Attend IT Blog

Attend IT Limited has been serving the Brentford area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scammers Come at You From Every Direction

Scammers Come at You From Every Direction

Imagine this scenario: you’re going about your daily tasks when you receive an email from a cybersecurity company claiming that you have become the target of a hacking attack. Now, you don’t work in IT, so you’re not sure what your security agency is or what security policies or procedures you have in place, so you trust the message and respond to the email. Unfortunately, the message came from a cyberthreat, and now you are on their hook, line and sinker.

Cyberthreats Can Masquerade as Cybersecurity Companies

Believe it or not, hackers have the gumption to impersonate cybersecurity companies and trusted resources in an attempt to subvert even the most careful employees. One such phishing campaign has been detailed by the security researchers at CrowdStrike, a company who has had their name dragged through the mud by cyberthreats impersonating them. This particular campaign had users calling a fake helpline to get support, which in this case means that the hacker remotes into a victim’s computer while the user is helpless on the other side of the line.

The worst part is that for someone who isn’t necessarily scrutinizing the message, it could be seen as legitimate. The email contains language about outsourced security providers, something which is increasingly common nowadays, abnormal activity, and potential compromise, all of which could be misconstrued as true if you aren’t careful. The phony email contains a case number and contact information to address the concern. When the victim calls the number, the hacker installs a remote access tool onto their device, allowing them to gain access to the device at their leisure.

What’s the Motive?

As for the motive behind such an attack, it’s not necessarily clear at the moment. It could be that the attackers simply want to infect systems for later remote access. It is also possible that they want to profit off these infections by selling access to infected devices to the highest bidder. In any case, it’s a dangerous situation to be in, and certainly one that you should be wary of.

What Should You Do?

In just about all circumstances, your security company or department is not going to contact you in the way addressed above. It’s incredibly important that your employees know this, too. To keep you from making the same mistakes outlined above, we recommend you do the following:

  • Verify the sender’s identity through secondary methods
  • Look for spelling errors, grammatical issues, or inconsistencies
  • Contact your own IT department, not the one in the email

Attend IT Limited can be your trusted IT resource, and we promise we won’t have you call some phony support line to get the help you need to secure your infrastructure. We’ll take care of the details behind the scenes so that you barely have to worry about it in the first place. To learn more about what we can do for your business, reach out to us at 020 8626 4485.

What Leads to Failure in a Business Project?
Is Your Business Equipped for Modern Collaboration...
 

Mobile? Grab this Article!

Qr Code

Tag Cloud

Technology Security Business Computing Productivity Network Security Cloud Best Practices Tip of the Week Business Data Backup Managed IT Services Hackers Data Data Recovery IT Support IT Services communications Disaster Recovery Hosted Solutions VoIP Privacy Software Innovation Backup Mobile Devices Small Business Cybersecurity Malware Email Efficiency Saving Money Phishing Business Continuity Internet Collaboration Business Management Cloud Computing Computer Hardware Outsourced IT BDR Microsoft User Tips Automation Productivity Smartphones IT Support Ransomware Information Technology Internet of Things Workplace Strategy Compliance Upgrade Risk Management Server Communication Workplace Tips Quick Tips Artificial Intelligence Users Smartphone Wi-Fi Managed IT services Mobility Budget Managed IT Meetings Mobile Device Management Covid-19 Employee-Employer Relationship Network Spam Training Human Resources Mobile Device Managed Service Provider Networking Remote BYOD Google Save Money Printing Passwords Gadgets Android Avoiding Downtime Document Management Windows 7 Wireless Remote Workers Help Desk MSP Windows 10 Data Management Video Conferencing History Password Cost Management Managed Service Time Management Hosted Solution Computers VPN Instant Messaging Microsoft Office Virtual Private Network Firewall Remote Computing Information Project Management Content Filtering Remote Work Router Chrome Data Security Hacker Current Events Laptop Encryption End of Support Wireless Internet Maintenance Audit Customer Relationship Management Computing Redundancy Telephony Hard Drives Tech Term Recovery Office Managed Services Marketing Machine Learning Big Data AI Automobile Voice over Internet Protocol Mobile IT Service Solid State Drive Monitoring Paperless Office Manufacturing Printers Backup and Disaster Recovery Hybrid Cloud Mobile Office Employer-Employee Relationship Personal Information Devices Value Printer Social Media Business Technology Conferencing Government Software as a Service Saving Time Telephone Systems Data Breach Battery Two-factor Authentication Dark Web Online Storage Hiring/Firing Black Market Wasting Money HIPAA File Sharing Remote Monitoring App Files Employer/Employee Relationships Apple Streaming Media E-Commerce Electronic Medical Records Flexibility Copiers Regulations Compliance Browser File Storage Virtualization Analytics Videoconferencing RMM Evernote Amazon Company Culture Microsoft 365 Leadership iPhone Storage intranet Vulnerability Regulation Windows 10 Cybercrime Social Engineering Payroll SaaS Managed IT Service Cost User Error Content Filter Payment Cards Facebook Gamification OneNote Voiceover Internet Protocol Going Paperless Operating System Word Bandwidth Shadow IT Streaming Telephone Nanotechnology Windows 11 Analysis Virtual Assistant Data Protection How To Outsource IT Advertising Antivirus Vendor Management Data Storage Outsourcing Data Loss Update Business Telephone Chromebook Legal Blockchain e-waste Fiber Optics Professional Services Workers Alexa for Business Azure Bitcoin Microsoft Outlook Windows Education Cleaning The Internet of Things Transportation Holiday Troubleshooting Regulations Management Administration Proactive Students Utility Computing Work/Life Balance Smartwatch Computer Repair Smart Tech Vendor Cybersecurty Workstations Customer Service Lifestyle Wireless Technology Proactive IT Private Cloud Hacking Windows Server 2008 Cabling Travel SMB Phone System Active Directory Commerce Finance Financial Technology Applications Application Break/Fix Window 10 PDF Going Green Entertainment Upgrades Development Samsung CRM Paperless Solutions Remote Working Mobile Computing Colocation Unified Communications Office 365 Business Intelligence Inventory Management Spyware Connectivity Disaster Downtime Copier Money IoT Save Time Employees Smart Technology PCI DSS WPA3 Windows Server Infrastructure Alert Display 5G Workstation Apps WannaCry Consultant Keyboard Proactive Management Reviews Print Relocation Net Neutrality Work Gifts Data Theft Investment Computer Accessories Communitications Law Enforcement Tech Support Testing Threats Excel Comparison Language Peripheral Television OneDrive CrashOverride Workplace Strategies NFL Data Privacy Security Cameras Emails Processor IT Solutions Google Assistant Co-Managed Services Point of Sale Computer Care Medical IT Telework Licensing Text Messaging Robot Micrsosoft HBO Database Video Games Safety Scams Financial ROI Hosted Desktop 2FA SSD Reputation Fraud Camera Specifications Scalability Access Control Identity Theft Sabotage eWaste Hard Drive Webinar Benchmarks WIndows Server 2008 Twitter Unsupported Software eCommerce Audits Office Tips Politics Touchscreen Digital Signage Charger eSignature Biometrics Health Sports IT budget Managing Stress Employee Emergency iOS Managed Services Provider Sync Authentication Credit Cards Bring Your Own Device WiFi Windows Server 2008 R2 Smart Devices Virtual Desktop Edge Miscellaneous Projects Internet Exlporer Sales Virus Memory Admin Worker Commute PC Scam Policy Print Management Windows Ink HaaS Device Security USB Books IT solutions Patch Management Computer Tips Cortana Computer Forensics Hyperlink Root Cause Analysis Solutions Supply Chain App store Experience IT Management Facebook Privacy Internet Service Provider Windows 8.1 FAQ Unified Threat Management Screen Mirroring Innovations Remote Management Social Google Docs Ciminal Retail Humor Settings Procedure Healthcare Google Maps Virtual Reality Windows 10s Outlook Search Identities Gmail Wasting Time YouTube Augmented Reality Updates Mobile Security Worker Computer Fan Voice Adobe Wireless Charging Best Practice Cast Telephone System Microsoft Excel How To Websites Keyboard Shortcuts Business Strategy Server Maintenance Inventory Organization Google Drive Hard Disk Drive Myths Shortcut Legislation PowerPoint Accessory Holidays Environment Tablets Microsoft Word Identity Music