ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Best Buy’s Geek Squad Scam is Touring Inboxes

Best Buy’s Geek Squad Scam is Touring Inboxes

Phishing scams are a topic we frequently discuss on this blog. In their simplest form, they are emails or messages sent that are designed to steal from you or gain access to computers or networks. One such scam uses the moniker of the popular IT support company Geek Squad, a subsidiary of Best Buy, to steal from its victims. Here’s how you can avoid falling for these tricks.

The Scam Overview

The scam starts with an email from the supposed Geek Squad informing them that their membership has been renewed. Most people who receive this email are not members, so they will naturally call the toll-free number listed on the email to find out why they have been renewed for a service they do not subscribe to. The person on the other end of the phone call agrees to refund the money, but needs access to your online banking account to do so. They then ask for remote access to your computer to show the user how it can be done.

Unfortunately, the “technician” claims that an error has occurred and informs the user that they have accidentally sent too much money to the user’s account. They then use intimidation and accusations to get the user to withdraw money from the account and send it to an address to settle their debts. Users are then further extorted when the technicians inform them that the package was never received. Hundreds of people forked over hundreds of thousands of dollars in the first half of this year as a result of this scheme.

You might think you wouldn’t fall for such a trick, but the fact of the matter is that these victims didn’t think they would, either. These scams never stop, and there is always a new one to take the place of the old. There are some commonalities amongst them, though. These scams:

  • Use the name of a popular and well-established organization
  • Send emails with attachments or links that, if you look past the frenetic content of the message, seem completely suspect. 
  • Use urgency to stress the user out and make mistakes they normally wouldn’t.

Questions About Phishing You Need to Consider

If you ever suspect that you have received a phishing message, then consider asking the following questions:

  • Who Sent It? – Are there irregularities in the address it came from, are names or suffixes misspelled, or does it come from someone who has never corresponded with you before?
  • What Does the Message Contain? - Are there any links shared in it, does a strange URL appear when you hover your cursor over them, are there any attachments?
  • What Does the Message Actually Say? – Are there spelling and grammar issues in a professional email, is there an excessive sense of urgency or time sensitivity communicated, or is there a request to do something like share data or forward access credentials?

If you can’t stop phishing attacks, the least you can do is be prepared to thwart them. ClearView IT can help in this effort. To learn more about how we can protect your business, reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Small Business Smartphones Microsoft Office Mobile Devices Network Communication Managed IT Services Data Recovery Quick Tips Productivity Social Media Users VoIP Mobile Device Automation Tech Term Windows 10 Business Continuity Facebook Passwords Holiday Disaster Recovery Covid-19 IT Support Browser Apps Managed Service Windows 10 Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Internet of Things Data Management Remote Work Saving Money Operating System Government Artificial Intelligence Managed IT services Gadgets Networking Windows Workplace Strategy Spam WiFi Server Information Bandwidth Encryption Mobile Device Management App Business Technology Virtualization Blockchain Remote Office 365 Budget History Gmail Office Apple Two-factor Authentication Employee/Employer Relationship Information Technology Conferencing Access Control Data Security Cybercrime Wi-Fi BDR Health Big Data Analytics Document Management Hacker Save Money Voice over Internet Protocol Patch Management Vendor Compliance Remote Monitoring Employer-Employee Relationship Help Desk Hacking Cost Management IT Management Training Remote Computing Password Legal Data storage Money Customer Service Mobile Office Unified Threat Management Firewall Applications Managed Services Augmented Reality Word Search... Project Management BYOD Vulnerabilities Best Practice IBM Website Computing Vendor Management Retail Hard Drive Alert Hiring/Firing Outlook Data loss Printer VPN Windows 11 Chrome Update Social Remote Workers Sports Travel SaaS DDoS Virtual Reality Data Breach Social Engineering Mobile Computing Cryptocurrency Paperless Office Windows 7 Free Resource Antivirus Black Market Marketing iPhone Cleaning Maintenance Running Cable Education Cortana How To Robot Content Filtering Monitoring Storage Healthcare Websites Router Mobility Meetings The Internet of Things YouTube Twitter Google Maps User Scam Law Enforcement End of Support Laptop Video Conferencing Virtual Machines Downtime Tech Terms Hack Safety Identity Theft Computer Repair Notifications Managed IT Digital Unified Communications Virtual Assistant Professional Services Virtual Desktop PowerPoint Experience Google Docs Bluetooth Taxes Administration Distributed Denial of Service Managed Services Provider Presentation Office Tips Memory Specifications Private Cloud Processor IT Consultant Virtual Private Network Disaster Physical Security Current Events Customer Relationship Management Politics Co-Managed IT Settings Lithium-ion battery Entertainment Machine Learning Solutions Multi-factor Authentication Start Menu Solid State Drive Downloads Integration Computer Care Images 101 Display Processors Vulnerability Saving Time Chromebook Software as a Service Drones Data Protection Computers Bitcoin Employees Automobile Avoiding Downtime HIPAA Telephone Holidays How To Wireless Technology Microchip eWaste Excel Flexibility Cooperation In Internet of Things Television Security Cameras Teamwork Telephony Trends intranet Employer Employee Relationship Mobile Technology 2FA Data Storage Hypervisor Wireless Hacks Customer Resource management Shortcut Network Congestion Cabling Devices Heating/Cooling Writing Tablet Environment G Suite Tip of the week Shopping Reliable Computing Fileless Malware Medical IT Windows XP Mouse SQL Server VoIP Gamification Social Networking Tracking Company Culture Paperless PCI DSS Licensing Telephone System Regulations Backup and Disaster Recovery Web Server Gig Economy Humor Inbound Marketing Scalability Directions Supply Chain Administrator SharePoint Azure Text Messaging Content Proactive IT Digital Payment Desktop Business Communications Internet Service Provider Regulations Compliance Managed IT Service Bring Your Own Device Electronic Medical Records Worker Accountants Access Database Memes Workplace Electronic Payment Time Management Music Public Cloud Human Resources Net Neutrality Financial Data Staffing Health IT Equifax IP Address Spyware Tactics Hard Drive Disposal Risk Management IT Audit Scams Botnet Phone System Username File Sharing Google Apps Freedom of Information Telework Rental Service Redundancy Micrsooft Startup Flash Cache Addiction email scam Smartwatch Communitications Navigation Microsoft 365 Cables Telephone Systems Unified Threat Management Business Growth Workers Mobile Security Procurement News FinTech Recovery User Tip Competition Legislation Computer Accessories Network Management CCTV CES IT Assessment Printing Evernote Point of Sale Supply Chain Management LiFi Value Banking Touchscreen Entrepreneur Google Wallet Computer Malfunction Fake News Organization Cyber security Documents Messenger Emergency Proxy Server Shortcuts Application Deep Learning Emails Vendor Mangement Service Level Agreement Business Intelligence Computing Infrastructure Smart Devices Remote Working Business Metrics Management Hosted Solution Samsung Device security Uninterrupted Power Supply Wireless Headphones Webcam Microsoft Excel AI Trend Micro Securty Books Be Proactive Tech Transportation Domains Language Business Mangement Going Green Society Business Cards Digital Security Cameras Electronic Health Records Wasting Time Error Tablets Monitors Visible Light Communication eCommerce Troubleshooting Reading Bookmark Modem Workplace Strategies Google Calendar Term Download Windows 8 Supercomputer Piracy Videos Surveillance Managing Costs Virus HTML Public Speaking Displays Nanotechnology Advertising Motion Sickness Relocation Browsers SSID Streaming Media Comparison Google Play Employer/Employee Relationships Work/Life Balance Google Drive Upload Tech Support Software License Media Development Virtual Machine Social Network Keyboard Hard Drives Corporate Profile Screen Reader Reviews Optimization Business Owner Knowledge Data Analysis Smart Technology

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?