MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is It A Good Idea To Bait A Phishing Scam?

Is It A Good Idea To Bait A Phishing Scam?

Phishing scams have had a supporting role in many of the latest cyber threats, often as the means the attacker has used to start off their attack. This attack vector is relatively easy to avoid in most cases, but requires education for the end user.

If you see these malicious emails in your inbox, you might be tempted to give the attacker a piece of your mind (or simply mess with them). We’ve all been there.

So, is it a good idea to antagonize a cybercriminal who was targeting you?

In a word, no.

There are plenty of professionals who have experimented with this very concept, for the academic purpose of finding out how a cybercriminal will react. One such researcher, Jerome Segura of Malwarebytes, played though a scam in its entirety. What he encountered was a mixture of apparent helpfulness in finding a cache of issues in his ‘device’ -- actually a virtual machine rigged to record attacks -- and a decidedly less helpful, unpleasant tone.

A  ‘technician’ had Segura check his Microsoft Error reports, warning him that each and every error and warning he sees is a major problem that had already begun to corrupt his system. To reinforce the need for a ‘solution,’ Segura was told that his software warranty had expired and, once transferred to another ‘representative,’ that he needed to pay for a $299 renewal.

Instead of paying, Segura supplied incorrect payment credentials, knowing they would be rejected. Once they were, his computer was suddenly seized. The ‘technician’ deleted all of his files as well as the Ethernet adapter driver, and calling Segura a rude word before disconnecting.

This is a fairly tame account of what this sort of cybercriminal can do. A wildlife photographer named Jakob Dulisse received a call to his home in Nelson, British Columbia, Canada from “Windows Technical Support” in Los Angeles, California. Quickly deducing that this was an attempt to scam him, Dulisse played along at first, before calling the voice on the other end of the line, “a scammer, a thief, and a bad person.”

The scammer/thief/bad person did not react well, stating that their group had people in Canada that would kill Dulisse, going so far as to describe himself as a killer and referencing that people in his region cut people into pieces and rid themselves of them in the river.

Other professionals have simply found remote access software installed without their consent as they have ‘played along’ with scammers.

However, these are professionals, whose job it is to identify and publicize the attacks that cybercriminals are resorting to. As for the business user, their best bet is to report the attempt to the local authorities, as well as your managed service provider.

A managed service provider can help you ensure that you are both secured against, and well-versed, in the latest cyberattacks. Give MERIT Solutions a call at (757) 420-5150 to get started. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 March 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Business Computing Hackers Network Security Malware Software Internet Hosted Solutions Backup Business Management Managed IT Services google Productivity Computer Microsoft Disaster Recovery Business Continuity Business IT Support communications Mobile Devices VoIP Outsourced IT User Tips Windows 10 IT Services Email Productivity Hardware Innovation Cybercrime Efficiency Mobility Mobile Device Management Windows Managed IT Server Small Business Data Backup Ransomware Apps Cybersecurity Smartphone browser Internet of Things Save Money Operating System Data Recovery Saving Money Telephone Systems Law Enforcement Hosted Solution Quick Tips Passwords Android Virtualization BDR Data Security Money Information Technology Chrome Office 365 Recovery VPN Phishing Microsoft Office BYOD Data Password Holiday Miscellaneous Managed Service Provider Computers Work/Life Balance Social Wi-Fi upgrade Best Practice Social Media IT Support App Communication Budget Smartphones Data Management Facebook Vulnerability Government Wireless Google Drive Update Hacking Risk Management Avoiding Downtime Unsupported Software Automation Gadgets Alert Cloud Computing Health Flexibility Shortcut Office tips Applications Social Engineering Private Cloud History Firewall Proactive IT Application Collaboration Antivirus search Current Events The Internet of Things Audit Personal Information Windows 10 User Error Politics Two-factor Authentication Spam USB Save Time Managed IT Services Wireless Technology Data Breach Telephony Workplace Tips Identity Theft Artificial Intelligence Data Loss Blockchain Marketing Robot Television Google Docs Cost Management Remote Computing Streaming Media Apple End of Support Data Protection SaaS WiFi Samsung Redundancy Content Filtering Going Green Bandwidth Battery Commerce HaaS Humor Disaster Fraud eWaste Tech Term Compliance Employer-Employee Relationship Cortana Patch Management Automobile Network Sports Tech Support Saving Time Project Management Cleaning Excel Hacker Gmail Internet Exlporer Office Solid State Drive Phone System Data Storage Computer Care OneNote Legal IT solutions Users Encryption iPhone Mobile Computing DDoS Transportation Settings Text Messaging Computer Accessories Maintenance Worker Commute Exchange Retail Big Data altivista Mobile Device Distributed Denial of Service Updates Licensing Managing Stress WannaCry Device Security SBS Conferencing Identities Books compaq HBO Scalability Webinar Microsoft Word Hiring/Firing Mobile Education Router Laptop Uninterrupted Power Supply Vendor Management Wearable Technology Microsoft Excel Devices Gifts IoT hp How To IT solutions Benefits Professional Services Touchpad File Sharing Spyware domain Language IT Management Windows 10s Reputation Unified Threat Management Travel Nanotechnology Advertising Training Storage Entertainment remote Credit Cards Electronic Medical Records Yahoo WIndows Server 2008 Hard Disk Drive Upgrades Data storage Tablets Point of Sale Root Cause Analysis Server 2008 Company Culture Running Cable Edge HIPAA FAQ Virus Ali Rowghani Black Market Administration Chromecast Consultant Trending Smart Technology NFL Augmented Reality Business Intelligence Avoid Downtime Touchscreen Value Lifestyle Ciminal Charger Proactive Outlook Shadow IT Colocation Word Document Management Hard Drives Experience server installation dvd "cannot install required files" Managed IT Service Files Legislation Lithium-ion battery Wireless Charging Websites stock iOS Administrator Windows Ink Video Games Comparison MSP Evernote tweet Regulation Virtual Reality Computer Fan Relocation Access Scam Google Maps intranet Music calculator Screen Mirroring Specifications Networking Twitter Sync Dark Web PDF Employer Employee Relationship Software as a Service control Meetings Sales IT budget Analytics Cast Emails Workers Keyboard WSJ Adobe Instant Messaging Cache Monitors Remote Monitoring Safety Emergency Thank You CrashOverride Data Theft Worker Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...