Attend IT Blog

Attend IT Limited has been serving the Brentford area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scammers Come at You From Every Direction

Scammers Come at You From Every Direction

Imagine this scenario: you’re going about your daily tasks when you receive an email from a cybersecurity company claiming that you have become the target of a hacking attack. Now, you don’t work in IT, so you’re not sure what your security agency is or what security policies or procedures you have in place, so you trust the message and respond to the email. Unfortunately, the message came from a cyberthreat, and now you are on their hook, line and sinker.

Cyberthreats Can Masquerade as Cybersecurity Companies

Believe it or not, hackers have the gumption to impersonate cybersecurity companies and trusted resources in an attempt to subvert even the most careful employees. One such phishing campaign has been detailed by the security researchers at CrowdStrike, a company who has had their name dragged through the mud by cyberthreats impersonating them. This particular campaign had users calling a fake helpline to get support, which in this case means that the hacker remotes into a victim’s computer while the user is helpless on the other side of the line.

The worst part is that for someone who isn’t necessarily scrutinizing the message, it could be seen as legitimate. The email contains language about outsourced security providers, something which is increasingly common nowadays, abnormal activity, and potential compromise, all of which could be misconstrued as true if you aren’t careful. The phony email contains a case number and contact information to address the concern. When the victim calls the number, the hacker installs a remote access tool onto their device, allowing them to gain access to the device at their leisure.

What’s the Motive?

As for the motive behind such an attack, it’s not necessarily clear at the moment. It could be that the attackers simply want to infect systems for later remote access. It is also possible that they want to profit off these infections by selling access to infected devices to the highest bidder. In any case, it’s a dangerous situation to be in, and certainly one that you should be wary of.

What Should You Do?

In just about all circumstances, your security company or department is not going to contact you in the way addressed above. It’s incredibly important that your employees know this, too. To keep you from making the same mistakes outlined above, we recommend you do the following:

  • Verify the sender’s identity through secondary methods
  • Look for spelling errors, grammatical issues, or inconsistencies
  • Contact your own IT department, not the one in the email

Attend IT Limited can be your trusted IT resource, and we promise we won’t have you call some phony support line to get the help you need to secure your infrastructure. We’ll take care of the details behind the scenes so that you barely have to worry about it in the first place. To learn more about what we can do for your business, reach out to us at 020 8626 4485.

What Leads to Failure in a Business Project?
Is Your Business Equipped for Modern Collaboration...

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Business Computing Network Security Productivity Best Practices Cloud Tip of the Week Data Backup Managed IT Services Data Recovery IT Services communications Hackers Disaster Recovery Data IT Support Business VoIP Privacy Hosted Solutions Cybersecurity Malware Innovation Backup Small Business Efficiency Mobile Devices Business Continuity Software Computer Outsourced IT Cloud Computing Phishing Internet Email Business Management Hardware Productivity BDR Automation Information Technology Collaboration Saving Money Internet of Things IT Support Ransomware User Tips Microsoft Smartphone Upgrade Server Smartphones Covid-19 Risk Management Workplace Tips Managed IT Budget Compliance Mobile Device Management Meetings Managed IT services Mobility Training Communication Managed Service Provider BYOD Artificial Intelligence Workplace Strategy Save Money Network Spam Wi-Fi Gadgets Quick Tips Users Mobile Device Remote Workers Avoiding Downtime Windows 7 Google Human Resources Passwords Password Remote Work Windows 10 Managed Service Data Management Virtual Private Network History MSP Instant Messaging VPN Hosted Solution Wireless Employee-Employer Relationship Remote Computing Computers Cost Management Printing Android Firewall Remote Networking Time Management Document Management Content Filtering Devices Data Breach Printer Saving Time Backup and Disaster Recovery Encryption Monitoring Mobile Office Data Security IT Service Solid State Drive Marketing Recovery Software as a Service Audit Conferencing Printers Telephony Hybrid Cloud Big Data Office Laptop Information Automobile Personal Information Business Technology Help Desk Maintenance Microsoft Office Video Conferencing Social Media Managed Services Redundancy Government Tech Term Telephone Systems Router Employer-Employee Relationship Chrome Hacker Wireless Internet Machine Learning Computing Voice over Internet Protocol End of Support Value Hard Drives Paperless Office Manufacturing Analysis Virtual Assistant e-waste Fiber Optics Battery Two-factor Authentication Facebook Cabling Proactive Telephone Azure HIPAA Operating System Finance Social Engineering Electronic Medical Records Lifestyle Dark Web Troubleshooting Remote Working Travel Copier Project Management Chromebook Smartwatch Computer Repair Advertising Inventory Management App Cybersecurty Virtualization Spyware Alexa for Business Windows Server 2008 Update PCI DSS SMB Active Directory Company Culture Infrastructure Break/Fix Window 10 Legal Hiring/Firing IoT Management Development Shadow IT File Sharing Vulnerability Regulation Smart Tech Vendor Employer/Employee Relationships SaaS Managed IT Service Students Utility Computing Downtime Videoconferencing Apple Employees Administration Regulations Compliance OneNote Windows Server Online Storage Transportation Wireless Technology RMM Nanotechnology Financial Technology Antivirus Vendor Management Leadership Data Protection intranet Connectivity Cost Evernote Unified Communications E-Commerce AI Streaming User Error WPA3 Copiers Colocation Going Paperless Proactive IT Private Cloud Wasting Money Customer Relationship Management Going Green Education Cleaning Money Windows 11 Mobile Computing Applications Holiday Word Outsource IT The Internet of Things Streaming Media Work/Life Balance Black Market Outsourcing Mobile Remote Monitoring Payment Cards Data Loss File Storage Voiceover Internet Protocol Hacking Phone System Commerce Amazon Application Flexibility Entertainment Samsung Bitcoin Disaster iPhone Blockchain Content Filter Office 365 Professional Services Workers Upgrades Payroll Workstations Customer Service Bandwidth Business Telephone Browser Save Time Smart Technology Windows 10 Cybercrime Business Intelligence Gamification Google Maps Robot Scalability Retail Twitter Facebook Privacy Health Voice Identities Projects Computer Accessories Office Tips Telephone System Updates Consultant Bring Your Own Device Analytics Microsoft Excel Excel Organization Adobe Wireless Charging Memory Admin Emails IT Solutions App store YouTube Point of Sale Internet Exlporer Environment Television Websites CrashOverride Computer Forensics Hyperlink HaaS Safety Windows Workstation Legislation Computer Care CRM Miscellaneous Reviews Tablets Microsoft Word HBO Social Net Neutrality Work Server Maintenance Inventory Identity Theft WannaCry Myths Tech Support Webinar WIndows Server 2008 Mobile Security Holidays Humor Workplace Strategies Gifts Data Theft Gmail Wasting Time Politics Charger 5G Managing Stress Emergency Search Telework Comparison Unsupported Software Language Keyboard NFL Touchscreen USB Books Storage iOS Sync Investment Communitications Worker Commute Scam PDF Best Practice SSD Licensing WiFi Data Storage Keyboard Shortcuts Threats Fraud IT solutions Patch Management Identity OneDrive How To PowerPoint Accessory Security Cameras Processor Experience IT Management Medical IT Audits Specifications Root Cause Analysis Display Micrsosoft Biometrics eWaste Scams Virtual Reality Relocation Authentication Sports IT budget Testing ROI Hosted Desktop Google Drive Apps Unified Threat Management Screen Mirroring Computer Tips Edge Windows 10s Outlook Data Privacy Sabotage Current Events Policy Print Management Credit Cards Settings Peripheral Benchmarks Law Enforcement Windows Ink Device Security eCommerce Worker Solutions Supply Chain Sales Virus Augmented Reality Google Assistant Co-Managed Services Digital Signage Alert Employee Managed Services Provider Video Games Internet Service Provider Windows 8.1 Cortana Computer Fan Camera Windows Server 2008 R2 Smart Devices Text Messaging Innovations Remote Management Cast Financial Google Docs Ciminal Hard Disk Drive Shortcut Hard Drive PC Procedure Healthcare FAQ Business Strategy Access Control Music Reputation