9/09/2022

IT Banner-01.jpg

August  2022 Cybersecurity Newsletter

WILLIAM RAVEIS MONTHLY CYBERSECURITY INFORMATION


  • Scareware!


  • What is Scareware 


  • Example of a Screen Popup


  • What to do about Scareware


  • Additional Material


 

Scareware is Common

Scareware is an attempt through a website link or phone call to gain access to your computer and personal information. A common technique is to insert a web page popup explaining urgent support issues, or that your computer is infected. A second method is a phone call or text explaining the threat actor is calling on behalf of software or Microsoft support.  


Microsoft, "You will never receive a legitimate call from Microsoft or our partners to charge you for computer fixes."


Always suspect the worst!

What is Scareware


The threat actor is trying to gain access to your computer. Either by fake phone calls from software support or a web application or website that contains malware. The threat actor is trying to introduce malicious software, gain access to your computer and steal your personal information. Often, these attempts are also disruptive to your computers performance.  


A personal story. A family member who was tricked into giving his credit card and remote control of his Apple computer. He received a call from what he thought was WIX support for his small business premium account. The fraudulent caller asked for $25 to upgrade his WIX email and web service. He gave over his credit card, and allowed a remote hacker access to his Apple computer. He noticed a strange software install, and probing into his Apple ID Manager. He quickly shut-off his computer, and called me. I asked he shut down his router and computer, until I could look at his computer. A quick credit card change, an uninstall of remote connectivity software, a virus scan, and changing his passwords got him back on track.


Sometimes web "bloatware" or a rogue application may install itself on your device. The below article, Norton Antivirus Scareware, explains how to remove a rogue application that may get installed on your Windows device. 


These threat actors are after three things. Your personal information, money and to disrupt your computer's operations. 

IT photo.jpg

What to do:

  1. Keep your web browsers updated (enable automatic updates)
  2. Disable screen pop-ups in your browsers
  3. Hang up if you are not expecting a software support phone call w/ a case or incident #. 
  4. Do not click on any suspicious web pages that may explain your machine is infected with a virus. 
  5. Never provide remote access to your device
  6. Immediately close suspicious popups and web pages. 
  7. Run your operating system "uninstall software" application if the pop-ups are persistent. 

Example 1: A Scareware Web Page


Additional Material:


Norton Antivirus Scareware


Technical Support Scam calls


The Today Show Scareware Example