Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Malware Locks Up Your PC and Offers Fake Tech Support Phone Number

b2ap3_thumbnail_hack_attack_400.jpgThere’s an intrusive malware on the Internet that locks a user out of their PC and directs them to a fake IT support phone number. In addition to being inconvenient, it can lead to the theft of sensitive information. If this happens to you, whatever you do, don’t call the fake phone number.

This attack is a classic phishing scam tactic; scare a user into contacting the hacker for the purpose of turning over their sensitive information. Typically, phishing scams involve spam emails and the information is transferred via an attachment, like a form. While this email tactic has tricked plenty of users, it’s not very effective because the scam is fairly easy to spot, and once the email is determined to be a phishing scam, it then gets deleted or ignored.

When activated, this particular malware is a virtually impossible to ignore. It will hit your PC without warning and even while you’re visiting a secure site (like Facebook or Google search). Once the malware is executed, the browser will display an image similar to the Windows blue screen of death. A fake technical support message will then be displayed, informing the user of the nature of the problem and directing them to call a bogus phone number.


Unfortunately, this blue screen can’t be closed out and easily ignored. The malware will completely freeze up your browser, meaning that the only way to get rid of this annoyance is to either manually close the browser via task manager (Ctrl + Alt + Delete), or reboot the computer entirely.

This type of tactic is called social engineering, and modern hackers utilize these tactics to assist them in getting past security by poking at weaknesses in end-users. By getting an emotional response, whether it be the frustration of malware or your empathy by say, pretending to be a friend of yours on social media, the hacker is much more likely to find their way into your computer.

Having to take such extreme measures is sure to put a damper on any project that you’re currently working on, cause downtime, and may even delete unsaved data. That’s not all; just because you’ve rebooted your system, doesn’t mean the malware is gone. Unless the malicious file is located and properly deleted, it will remain on the hard drive and pop up at another random time.

To reiterate; DON’T CALL THE PROVIDED PHONE NUMBER. The blog Delete Malware explains the risk: “If you call [the number] they won't actually remove adware from your computer. They will hijack your computer and steal all of your bank information and passwords. They are crooks, don't call them!”

Instead, call the real IT professionals at (800) 588-4430. By calling the fake phone number, you’re only opening yourself up to being taken deeper by this scam. One thing that hackers like these are counting on is you or your staff not having a solid understanding of who’s responsible for maintaining your company’s IT. It’s their hope that you’ll experience an error, panic, and call the provided number for “help.”

Actually, hackers posing as IT professionals is a fairly common scam. They like to pretend to be IT support because they know that users will trust their sensitive data to IT personnel (these jerks are giving IT professionals the world over a bad name). Therefore, it’s important to familiarize your staff with exactly who is overseeing their IT, and how to contact them, and only them, if there’s ever an issue.

By monitoring your network for risks, comprehensive IT support from Telesys Voice and Data can protect your business from scams such as this. We can remotely find and eliminate threats, as well as equip your business with powerful security tools to keep destructive malware out of your system. Call the real IT pros at (800) 588-4430 to learn more.


No comments yet
Already Registered? Login Here
Wednesday, 20 November 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Network Security Software Internet IT Services Windows 10 Computer Data Backup Productivity Managed Service Provider Innovation Backup Ransomware Outsourced IT Mobile Devices Business Continuity Android Hardware Smartphone Google Disaster Recovery Social Media Data Recovery Managed IT services Efficiency Upgrade User Tips Communication Data IT Support Workplace Tips Browser Small Business Business Management Cloud Computing IT Support Managed IT Services Data Management App Smartphones Holiday Microsoft Office Internet of Things Office Phishing Remote Monitoring Miscellaneous Server Office 365 Windows Network Password Facebook communications Paperless Office WiFi Artificial Intelligence Gmail Big Data Apps Tech Term VoIP Encryption Cybersecurity Save Money Spam Passwords Risk Management Collaboration Apple Bandwidth Firewall Unified Threat Management Windows 10 Saving Money Document Management Hosted Solution Recovery Robot Customer Relationship Management Employer-Employee Relationship Analytics Avoiding Downtime Word Vendor Management Hacker Managed IT Infrastructure Customer Service Mobile Device Management Content Filtering Operating System Remote Computing Tip of the week How To Compliance Downtime Government Wi-Fi Office Tips Money Work/Life Balance Chrome Windows 7 IT Management The Internet of Things File Sharing Computers Health Mobile Device Antivirus Redundancy Hacking Automation Mobile Computing Project Management Data loss Going Green BDR Tech Support Alert Education Business Technology Printing Data storage Cybercrime Computing Telephone Systems Healthcare Social Presentation Business Growth Virtual Reality Managed Service Training Website Vulnerability SaaS Help Desk BYOD Outlook Data Security Applications Two-factor Authentication Settings Software as a Service Retail Remote Monitoring and Management HIPAA Router Maintenance Best Practice Mobile Security Legal Lithium-ion battery Display Augmented Reality Business Owner Twitter Running Cable Monitors IBM Politics Travel Marketing Tablet Google Drive Websites Search Physical Security Bring Your Own Device Sports Taxes Access Control Competition IT service Botnet Cortana Information Technology Virtualization Samsung Administration Laptops Meetings Humor Storage IT solutions Safety Analyitcs Computer Care Wireless Technology Patch Management Solid State Drive Wireless Scam Identity Theft Regulations Specifications YouTube Automobile VPN Upgrades Unified Communications Net Neutrality Assessment Budget Server Management User End of Support Licensing Proactive Virtual Private Network Smart Technology LiFi Digital Payment Consultation Mouse Statistics iPhone Network Congestion Software Tips Favorites Law Enforcement Mail Merge Distributed Denial of Service Unsupported Software Laptop Enterprise Resource Planning File Management CCTV Disaster Resistance Hard Drives Emoji data services Bluetooth Technology Tips Virtual Desktop WPA3 IT Technicians Conferencing Gadget Modem Manufacturing Address Managed IT Service Mobile Data Corporate Profile Hacks Halloween Mobile Telephone Proactive IT Refrigeration Hotspot Quick Tips User Error Comparison History Fleet Tracking Mirgation Employees Fun Cookies Gadgets Break Fix WannaCry Current Events Deep Learning PowerPoint Scary Stories Company Culture Mobile VoIP G Suite IT Consulting Language Processors Time Management Printer Mobility Black Friday Cabling Asset Tracking Migration Zero-Day Threat Nanotechnology Proactive Maintenance Motion Sickness Dark Web Consumers Staffing Vulnerabilities Data Breach Undo Computing Infrastructure Network Management Google Docs Cyber Monday Writing Remote Workers IP Address Chatbots Backup and Disaster Recovery IoT Processor Data Warehousing Personal Information VoIP GPS Alt Codes Google Maps Geography IT Consultant Technology Laws Alerts Touchscreen SharePoint eWaste Machine Learning flu season Social Engineering Disaster IT Sevices Information Mobile Office Identity RMM Utility Computing Lenovo Microsoft Excel Computer Repair Digital Tracking Typing Buisness Cables Cleaning Unified Threat Management Cooperation Notifications Downloads Environment Relocation Shortcut Fort Worth Uninterrupted Power Supply Monitoring Procurement Knowledge Active Directory Webcam Superfish Blockchain Electronic Medical Records Spyware Google Wallet Cryptocurrency Dark Data Wires business communications systems Staff Crowdsourcing Multi-Factor Security Troubleshooting Remote Worker Private Cloud flu shot Electronic Health Records Bitcoin Experience Cost Management Windows Server Point of Sale Permissions How To Drones Phone System Internet Protocol Flexibility Heating/Cooling Google Calendar Professional Services Error Fort Worth IT Hard Disk Drive Windows 8 Hard Drive User Management Networking Fraud Firefox Supercomputer Legislation MSP VoIP streamlines Domains Operations Cyberattacks Servers 5G Social Networking Virtual Assistant Entrepreneur DFW IT Service Recycling Batteries Web Server Application Update IT Budget Users business network infrastructure Public Speaking Wearable Technology Bookmarks Motherboard Voice over Internet Protocol Administrator 3D Printing Management Remote Work Cameras Techology Internet Exlporer Chromebook

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...