Scammers Archives – Gridinsoft Blog https://gridinsoft.com/blogs/tag/scammers/ Welcome to the Gridinsoft Blog, where we share posts about security solutions to keep you, your family and business safe. Wed, 12 Apr 2023 04:01:58 +0000 en-US hourly 1 https://wordpress.org/?v=95884 200474804 Nine Web Scammers Arrested by Dutch Police in a Europol Operation https://gridinsoft.com/blogs/belgian-operation-scammers/ https://gridinsoft.com/blogs/belgian-operation-scammers/#respond Thu, 23 Jun 2022 12:12:46 +0000 https://gridinsoft.com/blogs/?p=8799 Nine Internet scammers arrested in the Netherlands during Dutch-Belgian joint operation Belgium and the Netherlands have conducted a Europol-supported operation to neutralize a group of cybercriminals. Malefactors made millions of euros with phishing and other fraudulent schemes. The operation was carried out by Belgium and Netherlands police with the support of Europol. The Dutch police… Continue reading Nine Web Scammers Arrested by Dutch Police in a Europol Operation

The post Nine Web Scammers Arrested by Dutch Police in a Europol Operation appeared first on Gridinsoft Blog.

]]>
Nine Internet scammers arrested in the Netherlands during Dutch-Belgian joint operation

Belgium and the Netherlands have conducted a Europol-supported operation to neutralize a group of cybercriminals. Malefactors made millions of euros with phishing and other fraudulent schemes.

The operation was carried out by Belgium and Netherlands police with the support of Europol. The Dutch police have arrested nine people aged between 25 and 36, eight men and a woman. The authorities have also searched 24 houses throughout the country.

The police have confiscated firearms, electronic devices, jewelry, and cryptocurrency from the suspects. The Belgian authorities initially started the investigation, so the individuals arrested in the Netherlands will be extradited to Belgium.

According to the police evidence, the suspects did phishing and other Internet scams that allowed them to make millions of euros. Cybercriminals sent emails, text messages, and WhatsApp messages to their victims. The SMS and letters contained a link to a spoofed bank website made for collecting users’ credentials. After getting these data, the crooks gained access to their victims’ bank accounts.

Europol report states that the frauds used mules to transfer and cash out funds from the victim’s accounts. The gang members have also turned out to be connected to illegal firearms and drug trafficking.

The post Nine Web Scammers Arrested by Dutch Police in a Europol Operation appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/belgian-operation-scammers/feed/ 0 8799
Around 2000 People Arrested by Interpol for Internet Scams https://gridinsoft.com/blogs/interpol-operation-first-light/ https://gridinsoft.com/blogs/interpol-operation-first-light/#respond Thu, 16 Jun 2022 19:29:40 +0000 https://gridinsoft.com/blogs/?p=8614 Operation “First Light” The war on cybercrime goes on. As its next round unwinds in 2022, Interpol arrests hundreds of Internet-fraud-related suspects within two months. The operation in question got dubbed First Light and concentrated on raiding illegal call centers in different countries, with the seized funds amounting to $50 million in assets. These offices… Continue reading Around 2000 People Arrested by Interpol for Internet Scams

The post Around 2000 People Arrested by Interpol for Internet Scams appeared first on Gridinsoft Blog.

]]>
Operation “First Light”

The war on cybercrime goes on. As its next round unwinds in 2022, Interpol arrests hundreds of Internet-fraud-related suspects within two months.

The operation in question got dubbed First Light and concentrated on raiding illegal call centers in different countries, with the seized funds amounting to $50 million in assets. These offices were bases and control centers for a series of socially engineered fraudulent activities on the Internet via email and phone, including date scams.

Police of Singapore have raided money launderers and scammers performing flagrant staged kidnappings. The most bizarre case was an interrupted fraud involving a minor victim already lured into playing kidnapped and fake being beaten. The €1.5 million ransom was ready to be paid, but luckily law enforcement agents were there on time. They managed not only to prevent this transaction but also to arrest about 4,000 bank accounts used to service fraudulent operations.

Another suspect was a Chinese citizen captured in Papua New Guinea. He is believed to be a leader of a gang that fished up to €34 million out of 24 thousand victims of their Ponzi scheme. The suspect is repatriated for trial.

The scams like these are conducted in vast numbers and are highly difficult to track because their authors and victims reside in different countries and the schemes of the crooks are ever-changing. The First Light operation lasted two months and involved police activities in 76 countries.

Rory Corcoran, the head of Interpol’s financial crime division, has noted that the nature of such crimes requires cooperation among many nations’ law enforcement agencies. The First Light operation has proved the effectiveness of such an approach as authorities from all the countries that took part in the procedure shared information on questionable financial transactions, phone numbers, scam websites, IP addresses, etc. The juxtaposition of the gathered materials eventually allowed to carry out a coordinated across-the-world operation.

The post Around 2000 People Arrested by Interpol for Internet Scams appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/interpol-operation-first-light/feed/ 0 8614
Beware: New SpaceX Bitcoin Giveaway Scam https://gridinsoft.com/blogs/spacex-bitcoin-scam/ https://gridinsoft.com/blogs/spacex-bitcoin-scam/#respond Thu, 09 Jun 2022 19:36:52 +0000 https://gridinsoft.com/blogs/?p=8419 Crooks Make Elon Musk a Bait for Wannabe Cryptotraders Scammers again use SpaceX as a bait in fraudulent schemes. The statements of Elon Musk, CEO of the company, have been watched for a long time, and as soon as he says something about cryptocurrency, this immediately gives rise to a lot of food for fraudulent… Continue reading Beware: New SpaceX Bitcoin Giveaway Scam

The post Beware: New SpaceX Bitcoin Giveaway Scam appeared first on Gridinsoft Blog.

]]>
Crooks Make Elon Musk a Bait for Wannabe Cryptotraders

Scammers again use SpaceX as a bait in fraudulent schemes. The statements of Elon Musk, CEO of the company, have been watched for a long time, and as soon as he says something about cryptocurrency, this immediately gives rise to a lot of food for fraudulent schemes. Some scammers make expensive fakes, while others make do with little. Before the story of DeepFake Elon telling how to invest in the BitVex cryptocurrency platform had died down, a low-end legend of the same type had already appeared.

This time we are talking about the fake site spacex-btc[.]org. This site pretends to be SpaceX’s dedicated platform for some kind of cryptocurrency giveaway that should help people make money by trading on cryptocurrency price fluctuations. This website may be redirected to by banner ads from apparently not the most reliable websites.

So, first of all, let’s say it: it’s a FAKE.

And don’t be fooled by the fact that this website has an SSL certificate. Do not look at HTTPS in the line, but the very name of the site: spacex-btc. Yes, and with TLD org. This site is a pure spoof because this cowboy office has no connection with the authentic SpaceX website or company.

The site has a decent design, but it’s still not stylish enough for a company like SpaceX. If you look for flaws, you can immediately notice grammatical errors in the fake quote of Musk himself and the terrible layout of the page.

There is a chat button in the corner of the window. Of course, everything connected to luring money is performed perfectly in such offices. You can probably talk to them, and they probably have a call center. But don’t let that fool you. It may seem that no one will find it profitable to create an entire call center to ensure the credibility of a single fake page. But we must remember that the companies behind such scams work with many schemes at once, giving rise to deception on an industrial scale.

These websites have only one purpose – to get money from you. In 99.99% of cases, Forex-like deals in cryptocurrency that these companies advertise are done through the mediator, so you don’t even see your purchased cryptocurrency. Then a psychological game starts: the trading can be random at best. However, in the worst cases, scammers totally control the process. They can make their victims feel lucky and lure more and more money out of them.

Don’t buy into famous faces in advertising campaigns. If you are told that Elon Musk is launching his cryptocurrency or something like that, first check in the news if this is true.

The post Beware: New SpaceX Bitcoin Giveaway Scam appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/spacex-bitcoin-scam/feed/ 0 8419
Three Online Scammers Arrested in Nigeria in an Interpol’s Operation https://gridinsoft.com/blogs/online-frauds-arrest-nigeria/ https://gridinsoft.com/blogs/online-frauds-arrest-nigeria/#respond Wed, 01 Jun 2022 18:37:48 +0000 https://gridinsoft.com/blogs/?p=8239 North Africa, Southeast Asia, and Middle East oil and gas companies became cyberfraud victims. Interpol arrested three citizens of Nigeria in the country’s capital city Lagos as a part of an international operation dubbed Killer Bee. The men were suspected of using Agent Tesla remote administration tools (RAT) to redirect financial operations and corporate classified… Continue reading Three Online Scammers Arrested in Nigeria in an Interpol’s Operation

The post Three Online Scammers Arrested in Nigeria in an Interpol’s Operation appeared first on Gridinsoft Blog.

]]>
North Africa, Southeast Asia, and Middle East oil and gas companies became cyberfraud victims.

Interpol arrested three citizens of Nigeria in the country’s capital city Lagos as a part of an international operation dubbed Killer Bee. The men were suspected of using Agent Tesla remote administration tools (RAT) to redirect financial operations and corporate classified data theft. The search showed that the suspects had fake documents, including invoices and official letters.

Agent Tesla showed up for the first time in 2014. It is an extremely popular RAT-Trojan used for credential stealing, keylogging, clipboard data obtaining, and collecting other information from the victims. Cybercriminal syndicates and stand-alone hackers use Agent Tesla widely because of its stability, flexibility, and broad functionality.

The headquarters of the General Secretariat and the National central bureau of Interpol, together with law-enforcement agencies in 11 South Asian countries, took part in the Killer Bee operation.

Three Suspects of Killer Bee
The three suspects. Omorume below.
Photo: INTERPOL

Hendrix Omorume – one of the three suspects has already been charged and convicted for three episodes of financial fraud, and he faces a year in jail. The two other Nigerians are now under trial.

“Through its global police network and constant monitoring of cyberspace, Interpol had the globally sourced intelligence needed to alert Nigeria to a serious security threat where millions could have been lost without swift police action,” – Craig Jones, the Interpol’s Director of Cybercrime stated. He added: “Further arrests and prosecutions are foreseen worldwide as intelligence continues to come in and investigations unfold.”

The post Three Online Scammers Arrested in Nigeria in an Interpol’s Operation appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/online-frauds-arrest-nigeria/feed/ 0 8239
What is Scareware and How Not to Buy Into It? https://gridinsoft.com/blogs/what-is-scareware/ https://gridinsoft.com/blogs/what-is-scareware/#respond Thu, 05 May 2022 18:50:38 +0000 https://gridinsoft.com/blogs/?p=7733 Scareware is a widespread Internet fraud scheme that intimidates victims into buying unnecessary or harmful software taking advantage of their ignorance. Scareware usually exploits fears of having a computer virus on a machine and persuades users to purchase fake security software. Here we’ll regard how this spoof works and how not to get fooled by… Continue reading What is Scareware and How Not to Buy Into It?

The post What is Scareware and How Not to Buy Into It? appeared first on Gridinsoft Blog.

]]>
Scareware is a widespread Internet fraud scheme that intimidates victims into buying unnecessary or harmful software taking advantage of their ignorance. Scareware usually exploits fears of having a computer virus on a machine and persuades users to purchase fake security software. Here we’ll regard how this spoof works and how not to get fooled by it. Among other things, we’ll touch on threats associated with scareware.

What is Scareware?

Scareware is a scam that plays on fears of inexperienced users. Although computer viruses are an obsolete type of malware, and you will hardly catch one nowadays even if you try, they remain a horror story for people. And the least you know about a threat, the easier it can scare you.

Both trustworthy and scam security products are promoted via advertising. An advertisement of a good solution will respect the customer and make stress on qualities and features of the promoted program. In the worst case – it will explain that there are many threats out there on the Web, and each endpoint needs protection. The scareware, on the contrary, will try convincing you that your computer is already infected with malware. Moreover, pushy ads will insist on immediate installation of the program they represent, as if it were a last chance to cure your pc.

Scareware banner
An example of a flashing scareware pop-up banner.

The profitability of the scheme is understandable. People get scared, buy the program and feel like the defenders of their computer system. Perhaps later, the apprehension will come that they just threw away their money, but they will no longer be able to get it back. There are usually many victims of such deception, and that is the very thing on which the scam relies.

Sadly, losing money is not the worst thing that can happen. Sometimes such malvertising used as a filter: whoever bought into this definitely does not have an actual antivirus. Accordingly, those agents who do business on the distribution of adware and malware can safely install a bunch of harmful programs on the victim’s device.

How Scareware Works

It all starts with a person suddenly seeing an advertising banner on some website. The banner itself looks like an automatic notification. Novice users may not even understand that they are dealing with an advertisement.

The message usually says that a scan of the user’s computer was carried out, which found infection with dangerous malware. Already here, a knowledgeable person could have laughed because not only is it impossible to scan the device so quickly, but it would also be problematic to do it remotely without preliminary procedures.

But charlatans deal with inexperienced people and therefore continue their psychological attack. The banners usually include very serious-looking malware names, tables, codes, etc. The more serious the picture looks, the stronger the effect. In all its appearance, the message tries to appear automatic. You can see, for example, this caption: “threat level: high,” as if the same plate could give out a reassuring “low.”

Scareware fake scan results
Scareware often renders fake scan results with frightening namedropping.

Such schemes are generally built on a series of psychological techniques. Intimidation is only the first of them. The use of colors plays with the victim’s emotions. Red stands for anything related to threats. As soon as the “rescue” program enters the scene, a soothing blue or green color appears. This feeling of possible safety encourages the user to make a purchase. In addition, the price is low. Most scareware schemes rely on the possibility of quick payments combined with a vast number of buyers.

Alternative Scams

There may be more time-consuming schemes for the crooks. For example, they might launch a massive campaign offering free device scans. To take one, the user must first download the software, the functionality of which will be limited until the program is purchased. So that this payment is still made, the scan will produce frightening results. This approach counts on more educated users.

By the way, the scope of scareware is not limited to the security sector. You can imagine other types of scareware, such as cleaners, that will scare users by saying: “look, a little more, and your system will get so clogged with the garbage that the device will start freezing.” The advertised program will be able to delete unused applications, temporary files, etc.

The programs in question can remain completely fake without an iota of the promised functionality. All “treatment” of the device, just like the initial intimidation, can be just a visual effect.

What are The Threats?

Theoretically, the victim of scareware could get lucky, and the only problem would be the wasted money. But more often than not, a deceptive program will leave an unpleasant payload behind. Its severity may vary. In fact, it corresponds to the degree of danger from the unwanted or overtly malicious software that scareware can fetch onto the victim’s computer. In most cases, installing a scareware application will decrease the PC’s running speed. We’ll be coming from the guess that scareware developers want understandable profit from their victims, not reduced to the price of the application.

This goal implies infecting the device with either of the malware types:

  • Adware is a class of relatively harmless unwanted applications. They flood users with ad banners, modify browsers’ settings, add ad links on webpages, etc.
  • Spyware is a more significant threat. Hidden software collects information about the system and the user’s activity to send it to people who can commercially benefit from having it. o
  • Miners are the programs that steal computing resources of the victim’s machine and throw them at mining cryptocurrency (for somebody else, of course.) The injured side will also be surprised by the electricity consumption rate.
  • Cybercriminals can add the infected device to the botnet, a controlled network, to perform certain activities on the web unbeknownst to the user.
  • Ransomware is probably the worst case. This malware encodes all data files on the victim’s computer, and the only chance to get them back is to buy a key from the racketeers.

Criminals can drop many other types of malware into the unaware victim’s system. However, those are more suitable for targeted attacks and require hackers’ special attention. The malware mentioned above can work and bring profit automatically.

How not to be fooled by scareware?

  • Install an actual security system. GridinSoft Anti-Malware is one of the best solutions on the market due to the combination of technical efficiency and cost-effectiveness. Its virus libraries are regularly updated so that whichever malware becomes recognized in the world, Anti-Malware will know how to deal with it. The program can perform a deep scanning, work in on-run protection mode, and be a security measure for safe Internet browsing.
  • Know right before you get scammed. The scareware schemes work only because of people’s ignorance. You don’t need to be a hacker or even an advanced user. Just take a simple course on Internet surfing from someone more experienced in it.
  • Don’t visit dubious websites and avoid clicking on ad banners whatsoever. You can hardly encounter malicious advertising, which scareware surely is, on trustworthy websites like Google, Youtube or Facebook. It’s not that you should limit your surfing to these three sites, but they can serve as an example of a trustworthy website appearance. As soon as you see ad banners popping up all around you, flashing and glaring, proceed with great caution if you need to.
  • Install ad-blocking software. It goes as an extension to your browser that blocks advertising banners from rendering. It might save you a lot of nerve cells.
  • If you happen to buy a scareware product, make sure you remove it as you usually remove an application. In Windows, pressStart > Settings > Apps > Apps & FeaturesChoose the app you want to remove, and then select Uninstall. After removing the scareware, carry out an antivirus scan to get rid of any accompanying malware.

The post What is Scareware and How Not to Buy Into It? appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/what-is-scareware/feed/ 0 7733
Pornographic virus alert from Microsoft https://gridinsoft.com/blogs/pornographic-virus-alert-from-microsoft/ https://gridinsoft.com/blogs/pornographic-virus-alert-from-microsoft/#respond Thu, 27 Jan 2022 13:11:10 +0000 https://blog.gridinsoft.com/?p=5212 Microsoft shows you the banner which states that your PC is infected with a “Pornographic virus”? It seems that someone wants to involve you in a popular online tech support scam, called “Pornographic virus alert from Microsoft”. But how can they do it with a single banner? That article will show you the whole mechanism… Continue reading Pornographic virus alert from Microsoft

The post Pornographic virus alert from Microsoft appeared first on Gridinsoft Blog.

]]>
Microsoft shows you the banner which states that your PC is infected with a “Pornographic virus”? It seems that someone wants to involve you in a popular online tech support scam1, called “Pornographic virus alert from Microsoft”. But how can they do it with a single banner? That article will show you the whole mechanism and will also explain why this notification appears so obsessively.

Pornographic virus alert from Microsoft: how it works and why is it malicious?

Once upon a time, after opening the browser, you may see the banner which says that your PC is infected with awful viruses. As you can suppose by the name of this alert, it also states that this virus got on your PC from pornographic websites. To eliminate this malware, “Microsoft” offers you to contact their support by the number they specified in the text. As they assure you, you cannot fix your computer without calling support. And here is the first suspicious element – times when the viruses may get into the PC exactly after opening the website are gone. It was possible at the beginning of the ’00s when the browsers were raw and had a huge amount of vulnerabilities. One of these security breaches allowed to start of file downloads and installations without the user allowance. But hold on, here are more interesting moments.

Pornographic virus alert from Microsoft banner
The appearance of pornographic virus alert from Microsoft banner

Calling the support as a sign of the malevolency of this banner

First thing is the number this banner offers as an official Microsoft helpline to reactivate your Windows. It is completely different from the one which is published on the Microsoft website. When you call this number, you will hear a “support” that will offer you to grant him remote access to your PC. Sometimes, such action is needed – when some of the program components are working wrong on the specific PC configuration. But when we are talking about the viruses, which are already detected (as the banner says), the need for a remote connection to your PC is very questionable.

Finally, things are getting really ridiculous. The support checks your PC and then says that you really have a lot of viruses. To remove them, you need to install a perfect solution they can offer you only today – an unknown (or low-trusted) antivirus. They can send you a link or even install it themselves, using the remote control. Installing the unknown software was never a pleasant experience. And all these strange moments surely show that this thing is not one you can trust. Usually, the program this “support” offers you is an example of typical scareware. This sort of program mimics the antivirus app and shows you tons of false detections.

The total possible danger of pornographic virus alert from Microsoft

Let’s count. The first danger the user carries is remote access. The user who gets the ability to manage your PC can do everything literally – delete your files, modify your settings, install any programs from any sources – he is a king now. Granting remote access must always be well-weighted because of the dangers it carries. Nonetheless, a lot of users ignore that security rule and give access to anyone who offers help.

Pornographic virus alert from Microsoft

Moving on. Scareware may look like a considerably non-dangerous but annoying app. But let this app stay active in your system for about 30 minutes, and you will not be able to use the PC as usual. Because of its malevolent nature, this unwanted program randomly blocks the elements of important applications. Hence, you can’t use the program as usual. To remove these “malicious and vulnerable items”, you need to purchase the full version of this pseudo-antivirus. Moreover, you can’t uninstall a program as usual – through the application list. Manual removal or antimalware software usage is the only option.

Scareware blocked the Photoshop
Typical example of scareware – SAntivirus – blocked the Photoshop

Danger #0. Source malware.

And the last one, which must be the first. I have missed mentioning the initiator of that event – adware. The pornographic virus alert from Microsoft cannot appear independently on your PC. Access to this page will just be blocked by the web browser you use. So, it is quite easy to conclude that something changed your browser configuration and networking settings to show you this banner every time you open your web browser. Adware is a kind of virus that usually does the same, that’s why I supposed it’s present. The way you get this virus on your PC may be different, and you can read the removal guide in that post. Fortunately, the adware can easily be removed with anti-malware software.

The thing you can do to get rid of the banner at the moment is to close the browser window or reboot the PC. Radical ways, but pretty effective against this sort of scam. Usually, that banner does not have any “close” buttons at the top right corner. Don’t worry – the notifications that “Microsoft locked this computer” are 100% lies. Still, neither viruses nor companies can block the computer through the Chrome browser. To prevent the browser appearance it is better to avoid using dubious sites. Things like torrent trackers or sites for YouTube videos downloading may redirect you to other pages, and this nasty thing is just among them.

The post Pornographic virus alert from Microsoft appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/pornographic-virus-alert-from-microsoft/feed/ 0 5212
Scammers distribute fake Windows 11 installers https://gridinsoft.com/blogs/scammers-distribute-fake-windows-11-installers/ https://gridinsoft.com/blogs/scammers-distribute-fake-windows-11-installers/#respond Mon, 26 Jul 2021 16:24:44 +0000 https://blog.gridinsoft.com/?p=5740 Fraudsters explore curiosity about the release of Windows 11 to distribute fake OS installers stuffed with malware, adware and other threats, Kaspersky Lab reports. Despite the fact that the process of downloading and installing Windows 11 from the official Microsoft website is very simple and straightforward, the researchers say that many are still trying to… Continue reading Scammers distribute fake Windows 11 installers

The post Scammers distribute fake Windows 11 installers appeared first on Gridinsoft Blog.

]]>
Fraudsters explore curiosity about the release of Windows 11 to distribute fake OS installers stuffed with malware, adware and other threats, Kaspersky Lab reports.

Despite the fact that the process of downloading and installing Windows 11 from the official Microsoft website is very simple and straightforward, the researchers say that many are still trying to download the new OS from third-party sources, and cybercriminals are happy to offer such people their “services”.

Hiding behind Windows 11, cybercriminals most often distribute malware downloaders designed to deliver other malware to victims’ computers.

Also, Microsoft’s new SO is used to directly distribute other payloads, ranging from adware (which in most cases is considered harmless) to much more dangerous Trojans, malware to steal passwords, and so on.the researchers write.

For example, scammers distribute a certain executable file called 86307_windows 11 build 21996.1 x64 + activator.exe, which weighs as much as 1.75 GB, so that it seems to the user that the operating system can really have such a volume. In fact, the bulk of this volume is occupied by a certain file with the extension .dll, which contains a lot of useless information that is not used in any way during the installation.

fake Windows 11 installers

If you open such an executable file, the installer will start, which looks like a normal installation wizard for Windows. Its main purpose is to download and run a second, more interesting file. It is also an installer, and it even has a license agreement, which says that along with the “download manager for 86307_windows 11 build 21996.1 x64 + activator”, a number of “sponsored programs” will be installed on the computer.

Researchers remind that currently Windows 11 is available only to members of the Windows Insider program, that is, to install it, you first need to register in this program.

You will also need a device with Windows 10 already installed. On that device, go to Settings, click on Updates and Security, and then select Windows Insider and activate the Dev Channel there to get an update to Windows 11.

Let me remind you that I also recently talked about the fact that Vulnerability in Windows 10 could allow gaining administrator privileges.

The post Scammers distribute fake Windows 11 installers appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/scammers-distribute-fake-windows-11-installers/feed/ 0 5740
Fake cryptocurrency giveaways on behalf of Elon Musk brought scammers $580,000 https://gridinsoft.com/blogs/fake-cryptocurrency-giveaways-on-behalf-of-elon-musk-brought-scammers-580000/ https://gridinsoft.com/blogs/fake-cryptocurrency-giveaways-on-behalf-of-elon-musk-brought-scammers-580000/#respond Fri, 15 Jan 2021 16:26:10 +0000 https://blog.gridinsoft.com/?p=4990 The media have repeatedly written that scammers sometimes impersonate famous people. For example, last year, cybercriminals arranged fake giveaways of cryptocurrency on behalf of Elon Musk or SpaceX that had hard consequences for naive users. In particular, criminals are very fond of conducting fake distributions of cryptocurrencies on social networks on behalf of Mask, promising… Continue reading Fake cryptocurrency giveaways on behalf of Elon Musk brought scammers $580,000

The post Fake cryptocurrency giveaways on behalf of Elon Musk brought scammers $580,000 appeared first on Gridinsoft Blog.

]]>
The media have repeatedly written that scammers sometimes impersonate famous people. For example, last year, cybercriminals arranged fake giveaways of cryptocurrency on behalf of Elon Musk or SpaceX that had hard consequences for naive users.

In particular, criminals are very fond of conducting fake distributions of cryptocurrencies on social networks on behalf of Mask, promising users huge profits, if they first send them some bitcoins.

For example, in 2018, such Twitter action brought scammers over $180,000 in just one day.

Although years are passing, and many famous people have got check marks for account verification and even unambiguous postscripts in the spirit of “I don’t distribute cryptocurrency!”, Many users still believe in such fakes, and assume that Elon Musk, the Winklevoss brothers, Bill Gates and other famous personalities can indeed give out bitcoins to everyone.say Bleeping Computer journalists.

This statement is confirmed by their fresh material in Bleeping Computer, in which journalists report that such activity has become more frequent again, and the scammers have already managed to make good money.

The spike in fraudulent activity on Twitter was highlighted by a MalwareHunterTeam researcher. He said that more and more verified accounts are hacked, and then hackers use them to promote another fake distribution of cryptocurrency on behalf of Elon Musk.

Examples of such scams can be seen on the screenshots below.

cryptocurrency giveaways of Elon Musk

Typically, these tweets contain links that redirect victims to Medium, where the article advertises a fake bitcoin giveaway. The scheme is still simple: users are asked to send a certain amount of cryptocurrency, promising to return the already doubled amount back.

MalwareHunterTeam and BleepingComputer report that most of the accounts compromised during this scam have been inactive for a long time.

Investigators also remind that last year, after a large-scale attack, Twitter abandoned the versioning of accounts, and now such accounts are in even greater demand among cybercriminals, and a real hunt for inactive accounts is under way.

According to BleepingComputer and MetaMask, the scammers receive more than $580,000 in Bitcoin per week. At the same time, the fraud with the distribution of Etherium did not bring such success, and the criminals “earned” only $2,700 on it.

Let me remind you that Elon Musk confirmed that the Russian offered a Tesla employee a million dollars for hacking the company.

The post Fake cryptocurrency giveaways on behalf of Elon Musk brought scammers $580,000 appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/fake-cryptocurrency-giveaways-on-behalf-of-elon-musk-brought-scammers-580000/feed/ 0 4990
Who stands behind cyberattacks? Top 5 types of attackers https://gridinsoft.com/blogs/who-stands-behind-cyberattacks-top-5-types-of-attackers/ https://gridinsoft.com/blogs/who-stands-behind-cyberattacks-top-5-types-of-attackers/#respond Fri, 17 Aug 2018 09:34:37 +0000 https://blog.gridinsoft.com/?p=2940 When accessing the internet, we are often introduced to seemingly wonderful websites, which we think would assist us with our internet surfing, and we often fall into the trap of thinking that these websites are save to use. In addition to that, it is advisable to us to install a number of web applications to… Continue reading Who stands behind cyberattacks? Top 5 types of attackers

The post Who stands behind cyberattacks? Top 5 types of attackers appeared first on Gridinsoft Blog.

]]>
When accessing the internet, we are often introduced to seemingly wonderful websites, which we think would assist us with our internet surfing, and we often fall into the trap of thinking that these websites are save to use. In addition to that, it is advisable to us to install a number of web applications to our computers to meet a number of certain requirements; however, a majority of these web applications and websites are responsible for making our computers and networking system susceptible to cyber-attacks, which could be detrimental to the integrity of our computer systems.

So, who initiates cyber-attacks? Cybercriminals, alternatively known as, cyber hackers, are responsible for hacking into your computer systems for the purpose of stealing or destroying information, which could benefit them. They latch onto vulnerable web applications, which makes it easy for them to install a malware virus to your computer system. Committing a cyber-crime is a federal offense, which warrants the arrest of the cyber-criminal by the authorities.

The occurrence of cyber-attacks has provoked the data security professionals to take initiatives to trace the location of the cyber-attacker, and they work with a team of security to warrant the arrest of the cyber-criminal. A cyber-attacker could be responsible for navigating high-classified or regular data; however, a number of proactive measurements should be taken against the cyber-attacker to reduce the probability of a cybercrime. We have compiled a list of the top five types of attackers, who are responsible for hacking your computer’s systems and database for stealing data and classified information:

Scammers:

Scammers are the most common type of cybercriminals. They are responsible for sending discount codes and lucrative offers to your email box, which sets as a trap to hack your network system. You will often find a banner claiming to earn you a million dollars overnight, and a number of people are naïve enough to click on, which alleviates the strength of their security networks to help the hacker maneuver into your computer systems.

Script Kiddie:

As depicted by its name, script kiddies are juvenile cyber-criminals, and they use an alternative approach to hack your computer systems. They generally copy a code, which is later converted into a SQL virus. In other terms, a script kiddie is not vastly familiar with using malware to hack into your computer system; instead, they resort to using existing codes to hack into your computers. If a script kiddie hacker was familiar with the tools to hack into computer systems, it would categorize him as a ‘Green Hat’ hacker.

White Hat

The white hat hackers are alternatively known as ethical hackers, and they are more focused on benefiting the user of a networking system. They play a contributing role in helping you remove viruses and perform pen tests to help people understand the vulnerabilities in their computer systems. A majority of the white hat hackers are responsible for asking security-related questions, and they are required to pursue a qualification in CREST Certified Infrastructure Tester, CREST Certified Application Security Tester, and Offensive Security Certified Professional (OSCP) to become white hat hackers.

Pishers:

Pishers are more likely to trick you into submitting your personal information to hack your computer systems. They often send you a link to fraudulent websites, which makes it easier for them to hack into your computer and networking systems. You should refrain from opening such scam links, and you should instantly report the incident to a cyber-security authority to avoid the occurrence of any illicit activity.

Insiders:

Insiders are considered to be the most dangerous types of hackers as they are responsible for facilitating 20% of the threat, which results in nearly 80% of the damage. As suggested by their name, they often work within an organization, and they use their expertise in hacking to hack the systems of the organization to acquire classified and financial information about the business. The insiders are also responsible for hacking into the classified information of a business’s competitors.

The post Who stands behind cyberattacks? Top 5 types of attackers appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/who-stands-behind-cyberattacks-top-5-types-of-attackers/feed/ 0 2940
Microsoft Tech Support Scam Affiliate Program https://gridinsoft.com/blogs/microsoft-tech-support-scam-affiliate-program/ https://gridinsoft.com/blogs/microsoft-tech-support-scam-affiliate-program/#respond Wed, 01 Mar 2017 14:16:08 +0000 https://blog.gridinsoft.com/?p=119 The new sector of cyber attacks has become popular nowadays. In the guise of Microsoft Technical Support (Microsoft Tech Support Scam). Scammers try to force Internet users into making a call on an alleged toll-free phone number. Of course, this number isn’t free indeed, and the fraudsters gain money from each call. Due to many… Continue reading Microsoft Tech Support Scam Affiliate Program

The post Microsoft Tech Support Scam Affiliate Program appeared first on Gridinsoft Blog.

]]>
The new sector of cyber attacks has become popular nowadays. In the guise of Microsoft Technical Support (Microsoft Tech Support Scam). Scammers try to force Internet users into making a call on an alleged toll-free phone number. Of course, this number isn’t free indeed, and the fraudsters gain money from each call.

Microsoft Tech Support scam
Tech Support Scam landing page example

Due to many of our users claims about such cyber attacks, we’ve decided to make a detailed investigation into this fraudulent scheme. In this post, we will give you the answers to the most frequently asked questions about Microsoft Tech Support scammers. Forewarned is forearmed! We hope that you will be attentive to the signs and take care of your safety while browsing. Don’t let scammers to manipulate on your fears!

How scammers scare people?

Hackers use similar methods to scare their victims, with their main goal being to gain profit. Fraudulent landings can toggle full-screen mode, lock the pressing of the main keys and stop the context menu launching. These scamming actions can be easily done by using the following javascript code:

Toggle the full-screen mode
Toggle the full-screen mode
context menu is blocked
Code using for menu blocking
locked keys
Locking the main keys

Amusingly, but the fraudsters even connect the Google Analytics to their malicious web pages!

scammers google analytics
Google Analytics on scammers landings

The horrible text messages are not the only thing which scammers are using to terrify their victims. There are also threatening voice notifications played. Usually, they are stored here:

* MALICIOUS_URL * / chrm / alert2.mp3

If you ever encounter one of these scare tactics, just keep calm and believe that there is no real danger, if you’re not calling the “free” phone number of the fake technical support team.

Scam-as-Service: how it works?

The landing pages, which our users were unhappy to see, are just the tip of the iceberg. Malware-as-Service has been thriving in the cybercrime world for a long time, and as for these new scam techniques, they should be called Scam-as-Service.

On a recently, discovered semi-private Russian underground forum exploit.in, we stumbled upon an affiliate program’s description:

scam support
Scam support affiliate program

English translation:

The private affiliate program of the tech support hires new publishers. Our landing page aggressively convinces people to call on your unique phone number (free), and you get a commission from each call. The standard rate is $ 4.5 per call. For the major partners with good quality and volume, the tariff is discussed individually.

  • Always provide clean landings and domains.
  • Accept all browsers for the Windows desktop.
  • Accepted countries: US, CA
  • All subjects are suitable, the main thing was that the traffic was alive.
  • Handy admin panel with the instant statistics of calls and conversion.
  • The ability to make multiple streams and their conversion’s comparison.

Conversion, as elsewhere, depends on the traffic’s quality. If the quality is good, the popunder and the redirect bring from 2 to 5 calls from 1k unique visitors. The search and scrap bring up to 30 calls from the 1k unique visitors, depending on the subject and the audience. You’ll get your payments every day or O/R – BTC. The usual working time is from 19:00 to 02:00. But, it’s highly recommended to ask the support if it has changed each time before delivering the traffic.

As you can see from the description, the scheme is quite simple: the creators of the affiliate program provide publishers with domains, admin panels with statistics, and payments through the BTC (which became the standard currency in the cyber underworld). Publishers should only send the traffic to the affiliate domains and wait for the profit.

Could Google eliminate this fraud?

Google can quickly defuse such aggressive scams by adding fraudulent landings to the Google Safe Browsing filters. But, the scammers do not give up easily. They register a large amount of similar domains with similar names (trying to allude Microsoft):

Popular malicious domain names
Scam domain list

So, bear in mind, that the lifetime of the separate scam pages is very short. They shouldn’t scare you at all.

What happened with those who made a call?

There is the same phone number for all scammers pages: +1-844-713-3460. We gathered the typical user complaints on this number:

A message popped up on my computer: ” Microsoft-error4113.xyz says: *** YOUR COMPUTER HAS BEEN BLOCKED *** “and went on to say that things were being stolen, including my photos. Threatens to disable my computer in five minutes. Then gave this number to call. SCAM !!!!! For so many reasons, starting with Microsoft all in lower case; the fact that the error is not sequential to other legit error messages; plus the threat, I started looking up the number …. on another reporting site, and a guy says his Mom made the mistake of calling and allowing them to remotely access her computer-they changed her passwords and high jacked it, demanding money to release it! BAD MOJO !!! =
Was on the computer. The number came through and said Critical Alert from Microsoft. I called the number back, and the gentleman wanted access to my computer to fix whatever the problem was. Threatened to shut down the computer if we did not call. We did not allow access. The error message attached to the number was Microsoft error 3111.xyz

As is clear from the users’ complaints, the scammers are trying to make the victim give them full access to the computer for further intimidation. You shouldn’t give access to your system to anyone unfamiliar with the web, especially if they insist on undertaking these suspicious actions themselves.

Conclusion:

Microsoft Tech Support scam – new widespread scheme in the cybercrime world. Scammers make money from the user’s fears by scaring people with the same simple techniques. Usually, keys are blocked, full-screen mode, and horrible audio messages. I hope we have convinced you that you shouldn’t be afraid and give hackers what they want. Such deceptive and primitive schemes don’t deserve your sponsorship!

The post Microsoft Tech Support Scam Affiliate Program appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/microsoft-tech-support-scam-affiliate-program/feed/ 0 119