Microsoft Tech Support Scam Crackdown - 39 Arrests

Law enforcement officials in India raided 16 call center locations that conned primarily American and Canadian victims. 

Recently, local law enforcement officials in India raided 16 call centers identified by Microsoft as engaging in tech support fraud, pretending to be affiliated with companies including Microsoft, Apple, Google, Dell, and HP. Thirty-nine have been arrested so far.

In a New York Times report, Ajay Pal, Senior Superintendent of police, said the scammers took money from thousands of primarily American and Canadian victims. Microsoft has received more than 7,000 victim reports from the 16 locations, which are spread over 15 countries.

Call center scammers usually prompt victims with a phone call or pop-up, warning of a computer problem and using scare tactics to get them to call tech support. Victims are manipulated into providing remote access for "further diagnosis" and typically charged a fee of $150 to $499 for unnecessary tech support, which also leaves their computers vulnerable to attacks.

This most recent raid happened six weeks after a successful operation by the Delhi Cyber Crime Cell, which raided 10 call centers, arrested 24 people, and obtained evidence including call scripts, live chats, voice call recordings, and customer records. 

The takedown successes in India reflect broader global effort to combat tech support fraud, Microsoft explains in a blog post.
The post, by Courtney Gregoire, assistant general counsel of Microsoft's Digital Crimes Unit, goes into detail about how analysis of cyber-criminals' behavior is influencing products and services including Windows 10, Windows Defender, and the SmartScreen filter.

Gregoire points out that education is the best defense and advises readers to be wary of unsolicited phone calls or pop-ups. 

Microsoft will never proactively contact customers for PC or technical support, she says. All contact with the company must be initiated by users.

Dark Reading

You Might Also Read:

India Wants A Big Windows Discount From Microsoft:


 

 

 

« Iran Using Websites To Spread Fake News
Facebook CEO Zuckerberg Backed Sharing Customer Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT2Trust

IT2Trust

IT2Trust is one of Scandinavia’s leading value-added distributors of business-critical IT solutions within IT security and networking.

PECB

PECB

PECB is a certification body for persons, management systems, and products on a wide range of international standards in a range of areas including Information Security and Risk Management.

Modux

Modux

Modux focus on a number of core competencies across cyber security including; cyber intelligence & analytics, penetration testing and training.

Bridewell

Bridewell

Bridewell provide cost effective Security & Risk Assurance Services across Information Security, Cyber Security, Technology Risk, Security Testing and Data Privacy.

Crayonic

Crayonic

Crayonic digital identity technologies protect and guarantee the identity of people and things.

Cloud Managed Networks

Cloud Managed Networks

Cloud Managed Networks provides enterprise grade IT network solutions for cloud-based and on premise network security, Wi-Fi, data switching, collaboration, device management and more.

Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71)

Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71)

Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71) is Singapore's first cybersecurity entrepreneur hub.

Drootoo

Drootoo

Drootoo is transforming businesses and making them high performing entities with its unified cloud platform.

Athreon

Athreon

Athreon utilizes a fusion of AI technology, human interpretation, and the latest in cybersecurity to deliver sound business solutions that help our clients make better data-driven decisions.

TPx Communications

TPx Communications

TPx is a leading managed services provider offering a full suite of managed IT, unified communications, network connectivity and security services.

Patriot Consulting Technology Group

Patriot Consulting Technology Group

Patriot Consulting's mission is to help our clients manage cybersecurity risk through secure deployments of Microsoft 365.

Sekoia.io

Sekoia.io

Sekoia.io is a European cybersecurity company whose mission is to develop the best protection capabilities against cyber-attacks.

Semgrep

Semgrep

Semgrep is a fast, open-source, static analysis tool for profoundly improving software security and reliability.

Levio

Levio

Levio is a digital native business and technology consulting firm. As a true partner from start to finish, our goal is a long-lasting transformation that’s right for your business model.

Invisily

Invisily

Invisily makes enterprise and cloud computing resources invisible to attackers with zero trust solutions, making them visible only when needed to only those who need them.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.