Contact us today!

Network Solutions Unlimited Blog

This Scammer Raid Proves Just How Useful Monitoring Can Be

This Scammer Raid Proves Just How Useful Monitoring Can Be

It can be easy to underestimate the importance of monitoring your solutions, to adopt an “out of sight, out of mind” mentality. However, the benefits of persistent monitoring were recently thrust into the spotlight, when 24 spammers were arrested in October by the Delhi Police’s cyber cell for impersonating Microsoft support staff and duping American citizens.

With the assistance of Microsoft’s Digital Crime Unit (based in Redmond, Washington, USA, and with offices around the globe) the authorities were able to leverage data analytics in order to bust multiple companies with illegal call centers. These call centers were running a tech support scam that targeted American Microsoft Windows users.

Typical of a tech support scam, the employees at these call centers would first send their targets a fraudulent notification that claimed that their systems had malware on them. They created websites to further convince their targets of their legitimacy. When a victim called the number provided, the cybercriminals would charge them a sum anywhere between $100 and $500 to “remedy” the apparent issue.

The scammers would steal data and install malware once they were given access.

It was through monitoring that an employee of Microsoft India, Nripenda Kashyap, was able to identify and report these activities to the DCU. His actions ultimately led to 10 call centers being raided and the arrest of 24 people, the owners of these businesses included.

There are a few lessons that you can take from these events.

First, you need to remember that no major technology company, like Microsoft, is ever going to reach out to you and inform you that your device is having issues. The only exception is if you’ve enlisted a service provider like Network Solutions Unlimited to actively monitor your computers and other devices. Otherwise, you’re essentially on your own.

Second, having your own IT monitored isn’t something that you should postpone. Tech support scams like these claim $1.5 billion each year from 3.3 million users (and that’s according to a lawsuit that the DCU filed… in 2014) While you may see the dozens of errors that your computer tracks as some kind of catastrophe, a professional IT resource will be able to tell if something is actually wrong.

When you do elect to have your devices monitored and maintained, try reaching out to us. We’ll work behind the scenes, actually preventing issues before they happen and identifying and mitigating threats.

If you’re interested in learning more about our services, including our remote monitoring and maintenance solutions, reach out to us at 217-428-6449.

Those Irritating Spam Calls May Not Last Much Long...
Tip of the Week: Keyboard Shortcuts to Save You Ti...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, December 12 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Excel WiFi Computer Accessories Password Browser Flexibility IT solutions IT budget Automobile Document Management Search Hiring/Firing Display Advertising Managed IT Services iOS Storage Tablets Backup Vendor Management Hacking SMB IT Solutions Innovation Project Management Experience Dark Web Collaboration Microsoft Excel OneNote Outlook Save Time Cybercrime Credit Cards Recovery Microsoft IT Support Save Money IT Services Twitter Budget Blockchain Audit Encryption eWaste Compliance Windows 7 Hackers File Storage Tech Term Utility Computing Word Conferencing Data Breach Ciminal WannaCry Regulation Projects Router Google Maps Students Alert Proactive IT Computer Care Data Backup Cache Saving Time Human Resources Printers Physical Security Data Management Google Docs Touchpad Big Data Consultant Marketing Wi-Fi Computing Assessment Vendor Business Technology Files Computer Fan Value Accessory Going Green Unified Threat Management Telephone Systems Google Drive Streaming Media Education Bandwidth intranet Business Application Spam Blocking Mobile Software as a Service Firewall Augmented Reality HaaS WPA3 IoT Gmail Malware Private Cloud Thank You Redundancy Efficiency Smartphones IT Support Cast Gamification Virtualization Sales Server Data Security Personal Information Health Tip of the Week Root Cause Analysis Data Internet of Things Benefits Business Intelligence Rootkit Company Culture Lifestyle Keyboard Shortcuts Admin Hard Drives Touchscreen Comparison Solid State Drive Network Audiobook Hardware Business Continuity Windows 10 Managed IT Services IT Management Devices File Sharing Public Computer Gifts Upgrade Memory Telephone USB Black Market iPhone App Virtual Reality IT Service Troubleshooting Apple Unsupported Software Employee-Employer Relationship VPN Adobe Wireless Internet Identity Robot Webinar Business Management Remote Computing Legislation Workers MSP Google Assistant Networking Work/Life Balance Scalability BYOD Retail Network Security Windows Automation Analysis Gadgets Artificial Intelligence Data Theft Worker Commute Nanotechnology CrashOverride Colocation Communications Bluetooth Edge Risk Management Downtime Emergency Virtual Assistant Identity Theft Cloud Computing Office 365 Settings Passwords Wireless Technology Sports Management Specifications Software Ransomware PDF Government Spam Remote Monitoring Public Cloud Wasting Money Relocation Video Games Battery History Device Security Cybersecurity Phishing Payroll Internet Exlporer Managing Stress Customer Virus Data Loss Productivity Television Phone System Testing Politics Best Practices Cortana Microsoft Word Hyperlink Mobility Computers Proactive Alexa for Business Printing Entertainment Windows 10 Smart Technology Data storage Content Filter Chrome Safety BDR Mobile Security How To Internet Users Patch Management Social Media Amazon Scam Meetings Content Filtering App store Avoiding Downtime Operating System Microsoft Office Privacy Maintenance Data Privacy Remote Workers Managed IT Service Camera Shortcut Applications User Tips Chromebook Hybrid Cloud Miscellaneous Quick Tips Mobile Device Licensing Wireless The Internet of Things Mobile Devices Worker Upgrades Wasting Time Saving Money Electronic Medical Records Small Business Facebook Fraud Identities Techology Managed IT Evernote Travel Technology Android PowerPoint Managed Service Smart Tech Antivirus Information Technology Financial Samsung Monitor Computer Shadow IT Keyboard Emails Humor Outsourced IT Instant Messaging Loyalty Data Recovery Monitoring Security Two Factor Authentication Smartphone Spyware Co-Managed Services Congratulations SaaS User Error Vulnerability VoIP Internet exploMicrosoft NFL Laptop Money Connectivity Professional Services End of Support Cloud Windows 10s Law Enforcement FAQ Data Storage Cleaning Computing Infrastructure Training Monitors Books Employer Employee Relationship Computer Forensics Holiday Hosted Solutions Update Mobile Device Management How to Hosted Solution Commerce Productivity Apps Updates Hard Drive Financial Technology Data Protection Sync Transportation Tech Support Websites Employer-Employee Relationship Language Two-factor Authentication Content Workplace Tips Disaster Recovery Cost Management Business Computing hacker Communication Managed Service Provider Screen Mirroring Access Control Wireless Charging Information Bring Your Own Device Office Tips Chromecast Legal Best Practice Charger HBO WIndows Server 2008 Office Administration HIPAA Unified Communications Email Windows Ink Business Owner Peripheral Google Reputation Social Engineering Hard Disk Drive