MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is It A Good Idea To Bait A Phishing Scam?

Is It A Good Idea To Bait A Phishing Scam?

Phishing scams have had a supporting role in many of the latest cyber threats, often as the means the attacker has used to start off their attack. This attack vector is relatively easy to avoid in most cases, but requires education for the end user.

If you see these malicious emails in your inbox, you might be tempted to give the attacker a piece of your mind (or simply mess with them). We’ve all been there.

So, is it a good idea to antagonize a cybercriminal who was targeting you?

In a word, no.

There are plenty of professionals who have experimented with this very concept, for the academic purpose of finding out how a cybercriminal will react. One such researcher, Jerome Segura of Malwarebytes, played though a scam in its entirety. What he encountered was a mixture of apparent helpfulness in finding a cache of issues in his ‘device’ -- actually a virtual machine rigged to record attacks -- and a decidedly less helpful, unpleasant tone.

A  ‘technician’ had Segura check his Microsoft Error reports, warning him that each and every error and warning he sees is a major problem that had already begun to corrupt his system. To reinforce the need for a ‘solution,’ Segura was told that his software warranty had expired and, once transferred to another ‘representative,’ that he needed to pay for a $299 renewal.

Instead of paying, Segura supplied incorrect payment credentials, knowing they would be rejected. Once they were, his computer was suddenly seized. The ‘technician’ deleted all of his files as well as the Ethernet adapter driver, and calling Segura a rude word before disconnecting.

This is a fairly tame account of what this sort of cybercriminal can do. A wildlife photographer named Jakob Dulisse received a call to his home in Nelson, British Columbia, Canada from “Windows Technical Support” in Los Angeles, California. Quickly deducing that this was an attempt to scam him, Dulisse played along at first, before calling the voice on the other end of the line, “a scammer, a thief, and a bad person.”

The scammer/thief/bad person did not react well, stating that their group had people in Canada that would kill Dulisse, going so far as to describe himself as a killer and referencing that people in his region cut people into pieces and rid themselves of them in the river.

Other professionals have simply found remote access software installed without their consent as they have ‘played along’ with scammers.

However, these are professionals, whose job it is to identify and publicize the attacks that cybercriminals are resorting to. As for the business user, their best bet is to report the attempt to the local authorities, as well as your managed service provider.

A managed service provider can help you ensure that you are both secured against, and well-versed, in the latest cyberattacks. Give MERIT Solutions a call at (757) 420-5150 to get started. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 16 January 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Business Computing Hackers Network Security Software Malware Hosted Solutions Backup google Internet Productivity Microsoft Managed IT Services Computer Disaster Recovery Business Continuity IT Support Windows 10 Mobile Devices VoIP Business User Tips Outsourced IT IT Services Hardware communications Business Management Innovation Email Productivity Mobility Data Backup Windows Managed IT Cybercrime Cybersecurity Mobile Device Management Efficiency Smartphone Server Ransomware Data Recovery Saving Money Save Money Telephone Systems Small Business Apps Operating System Law Enforcement browser Hosted Solution Quick Tips Android Virtualization Money VPN Information Technology Passwords Recovery Office 365 Password Holiday Microsoft Office BYOD Chrome Data BDR Computers Work/Life Balance Facebook Social Media Government Phishing Budget Smartphones Data Management Gadgets Wireless upgrade Hacking Social Google Drive Avoiding Downtime Unsupported Software Alert App Health Cloud Computing Communication Miscellaneous Managed Service Provider Private Cloud Office tips Applications History Windows 10 Shortcut User Error Vulnerability Proactive IT Best Practice Wi-Fi Firewall Application The Internet of Things Managed IT Services Current Events Audit Personal Information Workplace Tips Politics Data Security Two-factor Authentication Wireless Technology USB Save Time Collaboration Automation Risk Management Telephony IT Support search Identity Theft Artificial Intelligence Robot Flexibility Cortana End of Support Remote Computing Cost Management Spam SaaS Internet of Things Excel Antivirus Gmail Samsung Humor Disaster Content Filtering Data Storage Battery HaaS Update OneNote Employer-Employee Relationship Data Breach IT solutions Compliance Network Sports DDoS Automobile Marketing Television Hacker Internet Exlporer Social Engineering Google Docs Solid State Drive Saving Time Cleaning Streaming Media Apple Office Phone System Computer Care Data Protection iPhone WiFi Going Green Mobile Computing Users Encryption Redundancy Bandwidth Transportation Commerce Worker Commute Tablets Root Cause Analysis Computer Accessories Mobile Device Server 2008 Big Data Running Cable Patch Management Ali Rowghani Managing Stress FAQ Trending NFL Augmented Reality Laptop Touchscreen Uninterrupted Power Supply Books Scalability Lifestyle Business Intelligence Outlook Hiring/Firing Education Charger Router Word Maintenance Vendor Management Touchpad server installation dvd "cannot install required files" How To Legislation Managed IT Service Reputation stock iOS Benefits Wireless Charging Windows Ink Advertising Unified Threat Management Comparison Regulation tweet Computer Fan Evernote Entertainment Google Maps Data storage Training Upgrades calculator Electronic Medical Records Specifications Screen Mirroring Networking Sync Administration Twitter Dark Web Chromecast Point of Sale HIPAA Software as a Service Meetings Company Culture control Cast Consultant Emails Black Market Sales Workers Adobe Colocation WSJ Smart Technology Tech Support Avoid Downtime Data Loss Hard Drives Settings Value Exchange altivista Files Shadow IT Retail Distributed Denial of Service Updates Licensing WannaCry Administrator Lithium-ion battery Document Management Experience SBS HBO compaq Webinar Conferencing Microsoft Word Mobile Relocation Access Video Games Microsoft Excel Wearable Technology hp IT solutions Virtual Reality Gifts Professional Services Scam domain Music Legal File Sharing PDF IT Management Windows 10s Travel Nanotechnology Employer Employee Relationship remote Analytics Storage Text Messaging eWaste WIndows Server 2008 Yahoo Hard Disk Drive Keyboard Instant Messaging Credit Cards Thank You CrashOverride Congratulations Safety Emergency Cache Monitors Remote Monitoring Worker

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...