ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Don’t Call Fake Technical Support Hotlines Provided By Malware

b2ap3_thumbnail_tech_support_bomb_400.jpgComputer users, beware; there’s an intrusive malware spreading across the Internet that’s capable of locking users out of their web browsers and redirecting them to fake IT support phone numbers. The hacker’s goal is likely to steal sensitive information from users, so it’s especially important that you don’t call this fake phone number.

Little do users know that this is a simple phishing scam tactic that uses the guise of a technology issue to extort important information from them. Phishing scams usually involve spam email campaigns that come with viruses or malware attached to the message, or executes through a form. Thankfully, phishing emails are pretty easy to spot if you know what to look for, and once the email is identified as a scam, you can delete it or ignore it.

The malware in question will activate when you least expect it, and it’s practically impossible to simply ignore (not that you would want to anyway). It can hit your PC without warning, even if it’s while you’re visiting a secure website like Facebook or Google. Once the malware activates, you’ll see what looks like the blue screen of death from Windows PCs. You’ll then be shown a fake tech support message that urges you to contact a displayed phone number to resolve the issue.

ib blue screen

The blue screen can’t be closed out of or easily ignored; instead, the malware will completely freeze up the browser, leaving you with only two options to get rid of it. You could manually force the browser shut with the task manager (Ctrl+Alt+Delete), or restart your computer completely.

This kind of fear-mongering tactic is known as social engineering, a modern method for hackers who are trying to get past security measures by taking advantage of end-users. Social engineering attacks are designed to instigate an emotional response from the end-user, ranging from fear and frustration, to empathy and friendliness, depending on which medium the hacker is contacting the end-user from.

Having to use the aforementioned methods of bypassing this malware can have disastrous results, like causing downtime and deleting unsaved data. Furthermore, rebooting your system doesn’t guarantee that the malware is gone. If the malicious file is still on your computer, it will remain on the hard drive and could appear again at any moment. This is why, if you want to get rid of the malware for good, you need to eliminate the root cause of the problem by safely removing the infected file from your PC.

To reiterate; DON’T CALL THE PROVIDED PHONE NUMBER. The blog Delete Malware explains the risk: “If you call [the number] they won't actually remove adware from your computer. They will hijack your computer and steal all of your bank information and passwords. They are crooks, don't call them!”

Instead of relying on sketchy phone numbers in pop-ups on the website, you should contact the real IT professionals at 866-326-7214. Calling a fake phone number is exposing your organization to the scam on a personal level. Hackers will take advantage of anyone who they think doesn’t know the slightest thing about IT-related issues like hacking attacks and social engineering scams, but it’s your organization’s unfamiliarity with your IT department that will really throw your business under the bus. Hackers want to instill confusion and panic in the hearts of your workers, which will ultimately lead to costly error.

Hackers posing as IT professionals isn’t an unheard-of concept. In fact, it’s one of the more common social engineering tactics that hackers try to pull off. Hackers count on your business’s employees to trust your IT support with sensitive information, making it a great cover for hackers… even if it’s spitting in the face of the legitimate IT professionals out there. You should make sure that your organization’s employees are familiar with your IT staff, as well as how to contact them if they need help. By doing so, you’ll be giving them contact information that they can cross reference for any potential social engineering hacks, like the “blue screen of death” malware.

By integrating proper monitoring and maintenance protocol for your business’s IT infrastructure, ClearView IT can help protect your business from hacks of all kinds, be it social engineering or more traditional campaigns. We can remotely locate and eliminate threats so that your organization can stay productive. Remember, you should only contact the real IT pros at 866-326-7214 for any technology assistance.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup Smartphone communications Small Business Upgrade Microsoft Office Smartphones Mobile Devices Network Data Recovery Communication Managed IT Services Quick Tips Productivity VoIP Users Social Media Mobile Device Automation Tech Term Facebook Windows 10 Business Continuity Disaster Recovery Covid-19 Passwords Holiday Apps Managed Service Windows 10 IT Support Browser Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Data Management Internet of Things Remote Work Operating System Government Saving Money Artificial Intelligence Gadgets Managed IT services Networking Windows Workplace Strategy Blockchain Spam Server Information Bandwidth Encryption Mobile Device Management Remote Business Technology App WiFi Virtualization Two-factor Authentication Information Technology Office 365 History Budget Gmail Employee/Employer Relationship Office Apple Conferencing Access Control Data Security Health Cybercrime Wi-Fi BDR Analytics Big Data Training Document Management Voice over Internet Protocol Hacker Save Money Employer-Employee Relationship Patch Management Vendor Compliance Remote Monitoring Remote Computing Help Desk Hacking Cost Management IT Management Data loss Legal Data storage Money Mobile Office Search... Customer Service Best Practice Managed Services Unified Threat Management Firewall Retail Applications Alert Augmented Reality Word Project Management BYOD Vulnerabilities Hiring/Firing IBM Outlook Website Computing Vendor Management Password Hard Drive Scam Law Enforcement Windows 11 Laptop End of Support Mobile Computing Printer VPN Marketing Update Remote Workers Running Cable Windows 7 Sports Travel Free Resource Social Storage SaaS DDoS Virtual Reality Data Breach Social Engineering Cryptocurrency Paperless Office How To Antivirus Black Market Maintenance iPhone Cleaning Education Cortana Robot Content Filtering User Monitoring Healthcare Websites Router Mobility Meetings The Internet of Things Chrome YouTube Google Maps Twitter Video Conferencing PowerPoint How To Administration Virtual Machines Wireless Technology Microchip Flexibility eWaste Excel Computer Repair Presentation Specifications Professional Services Downtime Tech Terms IT Consultant Hack Safety Identity Theft Notifications Managed IT Customer Relationship Management Digital Unified Communications Virtual Assistant Virtual Desktop Managed Services Provider Co-Managed IT Google Docs Entertainment Experience Bluetooth Taxes Virtual Private Network Distributed Denial of Service Office Tips Private Cloud Processor Current Events Memory Disaster Solutions Physical Security Integration Images 101 Politics HIPAA Machine Learning Display Settings Lithium-ion battery Multi-factor Authentication Start Menu Solid State Drive Downloads Computer Care Employees Processors Avoiding Downtime Vulnerability Saving Time Holidays Chromebook Software as a Service Drones Data Protection Computers Bitcoin Automobile Telephone Cooperation Relocation Browsers Teamwork Public Speaking Displays Nanotechnology Advertising Motion Sickness 2FA Data Storage Streaming Media Comparison Google Play Hypervisor Work/Life Balance Google Drive Upload Tech Support Software License Keyboard Shopping Social Network Medical IT Knowledge Data Analysis SQL Server Hard Drives Corporate Profile Screen Reader Paperless Electronic Payment PCI DSS In Internet of Things Television Security Cameras Licensing Telephony Trends intranet Employer Employee Relationship Mobile Technology Shortcut Network Congestion Cabling Devices Gig Economy Humor Wireless Hacks Customer Resource management Supply Chain Reliable Computing Fileless Malware Azure Heating/Cooling Writing Tablet Environment G Suite Tip of the week Business Communications Internet Service Provider Phone System Regulations Compliance Windows XP Mouse Managed IT Service VoIP Gamification Social Networking Tracking Company Culture Regulations Memes Telephone System Workplace Scalability Directions Backup and Disaster Recovery Web Server Human Resources Net Neutrality Financial Data Administrator SharePoint Text Messaging Content Proactive IT Digital Payment Desktop Worker Accountants Risk Management IT Computer Accessories Bring Your Own Device Electronic Medical Records Scams Access Database Google Apps Telework Time Management Music Public Cloud Equifax Smartwatch Communitications Staffing Health IT Microsoft 365 Cables Audit IP Address Spyware Tactics Hard Drive Disposal Procurement FinTech Botnet Username File Sharing Micrsooft Startup Freedom of Information CES IT Assessment Rental Service Redundancy Point of Sale Supply Chain Management Navigation Value Flash Cache Addiction email scam Organization Troubleshooting Cyber security Telephone Systems Unified Threat Management Shortcuts Business Growth Workers Mobile Security Competition Legislation News Smart Devices Recovery User Tip Remote Working Printing Evernote Network Management CCTV AI LiFi Trend Micro Banking Touchscreen Be Proactive Entrepreneur Google Wallet Transportation Application Deep Learning Emails Computer Malfunction Fake News Digital Security Cameras Electronic Health Records Documents Messenger Emergency Proxy Server Wasting Time Vendor Mangement Service Level Agreement Business Intelligence Computing Infrastructure Business Owner eCommerce Business Metrics Management Modem Workplace Strategies Hosted Solution Samsung Device security Uninterrupted Power Supply Wireless Headphones Webcam Microsoft Excel Videos Surveillance Securty Books Tech Managing Costs Domains Language Business Mangement Going Green Society Business Cards Error SSID Tablets Reading Bookmark Employer/Employee Relationships Monitors Visible Light Communication Media Development Google Calendar Term Virtual Machine Download Windows 8 Supercomputer Piracy HTML Reviews Inbound Marketing Optimization Virus Smart Technology

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?