ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Don’t Call Fake Technical Support Hotlines Provided By Malware

b2ap3_thumbnail_tech_support_bomb_400.jpgComputer users, beware; there’s an intrusive malware spreading across the Internet that’s capable of locking users out of their web browsers and redirecting them to fake IT support phone numbers. The hacker’s goal is likely to steal sensitive information from users, so it’s especially important that you don’t call this fake phone number.

Little do users know that this is a simple phishing scam tactic that uses the guise of a technology issue to extort important information from them. Phishing scams usually involve spam email campaigns that come with viruses or malware attached to the message, or executes through a form. Thankfully, phishing emails are pretty easy to spot if you know what to look for, and once the email is identified as a scam, you can delete it or ignore it.

The malware in question will activate when you least expect it, and it’s practically impossible to simply ignore (not that you would want to anyway). It can hit your PC without warning, even if it’s while you’re visiting a secure website like Facebook or Google. Once the malware activates, you’ll see what looks like the blue screen of death from Windows PCs. You’ll then be shown a fake tech support message that urges you to contact a displayed phone number to resolve the issue.

ib blue screen

The blue screen can’t be closed out of or easily ignored; instead, the malware will completely freeze up the browser, leaving you with only two options to get rid of it. You could manually force the browser shut with the task manager (Ctrl+Alt+Delete), or restart your computer completely.

This kind of fear-mongering tactic is known as social engineering, a modern method for hackers who are trying to get past security measures by taking advantage of end-users. Social engineering attacks are designed to instigate an emotional response from the end-user, ranging from fear and frustration, to empathy and friendliness, depending on which medium the hacker is contacting the end-user from.

Having to use the aforementioned methods of bypassing this malware can have disastrous results, like causing downtime and deleting unsaved data. Furthermore, rebooting your system doesn’t guarantee that the malware is gone. If the malicious file is still on your computer, it will remain on the hard drive and could appear again at any moment. This is why, if you want to get rid of the malware for good, you need to eliminate the root cause of the problem by safely removing the infected file from your PC.

To reiterate; DON’T CALL THE PROVIDED PHONE NUMBER. The blog Delete Malware explains the risk: “If you call [the number] they won't actually remove adware from your computer. They will hijack your computer and steal all of your bank information and passwords. They are crooks, don't call them!”

Instead of relying on sketchy phone numbers in pop-ups on the website, you should contact the real IT professionals at 866-326-7214. Calling a fake phone number is exposing your organization to the scam on a personal level. Hackers will take advantage of anyone who they think doesn’t know the slightest thing about IT-related issues like hacking attacks and social engineering scams, but it’s your organization’s unfamiliarity with your IT department that will really throw your business under the bus. Hackers want to instill confusion and panic in the hearts of your workers, which will ultimately lead to costly error.

Hackers posing as IT professionals isn’t an unheard-of concept. In fact, it’s one of the more common social engineering tactics that hackers try to pull off. Hackers count on your business’s employees to trust your IT support with sensitive information, making it a great cover for hackers… even if it’s spitting in the face of the legitimate IT professionals out there. You should make sure that your organization’s employees are familiar with your IT staff, as well as how to contact them if they need help. By doing so, you’ll be giving them contact information that they can cross reference for any potential social engineering hacks, like the “blue screen of death” malware.

By integrating proper monitoring and maintenance protocol for your business’s IT infrastructure, ClearView IT can help protect your business from hacks of all kinds, be it social engineering or more traditional campaigns. We can remotely locate and eliminate threats so that your organization can stay productive. Remember, you should only contact the real IT pros at 866-326-7214 for any technology assistance.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup communications Smartphone Small Business Microsoft Office Upgrade Smartphones Network Mobile Devices Communication Data Recovery Managed IT Services Productivity Quick Tips Social Media VoIP Users Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Covid-19 Disaster Recovery Passwords Holiday Browser Managed Service Apps Windows 10 IT Support Cloud Computing Miscellaneous Outsourced IT Managed Service Provider Data Management Remote Work Internet of Things Saving Money Operating System Government Workplace Strategy Networking Windows Gadgets Artificial Intelligence Managed IT services WiFi Encryption Mobile Device Management Blockchain Business Technology App Virtualization Spam Information Server Remote Bandwidth Gmail Apple Office Two-factor Authentication Information Technology Office 365 History Employee/Employer Relationship Budget BDR Big Data Conferencing Access Control Health Data Security Wi-Fi Analytics Cybercrime Voice over Internet Protocol Cost Management IT Management Help Desk Hacking Training Document Management Employer-Employee Relationship Hacker Save Money Vendor Patch Management Remote Computing Compliance Remote Monitoring Mobile Office Computing IBM Vendor Management Website Managed Services Hard Drive Data loss Legal Search... Best Practice Data storage Retail Money Applications Alert Customer Service Unified Threat Management Hiring/Firing Firewall Vulnerabilities Outlook Project Management Password Augmented Reality BYOD Word Remote Workers Chrome Content Filtering Windows 7 Websites Free Resource Meetings Router Mobility How To Mobile Computing Twitter The Internet of Things Google Maps Windows 11 Scam YouTube Marketing Law Enforcement End of Support Running Cable Printer VPN Laptop Storage Update Data Breach Travel Virtual Reality Social Social Engineering Sports DDoS Cryptocurrency Paperless Office SaaS Antivirus Black Market User Cleaning Monitoring Maintenance iPhone Robot Healthcare Cortana Education Saving Time Lithium-ion battery Start Menu Computer Care Managed Services Provider Solid State Drive Downloads Bitcoin Computers Virtual Private Network Vulnerability Processors Telephone PowerPoint Chromebook Software as a Service Drones Administration Current Events Data Protection Presentation Automobile Excel Solutions Specifications IT Consultant How To Integration Microchip Images 101 Customer Relationship Management Display Flexibility Wireless Technology Co-Managed IT eWaste Virtual Assistant Entertainment Tech Terms Identity Theft Employees Hack Avoiding Downtime Notifications Managed IT Downtime Safety Unified Communications Digital Holidays Google Docs Processor Taxes Virtual Desktop Bluetooth Distributed Denial of Service Experience Cooperation Video Conferencing Office Tips Memory HIPAA Private Cloud Virtual Machines Computer Repair Physical Security Multi-factor Authentication Professional Services Disaster Politics Settings Machine Learning Microsoft Excel Banking Touchscreen Recovery Google Wallet Competition Wireless Headphones Memes Computer Malfunction Going Green Net Neutrality Business Cards Workplace Strategies Messenger Emergency Deep Learning Tech Human Resources Vendor Mangement Error Financial Data Entrepreneur LiFi Business Metrics Documents Hosted Solution Samsung Bookmark Risk Management Inbound Marketing Application IT Webcam Download Business Intelligence Piracy Books Uninterrupted Power Supply Term Google Apps Language Business Mangement Society Telework HTML Microsoft 365 Securty Tablets Browsers Smartwatch Nanotechnology Communitications Domains Visible Light Communication Upload Procurement Software License Smart Technology Reading Monitors Google Play Electronic Payment Windows 8 Supercomputer Social Network FinTech Google Calendar Virus Data Analysis CES Screen Reader IT Assessment Advertising Motion Sickness Trends Supply Chain Management Phone System Mobile Technology Value Relocation Displays Security Cameras Work/Life Balance Google Drive Tech Support Customer Resource management Organization Devices Cyber security Comparison Tip of the week Fileless Malware Public Speaking Smart Devices Gamification Remote Working Company Culture Supply Chain Knowledge Streaming Media Corporate Profile Telephony Employer Employee Relationship Telephone System AI Keyboard Regulations Trend Micro In Internet of Things Television Transportation Hacks Network Congestion Cabling Directions Digital Security Cameras Hard Drives Backup and Disaster Recovery Electronic Health Records Computer Accessories G Suite Content intranet Desktop Wasting Time Workplace Reliable Computing Writing Tablet VoIP Wireless Tracking Electronic Medical Records Shortcut Accountants eCommerce Modem Mouse Environment Videos Heating/Cooling Database Surveillance Web Server Social Networking Managing Costs Scams Scalability Windows XP Text Messaging Proactive IT Digital Payment Health IT Equifax SSID Administrator SharePoint Hard Drive Disposal Employer/Employee Relationships Bring Your Own Device Worker Media Tactics Development Username Virtual Machine Cables Access Time Management Music Public Cloud Reviews Troubleshooting Startup Optimization Freedom of Information Addiction email scam Teamwork Navigation 2FA Spyware Data Storage Mobile Security Hypervisor Point of Sale Audit News Medical IT Botnet Staffing File Sharing User Tip Shopping Legislation Network Management SQL Server Shortcuts Rental Service Redundancy Micrsooft Evernote Paperless IP Address Flash Cache PCI DSS Licensing Fake News Telephone Systems Unified Threat Management Business Growth Workers Proxy Server Gig Economy Business Owner Emails Humor Service Level Agreement Internet Service Provider Computing Infrastructure Azure Be Proactive Business Communications CCTV Management Regulations Compliance Device security Managed IT Service Printing

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?