business Management Flexibility Productivity Network Security Compliance Scam WannaCry WPA3 Printers Dark Web IT Solutions Communication Employer-Employee Relationship Commerce Devices Augmented Reality Backup and Disaster Recovery Retail Wasting Time Automation Politics Memory Printing Gmail Students Cache Phishing Windows Ink Admin Backup iPhone Training Law Enforcement Financial Thank You Employer Employee Relationship Medical IT Remote Computing Office Internet of Things Holiday Apple Monitor Loyalty Settings Android Cloud CrashOverride Security Cameras Business Intelligence Managed Service Display Updates Identity Data Security PDF Work/Life Balance Money Utility Computing FAQ Customer File Sharing Video Games Firewall Cleaning Recovery Hardware Malware Camera End of Support Encryption Robot Chromecast Mobile Security Spyware Administration Touchscreen Ransomware Business Technology How to Mobile Blockchain Bluetooth Wireless Technology Saving Money Internet exploMicrosoft E-Commerce Vulnerability Adobe Identity Theft Disaster Recovery Connectivity Router Mobile Device Management Machine Learning Humor Productivity Managed IT Service Email Management Battery Data Storage Google Drive IoT HIPAA Hard Drives Employee-Employer Relationship Black Market Keyboard Downtime Outsourced IT Technology Books Consultant Save Time Safety Sync Word File Storage VoIP IT solutions Analysis Payroll Software as a Service Employee Computer Care Going Green Smart Tech WiFi Marketing Twitter Outlook Government Excel SMB Private Cloud Education Vendor Management Hackers Two Factor Authentication Transportation IT Support Company Culture Human Resources Physical Security Microsoft Word Risk Management Shadow IT Gifts hacker Professional Services Virtual Private Network Chrome Mobile Devices OneNote Redundancy Colocation Alert Nanotechnology Wireless Content Filtering Hosted Solution Operating System Wireless Charging Analytics Project Management Sales Fraud Bandwidth Computing How To Lifestyle Miscellaneous Root Cause Analysis Audiobook Content SaaS Avoiding Downtime Projects Unsupported Software Co-Managed Services Bring Your Own Device HaaS Tech Support Testing Device Security Worker Commute Experience Communications Peripheral USB User Error Legislation Alexa for Business Tablets IT budget Hacking Wireless Internet Virtualization IT Service Users Data Management Microsoft Google Office 365 Windows 10 Emergency Save Money Payment Cards Windows Legal Data Benefits Two-factor Authentication Solid State Drive Business Computing Meetings Office Tips intranet Upgrade Samsung Audit Electronic Medical Records Scalability Efficiency Travel Managed Service Provider Google Docs