Watch Out for the Computer Takeover Scam

Financial Fraud Action UK (FFA UK) is warning of people of a new-style telephone scam where fraudsters impersonate major companies and organisations to take over computers and steal money from online bank accounts.

There has been a recent increase in reports of this type of scam to Action Fraud where criminals are using technology to take control of victims’ computers from remote locations, after telephoning them and offering to help with a slow computer/internet connection.

To carry out this fraud, scammers are impersonating Internet service providers, computer companies, banks, software firms and law enforcement. They are also claiming to be calling as a result of recent high-profile data breaches.

The scammers claim there is a problem with the victim’s computer or Internet service, which is causing it to run slowly. They say they can fix it but need to access their computer to do so.

Victims are then asked either to visit a website or enter a command prompt on their computer, which gives the scammers control of the machine remotely.

The fraudster will take some time to ‘fix’ the problem, in some cases as long as 30 or 40 minutes.

During the call, the scammer will either tell the victim they are entitled to compensation or pretend to put them through to a supervisor, who will make the offer.

The scammer will say they are sending the money and will ask the victim to log into their bank account to check it has arrived.

But the scammers will still have access to the computer and will put up a fake screen, which makes it appear the money has arrived. Working in the background, they will take money from the victim’s bank account. Alternatively, the scammers may transfer money between accounts to make it look like payment has been made.

To avoid falling victim to this scam, you:

    Should be wary of unsolicited approaches by phone claiming to offer a refund.
    
    Should avoid letting someone you do not know or trust have access to their computer, especially remotely.
    Should never log onto your Internet bank while someone else has access to your computer.
    
    Should not share one-time passcodes or card reader codes with anyone.

    Should not disclose your 4-digit card PIN or your online banking password, even by tapping them into the telephone keypad

 ActionFraud: http://bit.ly/1SVx0D1
    

« UK & US Banks Prepare For Cyber Attack Stress Test
Is AI a Threat to Media Jobs? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TechInsurance

TechInsurance

TechInsurance is America's top technology insurance company offering a range of technology related products including Cyber Liability insurance.

Security Audit Systems

Security Audit Systems

Security Audit Systems is a website security specialist providing website security audits and managed web security services.

Seclab

Seclab

Seclab is an innovative player in the protection of industrial systems and critical infrastructure against sophisticated cyber attacks.

ngCERT

ngCERT

ngCERT is the National Computer Emergency Response Team for Nigeria.

ContraForce

ContraForce

ContraForce is a threat detection and response software providing complete visibility across cloud, network, endpoints, user, and email with the ability to target and block threats in real-time.

JFrog

JFrog

JFrog is on a mission to enable continuous updates through Liquid Software, empowering developers to code high-quality applications that securely flow to end-users with zero downtime.

Otorio

Otorio

OTORIO delivers industrial cybersecurity and digital risk-management solutions and services. We help our customers to keep their revenue-generating operations resilient, efficient, and safe.

Noetic Cyber

Noetic Cyber

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture.

Xscale Accelerator

Xscale Accelerator

Xscale's vision is to create world-class startups out of India by transforming sales and providing access to global markets.

Exalens

Exalens

With deep roots in AI-driven cyber-physical security research and intrusion detection, at Exalens, we are enhancing operational resilience for cyber-physical systems at the OT edge.

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.

CLEAR

CLEAR

With more than 17 million members and a growing network of partners across the world, CLEAR's identity platform is transforming the way people live, work, and travel.

Texaport

Texaport

Texaport's vision is to be the trusted partner of choice for organisations seeking comprehensive IT management and cutting-edge security solutions.

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures is an early-stage investment vehicle focused on cybersecurity, data analytics and automation startups.

Averlon

Averlon

Averlon offers organizations peerless cloud security through Panoptic Cloud Visibility, Predictive Attack Intelligence and Rapid Remediation.

SafeLiShare

SafeLiShare

SafeLiShare’s data security platform unifies encryption strategies for organizations with hybrid and multi-cloud infrastructures, ensuring data is secure regardless of its location.